WorldWideScience

Sample records for attack wastewater utilities

  1. Reducing the Risks. In the aftermath of a terrorist attack, wastewater utilities may have to contend with decontamination water containing chemical, biological, or radiological substances

    Energy Technology Data Exchange (ETDEWEB)

    Warren, Linda P.; Hornback, Chris; Strom, Daniel J.

    2006-08-01

    In the aftermath of a chemical, biological, or radiological (CBR) attack, decontamination of people and infrastructure will be needed. Decontamination inevitably produces wastewater, and wastewater treatment plants (WTPs) need to know how to handle decontamination wastewater. This article describes CBR substances; planning, coordinating, and communicating responses across agencies; planning within a utility; coordination with local emergency managers and first responders; mitigating effects of decontamination wastewater; and mitigating effects on utility personnel. Planning for Decontamination Wastewater: A Guide for Utilities, the document on which this article is based, was developed under a cooperative agreement from the U.S. Environmental Protection Agency by the National Association of Clean Water Agencies (NACWA) and its contractor, CH2MHILL, Inc.

  2. Protecting water and wastewater infrastructure from cyber attacks

    Institute of Scientific and Technical Information of China (English)

    Srinivas Panguluri; William Phillips; John Cusimano

    2011-01-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion:cyber attacks are real and can cause significant damages.This paper presents some recent statistics on cyber attacks and resulting damages.Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks.Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are:1) the increasing interconnection of their business and control system networks,2) large variation of proprietary industrial control equipment utilized,3) multitude of cross-sector cyber-security standards,and 4) the differences in the equipment vendor's approaches to meet these security standards.The utilities can meet these challenges by voluntarily selecting and adopting security standards,conducting a gap analysis,performing vulnerability/risk analysis,and undertaking countermeasures that best meets their security and organizational requirements.Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years.Implementing cyber security does not necessarily have to be expensive,substantial improvements can be accomplished through policy,procedure,training and awareness.Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  3. Protecting water and wastewater infrastructure from cyber attacks

    Science.gov (United States)

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  4. Resourceful Utilization of Tannery Wastewater

    Institute of Scientific and Technical Information of China (English)

    Wang Chen; Wang Xikui; Ding Maochen; Zhang Chaoyu

    2012-01-01

    Leather industry is an important light industry in China. Leather making requires a series of chemical treatment. Degreasing, unhairing and chrome tanning wastewaters are the main portions of tannery wastewater. Reclaiming and reusing these wastewaters can eliminate 80% of COD, 75% of BOD, 95% of chromium and 93% of sulfuret, furthermore reduce environment impact, decrease treatment costs, save chemicals and water. Some application methods of wastewater reclamation and reuse for dif- ferent operations were reported. The suitable reclamation and reuse technologies can enable leather making processes more ra- tional, and realize the recovery and recycle of several chemicals in the tannery. Resourceful utilization of tannery wastewater should mate with renovating production technology, updating equipment, and must be guaranteed sufficiently by environmental protection measures.

  5. Utilizing Probabilistic Linear Equations in Cube Attacks

    Institute of Scientific and Technical Information of China (English)

    Yuan Yao; Bin Zhang; Wen-Ling Wu

    2016-01-01

    Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of cube attacks. Moreover, cube attacks are hard to apply if linear equations are rare. Therefore, it is of significance to make use of probabilistic linear equations, namely nonlinear superpolys that can be approximated by linear expressions effectively. In this paper, we suggest a way to test out and utilize these probabilistic linear equations, thus extending cube attacks to a wider scope. Concretely, we employ the standard parameter estimation approach and the sequential probability ratio test (SPRT) for linearity test in the preprocessing phase, and use maximum likelihood decoding (MLD) for solving the probabilistic linear equations in the online phase. As an application, we exhibit our new attack against 672 rounds of Trivium and reduce the number of key bits to search by 7.

  6. Asset Management for Water and Wastewater Utilities

    Science.gov (United States)

    Renewing and replacing the nation's public water infrastructure is an ongoing task. Asset management can help a utility maximize the value of its capital as well as its operations and maintenance dollars.

  7. A comprehensive review on utilization of wastewater from coffee processing.

    Science.gov (United States)

    Rattan, Supriya; Parande, A K; Nagaraju, V D; Ghiwari, Girish K

    2015-05-01

    The coffee processing industry is one of the major agro-based industries contributing significantly in international and national growth. Coffee fruits are processed by two methods, wet and dry process. In wet processing, coffee fruits generate enormous quantities of high strength wastewater requiring systematic treatment prior to disposal. Different method approach is used to treat the wastewater. Many researchers have attempted to assess the efficiency of batch aeration as posttreatment of coffee processing wastewater from an upflow anaerobic hybrid reactor (UAHR)-continuous and intermittent aeration system. However, wet coffee processing requires a high degree of processing know-how and produces large amounts of effluents which have the potential to damage the environment. Characteristics of wastewater from coffee processing has a biological oxygen demand (BOD) of up to 20,000 mg/l and a chemical oxygen demand (COD) of up to 50,000 mg/l as well as the acidity of pH below 4. In this review paper, various methods are discussed to treat coffee processing wastewaters; the constitution of wastewater is presented and the technical solutions for wastewater treatment are discussed.

  8. Estimated Buried Utility Water and Wastewater Lines at Little Bighorn Battlefield National Monument, Montana

    Data.gov (United States)

    National Park Service, Department of the Interior — The water and wastewater lines were compiled from utility lines collected with GPS equipment in the summer of 2003 and then merged with older water line data...

  9. Production of Spirulina sp by utilization of wastewater from the powder type energy drinks

    Science.gov (United States)

    Sumantri, Indro; Priyambada, Ika Bagus

    2015-12-01

    Wastewater of energy drink type of powder produced when the the production equipment required cleaning treatment to produce one taste to others. These equipments washed by water, so that, it produced wastewater. It contains high organic substances and classified as high degradable due to food product. The content of wastewater is high carbon and nitrogen substances. Microalgae is an autotrophic microorganism, live without carbon presence, utilized to digest the substances in wastewater especially for nitrogen substances. Spirulina sp is the type of microalgae selected to utilize the wastewater of energy drink, the selection criteria is the size of Spirulina sp is relatively large and easy to separated from its solution. The experiment conducted by cultivate the seeding microalgae with certain nutrients until the certain volume. The synthetic wastewater obtained from one of energy drink type of powder with commercial brand as Kuku Bima Ener-G, the wastewater concentration selected under the close to the real condition of wastewater as basis of COD measurement (6 sachet/L or COD of 12.480mg/L) and aqueous concentration (1 sachet/L or COD of 2080mg/L). The batch experiments with 1L volume conducted and with variable of percent volume of wastewater added in order to observe the growth of microlagae. The response of the microalgae growth obtained by increasing the optical density of the microalgae solution and continued by calculation for the growth rate of microalgae. The result of the experiments indicated that for the aqueous concentration (1 sachet/L or COD of 2080mg/L) the optimum added of wastewater is 40 % with growrate of 0.55/day while for the concentrated wastewater (6 sachet/L or COD of 12.480mg/L), the optimum condition is 25 % wastewater added with growth rate of 0.43/day.

  10. Utilization of municipal wastewater for cooling in thermoelectric power plants

    Energy Technology Data Exchange (ETDEWEB)

    Safari, Iman [Illinois Inst. of Technology, Chicago, IL (United States); Walker, Michael E. [Illinois Inst. of Technology, Chicago, IL (United States); Hsieh, Ming-Kai [Carnegie Mellon Univ., Pittsburgh, PA (United States); Dzombak, David A. [Carnegie Mellon Univ., Pittsburgh, PA (United States); Liu, Wenshi [Univ. of Pittsburgh, PA (United States); Vidic, Radisav D. [Univ. of Pittsburgh, PA (United States); Miller, David C. [National Energy Technology Lab. (NETL), Morgantown, WV (United States); Abbasian, Javad [Illinois Inst. of Technology, Chicago, IL (United States)

    2013-09-01

    A process simulation model has been developed using Aspen Plus® with the OLI (OLI System, Inc.) water chemistry model to predict water quality in the recirculating cooling loop utilizing secondary- and tertiary-treated municipal wastewater as the source of makeup water. Simulation results were compared with pilot-scale experimental data on makeup water alkalinity, loop pH, and ammonia evaporation. The effects of various parameters including makeup water quality, salt formation, NH3 and CO2 evaporation mass transfer coefficients, heat load, and operating temperatures were investigated. The results indicate that, although the simulation model can capture the general trends in the loop pH, experimental data on the rates of salt precipitation in the system are needed for more accurate prediction of the loop pH. It was also found that stripping of ammonia and carbon dioxide in the cooling tower can influence the cooling loop pH significantly. The effects of the NH3 mass transfer coefficient on cooling loop pH appear to be more significant at lower values (e.g., kNH3 < 4×10-3 m/s) when the makeup water alkalinity is low (e.g., <90 mg/L as CaCO3). The effect of the CO2 mass transfer coefficient was found to be significant only at lower alkalinity values (e.g., kCO2<4×10-6 m/s).

  11. Purification and utilization of garlic processing wastewater in lotus pond wetlands

    Institute of Scientific and Technical Information of China (English)

    Jun PANG; Xue-ling FENG; Xiu-feng WANG

    2014-01-01

    Based on the experiments of utilization of garlic processing wastewater in a lotus pond, this study demonstrates that lotus pond wetlands have a remarkable ability to remove organic pollutants and decrease chemical oxygen demand (CODCr), biochemical oxygen demand (BOD5), and suspended substances (SS) in garlic processing wastewater. Results also show evident effects of lotus roots on absorption of NH3-N. The pH value in a lotus pond with wastewater discharged was relatively stable. The water quality in the lotus pond reached the classⅡ emission standard, according to the Integrated Wastewater Discharge Standard (GB8978-1996), seven days after pretreated garlic processing wastewater had been discharged into the lotus pond. Garlic processing wastewater irrigation does not produce pollution in the pond sediment and has no negative effect on the growth of lotus roots. Due to utilization of garlic processing wastewater, the output of lotus roots increased by 3.0% to 8.3%, and the quality of lotus roots was improved. Therefore, better purification and utilization results can be achieved.

  12. Supply-chain environmental effects of wastewater utilities

    Science.gov (United States)

    Stokes, Jennifer R.; Horvath, Arpad

    2010-01-01

    This letter describes a comprehensive modeling framework and the Wastewater-Energy Sustainability Tool (WWEST) designed for conducting hybrid life-cycle assessments of the wastewater collection, treatment, and discharge infrastructure in the United States. Results from a case study treatment plant which produces electricity using methane offgas are discussed. The case study system supplements influent with 'high-strength organic waste' to augment electricity production. The system balance is 55 kg of greenhouse gases per million liters of wastewater. Sensitivity analysis confirms that reusing biogas from anaerobic digestion for electricity reduces life-cycle greenhouse gas emissions by nine times. When biogas is captured and reused for electricity, material production (e.g., chemicals and pipes) and the corresponding supply chains, rather than energy production, are responsible for most of the environmental effects. When biogas is flared, the material and energy production contributions are similar.

  13. Economic analysis of municipal wastewater utilization for thermoelectric power production

    Energy Technology Data Exchange (ETDEWEB)

    Safari, I.; Walker, M.; Abbasian, J.; Arastoopour, H.; Hsieh, M-K.; Theregowda, R.; Dzombak, D.; Miller, D.

    2011-01-01

    The thermoelectric power industry in the U.S. uses a large amount of freshwater. The large water demand is increasingly a problem, especially for new power plant development, as availability of freshwater for new uses diminishes in the United States. Reusing non-traditional water sources, such as treated municipal wastewater, provides one option to mitigate freshwater usage in the thermoelectric power industry. The amount of freshwater withdrawal that can be displaced with non-traditional water sources at a particular location requires evaluation of the water management and treatment requirements, considering the quality and abundance of the non-traditional water sources. This paper presents the development of an integrated costing model to assess the impact of degraded water treatment, as well as the implications of increased tube scaling in the main condenser. The model developed herein is used to perform case studies of various treatment, condenser cleaning and condenser configurations to provide insight into the ramifications of degraded water use in the cooling loops of thermoelectric power plants. Further, this paper lays the groundwork for the integration of relationships between degraded water quality, scaling characteristics and volatile emission within a recirculating cooling loop model.

  14. Utilization of secondary-treated wastewater for the production of freshwater microalgae.

    Science.gov (United States)

    Gómez-Serrano, C; Morales-Amaral, M M; Acién, F G; Escudero, R; Fernández-Sevilla, J M; Molina-Grima, E

    2015-08-01

    In this work, we studied the potential use of secondary-treated wastewater as nutrient source in the production of freshwater microalgae strains. Experiments were performed indoors in a semicontinuous mode, at 0.3 day(-1), simulating outdoor conditions. We demonstrated that all the tested strains can be produced by using only secondary-treated wastewater as the nutrient source. The utilization of secondary-treated wastewater imposes nutrient-limiting conditions, with maximal biomass productivity dropping to 0.5 g l(-1) day(-1) and modifies the biochemical composition of the biomass by increasing the amount of lipids and carbohydrates while reducing the biomass protein content. We measured fatty acid content and productivity of up to 25 %d.wt. and 110 mg l(-1) day(-1), respectively. We demonstrated that all the tested strains were capable of completely removing the nitrogen and phosphorus contained in the secondary-treated wastewater, and while the use of this effluent reduced the cells' photosynthetic efficiency, the nitrogen and phosphorus coefficient yield increased. Muriellopsis sp. and S. subpicatus were selected as the most promising strains for outdoor production using secondary-treated wastewater as the culture medium; this was not only because of their high productivity but also their photosynthetic efficiency, of up to 2.5 %, along with nutrient coefficient yields of up to 96 gbiomass gN (-1) and 166 gbiomass gP (-1). Coupling microalgae production processes to tertiary treatment in wastewater treatment plants make it possible to recover nutrients contained in the water and to produce valuable biomass, especially where nutrient removal is required prior to wastewater discharge.

  15. NEUTRALIZING WASTEWATER FROM PUBLIC UTILITIES ON RURAL AREAS

    Directory of Open Access Journals (Sweden)

    Piotr Bugajski

    2015-10-01

    Full Text Available The research aimed at determining a potential use of domestic sewage treatment plants based on activated sludge for the disposal of wastes drained from schools in rural areas. Selected pollutant indicators, such as: BOD5, COD, total suspended solids, total nitrogen and phosphates were the basis for determining the composition of raw sewage discharged by public utility objects and the quality of treated sewage considering the days when lessons were taking place at school and days free from classes. The analysis of the results revealed that household sewage treatment plants based on activated sludge may be used for waste disposal from public facilities, such as schools.

  16. Enhanced biomass production through optimization of carbon source and utilization of wastewater as a nutrient source.

    Science.gov (United States)

    Gupta, Prabuddha L; Choi, Hee-Jeong; Pawar, Radheshyam R; Jung, Sokhee P; Lee, Seung-Mok

    2016-12-15

    The study aimed to utilize the domestic wastewater as nutrient feedstock for mixotrophic cultivation of microalgae by evaluating appropriate carbon source. The microalgae Chlorella vulgaris was cultivated in municipal wastewater under various carbon sources (glucose, glycerol, and acetate), followed by optimization of appropriate carbon source concentration to augment the biomass, lipid, and carbohydrate contents. Under optimized conditions, namely of 5 g/L glucose, C. vulgaris showed higher increments of biomass with 1.39 g/L dry cell weight achieving biomass productivity of 0.13 g/L/d. The biomass accumulated 19.29 ± 1.83% total lipid, 41.4 ± 1.46% carbohydrate, and 33.06 ± 1.87% proteins. Moreover, the cultivation of Chlorella sp. in glucose-supplemented wastewater removed 96.9% chemical oxygen demand, 65.3% total nitrogen, and 71.2% total phosphate. The fatty acid methyl ester obtained showed higher amount (61.94%) of saturated fatty acid methyl esters associated with the improved fuel properties. These results suggest that mixotrophic cultivation using glucose offers great potential in the production of renewable biomass, wastewater treatment, and consequent production of high-value microalgal oil.

  17. Design and operation of an eco-system for municipal wastewater treatment and utilization.

    Science.gov (United States)

    Wang, L; Peng, J; Wang, B; Yang, L

    2006-01-01

    An eco-system consisting of integrated ponds and constructed wetland systems is employed in Dongying City, Shandong Province for the treatment and utilization of municipal wastewater with design capacity of 100,000 m(3)/d. The total capital cost of this system is 680 Yuan (RMB) or US dollars 82/m(3)/d, or about half that of the conventional system based on activated sludge process, and the O/M cost is 0.1 Yuan (RMB) or US dollars 0.012/m(3), only one fifth that of conventional treatment systems. The performance of the wastewater treatment and utilization eco-system is quite good with a final effluent COD, BOD, SS, NH3-N and TP of 45-65 mg/l, 7-32 mg/l, 12-35 mg/l, 2-13 mg/l and 0.2-1.8mg/l respectively and the annual average removals of COD, BOD, SS, NH3-N and TP are 69.1%, 78.3%, 76.4%, 62.1% and 52.9%o respectively, which is much better than that of conventional pond system or constructed wetland used separately and illustrates that the artificial and integrated eco-system is more effective and efficient than the simple natural eco-system.

  18. An innovative integrated system utilizing solar energy as power for the treatment of decentralized wastewater

    Institute of Scientific and Technical Information of China (English)

    Changfu Han; Junxin Liu; Hanwen Liang; Xuesong Guo; Lin Li

    2013-01-01

    This article reports an innovative integrated system utilizing solar energy as power for decentralized wastewater treatment,which consists of an oxidation ditch with double channels and a photovoltaic (PV) system without a storage battery.Because the system operates without a storage battery,which can reduce the cost of the PV system,the solar radiation intensity affects the amount of power output from the PV system.To ensure that the power output is sufficient in all different weather conditions,the solar radiation intensity of 78 W/m2 with 95% confidence interval was defined as a threshold of power output for the PV system according to the monitoring results in this study,and a step power output mode was used to utilize the solar energy as well as possible.The oxidation ditch driven by the PV system without storage battery ran during the day and stopped at night.Therefore,anaerobic,anoxic and aerobic conditions could periodically appear in the oxidation ditch,which was favorable to nitrogen and phosphate removal from the wastewater.The experimental results showed that the system was efficient,achieving average removal efficiencies of 88% COD,98% NH4+-N,70% TN and 83% TP,under the loading rates of 140 mg COD/(g MLSS·day),32 mg NH4+-N/(g MLSS·day),44 mg TN/(g MLSS·day) and 5mg TP/(g MLSS·day).

  19. An innovative integrated system utilizing solar energy as power for the treatment of decentralized wastewater.

    Science.gov (United States)

    Han, Changfu; Liu, Junxin; Liang, Hanwen; Guo, Xuesong; Li, Lin

    2013-02-01

    This article reports an innovative integrated system utilizing solar energy as power for decentralized wastewater treatment, which consists of an oxidation ditch with double channels and a photovoltaic (PV) system without a storage battery. Because the system operates without a storage battery, which can reduce the cost of the PV system, the solar radiation intensity affects the amount of power output from the PV system. To ensure that the power output is sufficient in all different weather conditions, the solar radiation intensity of 78 W/m2 with 95% confidence interval was defined as a threshold of power output for the PV system according to the monitoring results in this study, and a step power output mode was used to utilize the solar energy as well as possible. The oxidation ditch driven by the PV system without storage battery ran during the day and stopped at night. Therefore, anaerobic, anoxic and aerobic conditions could periodically appear in the oxidation ditch, which was favorable to nitrogen and phosphate removal from the wastewater. The experimental results showed that the system was efficient, achieving average removal efficiencies of 88% COD, 98% NH4+-N, 70% TN and 83% TP, under the loading rates of 140 mg COD/(g MLSS x day), 32 mg NH4+-N/(g MLSS x day), 44 mg TN/(g MLSS x day) and 5 mg TP/(g MLSS x day).

  20. The Effects of Operational and Environmental Variables on Efficiency of Danish Water and Wastewater Utilities

    Directory of Open Access Journals (Sweden)

    Andrea Guerrini

    2015-06-01

    Full Text Available Efficiency improvement is one of three patterns a public utility should follow in order to get funds for investments realization. The other two are recourse to bank loans or to private equity and tariff increase. Efficiency can be improved, for example, by growth and vertical integration and may be conditioned by environmental variables, such as customer and output density. Prior studies into the effects of these variables on the efficiency of water utilities do not agree on certain points (e.g., scale and economies of scope and rarely consider others (e.g., density economies. This article aims to contribute to the literature by analysing the efficiency of water utilities in Denmark, observing the effects of operational and environmental variables. The method is based on two-stage Data Envelopment Analysis (DEA applied to 101 water utilities. We found that the efficiency of the water sector was not affected by the observed variables, whereas that of wastewater was improved by smaller firm size, vertical integration strategy, and higher population density.

  1. Removal of basic dye (methylene blue) from wastewaters utilizing beer brewery waste

    Energy Technology Data Exchange (ETDEWEB)

    Tsai, W.-T. [Graduate Institute of Bioresources, National Pingtung University of Science and Technology, Pingtung 912, Taiwan (China)], E-mail: wttsai@mail.npust.edu.tw; Hsu, H.-C.; Su, T.-Y.; Lin, K.-Y.; Lin, C.-M. [Department of Environmental Engineering and Science, Chia Nan University of Pharmacy and Science, Tainan 717, Taiwan (China)

    2008-06-15

    In the work, the beer brewery waste has been shown to be a low-cost adsorbent for the removal of basic dye from the aqueous solution as compared to its precursor (i.e., diatomite) based on its physical and chemical characterizations including surface area, pore volume, scanning electron microscopy (SEM), and non-mineral elemental analyses. The pore properties of this waste were significantly larger than those of its raw material, reflecting that the trapped organic matrices contained in the waste probably provided additional adsorption sites and/or adsorption area. The results of preliminary adsorption kinetics showed that the diatomite waste could be directly used as a potential adsorbent for removal of methylene blue on the basis of its adsorption-biosorption mechanisms. The adsorption parameters thus obtained from the pseudo-second-order model were in accordance with their pore properties. From the results of adsorption isotherm at 298 K and the applicability examinations in treating industrial wastewater containing basic dye, it was further found that the adsorption capacities of diatomite waste were superior to those of diatomite, which were also in good agreement with their corresponding physical properties. From the results mentioned above, it is feasible to utilize the food-processing waste for removing dye from the industrial dying wastewater.

  2. Utilization of Shochu distillery wastewater for production of polyunsaturated fatty acids and xanthophylls using thraustochytrid.

    Science.gov (United States)

    Yamasaki, Takashi; Aki, Tsunehiro; Shinozaki, Masami; Taguchi, Masahiro; Kawamoto, Seiji; Ono, Kazuhisa

    2006-10-01

    The industrial production of barley shochu, a distilled alcoholic beverage, results in distillery waste that is currently incinerated or disposed of in landfills, causing environmental pollution. The supernatant of distillery waste contains organic matter such as proteins ( approximately 2.5%) and amino acids ( approximately 0.2%). This study demonstrates that the utilization of distillery wastewater as a sole nitrogen source enables a marine thraustochytrid, Schizochytrium sp. strain KH105, to propagate and accumulate valuable lipids including docosahexaenoic acid (DHA) and astaxanthin. Under optimized culture conditions, the highest DHA and astaxanthin yields were obtained at 3.4 g/l and 7.7 mg/l, respectively, after 4 or 5 d of cultivation in a 3-l jar fermentor. The chemical oxygen demand of the wastewater was reduced by 35%. About 67% of crude protein content and 85% of total free amino acid content also decreased in the culture supernatant. The thraustochytrid therefore serves to upgrade the distillery by-product to one containing value-added lipids for functional foods as well as to regulate the environmental contamination.

  3. Barriers to Innovation in Urban Wastewater Utilities: Attitudes of Managers in California

    Science.gov (United States)

    Kiparsky, Michael; Thompson, Barton H.; Binz, Christian; Sedlak, David L.; Tummers, Lars; Truffer, Bernhard

    2016-06-01

    In many regions of the world, urban water systems will need to transition into fundamentally different forms to address current stressors and meet impending challenges—faster innovation will need to be part of these transitions. To assess the innovation deficit in urban water organizations and to identify means for supporting innovation, we surveyed wastewater utility managers in California. Our results reveal insights about the attitudes towards innovation among decision makers, and how perceptions at the level of individual managers might create disincentives for experimentation. Although managers reported feeling relatively unhindered organizationally, they also spend less time on innovation than they feel they should. The most frequently reported barriers to innovation included cost and financing; risk and risk aversion; and regulatory compliance. Considering these results in the context of prior research on innovation systems, we conclude that collective action may be required to address underinvestment in innovation.

  4. Barriers to Innovation in Urban Wastewater Utilities: Attitudes of Managers in California.

    Science.gov (United States)

    Kiparsky, Michael; Thompson, Barton H; Binz, Christian; Sedlak, David L; Tummers, Lars; Truffer, Bernhard

    2016-06-01

    In many regions of the world, urban water systems will need to transition into fundamentally different forms to address current stressors and meet impending challenges-faster innovation will need to be part of these transitions. To assess the innovation deficit in urban water organizations and to identify means for supporting innovation, we surveyed wastewater utility managers in California. Our results reveal insights about the attitudes towards innovation among decision makers, and how perceptions at the level of individual managers might create disincentives for experimentation. Although managers reported feeling relatively unhindered organizationally, they also spend less time on innovation than they feel they should. The most frequently reported barriers to innovation included cost and financing; risk and risk aversion; and regulatory compliance. Considering these results in the context of prior research on innovation systems, we conclude that collective action may be required to address underinvestment in innovation.

  5. Caffeine in Boston Harbor past and present, assessing its utility as a tracer of wastewater contamination in an urban estuary

    Science.gov (United States)

    Sites throughout Boston Harbor were analyzed for caffeine to assess its utility as a tracer in identifying sources of sanitary wastewater. Caffeine ranged from 15 ng/L in the outer harbor to a high of 185 ng/L in the inner harbor. Inner harbor concentrations were a result of comb...

  6. Navy and the HARV: High angle of attack tactical utility issues

    Science.gov (United States)

    Sternberg, Charles A.; Traven, Ricardo; Lackey, James B.

    1994-01-01

    This presentation will highlight results from the latest Navy evaluation of the HARV (March 1994) and focus primarily on the impressions from a piloting standpoint of the tactical utility of thrust vectoring. Issue to be addressed will be mission suitability of high AOA flight, visual and motion feedback cues associated with operating at high AOA, and the adaptability of a pilot to effectively use the increased control power provided by the thrust vectoring system.

  7. Estimation of Viable Biomass In Wastewater And Activated Sludge By Determination of ATP, Oxygen Utilization Rate And FDA Hydrolysis

    DEFF Research Database (Denmark)

    Jørgensen, Poul-Erik; Eriksen, T.; Jensen, B.K.

    1992-01-01

    ATP content, oxygen utilization rate (OUR) and fluorescein diacetate (FDA) hydrolysis were tested for the ability to express the amount of viable biomass in wastewater and activated sludge. The relationship between biomass and these activity parameters was established in growth cultures made...... with biomass, while FDA hydrolysis in the sludge failed to show any such correlation. Conversion factors of 3 mg ATP/g dw, 300 mg O2/h g dw and 0.4 A/h (mg dw/ml) for ATP, OUR and FDA methods, respectively, were calculated. When the methods were applied for in situ determinations in four different wastewater...... plants, it was found that ATP content and respiration rate estimated viable biomass to range from 81 to 293 mg dw/g SS for raw wastewater and from 67 to 187 mg dw/g SS for activated sludge with a rather weak correlation between ATP and respiration measurements. The FDA hydrolysis estimated viable biomass...

  8. Utilization of Spirulina platensis for wastewater treatment in fermented rice noodle factory

    Directory of Open Access Journals (Sweden)

    Sumontip Bunnag

    2010-12-01

    Full Text Available Spirulina platensis is a single-cell blue-green alga which belongs to the family Oscillatoriaceae.S. platensis can grow in polluted water and it has been widely used to remove excess nitrate-nitrogenand total phosphorus content in wastewater from noodle factories. This study was aimed to investigatethe effect of wastewater on growth of S. platensis and to examine its potential to reduce nitrate-nitrogenand total phosphorus contents in wastewater from fermented rice noodle factory. Twenty five percentwastewatermixed Zarrouk’s medium gave rise to the highest growth rate of S. platensis. Optical density(OD of S. platensis culture increased from 0.07±0.04 to 0.24±0.12. Also, the results exhibited the leastvalue of nitrate-nitrogen and total phosphorus contents when performed in 25 % and 100 %wastewater-mixed Zarrouk’s media, respectively.

  9. Rural and Small Systems Guidebook to Sustainable Water and Wastewater Utility Management

    Science.gov (United States)

    The Guidebook is designed to introduce rural and small water and wastewater systems to the key areas of effectively managed systems. It provides background information on ten key management areas, instruction, and assistance.

  10. Assessment of wastewater treatment plant effluent on fish reproduction utilizing the adverse outcome pathway conceptual framework

    Science.gov (United States)

    Wastewater treatment plant (WWTP) effluents are a known contributor of chemical mixture inputs into the environment. Whole effluent testing guidelines were developed to screen these complex mixtures for acute toxicity. However, efficient and cost-effective approaches for screenin...

  11. Oil and Grease Removal from Industrial Wastewater Using New Utility Approach

    OpenAIRE

    H. S. Abd El-Gawad

    2014-01-01

    The present study is an attempt to investigate oil and grease pollution that may pollute fresh water and influence aquatic environment. Then removal of oil and grease from manufacturing wastewater befall essential but common techniques not enough. Enzyme and adsorption units representing major developed new laboratory were selected to assess the water quality and humiliation prospective of oil and grease from wastewater. Several components and environmental variables that were dissolved oxyge...

  12. Utilization of Potato Protein Recovered from Wastewater of Potato Starch Factory as Cattle Feed

    Directory of Open Access Journals (Sweden)

    Masayuki Takeguchi

    2015-05-01

    Full Text Available A large amount of wastewater is discharged from potato starch factories in Hokkaido, Japan. The wastewater contains residual potato constituents such as protein, which are named potato fruit juice (PFJ. A powerful stench is generated from PFJ by anaerobic fermentation. In this study, the isoelectric precipitation technique was applied to recover the potato protein from PFJ. Protein recovery from PFJ by acid isoelectric precipitation at pH 3.0 or less reached 80%. PFJ post-protein recovery at pH 3.0 does not produce a powerful stench. Potato protein recovered from PFJ by acid treatment is a useful feed resource. The PFJ in potato starch factory is a potentially promising resource for the production of potato protein. Wastewater from potato starch factories does not have to be waste or a source of powerful stench, it can be a valuable resource.

  13. Oil and Grease Removal from Industrial Wastewater Using New Utility Approach

    Directory of Open Access Journals (Sweden)

    H. S. Abd El-Gawad

    2014-01-01

    Full Text Available The present study is an attempt to investigate oil and grease pollution that may pollute fresh water and influence aquatic environment. Then removal of oil and grease from manufacturing wastewater befall essential but common techniques not enough. Enzyme and adsorption units representing major developed new laboratory were selected to assess the water quality and humiliation prospective of oil and grease from wastewater. Several components and environmental variables that were dissolved oxygen, bacteriology measure, flow rate and adsorption material amount studied to assess the removal performance of oil and grease. The results elucidated significant variations among different tests which influenced microbial necessary role of oxidation declining develop biological treatment process reached to 72%. The study stressed out natural material (zeolite that enhanced organic reduction under optimal conditions. These conditions were closer spacing and high length of adsorbing unit that led to increase oil and grease contact period with adsorbent and added to increase performance removal reached to 99%.

  14. Alkaline hydrothermal conversion of fly ash filtrates into zeolites 2: utilization in wastewater treatment.

    Science.gov (United States)

    Somerset, Vernon; Petrik, Leslie; Iwuoha, Emmanuel

    2005-01-01

    Filtrates were collected using a codisposal reaction wherein fly ash was reacted with acid mine drainage. These codisposal filtrates were then analyzed by X-ray Fluorescence spectrometry for quantitative determination of the SiO2 and Al2O3 content. Alkaline hydrothermal zeolite synthesis was then applied to the filtrates to convert the fly ash material into zeolites. The zeolites formed under the experimental conditions were faujasite, sodalite, and zeolite A. The use of the fly ash-derived zeolites and a commercial zeolite was explored in wastewater decontamination experiments as it was applied to acid mine drainage in different dosages. The concentrations of Ni, Zn, Cd, As, and Pb metal ions in the treated wastewater were investigated. The results of the treatment of the acid mine drainage with the prepared fly ash zeolites showed that the concentrations of Ni, Zn, Cd, and Hg were decreased as the zeolite dosages of the fly ash zeolite (FAZ1) increased.

  15. Benchmarking the scientific output of industrial wastewater research in Arab world by utilizing bibliometric techniques.

    Science.gov (United States)

    Zyoud, Shaher H; Al-Rawajfeh, Aiman E; Shaheen, Hafez Q; Fuchs-Hanusch, Daniela

    2016-05-01

    Rapid population growth, worsening of the climate, and severity of freshwater scarcity are global challenges. In Arab world countries, where water resources are becoming increasingly scarce, the recycling of industrial wastewater could improve the efficiency of freshwater use. The benchmarking of scientific output of industrial wastewater research in the Arab world is an initiative that could support in shaping up and improving future research activities. This study assesses the scientific output of industrial wastewater research in the Arab world. A total of 2032 documents related to industrial wastewater were retrieved from 152 journals indexed in the Scopus databases; this represents 3.6 % of the global research output. The h-index of the retrieved documents was 70. The total number of citations, at the time of data analysis, was 34,296 with an average citation of 16.88 per document. Egypt, with a total publications of 655 (32.2 %), was ranked the first among the Arab countries followed by Saudi Arabia 300 (14.7 %) and Tunisia 297 (14.6 %). Egypt also had the highest h-index, assumed with Saudi Arabia, the first place in collaboration with other countries. Seven hundred fifteen (35.2 %) documents with 66 countries in Arab/non-Arab country collaborations were identified. Arab researchers collaborated mostly with researchers from France 239 (11.7 %), followed by the USA 127 (6.2 %). The top active journal was Desalination 126 (6.2 %), and the most productive institution was the National Research Center, Egypt 169 (8.3 %), followed by the King Abdul-Aziz University, Saudi Arabia 75 (3.7 %). Environmental Science was the most prevalent field of interest 930 (45.8 %). Despite the promising indicators, there is a need to close the gap in research between the Arab world and the other nations. Optimizing the investments and developing regional experiences are key factors to promote the scientific research.

  16. Wastewater Refining Technologies and Modes Toward Ultimate Utilization of Wastewater Resource%面向污水资源极尽利用的污水精炼技术与模式探讨

    Institute of Scientific and Technical Information of China (English)

    胡洪营; 吴光学; 吴乾元; 管运涛; 李欢; 陶益

    2015-01-01

    针对现有城镇污水处理系统存在的高投入、高产污和低效率等问题,提出了面向污水资源( wastewater resource)极尽利用的“污水精炼(wastewater refining)”新理念,剖析了实现污水精炼的关键技术和可能的技术途径。污水精炼的核心理念是将污水视为资源,改变以污染物分解和去除为基础的现有处理技术原理,通过污水中有价值物质的精细化筛分和定向增值转化,实现污水中水、有机质和无机盐等资源的安全、高效和极尽利用。污水精炼主要包括筛分、转化和利用3个关键环节。基于技术分析,针对不同的场景,提出了污水精炼生态模式(wRefine-E)和污水精炼高端模式(wRefine-S)2种技术途径,并对污水精炼关键技术( wastewater refining technology)进行了较为系统的分析;同时指出,再生水安全高效利用是污水精炼技术发展的重要推动力,污水再生与资源能源转化耦合是未来的必然发展方向。%The present municipal wastewater treatment processes possess problems such as high investment, high waste yield and low efficiency.A new concept of wastewater refining was proposed toward ultimate utilization of wastewater resource, and key technologies and possible pathways to realize the concept analyzed.The core concept of wastewater refining is considering wastewater as resource.By changing the present treatment principles of pollutants degradation and removal, safe and efficient utilization of water, organic matters and inorganic salts can be realized by fine separation and directional transformation of valuable materials in wastewater.Wastewater refining includes three key processes of separation, transformation and utilization.Based on the technical analysis, two technical pathways of ecological and high-end modes of wastewater refining were presented for different cases.In addition, wastewater refining technology was

  17. Microbial utilization of the industrial wastewater pollutants 2-ethylhexylthioglycolic acid and iso-octylthioglycolic acid by aerobic gram-negative bacteria.

    Science.gov (United States)

    Toups, Mario; Wübbeler, Jan Hendrik; Steinbüchel, Alexander

    2010-04-01

    Industrial wastewater from the production of sulfur containing esters and the resulting products of this synthesis, 2-ethylhexylthioglycolic acid (EHTG) and iso-octylthioglycolic acid (IOTG), were deployed in this study to enrich novel bacterial strains, since no wastewater and EHTG or IOTG degrading microorganisms were hitherto described or available. In addition, nothing is known about the biodegradation of these thiochemicals. The effect of this specific wastewater on the growth behaviour of microorganisms was investigated using three well-known Gram-negative bacteria (Escherichia coli, Pseudomonas putida, and Ralstonia eutropha). Concentrations of 5% (v/v) wastewater in complex media completely inhibited growth of these three bacterial strains. Six bacterial strains were successfully isolated, characterized and identified by sequencing their 16S rRNA genes. Two isolates referred to as Achromobacter sp. strain MT-E3 and Pseudomonas sp. strain MT-I1 used EHTG or IOTG, respectively, as well as the wastewater as sole source of carbon and energy for weak growth. More notably, both isolates removed these sulfur containing esters in remarkable amounts from the cultures supernatant. One further isolate was referred to as Klebsiella sp. strain 58 and exhibited an unusual high tolerance against the wastewater's toxicity without utilizing the contaminative compounds. If cultivated with gluconic acid as additional carbon source, the strain grew even in presence of more than 40% (v/v) wastewater. Three other isolates belonging to the genera Bordetella and Pseudomonas tolerated these organic sulfur compounds but showed no degradation abilities.

  18. Utilization of AMD sludges from the anthracite region of Pennsylvania for removal of phosphorus from wastewater

    Science.gov (United States)

    Sibrell, P.L.; Cravotta, C.A.; Lehman, W.G.; Reichert, W.

    2010-01-01

    Excess phosphorus (P) inputs from human sewage, animal feeding operations, and nonpoint source discharges to the environment have resulted in the eutrophication of sensitive receiving bodies of water such as the Great Lakes and Chesapeake Bay. Phosphorus loads in wastewater discharged from such sources can be decreased by conventional treatment with iron and aluminum salts but these chemical reagents are expensive or impractical for many applications. Acid mine drainage (AMD) sludges are an inexpensive source of iron and aluminum hydrous oxides that could offer an attractive alternative to chemical reagent dosing for the removal of P from local wastewater. Previous investigations have focused on AMD sludges generated in the bituminous coal region of western Pennsylvania, and confirmed that some of those sludges are good sorbents for P over a wide range of operating conditions. In this study, we sampled sludges produced by AMD treatment at six different sites in the anthracite region of Pennsylvania for potential use as P sequestration sorbents. Sludge samples were dried, characterized, and then tested for P removal from water. In addition, the concentrations of acid-extractable metals and other impurities were investigated. Test results revealed that sludges from four of the sites showed good P sorption and were unlikely to add contaminants to treated water. These results indicate that AMD sludges could be beneficially used to sequester P from the environment, while at the same time decreasing the expense of sludge disposal.

  19. Determination of emerging contaminants in wastewater utilizing comprehensive two-dimensional gas-chromatography coupled with time-of-flight mass spectrometry.

    Science.gov (United States)

    Prebihalo, Sarah; Brockman, Adrienne; Cochran, Jack; Dorman, Frank L

    2015-11-06

    An analytical method for identification of emerging contaminants of concern, such as pesticides and organohalogens has been developed and utilized for true discovery-based analysis. In order to achieve the level of sensitivity and selectivity necessary for detecting compounds in complex samples, comprehensive gas chromatography coupled with time-of-flight mass spectrometry (GC×GC-TOFMS) was utilized to analyze wastewater samples obtained from the Pennsylvania State University wastewater treatment facility (WWTF). Determination of emerging contaminants through a process of combining samples which represent "normal background" and comparing this to new samples was developed. Results show the presence of halogenated benzotriazoles in wastewater samples as well as soil samples from Pennsylvania State University agricultural fields. The trace levels of chlorinated benzotriazoles observed in the monitoring wells present on the property indicate likely environmental degradation of the chlorinated benzotriazoles. Preliminary investigation of environmental fate of the substituted benzotriazoles indicates their likely degradation into phenol; an Environmental Protection Agency (USEPA) priority pollutant.

  20. Optimization of adenosine 5'-triphosphate extraction for the measurement of acidogenic biomass utilizing whey wastewater.

    Science.gov (United States)

    Lee, Changsoo; Kim, Jaai; Hwang, Seokhwan

    2006-08-01

    A set of experiments was carried out to maximize adenosine 5'-triphosphate (ATP) extraction efficiency from acidogenic culture using whey wastewater. ATP concentrations at different microbial concentrations increased linearly as microbial concentration decreased. More than 50% of ATP was extracted from the sample of 39 mg volatile suspended solids (VSS)/l compared to the sample of 2.8 g VSS/l. The ATP concentrations of the corresponding samples were 0.74+/-0.06 and 0.49+/-0.05 mg/l, respectively. For low VSS concentrations ranging from 39 to 92 mg/l, the extracted ATP concentration did not vary significantly at 0.73+/-0.01 mg ATP/l. Response surface methodology with a central composite in cube design for the experiments was used to locate the optimum for maximal ATP extraction with respect to boiling and bead beating treatments. The overall designed intervals were from 0 to 15 min and from 0 to 3 min for boiling and bead beating, respectively. The extracted ATP concentration ranged from 0.01 to 0.74 mg/l within the design boundary. The following is a partial cubic model where eta is the concentration of ATP and x ( k ) is the corresponding variable term (k=boiling time and bead beating time in order): eta=0.629+0.035x (1)-0.818x (2)-0.002x (1) x (2)-0.003x (1) (2) +0.254x (2) (2) +0.002x (1) (2) x (2). This model successfully approximates the response of ATP concentration with respect to the boiling- and bead beating-time. The condition for maximal ATP extraction was 5.6 min boiling without bead beating. The maximal ATP concentration using the model was 0.74 mg/l, which was identical to the experimental value at optimum condition for ATP extraction.

  1. Using EPA Tools and Data Services to Inform Changes to Design Storm Definitions for Wastewater Utilities based on Climate Model Projections

    Science.gov (United States)

    Tryby, M.; Fries, J. S.; Baranowski, C.

    2014-12-01

    Extreme precipitation events can cause significant impacts to drinking water and wastewater utilities, including facility damage, water quality impacts, service interruptions and potential risks to human health and the environment due to localized flooding and combined sewer overflows (CSOs). These impacts will become more pronounced with the projected increases in frequency and intensity of extreme precipitation events due to climate change. To model the impacts of extreme precipitation events, wastewater utilities often develop Intensity, Duration, and Frequency (IDF) rainfall curves and "design storms" for use in the U.S. Environmental Protection Agency's (EPA) Storm Water Management Model (SWMM). Wastewater utilities use SWMM for planning, analysis, and facility design related to stormwater runoff, combined and sanitary sewers, and other drainage systems in urban and non-urban areas. SWMM tracks (1) the quantity and quality of runoff made within each sub-catchment; and (2) the flow rate, flow depth, and quality of water in each pipe and channel during a simulation period made up of multiple time steps. In its current format, EPA SWMM does not consider climate change projection data. Climate change may affect the relationship between intensity, duration, and frequency described by past rainfall events. Therefore, EPA is integrating climate projection data available in the Climate Resilience Evaluation and Awareness Tool (CREAT) into SWMM. CREAT is a climate risk assessment tool for utilities that provides downscaled climate change projection data for changes in the amount of rainfall in a 24-hour period for various extreme precipitation events (e.g., from 5-year to 100-year storm events). Incorporating climate change projections into SWMM will provide wastewater utilities with more comprehensive data they can use in planning for future storm events, thereby reducing the impacts to the utility and customers served from flooding and stormwater issues.

  2. Assessment of sulfide production risk in soil during the infiltration of domestic wastewater treated by a sulfur-utilizing denitrification process.

    Science.gov (United States)

    Ghorbel, L; Coudert, L; Gilbert, Y; Mercier, G; Blais, J F

    2016-10-01

    This study aimed to determine the potential of sulfide generation during infiltration through soil of domestic wastewater treated by a sulfur-utilizing denitrification process. Three types of soil with different permeability rates (K s = 0.028, 0.0013, and 0.00015 cm/s) were investigated to evaluate the potential risk of sulfur generation during the infiltration of domestic wastewater treated by a sulfur-utilizing denitrification system. These soils were thoroughly characterized and tested to assess their capacity to be used as drainages for wastewaters. Experiments were conducted under two operating modes (saturated and unsaturated). Sulfate, sulfide, and chemical oxygen demand (COD) levels were determined over a period of 100 days. Despite the high concentration of sulfates (200 mg/L) under anaerobic conditions (ORP = -297 mV), no significant amount of sulfide was generated in the aqueous (process used to treat the domestic wastewater allowed the reduction of the concentration of biochemical oxygen demand (BOD5) below 5 mg/L, of DOC below 7 mg/L, and of COD below 100 mg/L.

  3. HIV Excision Utilizing CRISPR/Cas9 Technology: Attacking the Proviral Quasispecies in Reservoirs to Achieve a Cure.

    Science.gov (United States)

    Dampier, Will; Nonnemacher, Michael R; Sullivan, Neil T; Jacobson, Jeffrey M; Wigdahl, Brian

    2014-10-17

    Recently several gene-editing technologies developed are being explored for their potential utility in providing new and unique treatments for HIV. One of these technologies is the clustered regularly interspaced short palindromic repeats (CRISPR)/CRISPR-associated (Cas)9 system. This system is being explored for its utility against host genes important to HIV infection, namely the HIV coreceptor CCR5, and for excision of the integrated genome from infected cells by targeting selected genes or genomic regions, especially the HIV-1 promoter or long terminal repeat (LTR). One of the major hurdles with the development of this technology for use in patients is defining the LTR sequence spectrum within the viral quasispecies present in the integrated virus and how that effects the number of guide RNAs (gRNAs) required to completely excise all proviral genomes. In this study, the Drexel Medicine CNS AIDS Research and Eradication Study (CARES) Cohort was utilized to demonstrate that [1] the predominant sequence of the integrated proviral LTR within the PBMC compartment shows a decrease in the amount of variation per year regardless of the type of therapy; [2] predominant HIV-1 LTR sequence undergoes continued genetic change with respect to the predominant genotype in these cells for at least 6 years while on effective suppressive ART; [3] using next generation sequencing (NGS), to demonstrate that 4 of the 8 patient samples examined could have a complete gRNA regimen designed to target all known quasispecies; and [4] length of HAART therapy may reduce the number of gRNA required to eradicate provirus as shown by NGS and gRNA design for longitudinal samples of patient A0017 in the CARES cohort. Overall, these studies demonstrate the feasibility of addressing at least one of the major technological challenges of CRISPR/Cas9-mediated HIV-1 proviral genome eradication involving the effective targeting of all viral quasispecies in a given patient sample.

  4. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  5. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  6. 印制电路板废水分类及综合利用%Wastewater classiifcation and overall utilization in printed circuit board

    Institute of Scientific and Technical Information of China (English)

    谢灿欢; 苏培涛

    2013-01-01

    This article classiifed the wastewater of the PCB in a detailed scientiifc method, then discussed the overall utilization of wastewater which can be recycled and reused, in order to reduce the resources and pollution discharge in a reasonable way, so that increase the beneift in the PCB industry at last.%对印制电路板制造过程产生的废水进行详细、科学的分类,将可回收或可再利用的废水进行资源化综合利用,达到合理降低资源耗用,减少污染物排放量,并最终达到增加企业经济效益的目的。

  7. Treatment of African catfish, Clarias gariepinus wastewater utilizing phytoremediation of microalgae, Chlorella sp. with Aspergillus niger bio-harvesting.

    Science.gov (United States)

    Nasir, Nurfarahana Mohd; Bakar, Nur Syuhada Abu; Lananan, Fathurrahman; Abdul Hamid, Siti Hajar; Lam, Su Shiung; Jusoh, Ahmad

    2015-08-01

    This study focuses on the evaluation of the performance of Chlorella sp. in removing nutrient in aquaculture wastewater and its correlation with the kinetic growth of Chlorella sp. The treatment was applied with various Chlorella sp. inoculation dosage ranging from 0% to 60% (v/v) of wastewater. The optimum inoculation dosage was recorded at 30% (v/v) with effluent concentration of ammonia and orthophosphate recording at 0.012mgL(-1) and 0.647mgL(-1), respectively on Day 11. The optimum dosage for bio-flocculation process was obtained at 30mgL(-1) of Aspergillus niger with a harvesting efficiency of 97%. This type of development of phytoremediation with continuous bio-harvesting could promote the use of sustainable green technology for effective wastewater treatment.

  8. Shark attack in Natal.

    Science.gov (United States)

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  9. Comprehensive utilize situation of soybean products wastewater%豆制品废水综合利用现状

    Institute of Scientific and Technical Information of China (English)

    刘宇; 张国治; 袁东振; 黄纪念; 董进

    2015-01-01

    The ingredientscontained,preteatment methods andcomprehensive utilizeof soybean products wastewater were summarized. Soybean products wastewater pretreatmentcould be concentrated by multistage freezeconcentration to improve the retention efficiencyof the vast majority of functional ingredients. Soybean whey protein,soybeanoligosaccharides and soybean isoflavone product were separated from the soybean products wastewater by membrane separation and flocculation technology. After sterilizing additionof nutrientsof microorganisms soybean products wastewatercould be made into microbial medium forculturing microorganisms,toobtain myceliumor by–products. Soybean products wastewater as matenial raw for food production has been prospected.%该文对豆制品废水中所含成分、前处理方法以及综合利用方法进行了阐述。豆制品废水通过多级冷冻浓缩进行预处理,可提高绝大部分功能性成分的保留效率。采用膜分离和絮凝等技术可以从豆制品废水中分离大豆乳清蛋白、大豆低聚糖和大豆异黄酮等产物。向豆制品废水中加入微生物所需的营养物质再灭菌后可制成微生物培养液,用于培养微生物以获得菌体或副产物。对以豆制品废水为原料进行食品生产进行了展望。

  10. Shark attack.

    Science.gov (United States)

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  11. Chemistry Wastewater Treatment of El-Oued City (South-East of Algeria) by Utilization of Typha Latifolia

    OpenAIRE

    Zeghdi Saad; Bebba Ahmed Abdelhafid; Laouini Salah Eddine

    2016-01-01

    The objective of this study is to show the potential of Typha latifolia in the Purification performance of wastewater in the region of El Oued (southeast of Algeria). The pilot scale consists of two beds of plastics, filled with gravel and sand. One was planted saplings Typha latifolia at 36 stems/m2, the second was not planted serves as a control (witness). The results show good yields for suspended solids and organic pollution, removal rates are 96,76% for (SS) 89,92% for the Chemical Oxyge...

  12. Integrative approach for utilization of olive mill wastewater and lebna's whey for ethanol production

    Energy Technology Data Exchange (ETDEWEB)

    Ibrahim, M.A.; Hayek, B.O.; Al-Hmoud, N.; Al-Gogazeh, L.

    2009-09-15

    The industry of olive oil extraction in Jordan involves an intensive consumption of water and generates large quantities of olive mill wastewater (OMW). This wastewater has a high pollution risk with biological oxygen demand (BOD). The organic fraction of OMW includes sugars, tannins, polyphenols, polyalcohols, pectins and lipids. The presence of remarkable amounts of aromatic compounds in OMW is responsible for its phytotoxic and antimicrobial effects. The environmental problems and potential hazards caused by OMW had led olive oil producing countries to limit their discharge and to propose and develop new technologies for OMW treatments, such as physicochemical and biological treatments. In the present investigation lebna's whey a local byproduct of widely consumed local yogurt was used with OMW for ethanol production. The obtained results showed that the proteins of lebna's whey can remove substantial amounts of aromatic compounds present in OMW. This was reflected on the reduction of the intensity of black color of OMW and removal of 37% polyphenols. Moreover, the production of ethanol was ascertained in fermentation media composed of whey and in presence of various concentrations of OMW up to 20% OMW. The obtained results showed the possibility to develop a process for improvement and enhancement of ethanol production from whey and olive oil waste in mixed yeast cultures. (au)

  13. Adsorbents made from waste ashes and post-consumer PET and their potential utilization in wastewater treatment.

    Science.gov (United States)

    Zhang, Fu-Shen; Itoh, Hideaki

    2003-08-01

    This study was carried out to prepare low-cost adsorbents from different types of waste ashes and post-consumer PET for use in industrial wastewater treatment. PET was melted and blended with ashes. The mixture was then carbonized to form different types of adsorbents. Heavy metal leaching from the adsorbents was greatly reduced compared to leaching from the bulk ashes. The BET surface area of the adsorbents ranged from 115 to 485m(2)/g. The acidic sites on the adsorbents varied from 0.84 to 1.56meq./g, higher than that of the PET carbon. The adsorption of methylene blue (MB) or heavy metals on the adsorbents was not in accordance with their surface areas because acidic sites reaction, affinity adsorption and cation exchange all contribute to the adsorption of the adsorbents. The isotherm for MB adsorption on the adsorbents can be well described by the Langmuir or Freundlich equation but heavy metal adsorption cannot. It is believed that the adsorbents produced in this manner can be used in wastewater treatments for discoloration and heavy metal removal.

  14. Utilization of wastewater originated from naturally fermented virgin coconut oil manufacturing process for bioextract production: physico-chemical and microbial evolution.

    Science.gov (United States)

    Tripetchkul, Sudarut; Kusuwanwichid, Sasithorn; Koonsrisuk, Songpon; Akeprathumchai, Saengchai

    2010-08-01

    Production of virgin coconut oil via natural fermentation has led to large amount of wastes being generated, i.e., coconut pulp and wastewater containing coconut crème. Objective of this study is to gain more insight into the feasibility of utilization of such wastes as raw materials together with several types of wastes such as fish waste and/or pineapple peel for bioextract production. Chemical, physico-chemical and biological changes including phytotoxicity of the fermented mixture were closely monitored. Physical observation suggested that fermentation of bioextract obtained with fish waste appeared to be complete within the first month of fermentation while bioextract obtained using pineapple waste seemed to be complete after 8 months post-fermentation. Fermentation broth is of blackish color with alcoholic as well as acidic odour with no gas bubble and/or yeast film present on top of the surface. During the whole fermentation interval, several attributes of both bioextracts, e.g., pH, chemical oxygen demand (COD) and organic acids, were statistically different. Further, the total bacteria and lactic acid bacteria present in pineapple bioextract were statistically higher than those of the fish bioextract (pbiofertilizer after 1 month fermentation. Results further showed that wastewater derived from virgin coconut oil manufacturing process could effectively be employed together with other types of wastes such as fish waste and pineapple peel for bioextract production. However, for the best bioextract quality, fermentation should be carefully planned since over fermentation led to bioextract of low qualities.

  15. Chemistry Wastewater Treatment of El-Oued City (South-East of Algeria by Utilization of Typha Latifolia

    Directory of Open Access Journals (Sweden)

    Zeghdi Saad

    2016-12-01

    Full Text Available The objective of this study is to show the potential of Typha latifolia in the Purification performance of wastewater in the region of El Oued (southeast of Algeria. The pilot scale consists of two beds of plastics, filled with gravel and sand. One was planted saplings Typha latifolia at 36 stems/m2, the second was not planted serves as a control (witness. The results show good yields for suspended solids and organic pollution, removal rates are 96,76% for (SS 89,92% for the Chemical Oxygen Demand (COD and 87, 98% for biochemical oxygen demand in 5 days (BOD5. There is a clear increase in the concentration of dissolved oxygen (DO. The system effectively removes nitrite (88.84%, nitrate (91.20%, and orthophosphate (93.12%.

  16. Utilization of lipid extracted algal biomass and sugar factory wastewater for algal growth and lipid enhancement of Ettlia sp.

    Science.gov (United States)

    Moon, Myounghoon; Kim, Chul Woong; Farooq, Wasif; Suh, William I; Shrivastav, Anupama; Park, Min S; Mishra, Sanjiv K; Yang, Ji-Won

    2014-07-01

    The present study assessed the use of hydrolysate of lipid extracted algal biomass (LEA) combined with the sugar factory wastewater (SFW) as a low cost nutrient and a carbon source, respectively for microalgal cultivation. Microalgal strain Ettlia sp. was both mixotrophically and heterotrophically cultivated using various amounts of hydrolysate and SFW. The culture which was grown in medium containing 50% LEA hydrolysate showed highest growth, achieving 5.26 ± 0.14 gL(-1) after 12 days of cultivation. The addition of SFW increased the lipid productivity substantially from 5.8 to 95.5 mg L(-1)d(-1) when the culture medium was fortified with 20% SFW. Gas chromatography analysis indicated a noticeable increase of 20% in C16 and C18 fraction in FAME distribution under above condition. Therefore, it can be concluded that the combination of LEA hydrolysate and sugar factory waste water can be a powerful growth medium for economical algal cultivation.

  17. Utilization of moving bed biofilm reactor for industrial wastewater treatment containing ethylene glycol: kinetic and performance study.

    Science.gov (United States)

    Hassani, Amir Hessam; Borghei, Seyed Mehdi; Samadyar, Hassan; Ghanbari, Bastam

    2014-01-01

    One of the requirements for environmental engineering, which is currently being considered, is the removal of ethylene glycol (EG) as a hazardous environmental pollutant from industrial wastewater. Therefore, in a recent study, a moving bed biofilm reactor (MBBR) was applied at pilot scale to treat industrial effluents containing different concentrations of EG (600, 800, 1200, and 1800 mg L-1 ). The removal efficiency and kinetic analysis of the system were examined at different hydraulic retention times of 6, 8, 10, and 12 h as well as influent chemical oxygen demand (COD) ranged between values of 1000 and 3000mg L-1. In minimum and maximum COD Loadings, the MBBR showed 95.1% and 60.7% removal efficiencies, while 95.9% and 66.2% EG removal efficiencies were achieved in the lowest and highest EG concentrations. The results of the reactor modelling suggested compliance of the well-known modified Stover-Kincannon model with the system.

  18. Advances in Biological Treatment and Resource Utilization of Industrial Wastewater from Fermentation%高浓度发酵废水的生物处理及资源化利用研究进展

    Institute of Scientific and Technical Information of China (English)

    孙巍; 许玫英; 孙国萍

    2011-01-01

    This paper reviewed anaerobic and aerobic biological treatments and conditions for the utilization of wastewater from molasses distillery and antibiotic manufacturing plants as resource to produce useful material applied in agriculture and industry. According to the recent researches, the utilization of molasses distillery wastewater both home and abroad was emphasized. Biotechnology treatment of wastewater combined with resource utilization is the development trend in future, which has broad applied prospects in economic and efficient conversion of high organic wastewater into resource products.%文章对糖蜜酒精、抗生素发酵生产过程废水厌氧、好氧等生物处理技术及其农业、工业方面的资源化利用现状进行了综述.结合本实验室近期的研究进展,着重介绍了国内外糖蜜废水的利用状况.指出了结合资源化利用的废水处理生物技术是未来的发展趋势,在经济、高效地转化高浓度有机废水为资源性产品的应用中前景广阔.

  19. Wastewater Outfalls

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — Outfalls which discharge wastewater from wastewater treatment facilities with individual NPDES permits. It does not include NPDES general permits.

  20. Utilization of high concentration phenol-containing wastewater%高浓度含酚废水资源化利用

    Institute of Scientific and Technical Information of China (English)

    吴点; 王存文; 王为国; 吕仁亮; 覃远航

    2012-01-01

    The phenols in phenolic wastewater are treated by twice phenol-formaldehyde and urea-formaldehyde condensation process. We investigated the effect of factors such as formaldehyde consumption in the first phenol-formaldehyde condensation, temperature and time of reaction, consumption of formaldehyde and catalyst in the second condensation on phenol removal, and then studied the effect of factors such as urea feeding times, temperature and time of reaction and urea molar ratio in urea-formaldehyde condensation on formaldehyde removal in laboratory. The phenol content is less than 8 000 mg/L and the phenol recovery is 88. 6% after the first condensation while it is less than 50 mg/L after the second condensation, the twice condensation phenol recovery reaches to 99%. Condensation of phenol-formaldehyde resin can be used as a raw material. Formaldehyde content of the wastewater after condensation treated with urea is less than 300 mg/L, so that the wastewater can be treated directly by biochemical method. Pilot-scale validation results are better than the small scale, indicating that small scale experimental data is reliable. Pilot-scale preliminary economic accounting shows that every ton of wastewater can be recycled about 50 kg phenolic resin, the gross profit may be around 260 Yuan deducting the cost of raw materials and utilities. The method of twice phenol-formaldehyde and urea-formaldehyde condensation has a good economic benefit.%采用两次酚醛缩合-尿醛缩合的方法处理含酚废水,实验室小试考察了酚醛一次缩合的甲醛用量、二次缩合的反应温度、时间、甲醛用量及催化剂含量对除酚效果的影响;尿素投料批数、反应时间、反应温度和尿素/甲醛摩尔比对除醛效果的影响.一次缩合后酚含量可降至8 000 mg/L以下,酚回收率为88.6%.二次缩合后废水酚含量可降至50 mg/L以下,两次缩合后酚总回收率达99.0%,缩合回收的酚醛树脂可作为生产原料回用.

  1. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    -technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....

  2. Biodegradation and reversible inhibitory impact of sulfamethoxazole on the utilization of volatile fatty acids during anaerobic treatment of pharmaceutical industry wastewater.

    Science.gov (United States)

    Cetecioglu, Zeynep; Ince, Bahar; Gros, Meritxell; Rodriguez-Mozaz, Sara; Barceló, Damia; Ince, Orhan; Orhon, Derin

    2015-12-01

    This study evaluated the chronic impact and biodegradability of sulfamethoxazole under anaerobic conditions. For this purpose, a lab-scale anaerobic sequencing batch reactor was operated in a sequence of different phases with gradually increasing sulfamethoxazole doses of 1 to 45 mg/L. Conventional parameters, such as COD, VFA, and methane generation, were monitored with corresponding antimicrobial concentrations in the reactor and the methanogenic activity of the sludge. The results revealed that anaerobic treatment was suitable for pharmaceutical industry wastewater with concentrations of up to 40 mg/L of sulfamethoxazole. Higher levels exerted toxic effects on the microbial community under anaerobic conditions, causing the inhibition of substrate/COD utilization and biogas generation and leading to a total collapse of the reactor. The adverse long-term impact was quite variable for fermentative bacteria and methanogenic achaea fractions of the microbial community based on changes inflicted on the composition of the residual organic substrate and mRNA expression of the key enzymes.

  3. Biodegradation and reversible inhibitory impact of sulfamethoxazole on the utilization of volatile fatty acids during anaerobic treatment of pharmaceutical industry wastewater

    Energy Technology Data Exchange (ETDEWEB)

    Cetecioglu, Zeynep, E-mail: cetecioglu@itu.edu.tr [Istanbul Technical University, Environmental Engineering Department, 34469 Maslak, Istanbul (Turkey); Catalan Institute for Water Research (ICRA), Emili Grahit 101, 17003 Girona (Spain); Ince, Bahar [Bogazici University, Institute of Environmental Sciences, Rumelihisarustu - Bebek, 34342 Istanbul (Turkey); Gros, Meritxell; Rodriguez-Mozaz, Sara; Barceló, Damia [Catalan Institute for Water Research (ICRA), Emili Grahit 101, 17003 Girona (Spain); Ince, Orhan; Orhon, Derin [Istanbul Technical University, Environmental Engineering Department, 34469 Maslak, Istanbul (Turkey)

    2015-12-01

    This study evaluated the chronic impact and biodegradability of sulfamethoxazole under anaerobic conditions. For this purpose, a lab-scale anaerobic sequencing batch reactor was operated in a sequence of different phases with gradually increasing sulfamethoxazole doses of 1 to 45 mg/L. Conventional parameters, such as COD, VFA, and methane generation, were monitored with corresponding antimicrobial concentrations in the reactor and the methanogenic activity of the sludge. The results revealed that anaerobic treatment was suitable for pharmaceutical industry wastewater with concentrations of up to 40 mg/L of sulfamethoxazole. Higher levels exerted toxic effects on the microbial community under anaerobic conditions, causing the inhibition of substrate/COD utilization and biogas generation and leading to a total collapse of the reactor. The adverse long-term impact was quite variable for fermentative bacteria and methanogenic achaea fractions of the microbial community based on changes inflicted on the composition of the residual organic substrate and mRNA expression of the key enzymes. - Highlights: • Chronic impact of sulfamethoxazole was lethal at 45 mg/L on the microbial community. • Sulfamethoxazole was highly biodegradable under anaerobic conditions. • While the COD removal stopped, the sorption of sulfamethoxazole into the sludge increased. • Sulfamethoxazole has a reversible inhibitory effect on acetoclastic methanogens.

  4. Utilization of municipal wastewater for cooling in thermoelectric power plants: Evaluation of the combined cost of makeup water treatment and increased condenser fouling

    Energy Technology Data Exchange (ETDEWEB)

    Walker, Michael E. [Illinois Inst. of Technology, Chicago, IL (United States). Dept. of Chemical and Biological Engineering; Theregowda, Ranjani B. [Carnegie Mellon Univ., Pittsburgh, PA (United States). Dept of Civil and Mechanical Engineering; Safari, Iman [Illinois Inst. of Technology, Chicago, IL (United States). Dept. of Chemical and Biological Engineering; Abbasian, Javad [Illinois Inst. of Technology, Chicago, IL (United States). Dept. of Chemical and Biological Engineering; Arastoopour, Hamid [Illinois Inst. of Technology, Chicago, IL (United States). Dept. of Chemical and Biological Engineering; Dzombak, David A. [Carnegie Mellon Univ., Pittsburgh, PA (United States). Dept of Civil and Mechanical Engineering; Hsieh, Ming-Kai [Tamkang Univ., Taipei (Taiwan). Waer Resources Management and Policy Research Center; Miller, David C. [National Energy Technology Lab. (NETL), Morgantown, WV (United States)

    2013-10-01

    A methodology is presented to calculate the total combined cost (TCC) of water sourcing, water treatment and condenser fouling in the recirculating cooling systems of thermoelectric power plants. The methodology is employed to evaluate the economic viability of using treated municipal wastewater (MWW) to replace the use of freshwater as makeup water to power plant cooling systems. Cost analyses are presented for a reference power plant and five different tertiary treatment scenarios to reduce the scaling tendencies of MWW. Results indicate that a 550 MW sub-critical coal fired power plant with a makeup water requirement of 29.3 ML/day has a TCC of $3.0 - 3.2 million/yr associated with the use of treated MWW for cooling. (All costs USD 2009). This translates to a freshwater conservation cost of $0.29/kL, which is considerably lower than that of dry air cooling technology, $1.5/kL, as well as the 2020 conservation cost target set by the U.S. Department of Energy, $0.74/kL. Results also show that if the available price of freshwater exceeds that of secondary-treated MWW by more than $0.13-0.14/kL, it can be economically advantageous to purchase secondary MWW and treat it for utilization in the recirculating cooling system of a thermoelectric power plant.

  5. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks

    CERN Document Server

    Duan, Lingjie; Huang, Jianwei; Shin, Kang G

    2011-01-01

    Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy. Moreover, attackers may not follow the fusion center's decision regarding their spectrum access. This paper considers a challenging attack scenario where multiple rational attackers overhear all honest SUs' sensing reports and cooperatively maximize attackers' aggregate spectrum utilization. We show that, without attack-prevention mechanisms, honest SUs are unable to transmit over the licensed spectrum, and they may further be penalized by the primary user for collisions due to attackers' aggressive transmissions. To prevent such attacks, we propose two novel attack-prevention mechanisms with direct and indirect punishments. The key idea is to identify collisions...

  6. Wastewater Treatment

    Science.gov (United States)

    ... make water safe. Effects of wastewater pollutants If wastewater is not properly treated, then the environment and human health can be negatively impacted. These impacts can include harm to fish and wildlife ... in wastewater and the potentially harmful effects these substances can ...

  7. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    -technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  8. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  9. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  10. Efficient Techniques to Detect the Various Attacks in Ad-Hoc Network

    Directory of Open Access Journals (Sweden)

    Rakesh Kumar Sahu

    2012-09-01

    Full Text Available This paper is mainly focused on Denial of Service (DoS attack, where a server or a node cannot give service to the other nodes as it is under an attack. There are various attacks in the Ad hoc network but our paper is mainly focused on two types of DoS attacks viz SYN-Flooding and Worm-Hole attacks. How we can detect any one of attacks is addressed in this paper. We have discussed the CPU and memory utilization during the attack. We have given two separate algorithms for each attack and also suggest how to get rid of this type of attacks .

  11. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  12. Advance and Utilization of Treatment Technology on Wastewater from Piggery%猪场废水处理技术研究进展与应用

    Institute of Scientific and Technical Information of China (English)

    潘霞; 李双来; 胡诚; 陈云峰; 乔艳

    2011-01-01

    随着人们生活水平的提高,猪场废水排放的危害越来越引起人们的重视.介绍了猪场废水的产生、危害,并从自然生物处理法、厌氧生物处理法、好氧生物处理法、厌氧-好氧联合处理法等方面阐述了猪场废水的处理技术;并进行了沼气、人工湿地与氧化塘组合处理的研究,结果表明污水经组合处理后,出水达到排放标准,并能够循环利用.%The harm of wastewater from piggery was attracting more people's attention with the increasing of living standard.The generationa and damage of wastewater from piggery were introduced and some treatment technologies on wastewater from piggery such as natural bioremediation. aerobic bioremediation. anaerobic bioremediation and aerobic-anaerobic combination bioremediation etc. were elaborated. The treatment effects of combined technology with methane,artificial wetlands, oxidation pond were studied. The water treated by combined technology could meet the sewage discharge standard and could be reused.

  13. Investigation on Urban Wastewater Resources Comprehensive Utilization and Development Countermeasures in China%全国城市污水处理回用调查评价与发展对策研究

    Institute of Scientific and Technical Information of China (English)

    荣四海; 周振民

    2012-01-01

    Based on the project of urban wastewater treatment and recycle utilization and development planning,the paper focused on analysis of urban wastewater resources development and utilization facilities,urban water resources recycle plant and water recycling piper line investment,urban waster water resources development and utilization methods and total volume,etc.Based on the above findings,scientific assessment was carried out on the achieved results.Finally,the countermeasures of urban waster water resources development were put forward.It is sure that the present findings would play an important role for national urban non-traditional water resources development and utilization,improvement of urban and regional water environment.%结合全国城市污水处理回用调查评价与发展规划项目,重点介绍了全国城市污水资源开发利用工程设施;城市再生水厂与再生水管道投资;城市污水资源开发利用途径和污水资源开发利用量等调查成果。在此基础上,对调查成果进行了科学评价。最后提出了我国城市污水资源化发展对策。研究成果对于全国城市非常规水资源开发利用、改善城市和区域水环境具有十分重要的参考价值。

  14. Wastewater Collection.

    Science.gov (United States)

    Chatterjee, Samar; And Others

    1978-01-01

    Presents a literature review of wastewater collection systems and components. This review covers: (1) planning, (2) construction; (3) sewer system evaluation; (4) maintenance; (5) rehabilitation; (6) overview prevention; and (7) wastewater pumping. A list of 111 references is also presented. (HM)

  15. Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack

    OpenAIRE

    2014-01-01

    We have introduced a novel adversary model in Chosen-Ciphertext Attack with Timing Attack (CCA2-TA) and it was a practical model because the model incorporates the timing attack. This paper is an extended paper for 'A Secure TFTP Protocol with Security Proofs'. Keywords - Timing Attack, Random Oracle Model, Indistinguishabilit, Chosen Plaintext Attack, CPA, Chosen Ciphertext Attack, IND-CCA1, Adaptive Chosen Ciphertext Attack, IND-CCA2, Trivial File Transfer Protocol, TFTP, Security, Trust, P...

  16. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  17. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  18. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  19. Generation and energy utilization of methane form industrial wastewater; Produccion y aprovechamiento energetico de metano a partir de agua residual industrial

    Energy Technology Data Exchange (ETDEWEB)

    Lebek, M.

    2009-07-01

    At the production site of a natural ingredients manufacturer for the food industry was necessary the adjustment of the WWTP to the enlargement of the production and its complement with a pre-treatment. The core of the treatment plan tis an UASB (Upflow Anaerobic Sludge Blanket) reactor where the wastewater is removed under anaerobic conditions. The main advantages of this treatment ar the operation stability and the high methane production. The biogas generated is cleaned before it is used during the production process as an energy resource. (Author)

  20. CHARACTERIZATION AND INTEGRATED UTILIZATION OF WASTEWATER FROM OIL PRODUCTION STATIONS IN SHENGLI OIL FIELDS%胜利油田采油污水综合特征及利用评价

    Institute of Scientific and Technical Information of China (English)

    杨永红; 李义曼; 李晓燕; 张红波; 罗霁

    2015-01-01

    Shengli oil fields are one of the most important petroleum occurring areas.Its geothermal resources are abundant.With the background of energy saving,wastewater from petroleum producing is of relatively high-temperature.It can be used for water flooding,space heating and bathing.Wastewater samples from 19 typical oil production stations of seven oil factories in Shengli oil fields are obtained.Water chemical compositions are analyzed by ion chromatography.Scaling tendency &corrosion of wastewater are also discussed.Results show that the pH of wastewater is 6.8-8.0 and the average is 7.4.It is saline water-brine with TDS ranging from 6.0g·L-1 to 59.7g·L-1 . The wastewater is rich in Li,Mn,Cr,Ni,Cu,Zn and Sr.The microelements of Li and Sr are in particular rich.Its average concentrations are 1mg·L-1 and 70.5mg·L-1 ,which satisfy the mineral water requirement but cannot be used for minerals exploitation.Corrosive efficiency factor,larson and reruo method are used to assess the corrosion of wastewater.Results indicate that the wastewater is strongly corrosive,which is caused by chloride ion. Carbonate,sulfate and silicate scale are assessed using references from GB-T-11615-2010.The results indicate that carbonate and silicate scale wont occur while sulfate scale would form in wastewater from Binnan and Hekou oil production plant and pretreatment should be done before integrated utilization.Based on suggestions from published papers on wastewater utilization and local requirement,it can be used for water flooding,space heating,bathing, hothouse and aquaculture,which can mitigate environmental pollution and improve energy structure,showing favorable social and economic benefits.When using the wastewater,its corrosion and scaling tendency must be considered and choose proper pretreatment and pipeline.%胜利油田作为我国石油的重要赋存区,其地热资源也相当丰富。在节能减排的背景下,采油产生的污水由于其相对较高的温度

  1. Microbiological analysis of municipal wastewater treating photobioreactors

    OpenAIRE

    Krustok, Ivo

    2016-01-01

    Microalgae reactors, commonly known as photobioreactors, have become increasingly popular as an alternative for wastewater treatment. These systems reduce pollutants and remove nutrients such as nitrogen and phosphorous compounds from wastewater utilizing microalgae and bacteria. The biomass produced in the reactors can potentially be used to produce biofuels and decrease some of the energy demands of the process. Wastewater treating photobioreactors are a relatively new technology and many a...

  2. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  3. Wastewater Districts

    Data.gov (United States)

    Vermont Center for Geographic Information — The Wastewater districts layer is part of a larger dataset that contains administrative boundaries for Vermont's Agency of Natural Resources. The dataset includes...

  4. Wastewater Treatment.

    Science.gov (United States)

    Zoltek, J., Jr.; Melear, E. L.

    1978-01-01

    Presents the 1978 literature review of wastewater treatment. This review covers: (1) process application; (2) coagulation and solids separation; (3) adsorption; (4) ion exchange; (5) membrane processes; and (6) oxidation processes. A list of 123 references is also presented. (HM)

  5. Supply Chain Attack Framework and Attack Patterns

    Science.gov (United States)

    2013-12-01

    Malware is embedded in a replacement server motherboard (e.g., in the flash memory) in order to alter server functionality from that intended. Attack...Slashdot: Dell Ships Infected Motherboards July 21, 2010(c/o Rick Dove) Threat: An adversary with access to hardware procurement, maintenance, or upgrade...control can embed malware in a critical component server motherboard . Vulnerabilities: The control processes and mechanisms for hardware

  6. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  7. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  8. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  9. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  10. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  11. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  12. High Order Differential Attack and Trace Attack to Block Ciphers

    Institute of Scientific and Technical Information of China (English)

    HU Yupu; CHEN Kai; Xiao Guozhen

    2001-01-01

    In this paper, we prove a high or-der differential property of power function, then giverespectively high order differential attack and traceattack to block ciphers. These attacks depend onlyon block cipher's algebraic shape on GF(2n) and haveno relation with its designing structure. The condi-tions are given for both effective attacks and strengthagainst attacks.

  13. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  14. Utilization of high-strength wastewater for the production of biogas as a renewable energy source using hybrid upflow anaerobic sludge blanket (HUASB) reactor

    Energy Technology Data Exchange (ETDEWEB)

    Shivayogimath, C.B.; Ramanujam, T.K.

    1998-07-01

    Anaerobic digestion of distillery spentwash, a high-strength wastewater, was studied using a hybrid upflow anaerobic sludge blanket (HUASB) reactor for 240 days under ambient conditions. The HUASB reactor combined an open volume in the bottom two-thirds of the reactor for sludge blanket and polypropylene pall rings packing in the upper one-third of the reactor. The aim of the study was to achieve optimum biogas production and waste treatment. Using non-granular anaerobic sewage sludge as seed, the start-up of the HUASB reactor was successfully completed, with the production of active bacterial granules of 1--2 mm size, within 90 days. Examination of the bacterial granules under scanning electron microscope (SEM) revealed that Methanothrix like microorganisms were the dominant species besides Methanosarcina. An organic loading of 24 kg COD/m{sup 3}d at a low hydraulic retention time (HRT) of 6 hours was achieved with 82% reduction in COD. Biogas with high methane content (80%) was produced at these loadings. The specific biogas yield was 0.36 m{sup 3} CH{sub 4}/kg COD. Packing in the upper third of the reactor was very efficient as a gas-solid separator (GSS); and in addition it retained the biomass.

  15. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  16. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  17. Attacks on biometric systems: a case study in fingerprints

    Science.gov (United States)

    Uludag, Umut; Jain, Anil K.

    2004-06-01

    In spite of numerous advantages of biometrics-based personal authentication systems over traditional security systems based on token or knowledge, they are vulnerable to attacks that can decrease their security considerably. In this paper, we analyze these attacks in the realm of a fingerprint biometric system. We propose an attack system that uses a hill climbing procedure to synthesize the target minutia templates and evaluate its feasibility with extensive experimental results conducted on a large fingerprint database. Several measures that can be utilized to decrease the probability of such attacks and their ramifications are also presented.

  18. Wastewater reuse

    Directory of Open Access Journals (Sweden)

    Milan R. Radosavljević

    2013-12-01

    Full Text Available Water scarcity and water pollution are some of the crucial issues that must be addressed within local and global perspectives. One of the ways to reduce the impact of water scarcity  and to minimizine water pollution is to expand water and wastewater reuse. The local conditions including regulations, institutions, financial mechanisms, availability of local technology and stakeholder participation have a great influence on the decisions for wastewater reuse. The increasing awareness of food safety and the influence of the countries which import food are influencing policy makers and agriculturists to improve the standards of wastewater reuse in agriculture. The environmental awareness of consumers has been putting pressure on the producers (industries to opt for environmentally sound technologies including those which conserve water and reduce the level of pollution. It may be observed that we have to move forwards to implement strategies and plans for wastewater reuse. However, their success and sustainability will depend on political will, public awareness and active support from national and international agencies to create favorable    environment for the promotion of environmentally sustainable technologies. Wastewater treatment has a long history, especially in agriculture, but also in industry and households. Poor quality of wastewater can pose a significant risk to the health of farmers and users of agricultural products. The World Health Organization (WHO is working on a project for the reuse of wastewater in agriculture. To reduce effects of human activities to the minimum, it is necessary to provide such technical and technological solutions that would on the one hand ensure complying with  the existing regulations and legislation, and on the other hand provide economically viable systems as seen through investments and operating costs. The use of wastewater The practice of using wastewater varies from country to country. Its

  19. Utilization of reverse osmosis (RO) for reuse of MBR-treated wastewater in irrigation-preliminary tests and quality analysis of product water.

    Science.gov (United States)

    Bunani, Samuel; Yörükoğlu, Eren; Sert, Gökhan; Kabay, Nalan; Yüksel, Ümran; Yüksel, Mithat; Egemen, Özdemir; Pek, Taylan Özgür

    2015-02-19

    Membrane bioreactor (MBR) effluent collected from a wastewater treatment plant installed at an industrial zone was used for reverse osmosis (RO) membrane tests in the laboratory. For this, two different GE Osmonics RO membranes (AK-BWRO and AD-SWRO) were employed. The results showed that AK-brackish water reverse osmosis (AK-BWRO) and AD-seawater reverse osmosis (AD-SWRO) membranes have almost similar rejection performances regarding analyzed parameters such as conductivity, salinity, color, chemical oxygen demand (COD), and total organic carbon (TOC). On the other hand, these membranes behaved quite differently considering their permeate water flux at the same applied pressure of 10 bar. AD-SWRO membrane was also tested at 20 bar. The results revealed that AD-SWRO membrane had almost the same rejections either at 10 or at 20 bar of applied pressure. Compared with irrigation water standards, AK-BWRO and AD-SWRO gave an effluent with low salinity value and sodium adsorption ratio (SAR) which makes it unsuitable for irrigation due to the infiltration problems risi0ng from unbalanced values of salinity and SAR. Combination of MBR effluent and RO effluent at respective proportions of 0.3:0.7 and 0.4:0.6 for AK-BWRO and AD-SWRO, respectively, are the optimum mixing ratios to overcome the infiltration hazard problem. Choice of less-sensitive crops to chloride and sodium ions is another strategy to overcome all hazards which may arise from above suggested mixing proportions.

  20. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  1. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  2. Utilizing solar energy for the purification of olive mill wastewater using a pilot-scale photocatalytic reactor after coagulation-flocculation.

    Science.gov (United States)

    Michael, I; Panagi, A; Ioannou, L A; Frontistis, Z; Fatta-Kassinos, D

    2014-09-01

    This study investigated the application of a solar-driven advanced oxidation process (solar Fenton) combined with previous coagulation/flocculation, for the treatment of olive mill wastewater (OMW) at a pilot scale. Pre-treatment by coagulation/flocculation using FeSO4·7H2O (6.67 g L(-1)) as the coagulant, and an anionic polyelectrolyte (FLOCAN 23, 0.287 g L(-1)) as the flocculant, was performed to remove the solid content of the OMW. The solar Fenton experiments were carried out in a compound parabolic collector pilot plant, in the presence of varying doses of H2O2 and Fe(2+). The optimization of the oxidation process, using reagents at low concentrations ([Fe(2+)] = 0.08 g L(-1); [H2O2] = 1 g L(-1)), led to a high COD removal (87%), while the polyphenolic fraction, which is responsible for the biorecalcitrant and/or toxic properties of OMW, was eliminated. A kinetic study using a modified pseudo first-order kinetic model was performed in order to determine the reaction rate constants. This work evidences also the potential use of the solar Fenton process at the inherent pH of the OMW, yielding only a slightly lower COD removal (81%) compared to that obtained under acidic conditions. Moreover, the results demonstrated the capacity of the applied advanced process to reduce the initial OMW toxicity against the examined plant species (Sorghum saccharatum, Lepidium sativum, Sinapis alba), and the water flea Daphnia magna. The OMW treated samples displayed a varying toxicity profile for each type of organism and plant examined in this study, a fact that can potentially be attributed to the varying oxidation products formed during the process applied. Finally, the overall cost of solar Fenton oxidation for the treatment of 50 m(3) of OMW per day was estimated to be 2.11 € m(-3).

  3. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  4. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart.

  5. Wastewater treatment

    Directory of Open Access Journals (Sweden)

    Ranđel N. Kitanović

    2013-10-01

    Full Text Available Quality of life on Earth in the future will largely depend on the amount of safe water. As the most fundamental source of life, water is relentlessly consumed and polluted. To halt this trend, many countries are taking extensive measures and investing substantial resources in order to stop the contamination of water and return at least tolerably good water quality to nature. The goal of water purification is to obtain clean water with the sewage sludge as a by-product. Clean water is returned to nature, and further treatment of sludge may be subject to other procedures. The conclusion of this paper is simple. The procedure with purified water is easily achievable, purified water is discharged into rivers, lakes and seas, but the problem of further treatment of sludge remains. This paper presents the basic methods of wastewater treatment and procedures for processing the products from contaminated water. The paper can serve as a basis for further elaboration. Water Pollution In order to ensure normal life of living creatures, the water in which they live or the water they use must have a natural chemical composition and natural features. When, as a result of human activities, the chemical composition of water and the ratio of its chemical elements significantly change, we say that water is polluted. When the pollutants come from industrial plants, we are talking about industrial wastewater, and when they come from households and urban areas, we are talking about municipal wastewater. Both contain a huge amount of pollutants that eventually end up in rivers. Then, thousands of defenseless birds, fish and other animals suffer, and environmental consequences become immeasurable. In addition, the waste fed to the water often ends up in the bodies of marine animals, so they can return to us as food. Thermal water pollution also has multiple effects on the changes in the wildlife composition of aquatic ecosystems. Polluted water can be purified by

  6. Replacement Attack: A New Zero Text Watermarking Attack

    Science.gov (United States)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  7. 针对复合攻击的网络攻击预测算法%Network Attack Forecast Algorithm for Multi-step Attack

    Institute of Scientific and Technical Information of China (English)

    陈灿; 阎保平

    2011-01-01

    网络攻击以复合攻击形式为主,但当前的安全设备只能检测无法预测.针对该问题,提出一种基于攻击效用的复合攻击预测方法,通过该方法识别攻击者的最终意图,并预测攻击者下一步可能进行的攻击行为.该方法利用攻击意图描述复合攻击过程,建立基于攻击意图的复合攻击逻辑关系图,引入攻击效用的概念,表示入侵者在攻击过程中完成每步攻击所获得的收益大小,是复合攻击预测的参考.实验结果验证了该方法的有效性.%The main form of network attack is multi-step attack. The current security equipments can only detect but not forecast. For this issue,this paper presents an approach based on attack utility to recognize the attacker's finally intention and forecast the next possible attack. It describes a multi-attack by the attack intent, and establishes the multi-attack logic diagram based on the attack intention. During the procedure of the attack forecast, attack utility is used to represent the attackers benefit for each attack step. The attack utility is an important reference for the multi-step attack forecast. Experimental results prove the validity of the algorithm.

  8. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  9. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  10. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  11. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  12. Optimization of culture conditions of producing bacterial cellulose utilizing starch wastewater%淀粉废水发酵产细菌纤维素发酵条件的优化

    Institute of Scientific and Technical Information of China (English)

    徐伟; 张妍; 傅徐阳

    2012-01-01

    The culture conditions of Gluconacetobacter xylinus producing bacterial cellulose utilizing corn starch wastewater(adding glucose 20g/L,corn steep liquor 40g/L,ethanol 150mL/L) were investigated through singlefactor and orthogonal tests. The suitable culture conditions were as follows.liquid level was 80mL in 250mL triangle bottle,pH4.0,inoculation volume was 9% (VN),culture temperature was 28℃ ,the the yield of bacterial cellulose reached the peak(4.41g/L) at this time. The bacterial cellulose was verified by FTIR,SEM was used to observe the surface pattern of bacterial cellulose membrane.%以玉米淀粉废水添加葡萄糖20g/L,玉米浆40班,乙醇150mL/L为发酵基质,采用单因素和正交实验设计对葡糖醋杆菌(Gluconacetobacter xylinus)发酵产细菌纤维素条件进行优化。结果表明,最佳发酵条件为:装液量80mL/250mL,pH4.0,接种量9%(V/V),温度28℃;在此条件下得到细菌纤维素产量为4.41g/L。采用傅立叶转换红外光谱FTIR验证产物为细菌纤维素,并由SEM扫描电镜观察纤维素膜表面形貌。

  13. Wastewater treatment pilot

    OpenAIRE

    2016-01-01

    The aim of this thesis was to investigate the functionality of the wastewater treatment pilot and produce a learning manual-handout, as well as to define the parameters of wastewater clarification by studying the nutrient removal and the effluent clarification level of the processed wastewater. As part of the Environmental Engineering studies, Tampere University of Applied Sciences has invested on a Wastewater Treatment Pilot. The pilot simulates the basic wastewater treatment practices u...

  14. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  15. Lattice Based Attack on Common Private Exponent RSA

    Directory of Open Access Journals (Sweden)

    Santosh Kumar Ravva

    2012-03-01

    Full Text Available Lattice reduction is a powerful concept for solving diverse problems involving point lattices. Lattice reduction has been successfully utilizing in Number Theory, Linear algebra and Cryptology. Not only the existence of lattice based cryptosystems of hard in nature, but also has vulnerabilities by lattice reduction techniques. In this paper, we show that Wieners small private exponent attack, when viewed as a heuristic lattice based attack, is extended to attack many instances of RSA when they have the same small private exponent.

  16. The Comprehensive Utilization Technology of Treating High-Concentration Wastewater with Coal-Water Slurry Technology%利用水煤浆技术处置高浓度废水资源化利用技术

    Institute of Scientific and Technical Information of China (English)

    何先标; 徐永萍; 唐量华; 李亚平; 徐皆

    2015-01-01

    For different kinds of high-concentration wastewaters (hazardous wastes),different analysis methods,standards and treatment processes have been drawn up;in connection with different kinds of hazardous wastes,experiments and studies are carried out to determine standard operating process of slurrying;based on different kinds of hazardous wastes,gasification process operation parameters are studied and adjusted,effectively made comprehensive recovery and utilization of organic matters in wastes,along with saving coal and water,the products of hydrogen,liquid carbon dioxide, liquid ammonia and ammonium bicarbonate are produced;in order to prevent secondary pollution, closed and tunable mill feeding device,multichannel gasification nozzle,gas quench unit and corresponding gasifier are adopted.Breakthrough progress is realized in standardized and systematic operation and management of wastes treatment,resource conservation and comprehensive utilization, technology research and development,pilot and promotion and application.%对不同的高浓度废水(危险废物)制订不同的分析方法、标准和处理工艺;对不同种类的危险废物进行制浆工艺的试验和研究,确定标准化的制浆操作工艺;根据不同种类的危险废物,研究并合理调整气化工艺操作参数,有效地综合回收利用了废物中的有机物,在节煤、节水的同时,生产氢气、液体二氧化碳、液氨、碳酸氢铵产品。为防止二次污染,采用了密闭可调式磨机喂料装置、多通道气化喷嘴、气体激冷装置和与之相适应的气化炉。在废物处置规范化和制度化运行管理、资源节约和综合利用、技术研发、中试和推广应用等方面取得了突破性的进展。

  17. Tracing Technique for Blaster Attack

    CERN Document Server

    S., Siti Rahayu; S., Shahrin; A., Faizal M; M, Mohd Zaki; R, Irda

    2009-01-01

    Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.

  18. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  19. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  20. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  1. Shuttle Wastewater Solution Characterization

    Science.gov (United States)

    Adam, Niklas; Pham, Chau

    2011-01-01

    During the 31st shuttle mission to the International Space Station, STS-129, there was a clogging event in the shuttle wastewater tank. A routine wastewater dump was performed during the mission and before the dump was completed, degraded flow was observed. In order to complete the wastewater dump, flow had to be rerouted around the dump filter. As a result, a basic chemical and microbial investigation was performed to understand the shuttle wastewater system and perform mitigation tasks to prevent another blockage. Testing continued on the remaining shuttle flights wastewater and wastewater tank cleaning solutions. The results of the analyses and the effect of the mitigation steps are detailed in this paper.

  2. Audio Sensing Aid based Wireless Microphone Emulation Attacks Detection

    Directory of Open Access Journals (Sweden)

    Wang Shan-shan

    2013-10-01

    Full Text Available The wireless microphone network is an important PU network for CRN, but there is no effective technology to solve the problem of microphone evaluation attacks. Therefore, this paper propose ASA algorithm, which utilizes three devices to detect MUs, and they are loudspeaker audio sensor (LAS, environment audio sensor (EAS, and radio frequency fingerprint detector (RFFD. LASs are installed near loudspeakers, which have two main effects: One is to sense loudspeakers’ output, and the other is to broadcast warning information to all SUs through the common control channel when detecting valid output. EASs are pocket voice captures provided to SU, and utilized to sense loudspeaker sound at SU’s location. Utilizing EASs and energy detections in SU can detect primary user emulation attack (PUEA fast. But to acquire the information of attacked channels, we need explore RFFDs to analyze the features of PU transmitters. The results show that the proposed algorithm can detect PUEA well.    

  3. Impossible Differential Attacks on 13-Round CLEFIA-128

    Institute of Scientific and Technical Information of China (English)

    Hamid Mala; Mohammad Dakhilalian; Mohsen Shakiba

    2011-01-01

    CLEFIA,a new 128-bit block cipher proposed by Sony Corporation,is increasingly attracting cryptanalysts'attention.In this paper,we present two new impossible differential attacks on 13 rounds of CLEFIA-128.The proposed attacks utilize a variety of previously known techniques,in particular the hash table technique and redundancy in the key schedule of this block cipher.The first attack does not consider the whitening layers of CLEFIA,requires 2109.5 chosen plaintexts,and has a running time equivalent to about 2112.9 encryptions.The second attack preserves the whitening layers,requires 2117.8 chosen plaintexts,and has a total time complexity equivalent to about 2121.2 encryptions.

  4. Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Katarzyna Mazur

    2016-01-01

    Full Text Available The growing popularity of wireless sensor networks increases the risk of security attacks. One of the most common and dangerous types of attack that takes place these days in any electronic society is a distributed denial of service attack. Due to the resource constraint nature of mobile sensors, DDoS attacks have become a major threat to its stability. In this paper, we established a model of a structural health monitoring network, being disturbed by one of the most common types of DDoS attacks, the flooding attack. Through a set of simulations, we explore the scope of flood-based DDoS attack problem, assessing the performance and the lifetime of the network under the attack condition. To conduct our research, we utilized the Quality of Protection Modeling Language. With the proposed approach, it was possible to examine numerous network configurations, parameters, attack options, and scenarios. The results of the carefully performed multilevel analysis allowed us to identify a new kind of DDoS attack, the delayed distributed denial of service, by the authors, referred to as DDDoS attack. Multilevel approach to DDoS attack analysis confirmed that, examining endangered environments, it is significant to take into account many characteristics at once, just to not overlook any important aspect.

  5. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  6. The potential of dairy wastewater for denitrification

    Directory of Open Access Journals (Sweden)

    Tibela Landeka Dragičević

    2010-09-01

    Full Text Available In this work the potential of dairy wastewater for denitrification process by means of a microbial culture of nitrificants and denitrificants was investigated. The aim of this work was to remove nitrate by using organic compounds from the dairy wastewater as an electron donors. The minimal ratio of COD/NO3-N of 10 (COD-chemical oxygen demand/NO3-N-nitrate nitrogen was required to achieve complete reduction of NO3-N. The microbial culture of nitrificants and denitrificants, that was previously adapted on the dairy wastewater, carried out nitrate reduction with a different substrate utilization rate. The denitrification rate of 5.75 mg NO3-N/Lh was achieved at the beginning of denitrification when the microbial culture utilizes readily biodegradable COD. Further degradation occurred with the denitrification rate of 1.7 mg NO3-N/Lh.

  7. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  8. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses o...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  9. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  10. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  11. Design and Analysis of an Attack Resilient and Adaptive Medium access Control Protocol for Computer Networks

    CERN Document Server

    Shukla, Piyush Kumar; Bhadoria, Dr Sarita Singh

    2009-01-01

    The challenge of designing an efficient Medium Access Control (MAC) protocol and analyzing it has been an important research topic for over 30 years. This paper focuses on the performance analysis (through simulation) and modification of a well known MAC protocol CSMA/CD. The existing protocol does not consider the wastage of bandwidth due to unutilized periods of the channel. By considering this fact, performance of MAC protocol can be enhanced. The purpose of this work is to modify the existing protocol by enabling it to adapt according to state of the network. The modified protocol takes appropriate action whenever unutilized periods detected. In this way, to increase the effective bandwidth utilization and determine how it behaves under increasing load, and varying packet sizes. It will also include effects of attacks i.e. Denial of service attacks, Replay Attack, Continuous Channel Access or Exhaustion attack, Flooding attack, Jamming (Radio interference) attack, Selective forwarding attack which degrade...

  12. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  13. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  14. Vulnerability of water supply systems to cyber-physical attacks

    Science.gov (United States)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  15. Nitrification in Saline Industrial Wastewater

    NARCIS (Netherlands)

    Moussa, M.S.

    2004-01-01

    Biological nitrogen removal is widely and successfully applied for municipal wastewater. However, these experiences are not directly applicable to industrial wastewater, due to its specific composition. High salt levels in many industrial wastewaters affect nitrification negatively and improved unde

  16. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  17. An effective Denial of Service Attack Detection Method in Wireless Mesh Networks

    Science.gov (United States)

    Luan, Liangyu; Fu, Yingfang; Xiao, Peng

    In order to detect the DoS attack (Denial-of-Service attack) when wireless mesh networks adopt AODV routing protocol of Ad Hoc networks. Such technologies as an end-to-end authentication, utilization rate of cache memory, two pre-assumed threshold value and distributed voting are used in this paper to detect DoS attacker, which is on the basic of hierarchical topology structure in wireless mesh networks. Through performance analysis in theory and simulations experiment, the scheme would improve the flexibility and accuracy of DoS attack detection, and would obviously improve its security in wireless mesh networks.

  18. Wastewater Industrial Contributors

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — Industrial contributors to municipal wastewater treatment facilities in Iowa for the National Pollutant Discharge Elimination System (NPDES) program.

  19. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error...

  20. Removal of human pathogenic viruses in a down-flow hanging sponge (DHS) reactor treating municipal wastewater and health risks associated with utilization of the effluent for agricultural irrigation.

    Science.gov (United States)

    Kobayashi, Naohiro; Oshiki, Mamoru; Ito, Toshihiro; Segawa, Takahiro; Hatamoto, Masashi; Kato, Tsuyoshi; Yamaguchi, Takashi; Kubota, Kengo; Takahashi, Masanobu; Iguchi, Akinori; Tagawa, Tadashi; Okubo, Tsutomu; Uemura, Shigeki; Harada, Hideki; Motoyama, Toshiki; Araki, Nobuo; Sano, Daisuke

    2017-03-01

    A down-flow hanging sponge (DHS) reactor has been developed as a cost-effective wastewater treatment system that is adaptable to local conditions in low-income countries. A pilot-scale DHS reactor previously demonstrated stable reduction efficiencies for chemical oxygen demand (COD) and ammonium nitrogen over a year at ambient temperature, but the pathogen reduction efficiency of the DHS reactor has yet to be investigated. In the present study, the reduction efficiency of a pilot-scale DHS reactor fed with municipal wastewater was investigated for 10 types of human pathogenic viruses (norovirus GI, GII and GIV, aichivirus, astrovirus, enterovirus, hepatitis A and E viruses, rotavirus, and sapovirus). DHS influent and effluent were collected weekly or biweekly for 337 days, and concentrations of viral genomes were determined by microfluidic quantitative PCR. Aichivirus, norovirus GI and GII, enterovirus, and sapovirus were frequently detected in DHS influent, and the log10 reduction (LR) of these viruses ranged from 1.5 to 3.7. The LR values for aichivirus and norovirus GII were also calculated using a Bayesian estimation model, and the average LR (±standard deviation) values for aichivirus and norovirus GII were estimated to be 1.4 (±1.5) and 1.8 (±2.5), respectively. Quantitative microbial risk assessment was conducted to calculate a threshold reduction level for norovirus GII that would be required for the use of DHS effluent for agricultural irrigation, and it was found that LRs of 2.6 and 3.7 for norovirus GII in the DHS effluent were required in order to not exceed the tolerable burden of disease at 10(-4) and 10(-6) disability-adjusted life years loss per person per year, respectively, for 95% of the exposed population during wastewater reuse for irrigation.

  1. Ciprofloxacin oxidation by UV-C activated peroxymonosulfate in wastewater

    Energy Technology Data Exchange (ETDEWEB)

    Mahdi-Ahmed, Moussa; Chiron, Serge, E-mail: Serge.Chiron@msem.univ-montp2.fr

    2014-01-30

    Highlights: • UV/PMS more efficient than UV/H{sub 2}O{sub 2} for ciprofloxacin removal in wastewater. • PMS decomposition into sulfate radical was activated by bicarbonate ions. • CIP degradation pathways elucidation support sulfate radical attacks as a main route. • Sulfate radical generation allows for CIP antibacterial activity elimination. -- Abstract: This work aimed at demonstrating the advantages to use sulfate radical anion for eliminating ciprofloxacin residues from treated domestic wastewater by comparing three UV-254 nm based advanced oxidation processes: UV/persulfate (PDS), UV/peroxymonosulfate (PMS) and UV/H{sub 2}O{sub 2}. In distilled water, the order of efficiency was UV/PDS > UV/PMS > UV/H{sub 2}O{sub 2} while in wastewater, the most efficient process was UV/PMS followed by UV/PDS and UV/H{sub 2}O{sub 2} mainly because PMS decomposition into sulfate radical anion was activated by bicarbonate ions. CIP was fully degraded in wastewater at pH 7 in 60 min for a [PMS]/[CIP] molar ratio of 20. Nine transformation products were identified by liquid chromatography–high resolution-mass spectrometry allowing for the establishment of degradation pathways in the UV/PMS system. Sulfate radical anion attacks prompted transformations at the piperazinyl ring through a one electron oxidation mechanism as a major pathway while hydroxyl radical attacks were mainly responsible for quinolone moiety transformations as a minor pathway. Sulfate radical anion generation has made UV/PMS a kinetically effective process in removing ciprofloxacin from wastewater with the elimination of ciprofloxacin antibacterial activity.

  2. Characteristics of grey wastewater

    DEFF Research Database (Denmark)

    Eriksson, Eva; Auffarth, Karina Pipaluk Solvejg; Henze, Mogens

    2002-01-01

    The composition of grey wastewater depends on sources and installations from where the water is drawn, e.g. kitchen, bathroom or laundry. The chemical compounds present originate from household chemicals, cooking, washing and the piping. In general grey wastewater contains lower levels of organic...

  3. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  4. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  5. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on major American networks the first 24 hours...

  6. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst ...

  7. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  8. Study on mechanism of wet air oxidation of emulsification wastewater.

    Science.gov (United States)

    Tang, Wen W; Zeng, Xin P; Xiao, Yao M; Gu, Guo W

    2009-04-01

    Wet air oxidation (WAO) can effectively be used to treat high-concentration, non-biodegradable emulsification wastewater that contains nonionic matters. Gas chromatograph analysis of emulsification wastewater after oxidation indicated that a catalyst increased production of fatty acids but could not promote its oxidation between 160 and 180 degrees C. When the temperature was greater than or equal to 220 degrees C, the catalyst not only increased production of fatty acids initially but effectively promoted its oxidation in later stages and significantly reduced the concentration of residual surfactants. Experiments proved that fatty acids (especially acetic acid) were the primary intermediate products and that oxidation of these acids was the rate-limiting step. During the process of catalytic WAO of emulsification wastewater, active oxygen molecules attacked organic matters resulting in production of fatty acids, ketone, alcohol, hydrocarbon, and oligo-polyether through radical chain reactions.

  9. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  10. Inorganic nanoparticles engineered to attack bacteria.

    Science.gov (United States)

    Miller, Kristen P; Wang, Lei; Benicewicz, Brian C; Decho, Alan W

    2015-11-01

    Antibiotics were once the golden bullet to constrain infectious bacteria. However, the rapid and continuing emergence of antibiotic resistance (AR) among infectious microbial pathogens has questioned the future utility of antibiotics. This dilemma has recently fueled the marriage of the disparate fields of nanochemistry and antibiotics. Nanoparticles and other types of nanomaterials have been extensively developed for drug delivery to eukaryotic cells. However, bacteria have very different cellular architectures than eukaryotic cells. This review addresses the chemistry of nanoparticle-based antibiotic carriers, and how their technical capabilities are now being re-engineered to attack, kill, but also non-lethally manipulate the physiologies of bacteria. This review also discusses the surface functionalization of inorganic nanoparticles with small ligand molecules, polymers, and charged moieties to achieve drug loading and controllable release.

  11. Attack Vulnerability of Network Controllability.

    Science.gov (United States)

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.

  12. Research Note on the Energy Infrastructure Attack Database (EIAD

    Directory of Open Access Journals (Sweden)

    Jennifer Giroux

    2013-12-01

    Full Text Available The January 2013 attack on the In Amenas natural gas facility drew international attention. However this attack is part of a portrait of energy infrastructure targeting by non-state actors that spans the globe. Data drawn from the Energy Infrastructure Attack Database (EIAD shows that in the last decade there were, on average, nearly 400 annual attacks carried out by armed non-state actors on energy infrastructure worldwide, a figure that was well under 200 prior to 1999. This data reveals a global picture whereby violent non-state actors target energy infrastructures to air grievances, communicate to governments, impact state economic interests, or capture revenue in the form of hijacking, kidnapping ransoms, theft. And, for politically motivated groups, such as those engaged in insurgencies, attacking industry assets garners media coverage serving as a facilitator for international attention. This research note will introduce EIAD and position its utility within various research areas where the targeting of energy infrastructure, or more broadly energy infrastructure vulnerability, has been addressed, either directly or indirectly. We also provide a snapshot of the initial analysis of the data between 1980-2011, noting specific temporal and spatial trends, and then conclude with a brief discussion on the contribution of EIAD, highlighting future research trajectories. 

  13. Timing and hamming weight attacks on minimal cost encryption scheme

    Institute of Scientific and Technical Information of China (English)

    YUAN Zheng; WANG Wei; ZHANG Hua; WEN Qiao-yan

    2009-01-01

    The timing and Hamming weight attacks on the data encryption standard (DES) cryptosystem for minimal cost encryption scheme is presented in this article. In the attack, timing information on encryption processing is used to select and collect effective plaintexts for attack. Then the collected plaintexts are utilized to infer the expanded key differences of the secret key, from which most bits of the expanded secret key are recovered. The remaining bits of the expanded secret key are deduced by the correlations between Hamming weight values of the input of the S-boxes in the first-round. Finally, from the linear relation of the encryption time and the secret key's Hamming weight, the entire 56 bits of the secret key are thoroughly recovered. Using the attack, the minimal cost encryption scheme can be broken with 223 known plaintexts and about 221 calculations at a success rate a>99%. The attack has lower computing complexity, and the method is more effective than other previous methods.

  14. Detection of Attacks on MAODV Association Rule Mining Optimization

    Directory of Open Access Journals (Sweden)

    A. Fidalcastro

    2015-02-01

    Full Text Available Current mining algorithms can generate large number of rules and very slow to generate rules or generate few results, omitting interesting and valuable information. To address this problem, we propose an algorithm Optimized Featured Top Association Rules (OFTAR algorithm, where every attack have many features and some of the features are more important. The Features are selected by genetic algorithm and processed by the OFTAR algorithm to find the optimized rules. The algorithm utilizes Genetic Algorithm feature selection approach to find optimized features. OFTAR incorporate association rules with several rule optimization techniques and expansion techniques to improve efficiency. Increasing popularity of Mobile ad hoc network users of wireless networks lead to threats and attacks on MANET, due to its features. The main challenge in designing a MANET is protecting from various attacks in the network. Intrusion Detection System is required to monitor the network and to detect the malicious node in the network in multi casting mobility environment. The node features are processed in Association Analysis to generate rules, the generated rules are applied to nodes to detect the attacks. Experimental results show that the algorithm has higher scalability and good performance that is an advantageous to several association rule mining algorithms when the rule generation is controlled and optimized to detect the attacks.

  15. Energy Efficiency Strategies for Municipal Wastewater Treatment Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Daw, J.; Hallett, K.; DeWolfe, J.; Venner, I.

    2012-01-01

    Water and wastewater systems are significant energy consumers with an estimated 3%-4% of total U.S. electricity consumption used for the movement and treatment of water and wastewater. Water-energy issues are of growing importance in the context of water shortages, higher energy and material costs, and a changing climate. In this economic environment, it is in the best interest for utilities to find efficiencies, both in water and energy use. Performing energy audits at water and wastewater treatment facilities is one way community energy managers can identify opportunities to save money, energy, and water. In this paper the importance of energy use in wastewater facilities is illustrated by a case study of a process energy audit performed for Crested Butte, Colorado's wastewater treatment plant. The energy audit identified opportunities for significant energy savings by looking at power intensive unit processes such as influent pumping, aeration, ultraviolet disinfection, and solids handling. This case study presents best practices that can be readily adopted by facility managers in their pursuit of energy and financial savings in water and wastewater treatment. This paper is intended to improve community energy managers understanding of the role that the water and wastewater sector plays in a community's total energy consumption. The energy efficiency strategies described provide information on energy savings opportunities, which can be used as a basis for discussing energy management goals with water and wastewater treatment facility managers.

  16. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  17. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  18. Zika Attacks Nerves, Muscles, Other Tissues

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_164010.html Zika Attacks Nerves, Muscles, Other Tissues Monkey study may ... 2017 (HealthDay News) -- Scientists have learned where the Zika virus attacks the body in monkeys. In their ...

  19. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  20. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    is foreseeable while the rounds are performed. ECC (Elliptic Curve Cryptography) is used as a public key crypto system with the key purpose of creating a private shared between two participants in a communication network. Attacks on ECC include the Pohlig-Hellman attack and the Pollard's rho attack. Furthermore......AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...... side-channels attacks can be applied to ECC. This paper reflects an ongoing research in the field of countermeasures against the attacks mentioned above....

  1. Resilience of LTE networks against smart jamming attacks

    KAUST Repository

    Aziz, Farhan M.

    2014-12-08

    Commercial LTE networks are being studied for mission-critical applications, such as public safety and smart grid communications. In this paper, LTE networks are shown vulnerable to Denial-of-Service (DOS) and loss of service attacks from smart jammers, who may employ simple narrowband jamming techniques to attack without any need to hack the network or its users. We modeled the utilities of jamming and anti-jamming actions played by the jammer and the network under the framework of single-shot and repeated Bayesian games. In a single-shot game formulation the only Nash Equilibria (NE) are pure strategy equilibria at which network utility is severely compromised. We propose a repeated-game learning and strategy algorithm for the network that outperforms single-shot games by a significant margin. Furthermore, all of our proposed actions and algorithms can be implemented with current technology.

  2. Resilience of LTE networks against smart jamming attacks: Wideband model

    KAUST Repository

    Aziz, Farhan M.

    2015-12-03

    LTE/LTE-A networks have been successfully providing advanced broadband services to millions of users worldwide. Lately, it has been suggested to use LTE networks for mission-critical applications like public safety, smart grid and military communications. We have previously shown that LTE networks are vulnerable to Denial-of-Service (DOS) and loss of service attacks from smart jammers. In this paper, we extend our previous work on resilience of LTE networks to wideband multipath fading channel, SINR estimation in frequency domain and computation of utilities based on observable parameters under the framework of single-shot and repeated games with asymmetric information. In a single-shot game formulation, network utility is severely compromised at its solutions, i.e. at the Nash Equilibria (NE). We propose evolved repeated-game strategy algorithms to combat smart jamming attacks that can be implemented in existing deployments using current technology. © 2015 IEEE.

  3. Biomechanics of knife stab attacks.

    Science.gov (United States)

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  4. Sybil attack in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Abirami.K

    2013-04-01

    Full Text Available Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for security.

  5. New Multi-step Worm Attack Model

    OpenAIRE

    Robiah, Y.; Rahayu, S. Siti; Shahrin , S.; M. FAIZAL A.; Zaki, M. Mohd; Marliza, R.

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. Fo...

  6. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612... CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting of issues of public importance, an attack is made upon the honesty, character, integrity, or like...

  7. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  8. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  9. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  10. Wastewater Treatment Facilities

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — Individual permits for municipal, industrial, and semi-public wastewater treatment facilities in Iowa for the National Pollutant Discharge Elimination System (NPDES)...

  11. Wastewater Treatment Plants

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — The actual treatment areas for municipal, industrial, and semi-public wastewater treatment facilities in Iowa for the National Pollutant Discharge Elimination System...

  12. Methods of Identifying and Preventing SQL Attacks

    Directory of Open Access Journals (Sweden)

    Bojken Shehu

    2012-11-01

    Full Text Available The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

  13. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  14. Reclamation and reuse of distributed wastewater and programming based on cost analysis

    Institute of Scientific and Technical Information of China (English)

    HE Jun-guo; HAN Bao-ping; XU Chun-sheng; LI Ke; ZHANG Jie

    2010-01-01

    In order to improve the water environment of Songhua River,develop and maintain a healthy water cycle,the article has made theoretical and mathematical analyses of wastewater treatment and reuse.It proposes that the important link of sustainable utilization of urban water resources is wastewater treatment and reuse,and the main approach of sustainable utilization of water resources is water saving,wastewater reclamation and reuse.Through establishing the cost equation of recycle water system and optimizing it by Matlab,an optimal treatment scale of the city recycle distributed wastewater system is obtained.The principles of recycle water system in northern areas are put forward based on the research of sustainable utilization of water resource in Songbei district.The results can provide experiences and references for water saving,wastewater reclamation and reuse in northern cities of China.

  15. Continuous Weight Attack on Complex Network

    Institute of Scientific and Technical Information of China (English)

    YIN Yan-Ping; ZHANG Duan-Ming; TAN Jin; PAN Gui-Jun; HE Min-Hua

    2008-01-01

    We introduce a continuous weight attack strategy and numerically investigate the effect of continuous use a weight coefficient ω to define the attack intensity. The weight coefficient ω increases continuously from 1 to infinity, where 1 represents no attack and infinity represents complete destructive attack. Our results show that the continuous weight attack on two selected nodes with small ω (ω≈ 3) could achieve the same damage of complete elimination of a single selected node on both BA and ER networks. It is found that the continuous weight attack on a single selected edge with small ω (ω≈ 2) can reach the same effect of complete elimination of a single edge on BA network, but on ER network the damage of the continuous weight attack on a single edge is close to but always smaller than that of complete elimination of edge even if ω is very large.

  16. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  17. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  18. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  19. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identifi...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....... through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  20. Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis

    Directory of Open Access Journals (Sweden)

    Tongguang Ni

    2013-01-01

    Full Text Available Distributed denial of service (DDoS attacks are one of the major threats to the current Internet, and application-layer DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. Consequently, neither intrusion detection systems (IDS nor victim server can detect malicious packets. In this paper, a novel approach to detect application-layer DDoS attack is proposed based on entropy of HTTP GET requests per source IP address (HRPI. By approximating the adaptive autoregressive (AAR model, the HRPI time series is transformed into a multidimensional vector series. Then, a trained support vector machine (SVM classifier is applied to identify the attacks. The experiments with several databases are performed and results show that this approach can detect application-layer DDoS attacks effectively.

  1. Biohydrogen production from industrial wastewaters.

    Science.gov (United States)

    Moreno-Andrade, Iván; Moreno, Gloria; Kumar, Gopalakrishnan; Buitrón, Germán

    2015-01-01

    The feasibility of producing hydrogen from various industrial wastes, such as vinasses (sugar and tequila industries), and raw and physicochemical-treated wastewater from the plastic industry and toilet aircraft wastewater, was evaluated. The results showed that the tequila vinasses presented the maximum hydrogen generation potential, followed by the raw plastic industry wastewater, aircraft wastewater, and physicochemical-treated wastewater from the plastic industry and sugar vinasses, respectively. The hydrogen production from the aircraft wastewater was increased by the adaptation of the microorganisms in the anaerobic sequencing batch reactor.

  2. Microbial community structure of a freshwater system receiving wastewater effluent.

    Science.gov (United States)

    Hladilek, Matthew D; Gaines, Karen F; Novak, James M; Collard, David A; Johnson, Daniel B; Canam, Thomas

    2016-11-01

    Despite our dependency on treatment facilities to condition wastewater for eventual release to the environment, our knowledge regarding the effects of treated water on the local watershed is extremely limited. Responses of lotic systems to the treated wastewater effluent have been traditionally investigated by examining the benthic macroinvertebrate assemblages and community structure; however, these studies do not address the microbial diversity of the water systems. In the present study, planktonic and benthic bacterial community structure were examined at 14 sites (from 60 m upstream to 12,100 m downstream) and at two time points along an aquatic system receiving treated effluent from the Charleston Wastewater Treatment Plant (Charleston, IL). Total bacterial DNA was isolated and 16S rRNA sequences were analyzed using a metagenomics platform. The community structure in planktonic bacterial communities was significantly correlated with dissolved oxygen concentration. Benthic bacterial communities were not correlated with water quality but did have a significant geographic structuring. A local restructuring effect was observed in both planktonic and benthic communities near the treated wastewater effluent, which was characterized by an increase in abundance of sphingobacteria. Sites further downstream from the wastewater facility appeared to be less influenced by the effluent. Overall, the present study demonstrated the utility of targeted high-throughput sequencing as a tool to assess the effects of treated wastewater effluent on a receiving water system, and highlighted the potential for this technology to be used for routine monitoring by wastewater facilities.

  3. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  4. RECOVERY AND DESTRUCTIVE TREATMENT OF HARMFUL SUBSTANCE IN COKING PLANT WASTEWATER

    Institute of Scientific and Technical Information of China (English)

    Cheng Jianguang

    2000-01-01

    This paper discussed the comprehensive treatment of coking plant effluent.Cyanide-containing and phenol wastewater was first recovered and utilized respectively, and then, mixed it with other low harmful wastewater for destroying treatment.Treated water was reused in quenching coke.

  5. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  6. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to ...... of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs.......By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools...

  7. ACTIVITY ATTACK ON REDUCED VARIANTS OF RIJNDAEL

    Institute of Scientific and Technical Information of China (English)

    Wei Baodian; Liu Dongsu; Wang Xinmei

    2004-01-01

    The famous Square attacks against the Rijndael algorithm have taken advantage of the change of the balance of some bytes. Further study shows that the change of activity always happens before the change of balance, which builds the foundation for a new activity attack presented in this paper. In the activity attack, the round in which the activity changes is executed in an equivalent form to avoid the obstructive restriction of the subkeys of that round.The existence of the birthday paradox guarantees much fewer plaintexts necessary for activity attacks comparing with that for corresponding Square attacks. But no benefit may result from the new attacks performed independently because the activity attacks guess four instead of one key byte once. Only when both the balance property and the activity property are exploited at the same time can much better performance be obtained. The better performance in the simulation shows that the consuming time and chosen plaintexts necessary are both reduced to one tenth of those of the corresponding Square attacks. So the activity attacks could be viewed as an efficient supplement to the Square attacks.

  8. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

    Science.gov (United States)

    Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y

    2016-04-01

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.

  9. Xenobiotic organic compounds in wastewater

    DEFF Research Database (Denmark)

    Eriksson, Eva; Baun, Anders; Henze, Mogens

    2002-01-01

    Information regarding the contents of xenobiotic organic compounds (XOCs) in wastewater is limited, but it has been shown that at least 900 different compounds / compound groups could potentially be present in grey wastewater. Analyses of Danish grey wastewater revealed the presence of several...

  10. Microalgal biofilms for wastewater treatment

    NARCIS (Netherlands)

    Boelee, N.C.

    2013-01-01

    The objective of this thesis was to explore the possibilities of using microalgal biofilms for the treatment of municipal wastewater, with a focus on the post-treatment of municipal wastewater effluent. The potential of microalgal biofilms for wastewater treatment was first investigated using a scen

  11. Detection of Denial-of-service Attacks

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Denial-of-service (DOS) is a type of computer attack, which can essentially disable computers and networks.Resource consumption type of DOS attack could not be detected by the traditional misuse detection technique. This paper presents a new method of support vector mchine (SVM) to detect these attacks. We find that a DOS attack to a host is related to the activities within an impact data set of the host. The SVM method is used to classify the subsets of an impact data set to estimate its anomalism. The experiment result shows that this method can detect resource consumption type of DOS attacks, such as SYNflood, Smurf and UDP-storm. A receiver operating characteristic curve is plotted to determine performance for any possible operating point of the DOS attacks detection.

  12. Opportunities for Automated Demand Response in California Wastewater Treatment Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Aghajanzadeh, Arian [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Wray, Craig [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); McKane, Aimee [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2015-08-30

    Previous research over a period of six years has identified wastewater treatment facilities as good candidates for demand response (DR), automated demand response (Auto-­DR), and Energy Efficiency (EE) measures. This report summarizes that work, including the characteristics of wastewater treatment facilities, the nature of the wastewater stream, energy used and demand, as well as details of the wastewater treatment process. It also discusses control systems and automated demand response opportunities. Furthermore, this report summarizes the DR potential of three wastewater treatment facilities. In particular, Lawrence Berkeley National Laboratory (LBNL) has collected data at these facilities from control systems, submetered process equipment, utility electricity demand records, and governmental weather stations. The collected data were then used to generate a summary of wastewater power demand, factors affecting that demand, and demand response capabilities. These case studies show that facilities that have implemented energy efficiency measures and that have centralized control systems are well suited to shed or shift electrical loads in response to financial incentives, utility bill savings, and/or opportunities to enhance reliability of service. In summary, municipal wastewater treatment energy demand in California is large, and energy-­intensive equipment offers significant potential for automated demand response. In particular, large load reductions were achieved by targeting effluent pumps and centrifuges. One of the limiting factors to implementing demand response is the reaction of effluent turbidity to reduced aeration at an earlier stage of the process. Another limiting factor is that cogeneration capabilities of municipal facilities, including existing power purchase agreements and utility receptiveness to purchasing electricity from cogeneration facilities, limit a facility’s potential to participate in other DR activities.

  13. Dielectric Barrier Discharge Plasma-Induced Photocatalysis and Ozonation for the Treatment of Wastewater

    Science.gov (United States)

    Mok, Young Sun; Jo, Jin-Oh; Lee, Heon-Ju

    2008-02-01

    The physicochemical processes of dielectric barrier discharge (DBD) such as in-situ formation of chemically active species and emission of ultraviolet (UV)/visible light were utilized for the treatment of a simulated wastewater formed with Acid Red 4 as the model organic contaminant. The chemically active species (mostly ozone) produced in the DBD reactor were well distributed in the wastewater using a porous gas diffuser, thereby increasing the gas-liquid contact area. For the purpose of making the best use of the light emission, a titanium oxide-based photocatalyst was incorporated in the wastewater treating system. The experimental parameters chosen were the voltage applied to the DBD reactor, the initial pH of the wastewater, and the concentration of hydrogen peroxide added to the wastewater. The results have clearly shown that the present system capable of degrading organic contaminants in two ways (photocatalysis and ozonation) may be a promising wastewater treatment technology.

  14. Dielectric Barrier Discharge Plasma-Induced Photocatalysis and Ozonation for the Treatment of Wastewater

    Institute of Scientific and Technical Information of China (English)

    MOK Young Sun; JO Jin-Oh; LEE Heon-Ju

    2008-01-01

    The physicochemical processes of dielectric barrier discharge (DBD) such as in-situ formation of chemically active species and emission of ultraviolet (UV)/visible light were utilized for the treatment of a simulated wastewater formed with Acid Red 4 as the model organic contaminant. The chemically active species (mostly ozone) produced in the DBD reactor were well distributed in the wastewater using a porous gas diffuser, thereby increasing the gas-liquid contact area. For the purpose of making the best use of the light emission, a titanium oxide-based photocatalyst was incorporated in the wastewater treating system. The experimental parameters chosen were the voltage applied to the DBD reactor, the initial pH of the wastewater, and the concentration of hydrogen peroxide added to the wastewater. The results have clearly shown that the present system capable of degrading organic contaminants in two ways (photocatalysis and ozonation) may be a promising wastewater treatment technology.

  15. Fault Attack on the Balanced Shrinking Generator

    Institute of Scientific and Technical Information of China (English)

    GAO Juntao; LI Xuelian; HU Yupu

    2006-01-01

    Fault analysis, belonging to indirect attack, is a cryptanalysis technique for the physical implementation of cryptosystem. In this paper, we propose a fault attack on the Balanced Shrinking Generator. The results show that the attacker can obtain the secret key by analyzing faulty output sequences which is produced by changing control clock of one of Linear Feedback Shift Registers (LFSR). Therefore, the balanced shrinking generator has a trouble in hardware implementation.

  16. Impact of Alleged Russian Cyber Attacks

    Science.gov (United States)

    2009-05-01

    March 14, 2009). 96 Ivan Buranov, Vladimir Vodo, and Seda Yegikyan, Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal...Vladimir Vodo, and Seda Yegikyan, Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal Wrongdoing, Translated by Open Source...Buranov, Ivan; Vodo, Vladimir; and Yegikyan, Seda Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal Wrongdoing, Translated

  17. Reduction in toxicity of wastewater from three wastewater treatment plants to alga (Scenedesmus obliquus) in northeast China.

    Science.gov (United States)

    Zhang, Ying; Sun, Qing; Zhou, Jiti; Masunaga, Shigeki; Ma, Fang

    2015-09-01

    The toxicity of municipal wastewater to the receiving water bodies is still unknown, due to the lack of regulated toxicity based index for wastewater discharge in China. Our study aims at gaining insight into the acute toxic effects of local municipal wastewater on alga, Scenedesmus obliquus. Four endpoints, i.e. cell density, chlorophyll-A concentration, superoxide dismutase (SOD) activity and cell membrane integrity, of alga were analyzed to characterize the acute toxicity effects of wastewater from municipal wastewater treatment plants (WWTPs) with different treatment techniques: sequencing batch reactor (SBR), Linpor and conventional activated sludge. Influent and effluent from each treatment stage in these three WWTPs were sampled and evaluated for their acute toxicity. Our results showed that all three techniques can completely affect the algal chlorophyll-A synthesis stimulation effects of influent; the algal cell growth stimulation effect was only completely removed by the secondary treatment process in conventional activated sludge technique; toxic effects on cell membrane integrity of two influents from WWTPs with SBR and conventional activated sludge techniques were completely removed; the acute toxicity on SOD activity was partially reduced in SBR and conventional activated sludge techniques while not significantly reduced by Linpor system. As to the disinfection unit, NaClO disinfection enhanced wastewater toxicity dramatically while UV radiation had no remarkable influence on wastewater toxicity. Our results illustrated that SOD activity and chlorophyll-A synthesis were relatively sensitive to municipal wastewater toxicity. Our results would aid to understand the acute toxicity of municipal wastewater, as well as the toxicity removal by currently utilized treatment techniques in China.

  18. Identification of wastewater processes

    DEFF Research Database (Denmark)

    Carstensen, Niels Jacob

    -known theory of the processes with the significant effects found in data. These models are called grey box models, and they contain rate expressions for the processes of influent load of nutrients, transport of nutrients between the aeration tanks, hydrolysis and growth of biomass, nitrification...... function. The grey box models are estimated on data sets from the Lundtofte pilot scale plant and the Aalborg West wastewater treatment plant. Estimation of Monod- kinetic expressions is made possible through the application of large data sets. Parameter extimates from the two plants show a reasonable......The introduction of on-line sensors for monitoring of nutrient salts concentrations on wastewater treatment plants with nutrient removal, opens a wide new area of modelling wastewater processes. The subject of this thesis is the formulation of operational dynamic models based on time series...

  19. Wastewater Treatment in Greenland

    DEFF Research Database (Denmark)

    Gunnarsdottir, Ragnhildur

    treatment in these regions. However, designing, constructing and operating wastewater collection systems in the Arctic is challenging because of e.g. permafrost conditions, hard rock surfaces, freezing, limited quantity of water and high costs of electricity, fuel and transportation, as well as a settlement...... or water saving toilets. This opens up for co-treatment of organic waste fractions. Freezing and thawing has also been recognised as being a cost-effective wastewater treatment method in cold regions. Thus it was chosen to concentrate on the effect of the mentioned processes, namely freezing, anaerobic....... Wastewater contains a variety of substances, including anthropogenic pollutants, residues of pharmaceuticals and personal care products (PPCPs), pathogenic microorganisms and parasites as well as antibiotic resistant bacteria that can be harmful for the environment as well as human health. Due...

  20. Treatment of electroplating wastewater

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    To study the feasibility of treated water being used as rinsing water with CP/ED (chemical precipitation/electrodialysis) system, the relation between concentration of Cr (VI) and conductivity of water is investigated, the effect of electrodialysis (ED) for different wastewater is also studied. And several parameters of importance that are relevant to the process are identified. Analysis of ICP (Inductively coupled plasma) and IC (Ion chromatography) shows that the main reason of conductivity increase in CP treated water is the increase of Na+ and Cl- ions. The 93.8%-100% of ions from wastewater both in ED and CP/ED systems was removed successfully. The results of experiments indicate that the CP/ED system is a feasible method for electroplating wastewater treatment, the CP/ED system used as a way of wastwater is not only in favour of environment, but also economic beneficial to achieve.

  1. Localized attack on clustering networks

    CERN Document Server

    Dong, Gaogao; Du, Ruijin; Shao, Shuai; Stanley, H Eugene; Shlomo, Havlin

    2016-01-01

    Clustering network is one of which complex network attracting plenty of scholars to discuss and study the structures and cascading process. We primarily analyzed the effect of clustering coefficient to other various of the single clustering network under localized attack. These network models including double clustering network and star-like NON with clustering and random regular (RR) NON of ER networks with clustering are made up of at least two networks among which exist interdependent relation among whose degree of dependence is measured by coupling strength. We show both analytically and numerically, how the coupling strength and clustering coefficient effect the percolation threshold, size of giant component, critical coupling point where the behavior of phase transition changes from second order to first order with the increase of coupling strength between the networks. Last, we study the two types of clustering network: one type is same with double clustering network in which each subnetwork satisfies ...

  2. Attacks on Local Searching Tools

    CERN Document Server

    Nielson, Seth James; Wallach, Dan S

    2011-01-01

    The Google Desktop Search is an indexing tool, currently in beta testing, designed to allow users fast, intuitive, searching for local files. The principle interface is provided through a local web server which supports an interface similar to Google.com's normal web page. Indexing of local files occurs when the system is idle, and understands a number of common file types. A optional feature is that Google Desktop can integrate a short summary of a local search results with Google.com web searches. This summary includes 30-40 character snippets of local files. We have uncovered a vulnerability that would release private local data to an unauthorized remote entity. Using two different attacks, we expose the small snippets of private local data to a remote third party.

  3. Attacks and Countermeasures in Social Network Data Publishing

    Institute of Scientific and Technical Information of China (English)

    XIANG Yang

    2016-01-01

    With the increasing prevalence of social networks, more and more social network data are published for many applications, such as social network analysis and data mining. However, this brings privacy problems. For example, adversaries can get sensitive in⁃formation of some individuals easily with little background knowledge. How to publish social network data for analysis purpose while preserving the privacy of individuals has raised many concerns. Many algorithms have been proposed to address this issue. In this paper, we discuss this privacy problem from two aspects: attack models and countermeasures. We analyse privacy con⁃cerns, model the background knowledge that adversary may utilize and review the recently developed attack models. We then sur⁃vey the state⁃of⁃the⁃art privacy preserving methods in two categories: anonymization methods and differential privacy methods. We also provide research directions in this area.

  4. Evaluation of Hypervisor Stability towards Insider Attacks

    Institute of Scientific and Technical Information of China (English)

    Roman Kulikov; Svetlana Kolesnikova

    2016-01-01

    Virtualization technology plays a key role in cloud computing. Thus, the security issues of virtualization tools (hypervisors, emulators, etc.) should be under precise consideration. However, threats of insider attacks are underestimated. The virtualization tools and hypervisors have been poorly protected from this type of attacks. Furthermore, hypervisor is one of the most critical elements in cloud computing infrastructure. Firstly, hypervisor vulnerabilities analysis is provided. Secondly, a formal model of insider attack on hypervisor is developed. Consequently, on the basis of the formal attack model, we propose a new methodology of hypervisor stability evaluation. In this paper, certain security countermeasures are considered that should be integrated in hypervisor software architecture.

  5. Colluding attacks on a group signature scheme

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure. In this paper, we show that two dishonest group members can collude to launch two attacks on the scheme. In the first attack they can derive the group secret key and then generate untraceable group signatures. In the second attack, they can impersonate other group members once they see their signatures. Therefore we conclude that the signature scheme is not secure.We show that some parameters should be carefully selected in the scheme to resist our attacks.

  6. Off-Path Attacking the Web

    CERN Document Server

    Gilad, Yossi

    2012-01-01

    We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured with SSL/TLS. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a the victim client machine, and attacker capable of IP-spoofing on the Internet. Our attacks use a technique allowing an off-path attacker to learn the sequence numbers of both client and server in a TCP connection. The technique exploits the fact that many computers, in particular those running Windows, use a global IP-ID counter, which provides a side channel allowing efficient exposure of the connection sequence numbers. We present results of experiments evaluating the learning technique and the attacks ...

  7. Wastewater Treatment Models

    DEFF Research Database (Denmark)

    Gernaey, Krist; Sin, Gürkan

    2008-01-01

    The state-of-the-art level reached in modeling wastewater treatment plants (WWTPs) is reported. For suspended growth systems, WWTP models have evolved from simple description of biological removal of organic carbon and nitrogen in aeration tanks (ASM1 in 1987) to more advanced levels including...... the practice of WWTP modeling by linking the wastewater treatment line with the sludge handling line in one modeling platform. Application of WWTP models is currently rather time consuming and thus expensive due to the high model complexity, and requires a great deal of process knowledge and modeling expertise...

  8. Wastewater treatment models

    DEFF Research Database (Denmark)

    Gernaey, Krist; Sin, Gürkan

    2011-01-01

    The state-of-the-art level reached in modeling wastewater treatment plants (WWTPs) is reported. For suspended growth systems, WWTP models have evolved from simple description of biological removal of organic carbon and nitrogen in aeration tanks (ASM1 in 1987) to more advanced levels including...... of WWTP modeling by linking the wastewater treatment line with the sludge handling line in one modeling platform. Application of WWTP models is currently rather time consuming and thus expensive due to the high model complexity, and requires a great deal of process knowledge and modeling expertise...

  9. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  10. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  11. Modelling of wastewater systems

    DEFF Research Database (Denmark)

    Bechmann, Henrik

    In this thesis, models of pollution fluxes in the inlet to 2 Danish wastewater treatment plants (WWTPs) as well as of suspended solids (SS) concentrations in the aeration tanks of an alternating WWTP and in the effluent from the aeration tanks are developed. The latter model is furthermore used...

  12. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  13. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    Stevens, M.M.J.

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfi

  14. Minimization and Reliability Analyses of Attack Graphs

    Science.gov (United States)

    2002-02-01

    they model only attacks. Since we have a generic state machine model , we can simultaneously model not just attacks, but also seemingly benign system...Finite State Machine Model The Network We model the network as a set of facts, each represented as a relational predicate. The state of the network

  15. Quantifying Shannon's work function for cryptanalytic attacks

    NARCIS (Netherlands)

    van Son, R.J.J.H.

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on compu

  16. British used Congreve Rockets to Attack Napoleon

    Science.gov (United States)

    2004-01-01

    Sir William Congreve developed a rocket with a range of about 9,000 feet. The incendiary rocket used black powder, an iron case, and a 16-foot guide stick. In 1806, British used Congreve rockets to attack Napoleon's headquarters in France. In 1807, Congreve directed a rocket attack against Copenhagen.

  17. Attack tree generation by policy invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified th

  18. New Multi-step Worm Attack Model

    CERN Document Server

    Robiah, Y; Shahrin, S; Faizal, M A; Zaki, M Mohd; Marliza, R

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

  19. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  20. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  1. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash......In this paper we combine two powerful methods of symmetric cryptanalysis: rotational cryptanalysis and the rebound attack. Rotational cryptanalysis was designed for the analysis of bit-oriented designs like ARX (Addition-Rotation-XOR) schemes. It has been applied to several hash functions and block...... function Skein, a finalist of the SHA-3 competition. Our attack penetrates more than two thirds of the Skein core—the cipher Threefish, and made the designers to change the submission in order to prevent it. The rebound part of our attack has been significantly enhanced to deliver results on the largest...

  2. CompChall: Addressing Password Guessing Attacks

    CERN Document Server

    Goyal, Vipul; Singh, Mayank; Abraham, Ajith; Sanyal, Sugata

    2011-01-01

    Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication channel and can be successfully countered using public key cryptography, online dictionary attacks can be performed by anyone and there is no satisfactory solution to counter them. This paper presents a new authentication protocol which is called CompChall (computational challenge). The proposed protocol uses only one way hash functions as the building blocks and attempts to eliminate online dictionary attacks by implementing a challenge-response system. This challenge-response system is designed in a fashion that it does not pose any difficulty to a genuine user but is time consuming and computationally intensive for an adversary trying to launch a large n...

  3. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  4. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  5. Evaluating Deterioration of Concrete by Sulfate Attack

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Effects of factors such as water to cement ratio, fly ash and silica fume on the resistance of concrete to sulfate attack were investigated by dry-wet cycles and immersion method. The index of the resistance to sulfate attack was used to evaluate the deterioration degree of concrete damaged by sulfate. The relationship between the resistance of concrete to sulfate attack and its permeability/porosity were analyzed as well as its responding mechanism. Results show that the depth of sulfate crystal attack from surface to inner of concrete can be reduced by decreasing w/c and addition of combining fly ash with silica fume. The variation of relative elastic modulus ratio and relative flexural strength ratio of various specimens before and after being subjected to sulfate attack was compared.

  6. Agricultural use of treated municipal wastewaters preserving environmental sustainability

    Directory of Open Access Journals (Sweden)

    Pietro Rubino

    2007-07-01

    Full Text Available In this paper the utility of the treated municipal wastewaters in agriculture, analyzing the chemical, physical and microbiological characteristics and their pollution indicators evaluation are being illustrated. Some methods employed for treating wastewaters are examined, as well as instructions and rules actually in force in different countries of the world, for evaluating the legislative hygienic and sanitary and agronomic problems connected with the treated wastewaters use, are being collected and compared. Successively, in order to provide useful indications for the use of treated municipal wastewaters, results of long-term field researches, carried out in Puglia, regarding two types of waters (treated municipal wastewater and conventional water and two irrigation methods (drip and capillary sub-irrigation on vegetable crops grown in succession, are being reported. For each crop cycle, chemical physical and microbiological analyses have been performed on irrigation water, soil and crop samples. The results evidenced that although irrigating with waters having high colimetric values, higher than those indicated by law and with two different irrigation methods, never soil and marketable yield pollutions have been observed. Moreover, the probability to take infection and/or disease for ingestion of fruits coming from crops irrigated with treated wastewaters, calculated by Beta-Poisson method, resulted negligible and equal to 1 person for 100 millions of exposed people. Concentrations of heavy metals in soil and crops were lesser than those admissible by law. The free chlorine, coming from disinfection, found in the wastewaters used for watering, in some cases caused toxicity effects, which determined significant yield decreases. Therefore, municipal wastewaters, if well treated, can be used for irrigation representing a valid alternative to the conventional ones.

  7. Detection Block Model for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Diksha G. Kumar

    2014-10-01

    Full Text Available With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack.

  8. Denial of Service (DoS Attacks at Network Layer in WSN

    Directory of Open Access Journals (Sweden)

    Sunil Ghildiyal,

    2015-11-01

    Full Text Available Recent advancements in technology, tiny size, cost effectiveness have made sensors as a crucial part of real world sensitive applications. These sensor nodes are scattered over an area to monitor the situations like fire, flood and record the data and to forward meaningful data to the center head node for observation, resulting an advance prompt to control the situation. In last decade, WSN have grown significantly in variety of areas and applications, resulted the high, consistent security mechanism. Also, there is variety of attacks on WSN at their different layers of architecture. Though sensor nodes are not capable enough in terms of power, processing etc. but applications based on these sensors demand on-time collection of information or data and then to send same on reliable, secure delivery medium. Small sensors with limited hardware, processing cannot afford traditional security mechanisms to face or sustain the attacks. There is variety of attacks at different layers of WSN architecture to affect sensor‟s roles like signaling, framing, transmission etc. Many Denial of Service (DoS attacks are identified at each layer of WSN which are purposeful, planned attacks to hamper the availability of service, restricting the sensor node‟s utility for problem solution. In this paper we will focus on the WSN architecture, characteristics, constraints and various types of DoS attacks primarily on physical and data link layer and particularly at network layer in details with some suggestions against attacks.

  9. Electrochemical wastewater treatment directly powered by photovoltaic panels: electrooxidation of a dye-containing wastewater.

    Science.gov (United States)

    Valero, David; Ortiz, Juan M; Expósito, Eduardo; Montiel, Vicente; Aldaz, Antonio

    2010-07-01

    Electrochemical technologies have proved to be useful for the treatment of wastewater, but to enhance their green characteristics it seems interesting to use a green electric energy such as that provided by photovoltaic (PV) cells, which are actually under active research to decrease the economic cost of solar kW. The aim of this work is to demonstrate the feasibility and utility of using an electrooxidation system directly powered by a photovoltaic array for the treatment of a wastewater. The experimental system used was an industrial electrochemical filter press reactor and a 40-module PV array. The influence on the degradation of a dye-containing solution (Remazol RB 133) of different experimental parameters such as the PV array and electrochemical reactor configurations has been studied. It has been demonstrated that the electrical configuration of the PV array has a strong influence on the optimal use of the electric energy generated. The optimum PV array configuration changes with the intensity of the solar irradiation, the conductivity of the solution, and the concentration of pollutant in the wastewater. A useful and effective methodology to adjust the EO-PV system operation conditions to the wastewater treatment is proposed.

  10. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  11. Content modification attacks on consensus seeking multi-agent system with double-integrator dynamics.

    Science.gov (United States)

    Dong, Yimeng; Gupta, Nirupam; Chopra, Nikhil

    2016-11-01

    In this paper, vulnerability of a distributed consensus seeking multi-agent system (MAS) with double-integrator dynamics against edge-bound content modification cyber attacks is studied. In particular, we define a specific edge-bound content modification cyber attack called malignant content modification attack (MCoMA), which results in unbounded growth of an appropriately defined group disagreement vector. Properties of MCoMA are utilized to design detection and mitigation algorithms so as to impart resilience in the considered MAS against MCoMA. Additionally, the proposed detection mechanism is extended to detect the general edge-bound content modification attacks (not just MCoMA). Finally, the efficacies of the proposed results are illustrated through numerical simulations.

  12. Denial of Service Attack: Analysis of Network Traffic Anormaly using Queuing Theory

    CERN Document Server

    Singh, Neetu; Chaudhuri, Pranay

    2010-01-01

    Denial-of-service (DOS) attacks increasingly gained reputation over the past few years. As the Internet becomes more ubiquitous, the threat of the denial-of-service attacks becomes more realistic and important for individuals, businesses, governmental organizations, and even countries. There is intensive need to detect an attack in progress as soon as possible. The efficiency of diagnosing the DOS attack using concepts of queuing theory and performance parameter of the system has been investigated in the present work, as the servers definitely have some mechanisms to store and process the requests. Utilizing this concept of queuing theory, the collection of data patterns were generated. With the performance parameter of the system, the analysis of the data pattern had been made to diagnose the network anomaly. Performance analysis and results show the accuracy of the proposed scheme in detecting anomalies.

  13. Study on the resource utilization of potato starch wastewater using modified nano-clay surfactant%有机化纳米粘土基絮凝吸附材料对马铃薯淀粉加工废水的资源化处理

    Institute of Scientific and Technical Information of China (English)

    周添红; 赵鑫; 高祥虎; 刘刚

    2011-01-01

    The nano clay-based flocculation adsorption materials were prepared using the purification methods of physical chemistry. The produced materials were organically modified with the four representative surfactants of polyethylene glycol (PEG-2000), hexadecyl trimethyl ammonium bromide (CTAB), tetrabutylammonium hydroxide (TBAOH,25% wt) and tetraphenylphosphonium bromide (TPPB). The modified flocculation adsorption materials were applied in the resourceful treatment of potato starch wastewater. The results showed that the organized nano-clay flocculation absorbent materials had good flocculation absorption performance, the values for turbidity removal were all above 90%, and COD absorptive capacities were all above 170 mg/g. Furthermore, the absorbent materials can be used to prepare organic fertilizer, which further realizes the purpose of resource utilization for potato starch wastewater and clay minerals.%采用物理化学提纯方法制备了有机化纳米粘土基絮凝吸附材料,经过以聚乙二醇2000(PEG-2000)、十六烷基三甲基溴化氨(CTAB)、四丁基氢氧化铵(TBAOH,质量分数25%)和溴化四苯基磷(TPPB)4种表面活性剂对絮凝吸附材料进行有机化修饰,并将其应用于马铃薯淀粉加工废水的资源化处理.实验结果表明,有机化纳米粘土基絮凝吸附材料对马铃薯淀粉加工废水有良好的絮凝吸附性能,浊度去除率均在90%以上,COD吸附量在170 mg/g以上.吸附处理废水后,有机化纳米粘土基絮凝吸附材料还可用于制备有机肥料,符合马铃薯淀粉加工废水和粘土矿物的资源化利用目的.

  14. An Intrusion Detection System Against UDP Flood Attack and Ping of Death Attack (DDOS in MANET

    Directory of Open Access Journals (Sweden)

    Ankur Ashok Acharya

    2016-04-01

    Full Text Available DDoS is one of the serious attacks in the ad hoc network. Among lot many DDoS attacks, UDP flood attack and Ping of death attack are considered to be important as these two attacks may cause severe damage to the network. To provide better security to the network, efficient intrusion detection (IDS system is required to monitor the network continuously, keeping track of malicious activities and policy violations and produce report to the network administrator. UDP flood attack and ping of death attack are given importance in this paper as they are not well addressed in the existing research works. Packet capture and packet decoder is used to identify the packets and retrieve the packet details. A threshold is set for each node that is connected to the network. If the packet flow into the node exceeds the threshold that is set then the administrator is notified about the same.

  15. Comprehensive techno-economic analysis of wastewater-based algal biofuel production: A case study.

    Science.gov (United States)

    Xin, Chunhua; Addy, Min M; Zhao, Jinyu; Cheng, Yanling; Cheng, Sibo; Mu, Dongyan; Liu, Yuhuan; Ding, Rijia; Chen, Paul; Ruan, Roger

    2016-07-01

    Combining algae cultivation and wastewater treatment for biofuel production is considered the feasible way for resource utilization. An updated comprehensive techno-economic analysis method that integrates resources availability into techno-economic analysis was employed to evaluate the wastewater-based algal biofuel production with the consideration of wastewater treatment improvement, greenhouse gases emissions, biofuel production costs, and coproduct utilization. An innovative approach consisting of microalgae cultivation on centrate wastewater, microalgae harvest through flocculation, solar drying of biomass, pyrolysis of biomass to bio-oil, and utilization of co-products, was analyzed and shown to yield profound positive results in comparison with others. The estimated break even selling price of biofuel ($2.23/gallon) is very close to the acceptable level. The approach would have better overall benefits and the internal rate of return would increase up to 18.7% if three critical components, namely cultivation, harvest, and downstream conversion could achieve breakthroughs.

  16. Detecting relay attacks on RFID communication systems using quantum bits

    Science.gov (United States)

    Jannati, Hoda; Ardeshir-Larijani, Ebrahim

    2016-11-01

    RFID systems became widespread in variety of applications because of their simplicity in manufacturing and usability. In the province of critical infrastructure protection, RFID systems are usually employed to identify and track people, objects and vehicles that enter restricted areas. The most important vulnerability which is prevalent among all protocols employed in RFID systems is against relay attacks. Until now, to protect RFID systems against this kind of attack, the only approach is the utilization of distance-bounding protocols which are not applicable over low-cost devices such as RFID passive tags. This work presents a novel technique using emerging quantum technologies to detect relay attacks on RFID systems. Recently, it is demonstrated that quantum key distribution (QKD) can be implemented in a client-server scheme where client only requires an on-chip polarization rotator that may be integrated into a handheld device. Now we present our technique for a tag-reader scenario which needs similar resources as the mentioned QKD scheme. We argue that our technique requires less resources and provides lower probability of false alarm for the system, compared with distance-bounding protocols, and may pave the way to enhance the security of current RFID systems.

  17. Detecting relay attacks on RFID communication systems using quantum bits

    Science.gov (United States)

    Jannati, Hoda; Ardeshir-Larijani, Ebrahim

    2016-08-01

    RFID systems became widespread in variety of applications because of their simplicity in manufacturing and usability. In the province of critical infrastructure protection, RFID systems are usually employed to identify and track people, objects and vehicles that enter restricted areas. The most important vulnerability which is prevalent among all protocols employed in RFID systems is against relay attacks. Until now, to protect RFID systems against this kind of attack, the only approach is the utilization of distance-bounding protocols which are not applicable over low-cost devices such as RFID passive tags. This work presents a novel technique using emerging quantum technologies to detect relay attacks on RFID systems. Recently, it is demonstrated that quantum key distribution (QKD) can be implemented in a client-server scheme where client only requires an on-chip polarization rotator that may be integrated into a handheld device. Now we present our technique for a tag-reader scenario which needs similar resources as the mentioned QKD scheme. We argue that our technique requires less resources and provides lower probability of false alarm for the system, compared with distance-bounding protocols, and may pave the way to enhance the security of current RFID systems.

  18. Bio-inspired diversity for increasing attacker workload

    Science.gov (United States)

    Kuhn, Stephen

    2014-05-01

    Much of the traffic in modern computer networks is conducted between clients and servers, rather than client-toclient. As a result, servers represent a high-value target for collection and analysis of network traffic. As they reside at a single network location (i.e. IP/MAC address) for long periods of time. Servers present a static target for surveillance, and a unique opportunity to observe the network traffic. Although servers present a heightened value for attackers, the security community as a whole has shifted more towards protecting clients in recent years leaving a gap in coverage. In addition, servers typically remain active on networks for years, potentially decades. This paper builds on previous work that demonstrated a proof of concept leveraging existing technology for increasing attacker workload. Here we present our clean slate approach to increasing attacker workload through a novel hypervisor and micro-kernel, utilizing next generation virtualization technology to create synthetic diversity of the server's presence including the hardware components.

  19. Forensics Investigation of Web Application Security Attacks

    Directory of Open Access Journals (Sweden)

    Amor Lazzez

    2015-02-01

    Full Text Available Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.

  20. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approac...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers.......In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... and the Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...

  1. A quantitative method to evaluate microbial electrolysis cell effectiveness for energy recovery and wastewater treatment

    KAUST Repository

    Ivanov, Ivan

    2013-10-01

    Microbial electrolysis cells (MECs) are potential candidates for sustainable wastewater treatment as they allow for recovery of the energy input by producing valuable chemicals such as hydrogen gas. Evaluating the effectiveness of MEC treatment for different wastewaters requires new approaches to quantify performance, and the establishment of specific procedures and parameters to characterize the outcome of fed-batch treatability tests. It is shown here that Coulombic efficiency can be used to directly calculate energy consumption relative to wastewater treatment in terms of COD removal, and that the average current, not maximum current, is a better metric to evaluate the rate of the bioelectrochemical reactions. The utility of these methods was demonstrated using simulated current profiles and actual wastewater tests. Industrial and domestic wastewaters were evaluated using small volume MECs, and different inoculation strategies. The energy needed for treatment was 2.17kWhkgCOD-1 for industrial wastewater and 2.59kWhkgCOD-1 for domestic wastewater. When these wastewaters were combined in equal amounts, the energy required was reduced to 0.63kWhkgCOD-1. Acclimation of the MEC to domestic wastewater, prior to tests with industrial wastewaters, was the easiest and most direct method to optimize MEC performance for industrial wastewater treatment. A pre-acclimated MEC accomplished the same removal (1847 ± 53 mg L-1) as reactor acclimated to only the industrial wastewater (1839 ± 57 mg L-1), but treatment was achieved in significantly less time (70 h versus 238 h). © 2013, Hydrogen Energy Publications, LLC. Published by Elsevier Ltd. All rights reserved.

  2. Multiple Partial Attacks on Complex Networks

    Institute of Scientific and Technical Information of China (English)

    YIN Yan-Ping; ZHANG Duan-Ming; TAN Jin; PAN Gui-Jun; HE Min-Hua

    2008-01-01

    We numerically investigate the effect of four kinds of partial attacks of multiple targets on the Barabási-Albert (BA) scale-free network and the Erd(o)s-Rényi (ER) random network.Comparing with the effect of single target complete knockout we find that partial attacks of multiple targets may produce an effect higher than the complete knockout of a single target on both BA scale-free network and ER random network.We also find that the BA ecale-free network seems to be more susceptible to multi-target partial attacks than the ER random network.

  3. Measuring a System’s Attack Surface

    Science.gov (United States)

    2004-01-01

    fold: • In terms of a state machine model of the system, we present formal definitions of attack, attack surface, and attack class. Our definitions are...versions. The rest of this paper is organized as follows. In Section 2, we introduce our state machine model and point out the key differences from...approach in Section 6 and compare it to related work in Section 7. We conclude in Section 8. 2 State Machine Model We use a state machine to model the

  4. Optimizing Decision Tree Attack on CAS Scheme

    Directory of Open Access Journals (Sweden)

    PERKOVIC, T.

    2016-05-01

    Full Text Available In this paper we show a successful side-channel timing attack on a well-known high-complexity cognitive authentication (CAS scheme. We exploit the weakness of CAS scheme that comes from the asymmetry of the virtual interface and graphical layout which results in nonuniform human behavior during the login procedure, leading to detectable variations in user's response times. We optimized a well-known probabilistic decision tree attack on CAS scheme by introducing this timing information into the attack. We show that the developed classifier could be used to significantly reduce the number of login sessions required to break the CAS scheme.

  5. FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER

    Institute of Scientific and Technical Information of China (English)

    Ma Weiju; Feng Dengguo

    2006-01-01

    A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper.This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the security of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.

  6. What Are the Symptoms of a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks ... symptoms are called silent heart attacks. Most Common Symptoms The most common warning symptoms of a heart ...

  7. Wastewater treatment with algae

    Energy Technology Data Exchange (ETDEWEB)

    Wong Yukshan [Hong Kong Univ. of Science and Technology, Kowloon (China). Research Centre; Tam, N.F.Y. [eds.] [City Univ. of Hong Kong, Kowloon (China). Dept. of Biology and Chemistry

    1998-05-01

    Immobilized algal technology for wastewater treatment purposes. Removal of copper by free and immobilized microalga, Chlorella vulgaris. Biosorption of heavy metals by microalgae in batch and continuous systems. Microalgal removal of organic and inorganic metal species from aqueous solution. Bioaccumulation and biotransformation of arsenic, antimony and bismuth compounds by freshwater algae. Metal ion binding by biomass derived from nonliving algae, lichens, water hyacinth root and spagnum moss. Metal resistance and accumulation in cyanobacteria. (orig.)

  8. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    Directory of Open Access Journals (Sweden)

    Xiapu Luo

    2009-01-01

    Full Text Available This paper addresses the important problem of detecting pulsing denial of service (PDoS attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval. Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation and detection algorithms (e.g., dynamic time warping.

  9. Viability of increasing the tariff of freshwater for irrigation as a tool to stimulate wastewater reuse in the MENA region

    NARCIS (Netherlands)

    Abu-Madi, M.; Al-Sa'ed, R.; Braadbaart, O.D.; Alaerts, G.

    2008-01-01

    Despite water scarcity and high agricultural water demand in the Middle East and North Africa region, substantial proportions of treated wastewater are discharged into the environment and seas without proper utilization. All countries of the region, low pricing of reclaimed wastewater is a common to

  10. Attributing heart attack and stroke to "Old Age": Implications for subsequent health outcomes among older adults.

    Science.gov (United States)

    Stewart, Tara L; Chipperfield, Judith G; Perry, Raymond P; Hamm, Jeremy M

    2016-01-01

    This study assessed the extent to which older adults attribute a recent heart attack/stroke to "old age," and examined consequences for subsequent lifestyle behavior and health-care service utilization. Community-dwelling adults (N = 57, ages 73-98 years) were interviewed about their heart attack/stroke, and an objective health registry provided data on health-care utilization over a 3-year period. Endorsement of "old age" as a cause of heart attack/stroke negatively predicted lifestyle behavior change, and positively predicted frequency of physician visits and likelihood of hospitalization over the subsequent 3 years. Findings suggest the importance of considering "old age" attributions in the context of cardiovascular health events.

  11. Taxonomy of SSL/TLS Attacks

    Directory of Open Access Journals (Sweden)

    Keerthi Vasan K.

    2016-02-01

    Full Text Available Secure Socket Layer (SSL and Transport Layer Security (TLS protocols use cryptographic algorithms to secure data and ensure security goals such as Data Confidentiality and Integrity in networking. They are used along with other protocols such as HTTP, SMTP, etc. in applications such as web browsing, electronic mail, and VoIP. The existing versions of the protocols as well as the cryptographic algorithms they use have vulnerabilities and is not resistant towards Man-In-The- Middle (MITM attacks. Exploiting these vulnerabilities, several attacks have been launched on SSL/TLS such as session hijacking, version degradation, heart bleed, Berserk etc. This paper is a comprehensive analysis of the vulnerabilities in the protocol, attacks launched by exploiting the vulnerabilities and techniques to mitigate the flaws in protocols. A novel taxonomy of the attacks against SSL/TLS has been proposed in this paper.

  12. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  13. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  14. A NEW METHOD FOR RESYNCHRONIZATION ATTACK

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(217), and that of O(267) for LILI-128.

  15. AN APPROACH OF DEFENDING AGAINST DDOS ATTACK

    Institute of Scientific and Technical Information of China (English)

    Wu Zhijun; Duan Haixin; Li Xing

    2006-01-01

    An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%,drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP 1200.

  16. Correlations in complex networks under attack

    CERN Document Server

    Srivastava, Animesh; Ganguly, Niloy; Peruani, Fernando; 10.1103/PhysRevE.86.036106

    2013-01-01

    For any initial correlated network after any kind of attack where either nodes or edges are removed, we obtain general expressions for the degree-degree probability matrix and degree distribution. We show that the proposed analytical approach predicts the correct topological changes after the attack by comparing the evolution of the assortativity coefficient for different attack strategies and intensities in theory and simulations. We find that it is possible to turn an initial assortative network into a disassortative one, and vice versa, by fine-tuning removal of either nodes or edges. For an initial uncorrelated network, on the other hand, we discover that only a targeted edge-removal attack can induce such correlations.

  17. SECURING MANET FROM BLACKHOLE AND WORMHOLE ATTACKS

    Directory of Open Access Journals (Sweden)

    C.M.Vidhyapathi

    2013-06-01

    Full Text Available Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol. Blackhole and Wormhole nodes are malicious nodeswhich degrade the performance of the network. They actively participate in the network and conform to forward packets to the destination. The Watchdog Mechanism is used to correct the network from both blackhole and wormhole attacks. The networks originally, with the attacks and after being prevented from attacks are compared on the basis of packets received, throughput, end-to-end delay and packet delivery ratio. ns2 software is used for the simulation.

  18. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... medicines also keep existing clots from getting larger. Beta blockers . Beta blockers decrease your heart’s workload. These medicines also are ... discomfort and to help prevent another heart attack. Beta blockers also are used to treat arrhythmias (irregular heartbeats). ...

  19. Preventing Coordinated Attacks Via Distributed Alert Exchange

    CERN Document Server

    Garcia-Alfaro, Joaquin; Muehl, Gero; Borrell, Joan

    2008-01-01

    Attacks on information systems followed by intrusions may cause large revenue losses. The prevention of both is not always possible by just considering information from isolated sources of the network. A global view of the whole system is necessary to recognize and react to the different actions of such an attack. The design and deployment of a decentralized system targeted at detecting as well as reacting to information system attacks might benefit from the loose coupling realized by publish/subscribe middleware. In this paper, we present the advantages and convenience in using this communication paradigm for a general decentralized attack prevention framework. Furthermore, we present the design and implementation of our approach based on existing publish/subscribe middleware and evaluate our approach for GNU/Linux systems.

  20. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  1. Longest-path attacks on complex networks

    CERN Document Server

    Pu, Cunlai

    2014-01-01

    We investigate the longest-path attacks on complex networks. Specifically, we remove approximately the longest simple path from a network iteratively until there are no paths left in the network. We propose two algorithms, the random augmenting approach (RPA) and the Hamilton-path based approach (HPA), for finding the approximately longest simple path in a network. Results demonstrate that steps of longest-path attacks increase with network density linearly for random networks, while exponentially increasing for scale-free networks. The more homogeneous the degree distribution is, the more fragile the network, which is totally different from the previous results of node or edge attacks. HPA is generally more efficient than RPA in the longest-path attacks of complex networks. These findings further help us understand the vulnerability of complex systems, better protect complex systems, and design more tolerant complex systems.

  2. Study Shows How Zika Attacks Infant Brain

    Science.gov (United States)

    ... gov/news/fullstory_162514.html Study Shows How Zika Attacks Infant Brain Virus can copy itself thousands ... New research paints a chilling portrait of how Zika ravages the infant brain. Scientists from the U.S. ...

  3. Thatcher condemns attacks on abortion mp.

    Science.gov (United States)

    1987-12-19

    The Prime Minister, Mrs Margaret Thatcher, has stepped in to condemn a series of violent attacks on Liberal MP David Alton who is trying to reduce the [Illegible word] limit on abortions from 28 to 18 weeks.

  4. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey;

    2015-01-01

    nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise to security concerns: At CRYPTO 2008, Handschuh and Preneel describe key recovery attacks, and at FSE 2013, Procter and Cid provide a comprehensive framework for forgery attacks. Both approaches rely...... heavily on the ability to construct forgery polynomials having disjoint sets of roots, with many roots (“weak keys”) each. Constructing such polynomials beyond naïve approaches is crucial for these attacks, but still an open problem. In this paper, we comprehensively address this issue. We propose to use...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  5. Prevention of Routing Attacks In Manet

    Directory of Open Access Journals (Sweden)

    N.Rajesh

    2013-01-01

    Full Text Available Mobile Ad hoc Networks (MANET are easily prone to attacks due to its network infrastructure. In previous routing attacks the malicious node is isolated using naive fuzzy response decisions. In this paper a new technology of broadcasting the awareness information about attacker node to all the existing nodes in the network is discussed. The awareness approach is based on an extended Dempster-Shafer mathematical theory(D-S Theory. Dempster-Shafer mathematical theory is used to collect the evidence notion of importance factors. The adaptiveness of the mechanism allows to systematically cope with the identified MANET routing attacks. The intrusion response action in MANET was addressed by isolating uncooperative nodes based on the node reputation derived from their behaviors. Here the effectiveness of the approach with the consideration of the packet delivery ratio and routing cost were demonstrated using java swing concepts

  6. To mitigate Black-hole attack with CBDS in MANET

    Directory of Open Access Journals (Sweden)

    Navjot

    2015-06-01

    Full Text Available Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.

  7. Randomized, controlled trial of telcagepant over four migraine attacks

    DEFF Research Database (Denmark)

    Ho, Andrew P; Dahlöf, Carl Gh; Silberstein, Stephen D

    2010-01-01

    This study evaluated the calcitonin gene-related peptide (CGRP) receptor antagonist telcagepant (tablet formulation) for treatment of a migraine attack and across four attacks. Adults with migraine were randomized, double-blind, to telcagepant 140 mg, telcagepant 280 mg, or control treatment...... sequences to treat four moderate-to-severe migraine attacks. Control patients received placebo for three attacks and telcagepant 140 mg for one attack. Efficacy for the first attack (Attack 1) and consistency of efficacy over multiple attacks were assessed. For an individual patient, consistent efficacy...

  8. Heart Attack Prediction System Based Neural Arbitration

    OpenAIRE

    Helwan, Abdulkader

    2015-01-01

    Heart attack is an asymptomatic and epidemic medical condition that may suddenly occur and causes “death”. Therefore, it is a life-threatening condition and it should be detected before it occurs. Heart attack is so far predicted using the conventional ways of doctor’s examination and by performing some medical tests such as stress test, ECG, and heart CTScan etc. The coronary vessels constriction, the cholesterol levels in the arteries, and other attributes can be good indicators for making ...

  9. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  10. Estimation of EuroQol 5-Dimensions health status utility values in hereditary angioedema

    DEFF Research Database (Denmark)

    Aygören-Pürsün, Emel; Bygum, Anette; Beusterien, Kathleen;

    2016-01-01

    OBJECTIVE: To estimate health status utility (preference) weights for hereditary angioedema (HAE) during an attack and between attacks using data from the Hereditary Angioedema Burden of Illness Study in Europe (HAE-BOIS-Europe) survey. Utility measures quantitatively describe the net impact of a...

  11. Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD

    Institute of Scientific and Technical Information of China (English)

    Gao-Li Wang

    2013-01-01

    The cryptographic hash functions Extended MD4 and RIPEMD are double-branch hash functions,which consist of two parallel branches.Extended MD4 was proposed by Rivest in 1990,and RIPEMD was devised in the framework of the RIPE project (RACE Integrity Primitives Evaluation,1988~1992).On the basis of differential analysis and meet-in-the-middle attack principle,this paper proposes a collision attack on the full Extended MD4 and a pseudo-preimage attack on the full RIPEMD respectively.The collision attack on Extended MD4 holds with a complexity of 237,and a collision instance is presented.The pseudo-preimage attack on RIPEMD holds with a complexity of 2125,4,which optimizes the complexity order for brute-force attack.The results in this study will also be beneficial to the analysis of other double-branch hash functions such as RIPEMD-160.

  12. Microbial desalination cells for improved performance in wastewater treatment, electricity production, and desalination.

    Science.gov (United States)

    Luo, Haiping; Xu, Pei; Roane, Timberley M; Jenkins, Peter E; Ren, Zhiyong

    2012-02-01

    The low conductivity and alkalinity in municipal wastewater significantly limit power production from microbial fuel cells (MFCs). This study integrated desalination with wastewater treatment and electricity production in a microbial desalination cell (MDC) by utilizing the mutual benefits among the above functions. When using wastewater as the sole substrate, the power output from the MDC (8.01 W/m(3)) was four times higher than a control MFC without desalination function. In addition, the MDC removed 66% of the salts and improved COD removal by 52% and Coulombic efficiency by 131%. Desalination in MDCs improved wastewater characteristics by increasing the conductivity by 2.5 times and stabilizing anolyte pH, which therefore reduced system resistance and maintained microbial activity. Microbial community analysis revealed a more diverse anode microbial structure in the MDC than in the MFC. The results demonstrated that MDC can serve as a viable option for integrated wastewater treatment, energy production, and desalination.

  13. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...

  14. Superstorm Sandy: Implications For Designing A PostCyber Attack Power Restoration System

    Science.gov (United States)

    2016-03-31

    restore power when many utility chief executive officers (CEOs) will worry that their companies are next in line for attack, mutual assistance...other companies in the stricken region because restringing power lines and other restoration tasks are similar from one utility to the next . Much...political crisis in the South China Sea or the Baltics or with a regional power elsewhere in the world. Deputy Secretary of Defense Robert Work

  15. Arterial spin-labeled MRI study of migraine attacks treated with rizatriptan.

    Science.gov (United States)

    Kato, Yuji; Araki, Nobuo; Matsuda, Hiroshi; Ito, Yasuo; Suzuki, Chihiro

    2010-06-01

    Spin-tag perfusion imaging is an MRI method that quantitatively measures cerebral blood flow. Compared with conventional perfusion techniques, advantages of this arterial spin-labeling (ASL) include repeatability and the avoidance of intravenous contrast administration. In the present study, we performed an analysis of 3T high-field MRI examinations utilizing ASL perfusion during migraine attacks. A 32-year-old male patient was studied in three situations: during migraine attack within 1 h post-onset, 30 min after oral administration of rizatriptan 10 mg, and attack-free period. Normalized ASL images acquired during migraine attack showed significant relative hypoperfusion in the bilateral median thalamic areas including hypothalamus and significant relative hyperperfusion in the frontal cortex compared to images acquired during the migraine-free state. When normalized ASL images acquired 30 min after treatment were compared with those acquired during the attack, relative improvement of perfusion in the bilateral median thalamic areas including hypothalamus was observed. Hypothalamus and its surrounding areas may participate in the pathogenesis in migraine attack.

  16. Trends in advanced wastewater treatment

    DEFF Research Database (Denmark)

    Henze, M.

    1997-01-01

    The paper examines the present trends within wastewater handling and treatment. The trend is towards the extremes, either local low-tech treatment or centralized advanced treatment plants. The composition of the wastewater will change and it will be regarded as a resource. There will be more...

  17. Nutrient Removal in Wastewater Treatment

    Science.gov (United States)

    Shah, Kanti L.

    1973-01-01

    Discusses the sources and effects of nutrients in wastewater, and the methods of their removal in wastewater treatment. In order to conserve water resources and eliminate the cost of nutrient removal, treated effluent should be used wherever possible for irrigation, since it contains all the ingredients for proper plant growth. (JR)

  18. Physico-chemical wastewater treatment

    NARCIS (Netherlands)

    Mels, A.R.; Teerikangas, E.

    2002-01-01

    Wastewater reclamation strategies aimed at closing industrial water cycles and recovery of valuable components will in most cases require a combination of wastewater treatment unit operations. Biological unit operations are commonly applied as the core treatment. In addition, physico-chemical unit o

  19. Net-Zero-Energy Model for Sustainable Wastewater Treatment.

    Science.gov (United States)

    Yan, Peng; Qin, Rong-Cong; Guo, Jin-Song; Yu, Qiang; Li, Zhe; Chen, You-Peng; Shen, Yu; Fang, Fang

    2017-01-17

    A large external energy input prevents wastewater treatment from being environmentally sustainable. A net-zero-energy (NZE) wastewater treatment concept based on biomass energy recycling was proposed to avoid wasting resources and to promote energy recycling in wastewater treatment plants (WWTPs). Simultaneously, a theoretical model and boundary condition based on energy balance were established to evaluate the feasibility of achieving NZE in WWTPs; the model and condition were employed to analyze data from 20 conventional WWTPs in China. A total of six WWTPs can currently export excess energy, eight WWTPs can achieve 100% energy self-sufficiency by adjusting the metabolic material allocation, and six municipal WWTPs cannot achieve net-zero energy consumption based on the evaluation of the theoretical model. The NZE model offset 79.5% of the electricity and sludge disposal cost compared with conventional wastewater treatment. The NZE model provides a theoretical basis for the optimization of material regulation for the effective utilization of organic energy from wastewater and promotes engineering applications of the NZE concept in WWTPs.

  20. Transcriptomic-based effects monitoring for endocrine active chemicals: Assessing relative contribution of treated wastewater to downstream pollution

    Science.gov (United States)

    The present study investigated whether combining of targeted analytical chemistry methods with unsupervised, data-rich methodologies (i.e. transcriptomics) can be utilized to evaluate relative contributions of wastewater treatment plant (WWTP) effluents to biological effects. The...

  1. Pathologic features of fatal shark attacks.

    Science.gov (United States)

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  2. 40 CFR 63.133 - Process wastewater provisions-wastewater tanks.

    Science.gov (United States)

    2010-07-01

    ..., manages, or treats a Group 1 wastewater stream or a residual removed from a Group 1 wastewater stream, the... fixed roof except that if the wastewater tank is used for heating wastewater, or treating by means of an... 40 Protection of Environment 9 2010-07-01 2010-07-01 false Process wastewater...

  3. Burr Utility

    NARCIS (Netherlands)

    Ikefuji, M.; Laeven, R.J.A.; Magnus, J.R.; Muris, C.H.M.

    2010-01-01

    This note proposes the Burr utility function. Burr utility is a flexible two-parameter family that behaves approximately power-like (CRRA) remote from the origin, while exhibiting exponential-like (CARA) features near the origin. It thus avoids the extreme behavior of the power family near the origi

  4. Estimating Utility

    DEFF Research Database (Denmark)

    Arndt, Channing; Simler, Kenneth R.

    2010-01-01

    an information-theoretic approach to estimating cost-of-basic-needs (CBN) poverty lines that are utility consistent. Applications to date illustrate that utility-consistent poverty measurements derived from the proposed approach and those derived from current CBN best practices often differ substantially......, with the current approach tending to systematically overestimate (underestimate) poverty in urban (rural) zones....

  5. Comprehensive utilization of digested residue

    Energy Technology Data Exchange (ETDEWEB)

    Reizhi Shen [Soil and Fertilizer Inst. of Shanghai Academy of Agricultural Sciences (China)

    2000-07-01

    The application history of biogas technology in China covers almost one century. Until the 1980's, people's attention not only focused on the benefit of biogas as people's daily fuel, but also on the comprehensive utilization of digested residues. People are more and more interested in these methods of comprehensive utilization, which has led to many research projects on, among others, ''digested effluent as feed additive for pigs'', ''digested sludge for growing mushroom'', and ''digested effluent as pesticide''. Not only are biogas fermentation, organic waste such as animal manure, crop straw, distillery wastewater and the wastewater from slaughter houses converted to biogas, but also digested residues are very useful with a lot of ''potential value'' and ''special functions'', which will bring far more benefits than biogas alone. Some progress on the comprehensive utilization of digested residues in the past ten years is summarized below. (orig.)

  6. DETECTING MULTIPLE INTRUSION ATTACKS USING PERMANENT GIRTH CLUSTERING MODEL IN WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    G. Jayamurugan

    2014-01-01

    Full Text Available Security is the central challenge and one of the serious concerns for designing reliable sensor networks. Of the different types of security threats in wireless sensor network, particularly dangerous attack is the replica node attack, in which the opponent takes the secret keying materials from a compromised node. It then produces large number of attacker-controlled replicas that divide up the cooperation node’s keying materials and ID. In this study we are specifically interested in investigating the extremely difficult problem concerning multiple attacks being routed in parallel with a given utility field and see if significant hypothetical solutions could be drawn. A clustering model for discovering multiple intrusions in WSN is identified. Permanent-girth Clustering (PC model used to detect abnormal traffic patterns and then uses PC model to built the normal traffic behavior. In this study we develop mechanisms so that the PC model is capable to distinguish attacks. Furthermore, the detection scheme is based on position of traffic features that potentially are practical to an extensive variety of routing attacks. In order to approximate intrusion detection scheme, extensive sensor network simulator producing routing attacks in wireless sensor networks is designed. PC model for intrusion detection is capable to attain high detection accuracy with a low false positive rate for a multiplicity of replicated routing attacks. NS2 simulator is used to perform the experimental work of PC model on wireless sensor network. The experimental evaluation of PC model is measured in terms of average delay measurement, energy consumption and low false positive rate.

  7. A Probabilistic Framework for Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.; Halappanavar, Mahantesh

    2015-12-28

    Quantification and propagation of uncertainties in cyber attacker payoffs is a key aspect within multiplayer, stochastic security games. These payoffs may represent penalties or rewards associated with player actions and are subject to various sources of uncertainty, including: (1) cyber-system state, (2) attacker type, (3) choice of player actions, and (4) cyber-system state transitions over time. Past research has primarily focused on representing defender beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and mathematical intervals. For cyber-systems, probability distributions may help address statistical (aleatory) uncertainties where the defender may assume inherent variability or randomness in the factors contributing to the attacker payoffs. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as generalizations of probability boxes. This paper explores the mathematical treatment of such mixed payoff uncertainties. A conditional probabilistic reasoning approach is adopted to organize the dependencies between a cyber-system’s state, attacker type, player actions, and state transitions. This also enables the application of probabilistic theories to propagate various uncertainties in the attacker payoffs. An example implementation of this probabilistic framework and resulting attacker payoff distributions are discussed. A goal of this paper is also to highlight this uncertainty quantification problem space to the cyber security research community and encourage further advancements in this area.

  8. Toxicity evaluation of wastewater collected at different treatment stages from a pharmaceutical industrial park wastewater treatment plant.

    Science.gov (United States)

    Ma, Ke; Qin, Zhe; Zhao, Zhongqing; Zhao, Chunxia; Liang, Shuxuan

    2016-09-01

    The toxicity of water-receiving bodies, the effluent and other treatment stages in wastewater treatment plants has recently been of interest to the public due to the lack of a regulated toxicity-based index for wastewater discharge in China. This study aimed to evaluate the conventional pollution parameters and toxicities of wastewaters collected at different treatment stages from a pharmaceutical industrial park wastewater treatment plant through dehydrogenase activity (DHA) and bioluminescent bacteria (Vibrio qinghaiensis) tests. The results of an analysis of conventional parameters indicated that the total suspended solids (TSS), chemical oxygen demand (COD), total nitrogen (TN), ammonia nitrogen (NH3N), and total phosphorus (TP) were largely removed after various treatments. However, the TN, NH3N and COD still exceeded the regulated standards. The tested pharmaceutical park effluents were mainly polluted with organic pollutants and nitrogenous. The toxicity test results indicated that the toxicities could be markedly reduced after treatment, with the toxicities of two out of the six effluent samples at different treatment stages being greater than the influent toxicity. Spearman's rank correlation coefficients indicated a significantly positive correlation between the toxicity values obtained using the DHA and Vibrio qinghaiensis tests. Compared with the DHA measurement, the Vibrio qinghaiensis test was faster and more sensitive. Meanwhile, the toxicity indicators were significantly and positively correlated with the TSS, TN, TP and COD concentrations. These results may aid the understanding of the toxicity of pharmaceutical industrial park wastewaters and toxicity removal using the treatment techniques that are currently utilized in China.

  9. Health Effects Associated with Wastewater Treatment, Reuse, and Disposal.

    Science.gov (United States)

    Qu, Xiaoyan; Zhao, Yuanyuan; Yu, Ruoren; Li, Yuan; Falzone, Charles; Smith, Gregory; Ikehata, Keisuke

    2016-10-01

    A review of the literature published in 2015 on topics relating to public and environmental health risks associated with wastewater treatment, reuse, and disposal is presented. This review is divided into the following sections: wastewater management, microbial hazards, chemical hazards, wastewater treatment, wastewater reuse, agricultural reuse in different regions, greywater reuse, wastewater disposal, hospital wastewater, industrial wastewater, and sludge and biosolids.

  10. 40 CFR 63.1106 - Wastewater provisions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 10 2010-07-01 2010-07-01 false Wastewater provisions. 63.1106 Section... Technology Standards § 63.1106 Wastewater provisions. (a) Process wastewater. Except as specified in... source shall comply with the HON process wastewater requirements in §§ 63.132 through 63.148. (1)...

  11. Efficient recovery of nitrate and phosphate from wastewater by an amine-grafted adsorbent for cyanobacterial biomass production.

    Science.gov (United States)

    Kim, Jungmin; Hwang, Min-Jin; Lee, Sang-Jun; Noh, Won; Kwon, Jung Min; Choi, Jin Soo; Kang, Chang-Min

    2016-04-01

    Various types of wastewater have been widely utilized in microalgae and cyanobacteria cultivation for environmental and economic reasons. However, the problems of low cell growth and biomass contamination due to direct use of wastewater remain unresolved. In the present study, nitrate and phosphate were separated from wastewater by adsorption and subsequently used for cyanobacterial biomass production. To this end, an amine-grafted magnetic absorbent was synthesized. The synthesized absorbent recovered ca. 78% nitrate and 93% phosphate from wastewater. Regenerated medium was prepared using recovered nutrients as nitrogen and phosphate sources, which were efficiently assimilated by cyanobacterial culture. Compared to synthetic medium, there was no difference in growth and nutrient removal using regenerated medium. The proposed indirect method of wastewater utilization would prevent contamination of the produced biomass by unfavorable substances, which will broaden its potential applications.

  12. Drivers for and against municipal wastewater recycling: a review.

    Science.gov (United States)

    Kunz, Nadja C; Fischer, Manuel; Ingold, Karin; Hering, Janet G

    2016-01-01

    The reclamation, treatment and reuse of municipal wastewater can provide important environmental benefits. In this paper, 25 studies on this topic were reviewed and it was found that there are many (>150) different drivers acting for and against wastewater recycling. To deal with the challenge of comparing studies which entailed different research designs, a framework was developed which allowed the literature to be organized into comparable study contexts. Studies were categorized according to the level of analysis (wastewater recycling scheme, city, water utility, state, country, global) and outcome investigated (development/investment in new schemes, program implementation, percentage of wastewater recycled, percentage of water demand covered by recycled water, multiple outcomes). Findings across comparable case studies were then grouped according to the type (for or against recycling) and category of driver (social, natural, technical, economic, policy or business). The utility of the framework is demonstrated by summarizing the findings from four Australian studies at the city level. The framework offers a unique approach for disentangling the broad range of potential drivers for and against water recycling and to focus on those that seem relevant in specific study contexts. It may offer a valuable starting point for building hypotheses in future work.

  13. Modelling social-technical attacks with timed automata

    NARCIS (Netherlands)

    David, Nicolas; David, Alexandre; Hansen, René Rydhof; Larsen, Kim G.; Legay, Axel; Olesen, Mads Chr.; Probst, Christian W.

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation. In th

  14. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  15. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  16. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  17. Performance Evaluation of AODV with Blackhole Attack

    Science.gov (United States)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  18. Removal Of Phenol From Wastewater By Using Low-Cost Catalyst From Metal Production

    Directory of Open Access Journals (Sweden)

    Galbičková Blanka

    2014-12-01

    Full Text Available Utilization of AOPs (Advanced oxidation processes as an emerging technology for removing of pollutants from wastewater is developed. In this paper, UV photodegradation was used for removing of phenol from wastewater. As a source of UV radiation medium pressure mercury lamp with output 400W was used. The influence of low-cost catalysts on this process was also monitored. Wastes from metal production, red mud and black nickel mud, were used as catalysts.

  19. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  20. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes...... on a new and general formalism for attack-defence trees....

  1. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    Science.gov (United States)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  2. Distributed Denial of Service Attacks: A Review

    Directory of Open Access Journals (Sweden)

    Sonali Swetapadma Sahu

    2014-01-01

    Full Text Available A wireless sensor network (WSN is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a fluorishing network that has numerous applications and could be used in diverse scenarios. DDoS (Distributed Denial of Service is an attack where a number of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.Not much research work has been done in DDoS in WSN.We are conducting a review on DDoS attack to show its impact on networks and to present various defensive, detection and preventive measures adopted by researchers till now.

  3. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...... recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length. This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All attacks...

  4. A Traceability Attack against e-Passports

    Science.gov (United States)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  5. Resistance of the double random phase encryption against various attacks.

    Science.gov (United States)

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J; Javidi, Bahram

    2007-08-06

    Several attacks are proposed against the double random phase encryption scheme. These attacks are demonstrated on computer-generated ciphered images. The scheme is shown to be resistant against brute force attacks but susceptible to chosen and known plaintext attacks. In particular, we describe a technique to recover the exact keys with only two known plain images. We compare this technique to other attacks proposed in the literature.

  6. Opportunities and Challenges for Water and Wastewater Industries to Provide Exchangeable Services

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, Bethany [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hunsberger, Randolph [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2015-11-13

    Water and wastewater treatment plants and distribution systems use significant amounts of energy, around 2 - 4% of the total electricity used in the US, and their energy use is projected to increase as populations increase and regulations become more stringent. Water and wastewater systems have largely been disconnected from the electric utilities' efforts to improve energy efficiency and provide energy efficiency and provide grid services, likely because their core mission is to provide clean water and treated wastewater. Energy efficiency has slowly crept into the water and wastewater industry as the economic benefit has become more apparent, but there is still potential for significant improvement. Some of the larger, more progressive water utilities are starting to consider providing grid services; however, it remains a foreign concept to many. This report explores intrinsic mechanisms by which the water and wastewater industries can provide exchangeable services, the benefit to the parties involved, and the barriers to implementation. It also highlights relevant case studies and next steps. Although opportunities for increasing process efficiencies are certainly available, this report focuses on the exchangeable services that water and wastewater loads can provide to help maintain grid reliability, keep overall costs down, and increase the penetration of distributed renewables on the electric grid. These services have potential to provide water utilities additional value streams, using existing equipment with modest or negligible upgrade cost.

  7. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  8. Defending Against Wormhole Attack in OLSR

    Institute of Scientific and Technical Information of China (English)

    HONG Liang; HONG Fan; FU Cai

    2006-01-01

    OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoc Networks by the MANET working group of IETF(Internet engineering task force). OLSR, a proactive routing protocol, is based on a multipoint relaying flooding technique to reduce the number of topology broadcast. OLSR uses periodic HELLO packets to neighbor detection. As introduced in Reference [1], the wormhole attack can form a serious threat in wireless Networks, especially against many ad hoc Network routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in OLSR is provided and simulated in NS2.

  9. Textual Manipulation for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hussein AlNabulsi

    2013-11-01

    Full Text Available SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, we highlighted several examples of such text manipulations that can be successfully used in SQL injection attacks. We evaluated the usage of those strings on several websites and web pages using SNORT open source. We also conducted an extensive comparison study of some relevant papers.

  10. Evaluation of alternative institutional arrangements in public utilities

    Directory of Open Access Journals (Sweden)

    Ermishina Anna, V.

    2015-06-01

    Full Text Available Since early 2000s a policy of attracting private operators to public utilities, which should help to increase productivity, reduce costs, and as a result, reduce utility prices takes place in Russia. The aim of the study is to identify the relationship between institutional arrangements and pricing for water and wastewater services. Applying statistical and cluster analysis to empirical data on water utilities in 13 largest cities has revealed the differences in the level and dynamics of prices for water and wastewater services in the group of public utilities and public private water utilities. In 2011-2014 the level and growth price rates in the group of public private partnerships were higher than in group of municipal water utilities. Thus, the involvement of private operators has not yet lead to the expected reduction in prices.

  11. Electrocoagulation treatment of metal finishing wastewater.

    Science.gov (United States)

    Odongo, Isabel E; McFarland, Michael J

    2014-07-01

    Electrocoagulation has been found to be a consistent and reliable industrial wastewater treatment process capable of removing heavy metals to levels well below pretreatment discharge standards. Results from the testing of a 113 L/min pilot scale electrocoagulation unit indicated that electrocoagulation was capable of decreasing the cadmium, chromium, and nickel concentrations from 0.14, 18.1, and 0.06 parts per million (ppm) to 0.029, 0.039, and 0.020 ppm respectively, at a 1-min hydraulic retention time. In the presence of a strong chelating substance, electrocoagulation performance was found to be effective in reducing both chromium and nickel concentrations to levels well below discharge limits. At a pH of 8.0, chromium and nickel influent concentrations of 0.328 and 0.062 ppm, respectively, were reduced to 0.005 and 0.04 ppm. The electrocoagulation removal efficiency for chromium remained high at over 98% and appeared to be unaffected by the presence of chelating substances. Utilizing aluminum as the sacrificial anode improved the removal efficiency of targeted heavy metals when the industrial wastewater was treated under acidic conditions. At a pH of 5.6, the influent concentrations of the regulated heavy metals cadmium, chromium, and nickel were reduced from 0.55, 49.7, and 13.7 ppm, respectively, to 0.013, 2.7, and 0.8 ppm at a 1-min hydraulic retention time. The results of these tests suggest that the formation of ferric hydroxide and aluminum hydroxide through the electrocoagulation process may be an effective approach for treating metal finishing wastewaters.

  12. A Distributed Protocol for Detection of Packet Dropping Attack in Mobile Ad Hoc Networks

    CERN Document Server

    Sen, Jaydip; Balamuralidhar, P; G., Harihara S; Reddy, Harish

    2011-01-01

    In multi-hop mobile ad hoc networks (MANETs),mobile nodes cooperate with each other without using any infrastructure such as access points or base stations. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. Among the various attacks to which MANETs are vulnerable, malicious packet dropping attack is very common where a malicious node can partially degrade or completely disrupt communication in the network by consistently dropping packets. In this paper, a mechanism for detection of packet dropping attack is presented based on cooperative participation of the nodes in a MANET. The redundancy of routing information in an ad hoc network is utilized to make the scheme robust so that it works effectively even in presence of transient network partitioning and Byzantine failure of nodes. The proposed scheme is fully cooperative an...

  13. Wastewater treatment by flotation

    Directory of Open Access Journals (Sweden)

    F.P. Puget

    2000-12-01

    Full Text Available This work deals with the performance analysis of a separation set-up characterized by the ejector-hydrocyclone association, applied in the treatment of a synthetic dairy wastewater effluent. The results obtained were compared with the results from a flotation column (cylindrical body of a hydrocyclone operated both batch and continuously. As far as the experimental set-up studied in this work and the operating conditions imposed to the process, it is possible to reach a 25% decrease in the total effluent chemical oxygen demand (COD. This corresponds approximately to 60% of the COD of the material in suspension. The best results are obtained for ratios air flow rate-feed flow rate (Qair/Q L greater then 0.15 and for ratios underflow rate-overflow rate (Qu/Qo lower than 1.0.

  14. Treating Wastewater With Immobilized Enzymes

    Science.gov (United States)

    Jolly, Clifford D.

    1991-01-01

    Experiments show enzymes are immobilized on supporting materials to make biocatalyst beds for treatment of wastewater. With suitable combination of enzymes, concentrations of various inorganic and organic contaminants, including ammonia and urea, reduced significantly.

  15. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  16. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  17. Plant defences against herbivore and insect attack

    Science.gov (United States)

    Plants deploy a number of defences against attack by insects and other herbivores. Direct defence is conferred by plant products and structures that deter or kill the herbivores. Chemical toxins and deterrents vary widely among plant species, and some typical toxins include alkaloids, terpenoids, st...

  18. Why Does Asthma Attack Severely at Night?

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ The rhythmic changes of human physiological activities by day and at night may cause regular change of the patient's condition within one day. The following is the explanation with the theory of Chinese medicine for the reason why asthma attacks severely at night.

  19. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  20. The diagnosis of transient ischemic attacks

    NARCIS (Netherlands)

    P.J. Koudstaal (Peter Jan)

    1989-01-01

    textabstractThe diagnosis of transient ischemic attack (TIA) is fraught with difficulty, since the diagnosis rests entirely upon the history of the patient's symptoms and the neurologist's skill in questioning the patient. The aim of this thesis is to investigate various measures to improve the reli

  1. Persistent cognitive impairment after transient ischemic attack

    NARCIS (Netherlands)

    Rooij, F.G. van; Schaapsmeerders, P.; Maaijwee, N.A.; Duijnhoven, D.A. van; Leeuw, F.E. de; Kessels, R.P.; Dijk, E.J. van

    2014-01-01

    BACKGROUND AND PURPOSE: By definition, the symptoms of a transient ischemic attack (TIA) subside completely within 24 hours. Imaging studies show signs of persistent ischemic tissue damage in a substantial amount of patients with TIA. Cerebral infarction can cause permanent cognitive impairment. Whe

  2. Persistent Cognitive Impairment After Transient Ischemic Attack

    NARCIS (Netherlands)

    Rooij, F.G. van; Schaapsmeerders, P.; Maaijwee, N.A.M.M.; Duijnhoven, D.A. van; de Leeuw, F.E.; Kessels, R.P.C.; Dijk, E.J. van

    2014-01-01

    Background and Purpose—By definition, the symptoms of a transient ischemic attack (TIA) subside completely within 24 hours. Imaging studies show signs of persistent ischemic tissue damage in a substantial amount of patients with TIA. Cerebral infarction can cause permanent cognitive impairment. Whet

  3. Chemical Attack of Malaysian Pozzolans Concrete

    Directory of Open Access Journals (Sweden)

    Mohd Hilton Ahmad

    2011-09-01

    Full Text Available Malaysia produces more than 10 million tonne of by-product from industrial sector per year. As the environmental impact concerns, more than half of the by-product can be recycled to be used as construction materials. One of them is pozzolan, a cement replacing material that can be used to enhance the properties of the concrete. This paper studies the chemical attack to local prozzolans concrete. The parameters studied include weight loss, length change, and residual strength of local pozzolans concrete after been exposed to severe environment. The specimen were tested under normal room temperature, exposed to magnesium sulfate, MgSO4. 2H2O where both sulfate attack and acid attack take place. Two series of pozzolans< which is Pulverized fly ash (PFA and Palm oil fuel ash (POFA were identified. Another series of admixture, Quarry Dust (QD from quarry waste that contain high amount of silica content also been carried out. Each series will study the effect of cement replacement percentage of 5%, 10% and 15%. The parameters were compared to conventional ordinary Portland cement (OPC concrete as control mix. Accelerated testing was conducted at 3, 7, 28, 56 and 90 days. The result shows that the local pozzolans concrete were found to be in good resistance against sulfate attack compared to conventional concrete. Compared to all series conducted, series of PFA replacement gave the best resistance followed by POFA and QD replacement series.

  4. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  5. Shark Attack! Sinking Your Teeth into Anatomy.

    Science.gov (United States)

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  6. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  7. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  8. A graph based system for multi-stage attacks recognition

    Institute of Scientific and Technical Information of China (English)

    Safaa O. Al-Mamory; Zhai Jianhong; Zhang Hongli

    2008-01-01

    Building attack scenario is one of the most important aspects in network security. This paper proposed a system which collects intrusion alerts, clusters them as sub-attacks using alerts abstraction, aggregates the similar sub-attacks, and then correlates and generates correlation graphs. The scenarios were represented by alert classes instead of alerts themselves so as to reduce the required rules and have the ability of detecting new variations of attacks. The proposed system is capable of passing some of the missed attacks. To evaluate system effectiveness, it was tested with different datasets which contain multi-step attacks. Compressed and easily understandable correlation graphs which reflect attack scenarios were generated. The proposed system can correlate related alerts, uncover the attack strategies, and detect new variations of attacks.

  9. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal...... analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack......-defence trees to two-player stochastic games, and then employ probabilistic model checking techniques to formally analyse these models. This provides a means to both verify formally specified security properties of the attack-defence scenarios and, dually, to synthesise strategies for attackers or defenders...

  10. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  11. Economic Analysis on Wastewater Reuse

    Institute of Scientific and Technical Information of China (English)

    Yushan WAN; Na LI

    2012-01-01

    Abstract The shortage of water resources social development. Wastewater reuse is an has become a major limiting factor for effective solution to solve water short- ages, which not only has economic benefits, but also has significant social and en- vironmental benefits. The economic evaluation is an important component in the study of wastewater reuse feasibility and the basis for the program optimization and economic feasibility determination.

  12. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  13. Methane emission during municipal wastewater treatment.

    Science.gov (United States)

    Daelman, Matthijs R J; van Voorthuizen, Ellen M; van Dongen, Udo G J M; Volcke, Eveline I P; van Loosdrecht, Mark C M

    2012-07-01

    Municipal wastewater treatment plants emit methane. Since methane is a potent greenhouse gas that contributes to climate change, the abatement of the emission is necessary to achieve a more sustainable urban water management. This requires thorough knowledge of the amount of methane that is emitted from a plant, but also of the possible sources and sinks of methane on the plant. In this study, the methane emission from a full-scale municipal wastewater facility with sludge digestion was evaluated during one year. At this plant the contribution of methane emissions to the greenhouse gas footprint were slightly higher than the CO₂ emissions related to direct and indirect fossil fuel consumption for energy requirements. By setting up mass balances over the different unit processes, it could be established that three quarters of the total methane emission originated from the anaerobic digestion of primary and secondary sludge. This amount exceeded the carbon dioxide emission that was avoided by utilizing the biogas. About 80% of the methane entering the activated sludge reactor was biologically oxidized. This knowledge led to the identification of possible measures for the abatement of the methane emission.

  14. Behavioral Modeling of WSN MAC Layer Security Attacks: A Sequential UML Approach

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    Wireless sensor networks (WSNs) are growing enormously and becoming increasingly attractive for a variety of application areas such as tele-health monitoring, industry monitoring, home automation and many more. The primary weakness shared by all wireless application and technologies is the vulner......Wireless sensor networks (WSNs) are growing enormously and becoming increasingly attractive for a variety of application areas such as tele-health monitoring, industry monitoring, home automation and many more. The primary weakness shared by all wireless application and technologies...... is the vulnerability to security attacks/threats. The performance and behavior of a WSN are vastly affected by such attacks. In order to be able to better address the vulnerabilities of WSNs in terms of security, it is important to understand the behavior of the attacks. This paper addresses the behavioral modeling...... of medium access control (MAC) security attacks in WSNs. The MAC layer is responsible for energy consumption, delay and channel utilization of the network and attacks on this layer can introduce significant degradation of the individual sensor nodes due to energy drain and in performance due to delays...

  15. A Survey of Mobile Ad Hoc Network Attacks

    Directory of Open Access Journals (Sweden)

    PRADIP M. JAWANDHIYA,

    2010-09-01

    Full Text Available Security is an essential requirement in mobile ad hoc network (MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge, this is the first paper that studies all the existing attacks on MANETs.

  16. Analysis of the SYN Flood DoS Attack

    Directory of Open Access Journals (Sweden)

    Mitko Bogdanoski

    2013-06-01

    Full Text Available The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol segments when SYN flag is ON, which gives space for a DoS (Denial of Service attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection algorithms as an effective mechanism against this type of attack. Finally, practical approaches against SYN flood attack for Linux and Windows environment which are followed by are shown.

  17. Multiattribute Utility Theory without Expected Utility Foundations

    NARCIS (Netherlands)

    A.M. Stiggelbout; P.P. Wakker

    1995-01-01

    Methods for determining the form of utilities are needed for the implementation of utility theory in specific decisions. An important step forward was achieved when utility theorists characterized useful parametric families of utilities, and simplifying decompositions of multiattribute utilities. Th

  18. Justified Cross-Site Scripting Attacks Prevention from Client-Side

    Directory of Open Access Journals (Sweden)

    A.MONIKA

    2014-07-01

    Full Text Available Web apps are fetching towards the overriding way to offer access to web services. In parallel, vulnerabilities of web application are being revealed and unveiled at an frightening rate. Web apps frequently make JavaScript code utilization that is entrenched into web pages to defend client-side behavior which is dynamic. This script code is accomplished in the circumstance of the client’s web browser. From malicious JavaScript code to shield the client’s environment, a mechanism known as sandboxing is utilized that confines a program to admittance only resources connected with its origin website. Regrettably, these protection mechanisms not succeed if a client can be attracted into malicious JavaScript code downloading from an in-between, faithful site. In this situation, the wicked script is approved complete entrée to each and every resource (for example cookies and authentication tokens that be in the right place to the trusted/faithful site. Those types of attacks are described as XSS (crosssite scripting attacks. Commonly, cross-site scripting attacks are simple to perform, but complicated to identify and stop. One cause is the far above the ground HTML encoding methods flexibility, presenting the attacker a lot of chances for circumventing input filters on the server-side that must put off malicious scripts from entering into trusted/faithful sites. Also, developing a client-side way out is not simple cause of the complicatedness of recognizing JavaScript code as formatted as malicious. This theory shows that noxes is the finest of our understanding the initial client-side resolution to moderate cross-site scripting attacks. Noxes works as a web proxy and utilizes both automatically and manual produced rules to moderate possible cross-site scripting efforts. Noxes efficiently defends against data outflow from the client’s environment while needs least client communication and customization attempt.

  19. Integrated Hidden Markov Model and Bayes Packet Classifier for effective Mitigation of Application DDoS attacks

    Directory of Open Access Journals (Sweden)

    S Prabha

    2011-07-01

    Full Text Available Resisting distributed denial of service (DDoS attacks become more challenging with the availability of resources and techniques to attackers. The application-layer-based DDoS attacks utilize legitimate HTTP requests to overwhelm victim resources are more undetectable and are protocol compliant and non-intrusive. Focusing on the detection for application layer DDoS attacks, the existing scheme provide an access matrix which capture the spatial-temporal patterns of a normal flash crowd on non stationary object. The access matrix captures the spatial-temporal patterns of the normal flash crowd and the anomaly detector based on hidden Markov model (HMM described the dynamics of Access Matrix (AM to detect the application DDoS attacks. However current application layer attacks have high influence on the stationary object as well. In addition the detection threshold for non stationary object should be reevaluated to improve the performance of false positive rate and detection rate of the DDoS attacks.

  20. Optimization of Wastewater Microalgae Pretreatment for Acetone, Butanol, and Ethanol Fermentation

    OpenAIRE

    Castro, Yessica A.

    2014-01-01

    Acetone-butanol-ethanol (ABE) fermentation from wastewater microalgae by Clostridium saccharoperbutylacetonicum N1-4 is a novel bioprocess that utilizes waste substrate to generate valuable solvents. Butanol, the most abundant product resulting from ABE fermentation, is an environmentally safe and high performing fuel that can be utilized as a drop-in-fuel; however, high operational costs and low ABE yield present challenge in scale-up of the process. The utilization of algae as a substrate r...

  1. Impact of paper mill wastewater on soil properties and crop yield through lysimeter studies.

    Science.gov (United States)

    Singh, P K; Ladwani, K; Ladwani, K; Deshbhratar, P B; Ramteke, D S

    2013-01-01

    Paper and pulp industries produce large quantities of wastewater which can have adverse effects on the receiving water systems. In the present study lysimeters were used and filled with different soils replicating natural soil horizons and provided with a leachate collection system. The physico-chemical characteristics of the soil in each lysimeter and the quality of wastewater before leaching were assessed. Treated wastewater was evaluated for crop irrigation, and was categorized according to the irrigation water class 'Increasing Problem to Severe Problem' with respect to salinity and specific ion toxicity. Sandy loam soils showed 96% chemical oxygen demand (COD) removal while clay loam soils removed 99% of COD, and the colour removal in both the cases was found to be 100%. Application of wastewater resulted in an increase of pH value, ranging from 6.2-7.6; the electrical conductivity (ECe) of saturated extracts was found to be 0.6-1.7 dS m(-1), and exchangeable sodium percentage (ESP) ranged from 7.8-11.1% in soils. Similarly, an increase in the organic carbon, available nitrogen, phosphorus and potash content of soils was observed when irrigated with wastewater. Wastewater irrigation showed increased grain and straw yield of jowar, wheat and moong. These results permit successful utilization of pulp and paper mill wastewater for crop production without damaging the soils.

  2. Antibacterial Properties of ZnO/Calcium Alginate Composite and Its Application in Wastewater Treatment.

    Science.gov (United States)

    Zhang, Fengqin; Li, Xiaolong; He, Nongyue; Lin, Qinlu

    2015-05-01

    In this study, the antibacterial activities of ZnO with various morphologies were evaluated. A possible mechanism of antibacterial activities of dumbbell like ZnO was proposed based on the microscopic studies of the interaction between bacterial and dumbbell like ZnO, and also based on the antibacterial activity of ZnO enveloped with semi permeable membrane. Monosodium glutamate (MSG) wastewater and soy sauce wastewater were treated by M. purpureus using ZnO/calcium alginate carrier. The attached and suspended biomass in MSG wastewater reached to 228 mg/g and 74 mg/g, while, the attached and suspended biomass in soy sauce wastewater was 130 mg/g and 66 mg/g, respectively. The levels of chemical oxide demand (COD), biological oxide demand (BOD5), SO4(2-) and NH3-N in the treated MSG wastewater were distinctive lower than those detected in the raw wastewater. This ZnO/calcium alginate carrier method could be utilized as an alternative to the traditional anaerobic/aerobic methods in the application of food processing wastewater treatment.

  3. Improving quality of textile wastewater with organic materials as multi soil layering

    Science.gov (United States)

    Supriyadi; Widijanto, H.; Pranoto; Dewi, AK

    2016-02-01

    On agricultural land, fresh water is needed especially for irrigation. Alternative ways to fulfill needs of fresh water is by utilizing wastewater from industry. Wastewater that produced in the industry in Surakarta is over flowing especially textile wastewater. Wastewater that produced from industry has many pollutants that affected decreasing fresh water quality for irrigation. Multi Soil Layering (MSL) is one of method that utilize the soil ability as main media by increasing its function of soil structure to purify wastewater, so it does not contaminate the environment and reusable. This research was purposed to know affectivity of organic materials (such as rice straw, baggase, sawdust, coconut fibre, and corncob) and dosage (5%, 10% and 25%) in MSL, also get alternative purification ways with easy and cheaper price as natural adsorbent. This study using field and laboratory experiment. The result shows that MSL can be an alternative method of purification of wastewater. The appropriate composition of organic materials that can be used as adsorbent is MSL with wood sawdust 10% dosage because it can increase pH, decrease the number of Cr, ammonia, and phosphate but less effective to decrease BOD and COD.

  4. Formation of oxidation byproducts from ozonation of wastewater.

    Science.gov (United States)

    Wert, Eric C; Rosario-Ortiz, Fernando L; Drury, Doug D; Snyder, Shane A

    2007-04-01

    Disinfection byproduct (DBP) formation in tertiary wastewater was examined after ozonation (O(3)) and advanced oxidation with O(3) and hydrogen peroxide (O(3)/H(2)O(2)). O(3) and O(3)/H(2)O(2) were applied at multiple dosages to investigate DBP formation during coliform disinfection and trace contaminant oxidation. Results showed O(3) provided superior disinfection of fecal and total coliforms compared to O(3)/H(2)O(2). Color, UV absorbance, and SUVA were reduced by O(3) and O(3)/H(2)O(2), offering wastewater utilities a few potential surrogates to monitor disinfection or trace contaminant oxidation. At equivalent O(3) dosages, O(3)/H(2)O(2) produced greater concentrations of assimilable organic carbon (5-52%), aldehydes (31-47%), and carboxylic acids (12-43%) compared to O(3) alone, indicating that organic DBP formation is largely dependent upon hydroxyl radical exposure. Bromate formation occurred when O(3) dosages exceeded the O(3) demand of the wastewater. Bench-scale tests with free chlorine showed O(3) is capable of reducing total organic halide (TOX) formation potential by at least 20%. In summary, O(3) provided superior disinfection compared to O(3)/H(2)O(2) while minimizing DBP concentrations. These are important considerations for water reuse, aquifer storage and recovery, and advanced wastewater treatment applications.

  5. Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack

    Science.gov (United States)

    Ma, Hong-Xin; Bao, Wan-Su; Li, Hong-Wei; Chou, Chun

    2016-08-01

    We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulse-width, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward. Project supported by the National Basic Research Program of China (Grant No. 2013CB338002) and the National Natural Science Foundation of China (Grant Nos. 11304397 and 61505261).

  6. Surfactant scouring wastewater modified bentonites-promising material for unmanageable wastewater treatment%洗刷废水改性膨润土--一种有效的废水处理剂

    Institute of Scientific and Technical Information of China (English)

    钱光人; 余丽佳; 夏方远; 刘强; 裘祖楠

    2006-01-01

    Trimeric quaternary ammonium surfactants are newly developed surfactants, their widespread synthesis and utilization results in a great amount of scouring wasterwater of high COD, which is unmanageable. The present investigation aims to find a new type of organo-bentonites modified by the scouring wastewater and to treat the scouring wastewater at the same time. Results of adsorption experiments of phenol and formaldehyde by the modified bentonite show that, at the optimal ratio 24 % (W/V) of modified bentonite to scouring wastewater, the removal rate of phenol and formaldehyde by FTAT scouring wastewater modified bentonite is 3.53 times and 2.48 times higher than that of Na-bentonite, and the COD of treated scouring wastewater reduces to below 200 mg/L, meeting the second level of Standards for Discharge of Water Pollutants from the Ammonia Industry of China.

  7. Biotransformation of phosphogypsum by bacteria isolated from petroleum-refining wastewaters.

    Science.gov (United States)

    Wolicka, Dorota; Kowalski, Włodzimierz; Boszczyk-Maleszak, Hanka

    2005-01-01

    The biotransformation of phosphogypsum in cultures of sulfate-reducing bacteria (SRB) isolated from crude petroleum-refining wastewaters or purified using activated sludge method was studied. Selection was with the microcosms method on Postgate and minimal medium with different carbon sources, Emerson medium and petroleum-refining wastewaters. Highest hydrogen sulfide production, in excess of 500 mg/L, was observed in culture of microorganisms isolated from purified petroleum-refining wastewaters in Postgate medium with phenol as sole carbon source. 76% phenol reduction with simultaneous biotransformation of 2.7g phosphogypsum/L (1350 mg SO4/L) was obtained. The results regarding post-culture sediment indicated 66% utilization of phosphogypsum introduced into the culture (5 g/L), which reflects the active biotransformation of phosphogypsum by the community selected from the wastewaters.

  8. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed.......Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation....... In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...

  9. Flooding attack and defence in Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Yi Ping; Hou Yafei; Zhong Yiping; Zhang Shiyong; Dai Zhoulin

    2006-01-01

    Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called Ad hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed Ad hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a generic defense against the Ad hoc Flooding Attack. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the Ad hoc Flooding attack efficiently.

  10. Comparative Analysis of Routing Attacks in Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Bipul Syam Purkayastha

    2012-03-01

    Full Text Available In the mobile ad hoc networks the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node. But in such mobile networks, routing protocols are vulnerable to various kinds of security attacks such as blackhole node attacks. The routing protocols of MANET are unprotected and hence resulted into the network with the malicious mobile nodes in the network. These malicious nodes in the network are basically acts as attacks in the network. In this paper, we modify the existing DSR protocol with the functionality of attacks detection without affecting overall performance of the network. Also, we are considering the various attacks on mobile ad hoc network called blackhole attack, flooding attack and show the comparative analysis of these attacks using network simulator ns-2.

  11. An Attack Modeling Based on Colored Petri Net

    Institute of Scientific and Technical Information of China (English)

    ZHOU Shijie; QIN Zhiguang; ZHANG Feng; LIU Jinde

    2004-01-01

    A color petri net (CPN) based attack modeling approach is addressed.Compared with graph-based modeling,CPN based attack model is fiexible enough to model Intemet intrusions,because of their static and dynamic features.The processes and rules of building CPN based attack model from attack tree are also presented.In order to evaluate the risk of intrusion,some cost elements are added to CPN based attack modeling.This extended model is useful in intrusion detection and risk evaluation.Experiences show that it is easy to exploit CPN based attack modeling approach to provide the controlling functions,such as intrusion response and intrusion defense.A case study given in this paper shows that CPN based attack model has many unique characters which attack tree model hasn't.

  12. Robustness of Complex Networks against Attacks Guided by Damage

    CERN Document Server

    Wang, Hui; Xu, Xiaomin; Xiao, Yanghua; Wang, Wei

    2011-01-01

    Extensive researches have been dedicated to investigating the performance of real networks and synthetic networks against random failures or intentional attack guided by degree (degree attack). Degree is one of straightforward measures to characterize the vitality of a vertex in maintaining the integrity of the network but not the only one. Damage, the decrease of the largest component size that was caused by the removal of a vertex, intuitively is a more destructive guide for intentional attack on networks since the network functionality is usually measured by the largest component size. However, it is surprising to find that little is known about behaviors of real networks or synthetic networks against intentional attack guided by damage (damage attack), in which adversaries always choose the vertex with the largest damage to attack. In this article, we dedicate our efforts to understanding damage attack and behaviors of real networks as well as synthetic networks against this attack. To this end, existing ...

  13. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  14. New attacks on Wi-Fi Protected Setup

    Directory of Open Access Journals (Sweden)

    Hamed Mohtadi

    2015-09-01

    Full Text Available Wi-Fi Protected Setup (WPS is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weaknesses in the implementation of WPS and provides an improved evil twin attack. This attack shows that even by completely disabling the WPS on the routers, all vulnerabilities are not covered.

  15. Understanding how components of organisations contribute to attacks

    NARCIS (Netherlands)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is difficul

  16. Aspirin to Prevent a First Heart Attack or Stroke

    Science.gov (United States)

    ... Aspirin to Prevent a First Heart Attack or Stroke Also known as aspirin primary prevention. Aspirin is ... taking aspirin to prevent another heart attack or stroke? The information discussed in Who may benefit? only ...

  17. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......, one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  18. Mitigation of Malicious Attacks on Networks

    CERN Document Server

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  19. Making MANET secured against malicious attack

    Science.gov (United States)

    Kush, Ashwani; Taneja, Sunil; Kush, Shagun

    2011-12-01

    A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructureless environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive ondemand philosophy where routes are established only when required. Stable Routing is of major concern in Ad hoc routing. Security and Power efficiency are the major concerns in this field. This paper is an effort to use security to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The proposed scheme is intended to incorporate security aspect on existing protocols. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.

  20. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  1. GNSS-based positioning: Attacks and Countermeasures

    CERN Document Server

    Papadimitratos, P

    2010-01-01

    Increasing numbers of mobile computing devices, user-portable, or embedded in vehicles, cargo containers, or the physical space, need to be aware of their location in order to provide a wide range of commercial services. Most often, mobile devices obtain their own location with the help of Global Navigation Satellite Systems (GNSS), integrating, for example, a Global Positioning System (GPS) receiver. Nonetheless, an adversary can compromise location-aware applications by attacking the GNSS-based positioning: It can forge navigation messages and mislead the receiver into calculating a fake location. In this paper, we analyze this vulnerability and propose and evaluate the effectiveness of countermeasures. First, we consider replay attacks, which can be effective even in the presence of future cryptographic GNSS protection mechanisms. Then, we propose and analyze methods that allow GNSS receivers to detect the reception of signals generated by an adversary, and then reject fake locations calculated because of ...

  2. Quantifying Shannon's Work Function for Cryptanalytic Attacks

    CERN Document Server

    van Son, R J J H

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on computability logic to quantify Shannon's work function and evaluate resource use in cryptanalysis. A simple cost function is defined which allows to quantify a wide range of theoretical and real computational resources. With this approach the use of custom hardware, e.g., FPGA boards, in cryptanalysis can be analyzed. Applied to real cryptanalytic problems, it raises, for instance, the expectation that the computer time needed to break some simple 90 bit strong cryptographic primitives might theoretically be less than two years.

  3. Sharkonomics How to attack market leaders

    CERN Document Server

    Engeseth, Stefan

    2012-01-01

    Sharks are nature's most revered and feared killing machines. But if you study the behaviour of sharks, you will learn they are also highly strategic and efficient in the way they survive and thrive in nature's competitive environment. Inspired by the shark's evolved (over 420 million years) instincts and strategic moves, this book provides businesses with 10 ways on how to attack the market leaders, and take market share, in your sector.

  4. Afghanistan: Green-on-Blue Attacks

    Science.gov (United States)

    2013-05-02

    Afghanistan, December 2012, p 35 15 Yousafzai, Sami and Moreau , Ron, http://www.thedailybeast.com/newsweek/2012/08/26/ afghanistan-green-on-blue-killings...spike-insider-attacks- stress-ramadan-fasting, 24 August 2012 37 Yousafzai, Sami and Moreau , Ron, http://www.thedailybeast.com/newsweek/2012/08/26...afghanistan-green-on-blue-killings- explained.html, Afghanistan: ‘Green on Blue’ Killings Explained, 27 August 2012 38 Yousafzai, Sami and Moreau , Ron

  5. Coal Slag Attack-A Review

    Institute of Scientific and Technical Information of China (English)

    GUO Zongqi

    2004-01-01

    Although slagging coal gasifiers have served the commercial systems of electricity and chemical fertilizer productions for more than ten years, refractory service life still is a critical factor for gasifier availability. Some investigations were attracted, focusing on coal slag attack on high chromia refractories. A general introduction is made in order to have further understanding about slag corrosion in coal gasification environment. Microstructural deterioration and wear process of high chromia refractory in slagging gasifiers are discussed.

  6. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    cumulative cost of cyber-attacks was more than the combined global black market cost of cocaine, heroin and marijuana. These alarming figures raised...information (in many cases real-time) among many users at a very low cost . The number of networks the DoD uses to execute its mission has increased...the country to its knees. The Luftwaffe was uncontested in the Battle of Britain until radar’s ability to detect inbound aircraft provided the

  7. Converting Chemical Oxygen Demand (COD) of Cellulosic Ethanol Fermentation Wastewater into Microbial Lipid by Oleaginous Yeast Trichosporon cutaneum.

    Science.gov (United States)

    Wang, Juan; Hu, Mingshan; Zhang, Huizhan; Bao, Jie

    2017-01-27

    Cellulosic ethanol fermentation wastewater is the stillage stream of distillation column of cellulosic ethanol fermentation broth with high chemical oxygen demand (COD). The COD is required to reduce before the wastewater is released or recycled. Without any pretreatment nor external nutrients, the cellulosic ethanol fermentation wastewater bioconversion by Trichosporon cutaneum ACCC 20271 was carried out for the first time. The major components of the wastewater including glucose, xylose, acetic acid, ethanol, and partial of phenolic compounds could be utilized by T. cutaneum ACCC 20271. In a 3-L bioreactor, 2.16 g/L of microbial lipid accumulated with 55.05% of COD reduced after a 5-day culture of T. cutaneum ACCC 20271 in the wastewater. The fatty acid composition of the derived microbial lipid was similar with vegetable oil, in which it could be used as biodiesel production feedstock. This study will both solve the environmental problem and offer low-cost lipid feedstock for biodiesel production.

  8. Defending Against LDoS Attacks Using Fair AQM

    Directory of Open Access Journals (Sweden)

    Bianqin Wang

    2011-12-01

    Full Text Available According to the instant high rate and high intensity of LDoS attacks, this paper explores using fair queue management mechanism to mitigate their effect. We perform simulation experiments to evaluate the performance of fair AQM FRED and CHOKe under LDoS attacks. The simulation results show that they are able to reduce the impact of the attacks in various degrees. FRED outperforms CHOKe in throttling the attacks, but it is slightly inferior to CHOKe in time performance.

  9. Optimal Attack Strategy in Random Scale-Free Networks Based on Incomplete Information

    Institute of Scientific and Technical Information of China (English)

    LI Jun; WU Jun; LI Yong; DENG Hong-Zhong; TAN Yue-Jin

    2011-01-01

    @@ We introduce an attack model based on incomplete information, which means that we can obtain the information from partial nodes.We investigate the optimal attack strategy in random scale-free networks both analytically and numerically.We show that the attack strategy can affect the attack effect remarkably and the OAS can achieve better attack effect than other typical attack strategies.It is found that when the attack intensity is small, the attacker should attack more nodes in the "white area" in which we can obtain attack information; when the attack intensity is greater, the attacker should attack more nodes in the "black area" in which we can not obtain attack information.Moreover, we show that there is an inflection point in the curve of optimal attack proportion.For a given magnitude of attack information, the optimal attack proportion decreases with the attack intensity before the inflection point and then increases after the inflection point.%We introduce an attack model based on incomplete information, which means that we can obtain the information from partial nodes. We investigate the optimal attack strategy in random scale-free networks both analytically and numerically. We show that the attack strategy can affect the attack effect remarkably and the OAS can achieve better attack effect than other typical attack strategies. It is found that when the attack intensity is small, the attacker should attack more nodes in the "white area" in which we can obtain attack information; when the attack intensity is greater, the attacker should attack more nodes in the "black area" in which we can not obtain attack information. Moreover, we show that there is an inflection point in the curve of optimal attack proportion. For a given magnitude of attack information, the optimal attack proportion decreases with the attack intensity before the inflection point and then increases after the inflection point.

  10. Research and Implementation of Three HTTPS Attacks

    Directory of Open Access Journals (Sweden)

    Kefei Cheng

    2011-05-01

    Full Text Available With the rapid development of network applications, the issues of Network transmission security become very important. Therefore, SSL protocol is more and more widely used in a variety of network services. But the SSL protocol itself is not perfect, in practice, there are also problems. For the deficiencies of endpoint authentication in the SSL handshake process, the paper analyzes two kinds of defects existing in the SSL hand-shake process. Firstly, handshake process, in the first stage of the SSL connection, using plaintexts, existing the possibility of  being monitored and tampered. Secondly, SSL deployment of the actual application. Because of considering the factors about the performance of the network connection, that usually uses the way of switch connection based on HTTP protocol. In response to these deficiencies, this thesis adopts the two ways of forged certificates and converting the data stream from HTTPS to HTTP to attack them. In addition, a new attack mode against the data stream of HTTPS is designed and implemented. Experiments show that the above three methods cause significant security risks to HTTPS communications. Therefore, taking a static ARP table, enhanced certificate mechanism and mutual authentication of three different measures are proposed to enhance network security in the paper. It is shown that three ways can relative effectively defense against attacks on HTTPS in the experiments.

  11. A Formal Classification of Internet Banking Attacks and Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Laerte Peotta

    2011-02-01

    Full Text Available A formal classification of attacks and vulnerabilities that affect current internet banking systems is presented along with two attacks which demonstrate the insecurity of such systems. Based ona thoroughanalysis of current security models, we propose a guidelines for designing secure internet banking systems which are not affected by the presented attacks and vulnerabilities.

  12. Attacks Prevention and Detection Techniques In MANET: A Survey

    Directory of Open Access Journals (Sweden)

    Pranjali D. Nikam,

    2014-11-01

    Full Text Available Wireless sensor network is a set of distributed sensor nodes. Which are randomly deployed in geographical area to capture climatic changes like temperature, humidity and pressure. In Wireless Network MANET is a Mobile Ad-Hoc Networks which is a one self-configurable network. MANET is a collection of Wireless mobile node which is dynamically moves from one location to another location. Both attacks Active as well as Passive attacks is in MANET. It doesn’t have a static structure. Security for wireless network is much difficult as compare to wired networks. In last few years many security and attacks issue are face many researchers in MANET. Attacks like Packet dropping attack, Black-Hole attack, Denial of Service attack, wormhole attacks and Packet modification attacks found in MANET. At the time of data communication all the above mentioned attacks access data easily without permission. To solve the problem of attacks in MANET and secure data communication use Intrusion Detection System. In This paper propose the survey of different kinds of attacks on MANET and Wireless sensor networks. This paper helps to young researcher for implement new hybrid algorithm for secure intrusion detection in MANET.

  13. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Yee Wei; Hartel, Pieter; Hartog, den Jerry; Havinga, Paul

    2005-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone. W

  14. Recovery of polyphenols from rose oil distillation wastewater using adsorption resins--a pilot study.

    Science.gov (United States)

    Rusanov, Krasimir; Garo, Eliane; Rusanova, Mila; Fertig, Orlando; Hamburger, Matthias; Atanassov, Ivan; Butterweck, Veronika

    2014-11-01

    The production of rose oil from rose flowers by water steam distillation leaves a water fraction of the distillate as main part of the waste. Therefore, the rose oil distillation wastewater represents a serious environmental problem due to the high content of polyphenols which are difficult to decompose and have to be considered as biopollutants when discarded into the drainage system and rivers. On the other hand, natural polyphenols are valuable compounds with useful properties as bioactive substances. Until now there is no established practice for processing of rose oil distillation wastewater and utilization of contained substances. Thus, it was the aim of this study to develop a strategy to separate this wastewater into a polyphenol depleted water fraction and a polyphenol enriched fraction which could be developed into innovative value-added products. In a first step, the phytochemical profile of rose oil distillation wastewater was determined. Its HPLC-PDA-MS analysis revealed the presence of flavan-3-ols, flavanones, flavonols and flavones. In a second step, the development of a stepwise concentration of rose oil distillation wastewater was performed. The concentration process includes a filtration process to eliminate suspended solids in the wastewater, followed by adsorption of the contained phenolic compounds onto adsorption resins (XAD and SP). Finally, desorption of the polyphenol fraction from the resin matrix was achieved using ethanol and/or aqueous ethanol. The result of the process was a wastewater low in soluble organic compounds and an enriched polyphenol fraction (RF20 SP-207). The profile of this fraction was similar to that of rose oil distillation wastewater and showed the presence of flavonols such as quercetin and kaempferol glycosides as major metabolites. These compounds were isolated from the enriched polyphenol fraction and their structures confirmed by NMR. In summary, a pilot medium scale system was developed using adsorption resins

  15. Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Flach, G. P. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2015-05-12

    Recent Special Analysis modeling of Saltstone Disposal Units consider sulfate attack on concrete and utilize degradation rates estimated from Cementitious Barriers Partnership software simulations. This study provides an independent verification of those simulation results using an alternative analysis method and an independent characterization data source. The sulfate penetration depths estimated herein are similar to the best-estimate values in SRNL-STI-2013-00118 Rev. 2 and well below the nominal values subsequently used to define Saltstone Special Analysis base cases.

  16. A Robust and Resilient Network Design Paradigm for Region-Based Faults Inflicted by WMD Attack

    Science.gov (United States)

    2016-04-01

    protection- based algorithm (MP-SVIMA) to minimize the computing and communication resource costs. The MP-SVIMA scheme takes advantage of the...approach: For the first objective, the random subspace method developed in [7] can be utilized to build small DTs based on new synchrophasor measurements ...Robust and Resilient Network Design Paradigm for Region- Based Faults Inflicted by WMD Attack Distribution Statement A. Approved for public

  17. Preliminary Study of Thermal Treatment of Coke Wastewater Sludge Using Plasma Torch

    Science.gov (United States)

    Li, Mingshu; Li, Shengli; Sun, Demao; Liu, Xin; Feng, Qiubao

    2016-10-01

    Thermal plasma was applied for the treatment of coke wastewater sludge derived from the steel industry in order to investigate the feasibility of the safe treatment and energy recovery of the sludge. A 30 kW plasma torch system was applied to study the vitrification and gas production of coke wastewater sludge. Toxicity leaching results indicated that the sludge treated via the thermal plasma process converted into a vitrified slag which resisted the leaching of heavy metals. CO2 was utilized as working gas to study the production and heat energy of the syngas. The heating value of the gas products by thermal plasma achieved 8.43 kJ/L, indicating the further utilization of the gas products. Considering the utilization of the syngas and recovery heat from the gas products, the estimated treatment cost of coke wastewater sludge via plasma torch was about 0.98 CNY/kg sludge in the experiment. By preliminary economic analysis, the dehydration cost takes an important part of the total sludge treatment cost. The treatment cost of the coke wastewater sludge with 50 wt.% moisture was calculated to be about 1.45 CNY/kg sludge dry basis. The treatment cost of the coke wastewater sludge could be effectively controlled by decreasing the water content of the sludge. These findings suggest that an economic dewatering pretreatment method could be combined to cut the total treatment cost in an actual treatment process.

  18. Wastewater off-gas to electricity: A look at energy recovery using the internal combustion engine

    Energy Technology Data Exchange (ETDEWEB)

    Hawkins, S.C. [Eckenfelder Inc., Greenville, SC (United States)

    1997-12-31

    Historically, publicly owned treatment works (POTWs) have not been regulated for air pollutant emissions. Federal, state, and local regulatory agencies have placed increased scrutiny on POTW volatile organic compound (VOC) and hazardous air pollutant (HAP) emissions. In fact, the USEPA is developing Maximum Achievable Control Technology (MACT) standards for publicly owned facilities that receive and treat sewage and wastewater from residential, commercial, and industrial generators. Once promulgated, this standard will require POTWs to limit and control HAP emissions. One option available for the control of HAP emissions from wastewater facilities is the use of the internal combustion (IC) engine-generator systems to convert wastewater off-gas to energy. Single or multiple IC engines can be arranged to utilize wastewater off-gas in place of natural gas and diesel fuel to produce electricity. The electricity generated can then be used to power the treatment facility or sold to the local utility. These systems utilize an otherwise wasted energy resource while significantly reducing HAP and VOC emissions from the wastewater treatment process. This paper will discuss the principles of using the internal combustion engine for energy recovery and examine the technical and economic benefits involved with their use at POTW facilities.

  19. 40 CFR 63.1256 - Standards: Wastewater.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Standards: Wastewater. 63.1256 Section... for Pharmaceuticals Production § 63.1256 Standards: Wastewater. (a) General. Each owner or operator of any affected source (existing or new) shall comply with the general wastewater requirements...

  20. 40 CFR 63.647 - Wastewater provisions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 10 2010-07-01 2010-07-01 false Wastewater provisions. 63.647 Section... Emission Standards for Hazardous Air Pollutants From Petroleum Refineries § 63.647 Wastewater provisions... wastewater stream shall comply with the requirements of §§ 61.340 through 61.355 of 40 CFR part 61,...

  1. 18 CFR 1304.402 - Wastewater outfalls.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Wastewater outfalls. 1304.402 Section 1304.402 Conservation of Power and Water Resources TENNESSEE VALLEY AUTHORITY APPROVAL... Miscellaneous § 1304.402 Wastewater outfalls. Applicants for a wastewater outfall shall provide copies of...

  2. 40 CFR 63.1330 - Wastewater provisions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Wastewater provisions. 63.1330 Section... for Hazardous Air Pollutant Emissions: Group IV Polymers and Resins § 63.1330 Wastewater provisions... subpart. (10) Whenever §§ 63.132 through 63.149 refer to a Group 1 wastewater stream or a Group...

  3. 40 CFR 63.501 - Wastewater provisions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 9 2010-07-01 2010-07-01 false Wastewater provisions. 63.501 Section... for Hazardous Air Pollutant Emissions: Group I Polymers and Resins § 63.501 Wastewater provisions. (a... comply with the requirements of §§ 63.132 through 63.147 for each process wastewater stream...

  4. Orientation to Municipal Wastewater Treatment. Training Manual.

    Science.gov (United States)

    Office of Water Program Operations (EPA), Cincinnati, OH. National Training and Operational Technology Center.

    Introductory-level material on municipal wastewater treatment facilities and processes is presented. Course topics include sources and characteristics of municipal wastewaters; objectives of wastewater treatment; design, operation, and maintenance factors; performance testing; plant staffing; and laboratory considerations. Chapter topics include…

  5. 40 CFR 63.1433 - Wastewater provisions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Wastewater provisions. 63.1433 Section... for Hazardous Air Pollutant Emissions for Polyether Polyols Production § 63.1433 Wastewater provisions. (a) Process wastewater. Except as specified in paragraph (c) of this section, the owner or...

  6. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  7. Innovation in radioactive wastewater-stream management. Pt. 1

    Energy Technology Data Exchange (ETDEWEB)

    Karameldin, A. [Reactor Dept., Nuclear Research Center, Atomic Energy Authority, Cairo (Egypt)

    2002-07-01

    Recently an invention of a system for volume reduction of the wastewater streams present in SDTs has been achieved. This system substantially utilized the air conditioning and ventilation techniques in water transfer from the wastewater to air. This process is promoted by a mutual heating and humidification of a compressed dry air introduced through SDTs (or in another tank). From the probable release of radioactive nuclides point of view, the analysis of the evaporation of waste streams present in SDTs have been indicated that the proposed optimal evaporating temperature is round 75 C. The design curve of the daily volumetric reduction of the wastewater streams versus the necessary volumetric airflow rates at different operating temperature has been achieved. The evaporating temperature varied from 40 C to 95 C with a step of 5 C. The obtained curve illustrates that the required volumetric airflow rate utilized to evaporate one m{sup 3}/day (when maintaining SDTs at the temperature 75 C) is less than 90 m{sup 3}/h. The assessments of the obtained curve have been indicated that this system is feasible and viable, economic and has no secondary waste residuals. Recently, an experimental facility proposed to be constructed to obtain the optimal operating parameters of the system, regarding to the probable emissions of the radioactive nuclides within the permissible release limits. (authors)

  8. A Discrete Event Simulator for Extensive Defense Mechanism for Denial of Service Attacks Analysis

    Directory of Open Access Journals (Sweden)

    Maryam Tanha

    2012-01-01

    Full Text Available Problem statement: Seeking for defense mechanisms against low rate Denial of Service (DoS attacks as a new generation of DoS attacks has received special attention during recent years. As a decisive factor, evaluating the performance of the offered mitigation techniques based on different metrics for determining the viability and ability of these countermeasures requires more research. Approach: The development of a new generalized discrete event simulator has been deliberated in detail. The research conducted places high emphasis on the benefits of creating a customized discrete event simulator for the analysis of security and in particular the DoS attacks. The simulator possesses a niche in terms of the small scale, low execution time, portability and ease of use. The attributes and mechanism of the developed simulator is complemented with the proposed framework. Results: The simulator has been extensively evaluated and has proven to provide an ideal tool for the analysis and exploration of DoS attacks. In-depth analysis is enabled by this simulator for creating multitudes of defense mechanisms against HTTP low rate DoS attacks. The acquired results from the simulation tool have been compared against a simulator from the same domain. Subsequently, it enables the validation of developed simulator utilizing selected performance metrics including mean in-system time, average delay and average buffer size. Conclusion: The proposed simulator serves as an efficient and scalable performance analysis tool for the analysis of HTTP low rate DoS attack defense mechanism. Future work can encompass the development of discrete event simulators for analysis of other security issues such as Intrusion Detection Systems.

  9. Bioremediation of wastewater using microalgae

    Science.gov (United States)

    Chalivendra, Saikumar

    Population expansion and industrial development has deteriorated the quality of freshwater reservoirs around the world and has caused freshwater shortages in certain areas. Discharge of industrial effluents containing toxic heavy metals such as Cd and Cr into the environment have serious impact on human, animal and aquatic life. In order to solve these problems, the present study was focused on evaluating and demonstrating potential of microalgae for bioremediation of wastewater laden with nitrogen (N) in the form of nitrates, phosphorous (P) in the form of phosphates, chromium (Cr (VI)) and cadmium (Cd (II)). After screening several microalgae, Chlorella vulgaris and algae taken from Pleasant Hill Lake were chosen as candidate species for this study. The viability of the process was demonstrated in laboratory bioreactors and various experimental parameters such as contact time, initial metal concentration, algae concentration, pH and temperature that would affect remediation rates were studied. Based on the experimental results, correlations were developed to enable customizing and designing a commercial Algae based Wastewater Treatment System (AWTS). A commercial AWTS system that can be easily customized and is suitable for integration into existing wastewater treatment facilities was developed, and capital cost estimates for system including installation and annual operating costs were determined. The work concludes that algal bioremediation is a viable alternate technology for treating wastewater in an economical and sustainable way when compared to conventional treatment processes. The annual wastewater treatment cost to remove N,P is ~26x lower and to remove Cr, Cd is 7x lower than conventional treatment processes. The cost benefit analysis performed shows that if this technology is implemented at industrial complexes, Air Force freight and other Department of Defense installations with wastewater treatment plants, it could lead to millions of dollars in

  10. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  11. Link-layer jamming attacks on S-MAC

    OpenAIRE

    Law, Yee Wei; Hartel, Pieter; Hartog, den, D.N.; Havinga, Paul

    2005-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone. In this paper, we investigate some jamming attacks on S-MAC, the level of effectiveness and efficiency the attacks can potentially achieve, and a countermeasure that can be implemented against one o...

  12. Black Hole and Greyhole Attack in Wireless Mesh Network

    Directory of Open Access Journals (Sweden)

    Rupinder Kaur

    2014-10-01

    Full Text Available Security is an important need in wireless mesh networks to give safe and shared information between wireless non-static nodes. In wireless network nodes has ability to act correctly and route the packets. Wireless mesh networks unusual method of producing,keeping and sharing information ability of mobile objects to show spontaneous and cheap adjusting arrangement itself.There are different types of communication devices in technology by which performance is measured.There is a major issue which take part in network and provide security from various kinds of malicious attacks.There are various attacks such as black hole attack,wormhole attack,Greyhole attack, and evesdropping attack.Black hole and Greyhole attacks are network layer attacks that spoils the performance by falling the packets.The black hole and Grey hole are the problem of security that consider in wireless networks.Black hole and Greyhole attack is one type of way of interrupting attack and can cause large amount of damage to network.Black hole attack is act like ad-hoc network; which create network and attack on packets.In black hole attack where a false node not make correct paths in public to receiver node during the direction finding process. Theattacker achieves this attack when all the similar kinds of nodes communicate and make network to each other. It is very important to protectthe network layer from these attack which is also a great issues in wireless mesh network. Greyhole attack is very difficult to detect in wireless mesh network.In this paper,its an overview about black hole attack and grey hole in wireless mesh network and define problem statement about them. Secondly, its take study about related work in which many authors perform on these attacks and then its discuss about proposed method.Thirdly,the results are simulated carried out in OPNET simulator where black hole attack and grey hole attack shows the performance and Its analysis the throughput in network.

  13. Combined coagulation flocculation pre treatment unit for municipal wastewater

    Directory of Open Access Journals (Sweden)

    Ibrahim M. Ismail

    2012-10-01

    Full Text Available The potentials of using the hydraulic technique in combined unit for municipal wastewater treatment were studied. A combined unit in which processes of coagulation, flocculation and sedimentation, has been designed utilizing hydraulic mixing instead of mechanical mixing. A jar test treatability study has been conducted to locate the optimum dose of the coagulants to be used. Alum, ferrous sulfate, ferric sulfate, a mixture of ferric and ferrous sulfates, and mixture of lime and ferrous sulfate were all tested. A pilot unit was constructed in the existing wastewater treatment plant at El Mansoura governorate located in north Egypt. The optimum dose of coagulants used in the combined unit gives removal efficiencies for COD, BOD, and total phosphorous as 65%, 55%, and 83%, respectively.

  14. Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks.

    Science.gov (United States)

    Lu, Yang; Li, Jiguo

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.

  15. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

    Directory of Open Access Journals (Sweden)

    Yang Lu

    2014-01-01

    Full Text Available Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.

  16. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  17. PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK

    Directory of Open Access Journals (Sweden)

    Mohammad Abdus Salam

    2016-03-01

    Full Text Available Wireless sensor network (WSN is highly used in many fields. The network consists of tiny lightweight sensor nodes and is largely used to scan or detect or monitor environments. Since these sensor nodes are tiny and lightweight, they put some limitations on resources such as usage of power, processing given task, radio frequency range. These limitations allow network vulnerable to many different types of attacks such as hello flood attack, black hole, Sybil attack, sinkhole, and many more. Among these attacks, hello flood is one of the most important attacks. In this paper,we have analyzed the performance of hello flood attack and compared the network performance as number of attackers increases. Network performance is evaluated by modifying the ad-hoc on demand distance vector (AODV routing protocol by using NS2 simulator. It has been tested under different scenarios like no attacker, single attacker, and multiple attackers to know how the network performance changes. The simulation results show that as the number of attackers increases the performance in terms of throughput and delay changes.

  18. Mitigating App-DDoS Attacks on Web Servers

    Directory of Open Access Journals (Sweden)

    Manisha M. Patil

    2011-07-01

    Full Text Available In this paper, a lightweight mechanism is proposed to mitigate session flooding and request flooding app-DDoS attacks on web servers. App-DDoS attack is Application layer Distributed Denial of Service attack. This attack prevents legitimate users from accessing services. Numbers of mechanisms are available and can be installed on routers and firewalls to mitigate network layer DDoS attacks like SYNflood attack, ping of death attack. But Network layer solution is not applicable because App-DDoS attacks are indistinguishable based on packets and protocols. A lightweight mechanism is proposed which uses trust to differentiate legitimate users and attackers. Trust to client is evaluated based on his visiting history and requests are scheduled in decreasing order of trust. In this mechanism trust information is stored at client side in the form of cookies. This mitigation mechanism can be implemented as a java package which can run separately and forward valid requests to server. This mechanism also mitigates request flooding attacks by using Client Puzzle Protocol. When server is under request flooding attack source throttling is done by imposing cost on client. Cost is collected in terms of CPU cycles.

  19. Parametric approximation of airfoil aerodynamic coefficients at high angles of attack

    DEFF Research Database (Denmark)

    Skrzypinski, Witold Robert; Zahle, Frederik; Bak, Christian

    2014-01-01

    , and the third method, also utilizing trigonometric functions, was developed with the scope on stall-regulated turbines. The method of the even sine and cosine functions was further developed in the present work by using two independent harmonic approximations in the positive and negative α regions......Three methods for estimating the lift and drag curves in the 360° angle of attack (α) range with harmonic approximation functions were analyzed in the present work. The first method assumes aerodynamic response of a flat plate, the second utilizes even sine and even cosine approximation functions...

  20. Microbial Community Analysis of a Single Chamber Microbial Fuel Cell Using Potato Wastewater

    Energy Technology Data Exchange (ETDEWEB)

    Zhen Li; Rishika Haynes; Eugene Sato; Malcolm Shields; Yoshiko Fujita; Chikashi Sato

    2014-04-01

    Microbial fuel cells (MFCs) convert chemical energy to electrical energy via bioelectrochemical reactions mediated by microorganisms. We investigated the diversity of the microbial community in an air cathode single chamber MFC that utilized potato-process wastewater as substrate. Terminal Restriction Fragment Length Polymorphism (T-RFLP) results indicated that the bacterial communities on the anode, cathode, control electrode, and MFC bulk fluid were similar, but differed dramatically from that of the anaerobic domestic sludge and potato wastewater inoculum. The 16S rDNA sequencing results showed that microbial species detected on the anode were predominantly within the phyla of Proteobacteria, Firmicutes, and Bacteroidetes. Fluorescent microscopy results indicated that there was a clear enhancement of biofilm formation on the anode. Results of this study could help improve understanding of the complexity of microbial communities and optimize the microbial composition for generating electricity by MFCs that utilize potato wastewater.

  1. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure......Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop...

  2. Replication Attack Mitigations for Static and Mobile WSN

    CERN Document Server

    Manjula, V; 10.5121/ijnsa.2011.3210

    2011-01-01

    Security is important for many sensor network applications. Wireless Sensor Networks (WSN) are often deployed in hostile environments as static or mobile, where an adversary can physically capture some of the nodes. once a node is captured, adversary collects all the credentials like keys and identity etc. the attacker can re-program it and replicate the node in order to eavesdrop the transmitted messages or compromise the functionality of the network. Identity theft leads to two types attack: clone and sybil. In particularly a harmful attack against sensor networks where one or more node(s) illegitimately claims an identity as replicas is known as the node replication attack. The replication attack can be exceedingly injurious to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc. This paper analyzes the threat posed by the replication attack and several novel techniques to detect and defend against the replication attack, and analyzes their effect...

  3. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...... analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack......-defence trees to two-player stochastic games, and then employ probabilistic model checking techniques to formally analyse these models. This provides a means to both verify formally specified security properties of the attack-defence scenarios and, dually, to synthesise strategies for attackers or defenders...

  4. Biological flocculation treatment on distillery wastewater and recirculation of wastewater.

    Science.gov (United States)

    Zhang, Wen; Xiong, Rongchun; Wei, Gang

    2009-12-30

    In the present study, a wastewater treatment system for the ethanol fermentation industry was developed by recycling distillery wastewater. The waste was able to be recycled for the next fermentation after being treated with bio-flocculation process. The bio-flocculation process contains three steps: screening, treatment with polyaspartic acid and filtration. When the filtrate from this process was recycled, the average ethanol production yield was very close to that in the conventional process using tap water. In contrast, the recycle of wastewater without flocculation and with chemical flocculation showed negative effects on ethanol yield as recycling was repeated. This new process was confirmed to have stable operation over ten recycles. Hazardous materials influencing distillery wastewater recycles on fermentation were also considered. It was found that the content of suspended solids (SS), volatile acid and Fe ions inhibited fermentation and resulted in a decreased ethanol yield. Bio-flocculation was shown to be an effective way to diminish the content of inhibitory compounds drastically when the waste was recirculated.

  5. Feasibility study for alternate fuels production: unconventional natural gas from wastewater treatment plants. Volume II, Appendix D. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Overly, P.; Tawiah, K.

    1981-12-01

    Data are presented from a study performed to determined the feasibility of recovering methane from sewage at a typical biological secondary wastewater treatment plant. Three tasks are involved: optimization of digester gas; digester gas scrubbing; and application to the East Bay Municipal Utility District water pollution control plant. Results indicate that excess digester gas can be used economically at the wastewater treatment plant and that distribution and scrubbing can be complex and costly. (DMC) 193 references, 93 figures, 26 tables.

  6. ``Living off the land'': resource efficiency of wetland wastewater treatment

    Science.gov (United States)

    Nelson, M.; Odum, H. T.; Brown, M. T.; Alling, A.

    Bioregenerative life support technologies for space application are advantageous if they can be constructed using locally available materials, and rely on renewable energy resources, lessening the need for launch and resupply of materials. These same characteristics are desirable in the global Earth environment because such technologies are more affordable by developing countries, and are more sustainable long-term since they utilize less non-renewable, imported resources. Subsurface flow wetlands (wastewater gardens™) were developed and evaluated for wastewater recycling along the coast of Yucatan. Emergy evaluations, a measure of the environmental and human economic resource utilization, showed that compared to conventional sewage treatment, wetland wastewater treatment systems use far less imported and purchased materials. Wetland systems are also less energy-dependent, lessening dependence on electrical infrastructure, and require simpler maintenance since the system largely relies on the ecological action of microbes and plants for their efficacy. Detailed emergy evaluations showed that wetland systems use only about 15% the purchased emergy of conventional sewage systems, and that renewable resources contribute 60% of total emergy used (excluding the sewage itself) compared to less than 1% use of renewable resources in the high-tech systems. Applied on a larger scale for development in third world countries, wetland systems would require 1/5 the electrical energy of conventional sewage treatment (package plants), and save 2/3 of total capital and operating expenses over a 20-year timeframe. In addition, there are numerous secondary benefits from wetland systems including fiber/fodder/food from the wetland plants, creation of ecosystems of high biodiversity with animal habitat value, and aesthestic/landscape enhancement of the community. Wetland wastewater treatment is an exemplar of ecological engineering in that it creates an interface ecosystem to handle

  7. "Living off the land": resource efficiency of wetland wastewater treatment.

    Science.gov (United States)

    Nelson, M; Odum, H T; Brown, M T; Alling, A

    2001-01-01

    Bioregenerative life support technologies for space application are advantageous if they can be constructed using locally available materials, and rely on renewable energy resources, lessening the need for launch and resupply of materials. These same characteristics are desirable in the global Earth environment because such technologies are more affordable by developing countries, and are more sustainable long-term since they utilize less non-renewable, imported resources. Subsurface flow wetlands (wastewater gardens(TM)) were developed and evaluated for wastewater recycling along the coast of Yucatan. Emergy evaluations, a measure of the environmental and human economic resource utilization, showed that compared to conventional sewage treatment, wetland wastewater treatment systems use far less imported and purchased materials. Wetland systems are also less energy-dependent, lessening dependence on electrical infrastructure, and require simpler maintenance since the system largely relies on the ecological action of microbes and plants for their efficacy. Detailed emergy evaluations showed that wetland systems use only about 15% the purchased emergy of conventional sewage systems, and that renewable resources contribute 60% of total emergy used (excluding the sewage itself) compared to less than 1% use of renewable resources in the high-tech systems. Applied on a larger scale for development in third world countries, wetland systems would require the electrical energy of conventional sewage treatment (package plants), and save of total capital and operating expenses over a 20-year timeframe. In addition, there are numerous secondary benefits from wetland systems including fiber/fodder/food from the wetland plants, creation of ecosystems of high biodiversity with animal habitat value, and aesthestic/landscape enhancement of the community. Wetland wastewater treatment is an exemplar of ecological engineering in that it creates an interface ecosystem to handle

  8. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed.

  9. Electrochemical disinfection of toilet wastewater using wastewater electrolysis cell.

    Science.gov (United States)

    Huang, Xiao; Qu, Yan; Cid, Clément A; Finke, Cody; Hoffmann, Michael R; Lim, Keahying; Jiang, Sunny C

    2016-04-01

    The paucity of proper sanitation facilities has contributed to the spread of waterborne diseases in many developing countries. The primary goal of this study was to demonstrate the feasibility of using a wastewater electrolysis cell (WEC) for toilet wastewater disinfection. The treated wastewater was designed to reuse for toilet flushing and agricultural irrigation. Laboratory-scale electrochemical (EC) disinfection experiments were performed to investigate the disinfection efficiency of the WEC with four seeded microorganisms (Escherichia coli, Enterococcus, recombinant adenovirus serotype 5, and bacteriophage MS2). In addition, the formation of organic disinfection byproducts (DBPs) trihalomethanes (THMs) and haloacetic acids (HAA5) at the end of the EC treatment was also investigated. The results showed that at an applied cell voltage of +4 V, the WEC achieved 5-log10 reductions of all four seeded microorganisms in real toilet wastewater within 60 min. In contrast, chemical chlorination (CC) disinfection using hypochlorite [NaClO] was only effective for the inactivation of bacteria. Due to the rapid formation of chloramines, less than 0.5-log10 reduction of MS2 was observed in toilet wastewater even at the highest [NaClO] dosage (36 mg/L, as Cl2) over a 1 h reaction. Experiments using laboratory model waters showed that free reactive chlorine generated in situ during EC disinfection process was the main disinfectant responsible for the inactivation of microorganisms. However, the production of hydroxyl radicals [OH], and other reactive oxygen species by the active bismuth-doped TiO2 anode were negligible under the same electrolytic conditions. The formation of THMs and HAA5 were found to increase with higher applied cell voltage. Based on the energy consumption estimates, the WEC system can be operated using solar energy stored in a DC battery as the sole power source.

  10. Electrochemical disinfection of toilet wastewater using wastewater electrolysis cell

    Science.gov (United States)

    Huang, Xiao; Qu, Yan; Cid, Clément A.; Finke, Cody; Hoffmann, Michael R.; Lim, Keahying; Jiang, Sunny C.

    2016-01-01

    The paucity of proper sanitation facilities has contributed to the spread of waterborne diseases in many developing countries. The primary goal of this study was to demonstrate the feasibility of using a wastewater electrolysis cell (WEC) for toilet wastewater disinfection. The treated wastewater was designed to reuse for toilet flushing and agricultural irrigation. Laboratory-scale electrochemical (EC) disinfection experiments were performed to investigate the disinfection efficiency of the WEC with four seeded microorganisms (Escherichia coli, Enterococcus, recombinant adenovirus serotype 5, and bacteriophage MS2). In addition, the formation of organic disinfection byproducts (DBPs) trihalomethanes (THMs) and haloacetic acids (HAA5) at the end of the EC treatment was also investigated. The results showed that at an applied cell voltage of +4 V, the WEC achieved 5-log10 reductions of all four seeded microorganisms in real toilet wastewater within 60 min. In contrast, chemical chlorination (CC) disinfection using hypochlorite [NaClO] was only effective for the inactivation of bacteria. Due to the rapid formation of chloramines, less than 0.5-log10 reduction of MS2 was observed in toilet wastewater even at the highest [NaClO] dosage (36 mg/L, as Cl2) over a 1 h reaction. Experiments using laboratory model waters showed that free reactive chlorine generated in situ during EC disinfection process was the main disinfectant responsible for the inactivation of microorganisms. However, the production of hydroxyl radicals [•OH], and other reactive oxygen species by the active bismuth-doped TiO2 anode were negligible under the same electrolytic conditions. The formation of THMs and HAA5 were found to increase with higher applied cell voltage. Based on the energy consumption estimates, the WEC system can be operated using solar energy stored in a DC battery as the sole power source. PMID:26854604

  11. Quantum attacks on public-key cryptosystems

    CERN Document Server

    Yan, Song Y

    2013-01-01

    The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.Quantum Attacks on Public-Key Cryptosystems presemts almost all?known quantum comput

  12. SQL Injection Attacks: Techniques and Protection Mechanisms

    Directory of Open Access Journals (Sweden)

    Santosh Soni

    2011-01-01

    Full Text Available When an internet user interacts in web environment by surfing the Net, sending electronic mail messages and participating in online forums lot of data is generated which may have user’s private information. If this information is captured by third party tools and techniques; it may cause a breach in end user privacy. In the Web environment, end user privacy is one of the most controversial legal issues. In this paper issues related to information leakage through SQL injection attacks are presented and protection mechanisms are also discussed.

  13. Cooperative Guidance for Multimissile Salvo Attack

    Institute of Scientific and Technical Information of China (English)

    Zhao Shiyu; Zhou Rui

    2008-01-01

    Cooperative guidance problems of multiple missiles are considered in this article. A cooperative guidance scheme, where coordi-nation algorithms and local guidance laws are combined together, is proposed. This scheme actually builds up a hierarchical cooperative guidance architecture, which may provide a general solution to the multimissile cooperative guidance problems. In the case of salvo attacks which require missiles to hit the target simultaneously, both centralized and distributed coordination algorithms are derived based on the impact-time-control guidance (ITCG) law. Numerical simulations are performed to demonstrate the effectiveness of the proposed approaches.

  14. Cardiogenic embolism producing crescendo transient ischemic attacks.

    Science.gov (United States)

    Geraghty, Patrick J; Oak, Jack; Choi, Eric T

    2005-09-01

    Lateralizing, repetitive transient ischemic attacks are characteristic of symptomatic carotid bifurcation atherosclerotic plaques. We report a case in which a cardiogenic embolus, after lodging at the left carotid bifurcation, produced crescendo episodes of expressive aphasia and mild right upper extremity weakness. Complete neurological recovery was achieved following emergent carotid embolectomy and endarterectomy. This case demonstrates that the laminar nature of internal carotid blood flow may result in the localization of embolic events to a single region of the cerebral vasculature, regardless of the source lesion in the carotid artery. The role of endoluminal techniques in the diagnosis and management of such lesions is discussed.

  15. A Method to Defend File-Attacking

    Institute of Scientific and Technical Information of China (English)

    HE Hongjun; LUO Li; CAO Sihua; FENG Tao; PAN Li; ZOU Zhiji

    2006-01-01

    The paper points out that the deep reason why modern computer system fails to defense malware lies in that user has no right to control the access of information, and proposes an explicit authorization mechanism. Its basic idea is that user explicitly authorizes program the file set it can access, and monitor all file access operations; once program requests to access file out of the authorized file set, refuse it, and this means that the program is malicious or has design errors. Computers based on this novel mechanism can protect information from attacking reliably, and have good software and hardware compatibility. A testing system is presented to validate our theory.

  16. Bobcat attack on a cottontail rabbit

    Science.gov (United States)

    Biggins, D.E.; Biggins, D.M.

    2006-01-01

    We observed an attack by a bobcat (Lynx rufus) on a cottontail rabbit (Sylvilagus) that involved stealthy approach by the cat for >1 h, followed by a 12.3-s chase covering 116.0 m for the cat and 128.4 m for the rabbit. During the chase, the route of the cat from starting point to kill site was more direct than the semi-circular route of the rabbit. Stride lengths for the cat and total distance covered by the chase were longer than those previously reported for bobcats.

  17. Suicide bomb attack causing penetrating craniocerebral injury

    Institute of Scientific and Technical Information of China (English)

    Manzar Hussain; Muhammad Ehsan Bari

    2013-01-01

    Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma,although there are various reports of blast or gunshot injuries in warfare due to multiple foreign bodies like pellets and nails.In our case,a 30-year-old man presented to neurosurgery clinic with signs and symptoms of right-sided weakness after suicide bomb attack.The skull X-ray showed a single intracranial nail.Small craniotomy was done and the nail was removed with caution to avoid injury to surrounding normal brain tissue.At 6 months' follow-up his right-sided power improved to against gravity.

  18. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version

    Directory of Open Access Journals (Sweden)

    M. Rajesh Babu

    2015-01-01

    Full Text Available The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things.

  19. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version.

    Science.gov (United States)

    Babu, M Rajesh; Dian, S Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things.

  20. Wastewater Treatment I. Student's Guide.

    Science.gov (United States)

    California Water Pollution Control Association, Sacramento. Joint Education Committee.

    This student's guide is designed to provide students with the job skills necessary for the safe and effective operation and maintenance of wastewater treatment plants. It consists of three sections. Section 1 consists of an introductory note outlining course objectives and the format of the guide. A course outline constitutes the second section.…

  1. Evaluation of different smoking habits during music festivals through wastewater analysis.

    Science.gov (United States)

    Mackuľak, Tomáš; Grabic, Roman; Gál, Marián; Gál, Miroslav; Birošová, Lucia; Bodík, Igor

    2015-11-01

    Wastewater analysis is a powerful method that can provide useful information about the abuse of legal and illicit drugs. The aim of our study was to determine nicotine consumption during four different music festivals and to find a connection between smoking and preferences for specific music styles using wastewater analysis. The amount of the nicotine metabolite cotinine was monitored in wastewater at the influent of three waste water treatment plants WWTPs in the Czech Republic and Slovakia, where the festivals took place. Urinary bio-markers of nicotine utilization were analyzed by LC-HRMS. More than 80,000 festival participants were monitored during our study from June to September 2014. A significant increase of nicotine consumption was observed in wastewaters during music festivals. The nicotine ingestion level was back-calculated and expressed as mass of pure drug consumed per day and per 1000 inhabitants for selected cities of both countries. The highest differences between typical levels of cotinine in wastewaters and the levels during music festivals were detected in Piešťany: 4 g/L/1000 inhabitants during non-festival days compared to 8 g/L/1000 inhabitants during the Topfest pop-rock festival and 6g/L/1000 inhabitants during the Grape dance festival. No significant increase of the amounts of cotinine in wastewater was recorded for the Country and Folk festivals.

  2. Microbial Electrolytic Carbon Capture for Carbon Negative and Energy Positive Wastewater Treatment.

    Science.gov (United States)

    Lu, Lu; Huang, Zhe; Rau, Greg H; Ren, Zhiyong Jason

    2015-07-07

    Energy and carbon neutral wastewater management is a major goal for environmental sustainability, but current progress has only reduced emission rather than using wastewater for active CO2 capture and utilization. We present here a new microbial electrolytic carbon capture (MECC) approach to potentially transform wastewater treatment to a carbon negative and energy positive process. Wastewater was used as an electrolyte for microbially assisted electrolytic production of H2 and OH(-) at the cathode and protons at the anode. The acidity dissolved silicate and liberated metal ions that balanced OH(-), producing metal hydroxide, which transformed CO2 in situ into (bi)carbonate. Results using both artificial and industrial wastewater show 80-93% of the CO2 was recovered from both CO2 derived from organic oxidation and additional CO2 injected into the headspace, making the process carbon-negative. High rates and yields of H2 were produced with 91-95% recovery efficiency, resulting in a net energy gain of 57-62 kJ/mol-CO2 captured. The pH remained stable without buffer addition and no toxic chlorine-containing compounds were detected. The produced (bi)carbonate alkalinity is valuable for wastewater treatment and long-term carbon storage in the ocean. Preliminary evaluation shows promising economic and environmental benefits for different industries.

  3. [Analysis of novel style biological fluidized bed A/O combined process in dyeing wastewater treatment].

    Science.gov (United States)

    Wei, Chao-Hai; Huang, Hui-Jing; Ren, Yuan; Wu, Chao-Fei; Wu, Hai-Zhen; Lu, Bin

    2011-04-01

    A novel biological fluidized bed was designed and developed to deal with high-concentration refractory organic industrial wastewater. From 12 successful projects, three cases of dyeing wastewater treatment projects with the scale of 1200, 2000 and 13000 m3/d respectively were selected to analyze the principle of treating refractory organic wastewater with fluidized bed technology and discuss the superiority of self-developed biological fluidized bed from the aspects of technical and economic feasibility. In the three cases, when the hydraulic retention time (HRT) of biological system were 23, 34 and 21. 8 h, and the volume loading of influents (COD) were 1.75, 4.75 and 2.97 kg/(m3 x d), the corresponding COD removal were 97.3%, 98.1% and 95.8%. Furthermore the operating costs of projects were 0.91, 1.17 and 0.88 yuan per ton of water respectively. The index of effluent all met the 1st grade of Guangdong Province wastewater discharge standard. Results showed that the biological fluidized bed had characteristics of shorter retention time, greater oxygen utilization rate, faster conversion rate of organic pollutants and less sludge production, which made it overcome the shortcomings of traditional methods in printing and dyeing wastewater treatment. Considering the development of technology and the combination of ecological security and recycling resources, a low-carbon wastewater treatment process was proposed.

  4. Olive mill wastewater treatment in single-chamber air-cathode microbial fuel cells.

    Science.gov (United States)

    Bermek, Hakan; Catal, Tunc; Akan, S Süha; Ulutaş, Mehmet Sefa; Kumru, Mert; Özgüven, Mine; Liu, Hong; Özçelik, Beraat; Akarsubaşı, Alper Tunga

    2014-04-01

    Olive mill wastewaters create significant environmental issues in olive-processing countries. One of the most hazardous groups of pollutants in these wastewaters is phenolic compounds. Here, olive mill wastewater was used as substrate and treated in single-chamber air-cathode microbial fuel cells. Olive mill wastewater yielded a maximum voltage of 381 mV on an external resistance of 1 kΩ. Notable decreases in the contents of 3,4-dihydroxybenzoic acid, tyrosol, gallic acid and p-coumaric acid were detected. Chemical oxygen demand removal rates were 65 % while removal of total phenolics by the process was lower (49 %). Microbial community analysis during the olive mill wastewater treating MFC has shown that both exoelectrogenic and phenol-degrading microorganisms have been enriched during the operation. Brevundimonas-, Sphingomonas- and Novosphingobium-related phylotypes were enriched on the anode biofilm, while Alphaproteobacteria and Bacteriodetes dominated the cathode biofilm. As one of the novel studies, it has been demonstrated that recalcitrant olive mill wastewaters could be treated and utilized for power generation in microbial fuel cells.

  5. Using wastewater after lipid fermentation as substrate for bacterial cellulose production by Gluconacetobacter xylinus.

    Science.gov (United States)

    Huang, Chao; Guo, Hai-Jun; Xiong, Lian; Wang, Bo; Shi, Si-Lan; Chen, Xue-Fang; Lin, Xiao-Qing; Wang, Can; Luo, Jun; Chen, Xin-De

    2016-01-20

    In this study, lipid fermentation wastewater (fermentation broth after separation with yeast biomass) with high Chemical Oxygen Demand (COD) value of 25,591 mg/L was used as substrate for bacterial cellulose (BC) production by Gluconacetobacter xylinus for the first time. After 5 days of fermentation, the highest BC yield (0.659 g/L) was obtained. Both monosaccharide and polysaccharides present in lipid fermentation wastewater could be utilized by G. xylinus simultaneously during fermentation. By this bioconversion, 30.0% of COD could be removed after 10 days of fermentation and the remaining wastewater could be used for further BC fermentation. The crystallinity of BC samples in lipid fermentation wastewater increased gradually during fermentation but overall the environment of lipid fermentation wastewater showed small influence on BC structure by comparison with that in traditional HS medium by using FE-SEM, FTIR, and XRD. By this work, the possibility of using lipid fermentation wastewater containing low value carbohydrate polymer (extracellular polysaccharides) for high value carbohydrate polymer (BC) production was proven.

  6. Microbial lipid production from potato processing wastewater using oleaginous filamentous fungi Aspergillus oryzae.

    Science.gov (United States)

    Muniraj, Iniya Kumar; Xiao, Liwen; Hu, Zhenhu; Zhan, Xinmin; Shi, Jianghong

    2013-06-15

    Use of potato processing wastewater for microbial lipid production by oleaginous filamentous fungus Aspergillus oryzae was studied with the purpose of recycling potato processing wastewater for biodiesel production. The wastewater contained high concentrations of solids, starch and nutrients. Sterilization of the potato processing wastewater resulted in a thick gelatinized medium, causing the fungi to grow slow. In order to overcome this problem, the wastewater was diluted with tap water at three dilution ratios (25%, 50% and 75% before fermentation). Dilution of the wastewater not only enhanced lipid production, starch utilization and amylase secretion but also COD and nutrient removal. The dilution ratio of 25% was found to be optimum for lipid production and the maximum lipid concentration obtained was 3.5 g/L. Lipid accumulation was influenced by amylase secretion, and the amylase activity was up to 53.5 IU/mL at 25% dilution. The results show that phosphate limitation may be the mechanism to stimulate the lipid accumulation. In addition to lipid production, removals of COD, total soluble nitrogen and total soluble phosphorus up to 91%, 98% and 97% were achieved, respectively. Microbial lipids of A. oryzae contained major fatty acids such as palmitic acid (11.6%), palmitolic acid (15.6%), stearic acid (19.3%), oleic acid (30.3%), linolenic acid (5.5%) and linoleic acid (6.5%) suggesting that the lipids be suitable for second generation biodiesel production.

  7. Ecotoxicological risks associated with tannery effluent wastewater.

    Science.gov (United States)

    Shakir, Lubna; Ejaz, Sohail; Ashraf, Muhammad; Qureshi, Naureen Aziz; Anjum, Aftab Ahmad; Iltaf, Imran; Javeed, Aqeel

    2012-09-01

    The problem of water pollution acquires greater relevance in the context of a developing agrarian economy like Pakistan. Even though, the leather industry is a leading economic sector in Pakistan, there is an increasing environmental concern regarding tanneries because they produce large amounts of potentially toxic wastewater containing both trivalent and hexavalent chromium, which are equally hazardous for human population, aquaculture and agricultural activities in the area. Therefore, we defined the scope of the present study as to employ different bioassays to determine the eco-toxic potential of tannery effluent wastewater (TW) and its chromium based components, i.e., potassium dichromate (K(2)Cr(2)O(7)) and chromium sulfate Cr(2)(SO(4))(3). Particle-induced X-ray emission (PIXE) analysis of TW was carried out to determine the concentration of chromium in TW and then equal concentrations of hexavalent (K(2)Cr(2)O(7)) and trivalent chromium Cr(2)(SO(4))(3) were obtained for this study. Cytotoxicity assay, artemia bioassay and phytotoxicity assay was utilized to investigate the eco-toxicological potential of different concentrations of TW, K(2)Cr(2)O(7) and Cr(2)(SO(4))(3). All the dilutions of TW, K(2)Cr(2)O(7) and Cr(2)(SO(4))(3) presented concentration dependent cytotoxic effects in these assays. The data clearly represents that among all three tested materials, different dilutions of K(2)Cr(2)O(7) caused significantly more damage (Prisk to the human population, aquaculture and agricultural industry that can obliterate ecosystem surrounding the tanneries.

  8. Public knowledge of heart attack symptoms in Beijing residents

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qing-tan; HU Da-yi; YANG Jin-gang; ZHANG Shou-yan; ZHANG Xin-quan; LIU Shu-shan

    2007-01-01

    Background Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy,and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care.Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack.Methods A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006.Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community.Results A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms.Conclusions Public knowledge of common heart attack

  9. Removal of Arsenic from Wastewaters by Airlift Electrocoagulation: Part 3: Copper Smelter Wastewater Treatment

    DEFF Research Database (Denmark)

    Hansen, H.K.; Ottosen, Lisbeth M.

    2010-01-01

    -arsenate precipitates. This work evaluates the feasibility of EC as a treatment process at various stages during conventional copper smelter wastewater treatment - with a focus on arsenic. The reactor used is a batch airlift electrocoagulator. The results showed that raw copper smelter wastewater was difficult to treat......The arsenic content in wastewater is of major concern for copper smelters. A typical complex wastewater treatment is needed with a combination of chemical and physical processes. Electrocoagulation (EC) has shown its potential for arsenic removal due to the formation of ferric hydroxide...... threshold value for wastewater discharge could rapidly be reached when the conventional method did not clean the wastewater sufficiently....

  10. Membrane-filtered olive mill wastewater: Quality assessment of the dried phenolic-rich fraction

    Science.gov (United States)

    A current trend in olive mill wastewater (OMWW) management is to not only decrease environmental pollution but also extract and utilize valuable by-products. Therefore, the objectives of this study were to explore different techniques for drying a phenolic-rich membrane filtration fraction of OMWW a...

  11. MERCURY(II) ADSORPTION FROM WASTEWATERS USING A THIOL FUNCTIONAL ADSORBENT

    Science.gov (United States)

    The removal of mercury(II) from wastewaters (coal-fired utility plant scrubber solutions) using a thiol functional organoceramic composite (SOL-AD-IV) is investigated. A simulant is employed as a surrogate to demonstrate the removal of mercury from real waste solutions. Equilibri...

  12. Olive mill wastewater membrane filtration fraction: Drying techniques and quality assessment of the dried product (abstract)

    Science.gov (United States)

    A current trend in olive mill wastewater (OMWW) management is to not only decrease environmental pollution but also utilize valuable co-products. Recovery of phenolics from OMWW could help olive oil processors add value to their co-product, increasing the sustainability of olive oil production. The ...

  13. Using floating vegetation to remove nutrients from an anaerobic swine wastewater lagoon

    Science.gov (United States)

    Methods are needed for utilizing nutrients contained within animal wastewater lagoons. One potential method for removing nutrients is to have vegetation growing in the lagoon. A study was conducted from 2005-2007 to determine the feasibility of growing vegetation on floating platforms on a single ...

  14. Oxidative Mineralization and Characterization of Polyvinyl Alcohol Solutions for Wastewater Treatment

    Energy Technology Data Exchange (ETDEWEB)

    Oji, L.N.

    1999-08-31

    The principal objectives of this study are to identify an appropriate polyvinyl alcohol (PVA) oxidative mineralization technique, perform compatibility and evaporation fate tests for neat and mineralized PVA, and determine potential for PVA chemical interferences which may affect ion exchange utilization for radioactive wastewater processing in the nuclear industry.

  15. Estimation of EuroQol 5-Dimensions health status utility values in hereditary angioedema

    DEFF Research Database (Denmark)

    Aygören-Pürsün, Emel; Bygum, Anette; Beusterien, Kathleen

    2016-01-01

    OBJECTIVE: To estimate health status utility (preference) weights for hereditary angioedema (HAE) during an attack and between attacks using data from the Hereditary Angioedema Burden of Illness Study in Europe (HAE-BOIS-Europe) survey. Utility measures quantitatively describe the net impact of a...... across countries with regard to pain severity and in comparison to similar disease states. The results can be used to raise awareness of HAE as a serious disease with wide-ranging personal and social impacts....

  16. Enhancing network robustness for malicious attacks

    CERN Document Server

    Zeng, An

    2012-01-01

    In a recent work [Proc. Natl. Acad. Sci. USA 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. With a greedy algorithm, they found the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly, complementary to the node-robustness measurement ($R_{n}$), we propose a link-robustness index ($R_{l}$). We show that solely enhancing $R_{n}$ cannot guarantee the improvement of $R_{l}$. Moreover, the structure of $R_{l}$-optimized network is found to be entirely different from that of onion network. In order to design robust networks resistant to more realistic attack condition, we propose a hybrid greedy algorithm which takes both the $R_{n}$ and $R_{l}$ into account. We validate the robustness of our generated networks a...

  17. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  18. Gemcitabine-induced gouty arthritis attacks.

    Science.gov (United States)

    Bottiglieri, Sal; Tierson, Neil; Patel, Raina; Mo, Jae-Hyun; Mehdi, Syed

    2013-09-01

    In this case report, we review the experience of a patient who presented with early stage pancreatic cancer (Stage IIb) who underwent a Whipple procedure and adjuvant chemoradiation. The patient's past medical history included early stage colon cancer in remission, post-traumatic-stress-disorder, hypertension, hyperlipidemia, osteoarthritis, gout, and pre-diabetes. Chemotherapy initially consisted of weekly gemcitabine. The patient developed acute gouty attacks after his second dose of gemcitabine, which brought him to the emergency room for emergent treatment on several occasions. Gemcitabine was held and treatment began with fluorouracil and concurrent radiation. After completion of his chemoradiation with fluorouracil, he was again treated with weekly gemcitabine alone. As soon as the patient started gemcitabine chemotherapy the patient developed gouty arthritis again, requiring discontinuation of chemotherapy. The patient received no additional treatment until his recent recurrence 8 months later where gemcitabine chemotherapy was again introduced with prophylactic medications consisting of allopurinol 100 mg by mouth daily and colchicine 0.6 mg by mouth daily throughout gemcitabine chemotherapy, and no signs of gouty arthritis occurred. To our knowledge, this is the first case report describing gout attacks associated with gemcitabine therapy. There is limited data available describing the mechanism that gouty arthritis may be precipitated from gemcitabine chemotherapy. Further monitoring and management may be required in patients receiving gemcitabine chemotherapy with underlying gout.

  19. Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ibrahim S. I. Abuhaiba

    2012-11-01

    Full Text Available The objective of this paper is to study the vulnerabilities of sensor networks, design, and implement new approaches for routing attack. As one of the cornerstones of network infrastructure, routing systems are facing more threats than ever; they are vulnerable by nature and challenging to protect. We present a new attack, Swarm Flooding Attack, against Directed Diffusion based WSNs, which targets the consumption of sensors computational resources, such as bandwidth, disk space, or processor time. Two variants of swarm attack have been introduced: Bee and Ant. Both approaches are inspired from the natural swarming difference between bees and ants. In all cases, the strategy used to mount an attack is the same. An attack consists of a set of malicious user queries represented by interests that are inserted into the network. However, the two forms of attack vary in the synchronization aspects among attackers. These types of attacks are hard to defend against as illustrated. For each of the proposed attack models, we present analysis, simulation, and experimental measurements. We show that the system achieves maximal damage on system performance represented by many metrics.

  20. Simulation of Attacks for Security in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Alvaro Diaz

    2016-11-01

    Full Text Available The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation. After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  1. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  2. Minimizing Expected Maximum Risk from Cyber-Attacks with Probabilistic Attack Success

    Energy Technology Data Exchange (ETDEWEB)

    Bhuiyan, Tanveer H.; Nandi, Apurba; Medal, Hugh; Halappanavar, Mahantesh

    2016-07-16

    The goal of our work is to enhance network security by generating partial cut-sets, which are a subset of edges that remove paths from initially vulnerable nodes (initial security conditions) to goal nodes (critical assets), on an attack graph given costs for cutting an edge and a limited overall budget.

  3. Dishonest Behaviors in Online Rating Systems: Cyber Competition, Attack Models, and Attack Generator

    Institute of Scientific and Technical Information of China (English)

    Ya-Fei Yang; Qin-Yuan Feng; Yen(Lindsay)Sun; Ya-Fei Dai

    2009-01-01

    Recently,online rating systems are gaining popularity.Dealing with unfair ratings in such systems has been recognized as an important but challenging problem.Many unfair rating detection approaches have been developed and evaluated against simple attack models.However,the lack of unfair rating data from real human users and realistic attack behavior models has become an obstacle toward developing reliable rating systems.To solve this problem,we design and launch a rating challenge to coHect anfair rating data from real human users.In order to broaden the scope of the data collection,we also develop a comprehensive signal-based unfair rating detection system.Based on the analysis of real attack data,we discover important features in unfair ratings,build attack models,and develop an unfair rating generator.The models and generator developed in this paper can be directly used to test current rating aggregation systems,as well as to assist the design of future rating systems.

  4. An Attack Investigation, Characterization and Simulation of Various Attacks in MANET

    Directory of Open Access Journals (Sweden)

    Pratik Gite

    2015-01-01

    Full Text Available Mobile Ad-hoc Network is one of the most popular network technology in the field of research and development community. Due to their dynamic and ad-hoc nature, the network suffers from the various performance and security issues. The main objective of this paper is to evaluate the performance of Ad-hoc On Demand Distance Vector (AODV routing protocol under normal condition and attacks conditions on the basis of different performance metrics. This paper is also concerned about the different kinds of attacks formation viz. Black Hole, Worm Hole, Gray Hole and Denial of Service attacks on MANET environment. In addition of that different kinds of approaches available for detection and prevention of such attacks are also investigated. Finally using different experimentation and simulations through NS-2, the effort is made to identify the effective network characteristics. After concluding the effects and simulation the need of a new Intrusion Detection System (IDS model is presented for future implementation.

  5. Investigation of fluorescence methods for rapid detection of municipal wastewater impact on drinking water sources

    Science.gov (United States)

    Peleato, Nicolas M.; Legge, Raymond L.; Andrews, Robert C.

    2017-01-01

    Fluorescence spectroscopy as a means to detect low levels of treated wastewater impact on two source waters was investigated using effluents from five wastewater facilities. To identify how best to interpret the fluorescence excitation-emission matrices (EEMs) for detecting the presence of wastewater, several feature selection and classification methods were compared. An expert supervised regional integration approach was used based on previously identified features which distinguish biologically processed organic matter including protein-like fluorescence and the ratio of protein to humic-like fluorescence. Use of nicotinamide adenine dinucleotide-like (NADH) fluorescence was found to result in higher linear correlations for low levels of wastewater presence. Parallel factors analysis (PARAFAC) was also applied to contrast an unsupervised multiway approach to identify underlying fluorescing components. A humic-like component attributed to reduced semiquinone-like structures was found to best correlate with wastewater presence. These fluorescent features were used to classify, by volume, low (0.1-0.5%), medium (1-2%), and high (5-15%) levels by applying support vector machines (SVMs) and logistic regression. The ability of SVMs to utilize high-dimensional input data without prior feature selection was demonstrated through their performance when considering full unprocessed EEMs (66.7% accuracy). The observed high classification accuracies are encouraging when considering implementation of fluorescence spectroscopy as a water quality monitoring tool. Furthermore, the use of SVMs for classification of fluorescence data presents itself as a promising novel approach by directly utilizing the high-dimensional EEMs.

  6. AN INTEGRATED APPROACH AGAINST APP-DDoS FOR MITIGATING IP SPOOFED ATTACKS AND MAC ATTACKS

    Directory of Open Access Journals (Sweden)

    S.PRABHA

    2013-06-01

    Full Text Available The nature of data traffic flow from wired network is extremely different from wireless network. Therefore as the DDoS application service attacks from the wired ones are produced from IP frame and wireless ones from Media Access Control (MAC frame. The variant in the frames motivates the requirement of enhanced resistive mechanism for application DDoS attacks for interfaced internet application servers enabled with both wired and wireless infrastructure. With the wired and wireless interface access in internet application services made us to present an Application Service Network Request Identification (ASNRI scheme in this work. ASNRI scheme first identifies the type of data stream frame and input it to the IHBCM method. In Bayes packet classifier, separated data frames are verified for its malicious characteristic in its data frame attributes to filter out the malicious data packet frames. Simulations are carried out to evaluate the performance of ASNRI to conventional application DDoS attack resistance schemes by measuring its true positive and true negative of data frame classification and its malicious attack resistance rate at different traffic volumes.In the process of applying Bayes has been planned to provide insight into the behavior of this technique itself. In this paper has been illustrated the sensitivity of the algorithm to its initial assumptions and demonstrated the use of two techniques, one to break the Gaussian assumptions and the other to improve the quality of discriminators as input, It leads to significant improvements in the accuracy of the Bayes technique. Integrated Hidden Markov Model (HMM and Bayes Packet Classifier based Gaussian distribution factor to detect and respond to the App-DDoS attacks if they occur during a flash crowd event for both dynamic and stationary objects.

  7. Information security becoming a priority for utilities

    Energy Technology Data Exchange (ETDEWEB)

    Nicolaides, S. [Numerex, Atlanta, GA (United States)

    2009-10-15

    As part of North America's national critical infrastructure, utilities are finding themselves at the forefront of a security issue. In October 2007, a leading security service provider reported a 90 per cent increase in the number of hackers attempting to attack its utility clients in just one year. Utilities are vulnerable to cyber attacks that could disrupt power production and the transmission system. This article discussed the need for intelligent technologies in securely enabling resource management and operational efficiency of the utilities market. It discussed the unique security challenges that utilities face at a time of greater regulatory activity, heightened environmental concerns, tighter data security requirements and an increasing need for remote monitoring and control. A new tool has emerged for cyber security in the form of an international standard that may offer a strong guideline to work toward 11 security domains. These include security policy; organization of information security; asset management; human resources security; physical and environmental security; communications and operations management; access control; information systems acquisition; development and maintenance; information security incident management; business continuity management; and compliance. 2 figs.

  8. Organic contaminants in onsite wastewater treatment systems

    Science.gov (United States)

    Conn, K.E.; Siegrist, R.L.; Barber, L.B.; Brown, G.K.

    2007-01-01

    Wastewater from thirty onsite wastewater treatment systems was sampled during a reconnaissance field study to quantify bulk parameters and the occurrence of organic wastewater contaminants including endocrine disrupting compounds in treatment systems representing a variety of wastewater sources and treatment processes and their receiving environments. Bulk parameters ranged in concentrations representative of the wide variety of wastewater sources (residential vs. non-residential). Organic contaminants such as sterols, surfactant metabolites, antimicrobial agents, stimulants, metal-chelating agents, and other consumer product chemicals, measured by gas chromatography/mass spectrometry were detected frequently in onsite system wastewater. Wastewater composition was unique between source type likely due to differences in source water and chemical usage. Removal efficiencies varied by engineered treatment type and physicochemical properties of the contaminant, resulting in discharge to the soil treatment unit at ecotoxicologically-relevant concentrations. Organic wastewater contaminants were detected less frequently and at lower concentrations in onsite system receiving environments. Understanding the occurrence and fate of organic wastewater contaminants in onsite wastewater treatment systems will aid in minimizing risk to ecological and human health.

  9. Iron supplementation reduces the frequency and severity of breath-holding attacks in non-anaemic children

    Directory of Open Access Journals (Sweden)

    Anthony Zehetner

    2011-11-01

    Full Text Available Iron supplementation reduces the frequency and severity of breath-holding attacks (BHAs, particularly in children with iron deficiency. The issue of iron supplementation is less clear for Westernized children with BHAs who present to an outpatient community clinic and are not iron-deficient. This is the first reported case series of iron-replete children with frequent and disabling breath-holding attacks who have responded to a course of oral iron supplementation. This intervention is safe, improves quality of life for both child and carer, and is significantly cost-effective in terms of health resource utilization.

  10. Detection and Defense Against Packet Drop Attack in MANET

    Directory of Open Access Journals (Sweden)

    Tariq Ahamad

    2016-02-01

    Full Text Available MANET is a temporary network for a specified work and with the enormous growth MANETs it is becoming important and simultaneously challenging to protect this network from attacks and other threats. Packet drop attack or gray hole attack is the easiest way to make a denial of service in these dynamic networks. In this attack the malicious node reflects itself as the shortest path and receives all the packets and drops the selected packets in order to give the user the service that that is not correct. It is a specific kind of attack and protects the network and user from detecting this malicious activity. In this article I have proposed an efficient for step technique that confirms that this attack can be detected and defended with least efforts and resource consumption.

  11. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    Science.gov (United States)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  12. Relating Admissibility Standards for Digital Evidence to Attack Scenario Reconstruction

    Directory of Open Access Journals (Sweden)

    Changwei Liu

    2014-09-01

    Full Text Available Attackers tend to use complex techniques such as combining multi-step, multi-stage attack with anti-forensic tools to make it difficult to find incriminating evidence and reconstruct attack scenarios that can stand up to the expected level of evidence admissibility in a court of law. As a solution, we propose to integrate the legal aspects of evidence correlation into a Prolog based reasoner to address the admissibility requirements by creating most probable attack scenarios that satisfy admissibility standards for substantiating evidence. Using a prototype implementation, we show how evidence extracted by using forensic tools can be integrated with legal reasoning to reconstruct network attack scenarios. Our experiment shows this implemented reasoner can provide pre-estimate of admissibility on a digital crime towards an attacked network.

  13. The Impact of Black-Hole Attack on ZRP Protocol

    Directory of Open Access Journals (Sweden)

    CHAHIDI Badr

    2016-07-01

    Full Text Available lack of infrastructure in ad hoc networks makes their deployment easier. Each node in an ad hoc network can route data using a routing protocol, which decreases the level of security. Ad hoc networks are exposed to several attacks such as the blackhole attack. In this article, a study has been made on the impact of the attack on the hybrid routing protocol ZRP (Zone Routing Protocol. In this attack a malicious node is placed between two or more nodes in order to drop data. The trick of the attack is simple, the malicious node declares to have the most reliable way to the destination so that the wife destination chooses this path. In this study, NS2 is used to assess the impact of the attack on ZRP. Two metrics measure, namely the packet delivered ratio and end to end delay.

  14. Variability of clinical features in attacks of migraine with aura

    DEFF Research Database (Denmark)

    Hansen, Jakob M; Goadsby, Peter J; Charles, Andrew C

    2016-01-01

    BACKGROUND: There is significant variability in the clinical presentation of migraine, both among patients, and between attacks in an individual patient. We examined clinical features of migraine with aura in a large group of patients enrolled in a clinical trial, and compared retrospective...... migraine attack characteristics reported upon enrollment in the trial with those recorded prospectively in the trial. METHODS: Patients with migraine (n = 267) with typical visual aura in more than 30% of their attacks were enrolled from 16 centers for a clinical trial. Upon enrollment, patients provided...... a detailed retrospective description of the clinical features of their attacks of migraine. During the trial, clinical symptoms in migraine attacks starting with aura were recorded prospectively in 861 attacks. RESULTS: Retrospectively reported visual aura symptoms were variable and often overlapping...

  15. Detection and Isolation of Packet Dropping Attacker in MANETs

    Directory of Open Access Journals (Sweden)

    Ahmed Mohamed Abdalla

    2013-05-01

    Full Text Available Several approaches have been proposed for Intrusion Detection Systems (IDS in Mobile Ad hoc Networks (MANETs. Due to lack of MANETs infrastructure and well defined perimeter MANETs are susceptible to a variety of attacker types. To develop a strong security mechanism it is necessary to understand how malicious nodes can attack the MANETs. A new IDS mechanism is presented based on End-to-End connection for securing Optimized Link State Routing (OLSR routing protocol. This new mechanism is named as Detection and Isolation Packet Dropped Attackers in MANETs (DIPDAM. DIPDAM mechanism based on three ID messages Path Validation Message (PVM , Attacker Finder Message (AFM and Attacker Isolation Message (AIM. DIPDAM mechanism based on End-to-End (E2E communication between the source and the destination is proposed. The simulation results showed that the proposed mechanism is able to detect any number of attackers while keeping a reasonably low overhead in terms of network traffic.

  16. Preventing Recommendation Attack in Trust-Based Recommender Systems

    Institute of Scientific and Technical Information of China (English)

    Fu-Guo Zhang

    2011-01-01

    Despite its success,similarity-based collaborative filtering suffers from some limitations,such as scalability,sparsity and recommendation attack.Prior work has shown incorporating trust mechanism into traditional collaborative filtering recommender systems can improve these limitations.We argue that trust-based recommender systems are facing novel recommendation attack which is different from the profile injection attacks in traditional recommender system.To the best of our knowledge,there has not any prior study on recommendation attack in a trust-based recommender system.We analyze the attack problem,and find that "victim" nodes play a significant role in the attack.Furthermore,we propose a data provenance method to trace malicious users and identify the "victim" nodes as distrust users of recommender system.Feasibility study of the defend method is done with the dataset crawled from Epinions website.

  17. Attacks on Web Based Software and Modelling Defence Mechanisms

    Directory of Open Access Journals (Sweden)

    D.R. Ingle

    2012-08-01

    Full Text Available The software life cycle was in use to develop the good software. Now a day’s the software development life cycle should incorporate the security features. Input Validation Attacks are one of the most wide spread forms of vulnerability on the Web application. Our main intention is to focuses on detection and prevention of Input Validation attacks like SQL Injection, Cross Site Scripting and Buffer Overflow by incorporating security in software development life cycle. We have introduced a novel approach of preclusion and uncovering of Input Validation Attacks. SQL Injection , Cross Site Scripting, A buffer overflow attacks, experimentations are made to do these attacks on various sides and the defense mechanism model is proposed to avoid these attacks on the code.

  18. Attacker Control and Impact for Confidentiality and Integrity

    CERN Document Server

    Askarov, Aslan

    2011-01-01

    Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Security-typed languages have therefore introduced declassification mechanisms for relaxing confidentiality policies, and endorsement mechanisms for relaxing integrity policies. However, a continuing challenge has been to define what security is guaranteed when such mechanisms are used. This paper presents a new semantic framework for expressing security policies for declassification and endorsement in a language-based setting. The key insight is that security can be characterized in terms of the influence that declassification and endorsement allow to the attacker. The new framework introduces two notions of security to describe the influence of the attacker. Attacker control defines what the attacker is able to learn from observable effects of this code; attacker impact captures the attacker's influence on trusted locations. This ap...

  19. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  20. REVIEW CLUSTERING MECHANISMS OF DISTRIBUTED DENIAL OF SERVICE ATTACKS

    Directory of Open Access Journals (Sweden)

    Wesam Bhaya

    2014-01-01

    Full Text Available Distributed Denial of Service attacks (DDoS overwhelm network resources with useless or harmful packets and prevent normal users from accessing these network resources. These attacks jeopardize the confidentiality, privacy and integrity of information on the internet. Since it is very difficult to set any predefined rules to correctly identify genuine network traffic, an anomaly-based Intrusion Detection System (IDS for network security is commonly used to detect and prevent new DDoS attacks. Data mining methods can be used in intrusion detection systems, such as clustering k-means, artificial neural network. Since the clustering methods can be used to aggregate similar objects, they can detect DDoS attacks to reduce false-positive rates. In this study, a review of DDoS attacks using clustering data mining techniques is presented. A review illustrates the most recent, state-of-the art science for clustering techniques to detect DDoS attacks.

  1. Opportunities for Open Automated Demand Response in Wastewater Treatment Facilities in California - Phase II Report. San Luis Rey Wastewater Treatment Plant Case Study

    Energy Technology Data Exchange (ETDEWEB)

    Thompson, Lisa; Lekov, Alex; McKane, Aimee; Piette, Mary Ann

    2010-08-20

    This case study enhances the understanding of open automated demand response opportunities in municipal wastewater treatment facilities. The report summarizes the findings of a 100 day submetering project at the San Luis Rey Wastewater Treatment Plant, a municipal wastewater treatment facility in Oceanside, California. The report reveals that key energy-intensive equipment such as pumps and centrifuges can be targeted for large load reductions. Demand response tests on the effluent pumps resulted a 300 kW load reduction and tests on centrifuges resulted in a 40 kW load reduction. Although tests on the facility?s blowers resulted in peak period load reductions of 78 kW sharp, short-lived increases in the turbidity of the wastewater effluent were experienced within 24 hours of the test. The results of these tests, which were conducted on blowers without variable speed drive capability, would not be acceptable and warrant further study. This study finds that wastewater treatment facilities have significant open automated demand response potential. However, limiting factors to implementing demand response are the reaction of effluent turbidity to reduced aeration load, along with the cogeneration capabilities of municipal facilities, including existing power purchase agreements and utility receptiveness to purchasing electricity from cogeneration facilities.

  2. Breakdown of an Inhomogeneous Scale- Free Network Under Intentional Attack

    Institute of Scientific and Technical Information of China (English)

    LIN Guo-Ji; CHENG Xiang; OU-YANG Qi

    2003-01-01

    Using a recently introduced network model with node and connection diversity, we study the breakdown of different scale-free networks under intentional attacks. Our simulation results show that inhomogeneous networks are more sensitive to intentional attack than the homogeneous ones and that the centralization of the networks is an important variable, reflecting the characteristics of the network under intentional attack. Using a recently introduced method we can theoretically develop the critical point of the inhomogeneous networks.

  3. Cooperative Defense Against DDoS Attack using GOSSIP Protocol

    OpenAIRE

    Sohail, Imran; Hayat,Sikandar

    2009-01-01

    The ability to detect and prevent a network from DDoS attack and to ensure the high quality infrastructure is a back bone of today’s network security issues. In this thesis, we have successfully validated an algorithm using OmNet++ Ver. 4.0 simulation to show how a DDoS attack can be detected and how the nodes can be protected from such an attack using GOSSIP protocol.

  4. Participant attack on quantum secret sharing based on entanglement swapping

    Institute of Scientific and Technical Information of China (English)

    Song Ting-Ting; Zhang Jie; Gao Fei; Wen Qiao-Yan; Zhu Fu-Chen

    2009-01-01

    The security of quantum secret sharing based on entanglement swapping is revisited and a participant attack is presented.In this attack two dishonest agents together can illegally recover the secret quantum state without the help of any other controller,and it will not be detected by any othcr users.Furthermore,by modifying the distribution process of particles and adding a detection step after each distribution process,we propose an improved protocol which can resist this kind of attack.

  5. Non-harmful insertion of data mimicking computer network attacks

    Energy Technology Data Exchange (ETDEWEB)

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  6. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

    Science.gov (United States)

    2014-02-01

    ping-o-death. html. [40] S. Savage, N. Cardwell, D. Wetherall, and T. Anderson, “TCP Con- gestion Control with a Misbehaving Receiver,” ACM SIGCOMM CCR...forcing them to choose guard nodes in control of the adversary. Finally, we discuss defenses against the Sniper Attack that provably render the attack...in control of the adversary. Our attack thus imposes real, significant threats to Tor’s users,1 and we believe it constitutes the most devastating

  7. New trends in Internet attacks: Clickjacking in detail

    OpenAIRE

    Thoresen, Torgeir Dahlqvist

    2009-01-01

    While the complexity of web applications and their functionality continually increase, so do the number of opportunities for an attacker to launch successful attacks against a web application's users. In this thesis we investigate and describe clickjacking in great detail. To our knowledge, this work represent the first systematic scientific approach to assess clickjacking that also consider the attack's social consequences for users' security through an experiment and survey. We address the...

  8. Biological wastewater treatment in brewhouses

    Directory of Open Access Journals (Sweden)

    Voronov Yuriy Viktorovich

    2014-03-01

    Full Text Available In the article the working principles of wastewater biological treatment for food companies is reviewed, including dairies and breweries, the waters of which are highly concentrated with dissolved organic contaminants and suspended solids. An example of successful implementation is anaerobic-aerobic treatment plants. Implementation of these treatment plants can achieve the required wastewater treatment at the lowest operational expenses and low volumes of secondary waste generated. Waste water from the food companies have high concentration of various organic contaminants (fats, proteins, starch, sugar, etc.. For such wastewater, high rates of suspended solids, grease and other contaminants are characteristic. Wastewater food industry requires effective purification flowsheets using biological treatment facilities. At the moment methods for the anaerobic-aerobic purification are applied. One of such methods is the treatment of wastewater at ASB-reactor (methane reactor and the further tertiary treatment on the OSB-reactor (aeration. Anaerobic process means water treatment processes in anoxic conditions. The anaerobic treatment of organic contamination is based on the process of methane fermentation - the process of converting substances to biogas. The role of biological effluent treatment is discussed with special attention given to combined anaerobic/aerobic treatment. Combining anaerobic pre-treatment with aerobic post-treatment integrates the advantages of both processes, amongst which there are reduced energy consumption (net energy production, reduced biological sludge production and limited space requirements. This combination allows for significant savings for operational costs as compared to complete aerobic treatment without compromising the required discharge standards. Anaerobic treatment is a proven and energy efficient method to treat industrial wastewater effluents. These days, more and more emphasis is laid on low energy use, a

  9. Treatment of Wastewater with High Conductivity by Pulsed Discharge Plasma

    Science.gov (United States)

    Wang, Zhaojun; Jiang, Song; Liu, Kefu

    2014-07-01

    A wastewater treatment system was established by means of pulsed dielectric barrier discharge (DBD). The main advantage of this system is that the wastewater is employed as one of the electrodes for the degradation of rhodamine B, which makes use of the high conductivity and lessenes its negative influence on the discharge process. At the same time, the reactive species like ozone and ultraviolet (UV) light generated by the DBD can be utilized for the treatment of wastewater. The effects of some factors like conductivity, peak pulse voltage, discharge frequency and pH values were investigated. The results show that the combination of these reactive species could enhance the degradation of the dye while the ozone played the most important role in the process. The degradation efficiency was enhanced with the increase of energy supplied. The reduction in the concentration of rhodamine B was much more effective with high solution conductivity; under the highest conductivity condition, the degradation rate could rise to 99%.

  10. Treatemnt of Wastewater with Modified Sequencing Batch Biofilm Reactor Technology

    Institute of Scientific and Technical Information of China (English)

    胡龙兴; 刘宇陆

    2002-01-01

    This paper describes the removel of COD and nitrogen from wastewater with modified sequencing batch biofilm reactor,The strategy of simultaneous feeding and draining was explored.The results show that introduction of a new batch of wastewater and withdrawal of the purifeid water can be conducted simultaneously with the maximum volumetric exchange rate of about 70%,Application of this feeding and draining mode leads to the reduction of the cycle time,the increase of the utilization of the reactor volume and the simplification of the reactor structure.The treatment of a synthetic wastewater containing COD and nitrogen was investigated.The operation mode of F(D)-O(i.e.,simultaneous feeding and draining followed by the aerobic condition)was adopted.It was found that COD was degraded very fast in the initial reaction period of time,then reduced slowly and the ammonia nitrogen and nitrate nitrogen concentrations decreased and increased with time respectively,while the nitrite nitrogen level increased first and then reduced.The relationship between the COD or ammonia nitrogen loading and its removal rate was examined,and the removal of COD,ammonia nitrogen and total nitrogen could exceed 95%,90%and 80% respectively,The fact that nitrogen could e removed more completely under constant aeration(aerobic condition)of the SBBR operation mode is very interesting and could be explained in several respects.

  11. Measuring the efficiency of wastewater services through Data Envelopment Analysis.

    Science.gov (United States)

    Guerrini, A; Romano, G; Leardini, C; Martini, M

    2015-01-01

    Efficient water management is a priority in the European Union, since the operational efficiency of many water utilities is very low compared to best practice. Several countries are restructuring the water industry to save costs. Larger-scale operations and vertical integration are promoted to achieve scale and scope economies; however, the literature is not unanimous that such economies exist. There is also little evidence of the effect of customer density on costs. This article offers some insights into this matter, analysing the Danish water industry by a two-stage Data Envelopment Analysis approach to investigate the effects of size, scope and density in the wastewater industry. The results show that the Danish wastewater industry is positively affected by vertical integration and higher population density: firms that serve more than 100 person per km of sewer and combine water and wastewater services achieve better efficiency. Size does not have any significant influence on global efficiency, although technical pure efficiency decreases statistically with firm size.

  12. Disinfection of Ebola Virus in Sterilized Municipal Wastewater

    Science.gov (United States)

    Fischer, Robert J.; Casson, Leonard W.; de Carvalho, Nathalia Aquino; Haas, Charles N.; Munster, Vincent J.

    2017-01-01

    Concerns have been raised regarding handling of Ebola virus contaminated wastewater, as well as the adequacy of proposed disinfection approaches. In the current study, we investigate the inactivation of Ebola virus in sterilized domestic wastewater utilizing sodium hypochlorite addition and pH adjustment. No viral inactivation was observed in the one-hour tests without sodium hypochlorite addition or pH adjustment. No virus was recovered after 20 seconds (i.e. 4.2 log10 unit inactivation to detection limit) following the addition of 5 and 10 mg L-1 sodium hypochlorite, which resulted in immediate free chlorine residuals of 0.52 and 1.11 mg L-1, respectively. The addition of 1 mg L-1 sodium hypochlorite resulted in an immediate free chlorine residual of 0.16 mg L-1, which inactivated 3.5 log10 units of Ebola virus in 20 seconds. Further inactivation was not evident due to the rapid consumption of the chlorine residual. Elevating the pH to 11.2 was found to significantly increase viral decay over ambient conditions. These results indicate the high susceptibility of the enveloped Ebola virus to disinfection in the presence of free chlorine in municipal wastewater; however, we caution that extension to more complex matrices (e.g. bodily fluids) will require additional verification. PMID:28146555

  13. Securing Oracle Database from Search Engines Attack

    Directory of Open Access Journals (Sweden)

    N. M. A. Ayad

    2012-09-01

    Full Text Available Database security has recently become A victim of misused search engines. This can be accomplished simply by searching for a URL containing the name of the vulnerable web page or application. Oracle ships several sample web applications along with its databases. The security holes in these applications allow a web user to exploit SQL Injection to submit arbitrary SQL statements to the database. These applications are enabled by default, listening on port 7777, and known to be vulnerable to SQL Injection. This paper focuses on exploiting search engines to attack oracle database using SQL injection technique from web applications, when a website is vulnerable by SQL injection and this side is connected by oracle database vulnerable by SQL injection.

  14. Attacks on lexical natural language steganography systems

    Science.gov (United States)

    Taskiran, Cuneyt M.; Topkara, Umut; Topkara, Mercan; Delp, Edward J.

    2006-02-01

    Text data forms the largest bulk of digital data that people encounter and exchange daily. For this reason the potential usage of text data as a covert channel for secret communication is an imminent concern. Even though information hiding into natural language text has started to attract great interest, there has been no study on attacks against these applications. In this paper we examine the robustness of lexical steganography systems.In this paper we used a universal steganalysis method based on language models and support vector machines to differentiate sentences modified by a lexical steganography algorithm from unmodified sentences. The experimental accuracy of our method on classification of steganographically modified sentences was 84.9%. On classification of isolated sentences we obtained a high recall rate whereas the precision was low.

  15. [Acute ischemic proctitis following an epileptic attack

    DEFF Research Database (Denmark)

    Klintmann, C.K.; Hillingso, J.G.; Glenthøj, Andreas

    2008-01-01

    Acute ischemic proctitis is a rare diagnosis mainly because the rectum is supplied by an extensive arterial network. Consequently, in more than 90% of patients with ischemic colitis the rectum is spared. Previously reported cases are related to severe vascular insufficiency of the rectal circulat......Acute ischemic proctitis is a rare diagnosis mainly because the rectum is supplied by an extensive arterial network. Consequently, in more than 90% of patients with ischemic colitis the rectum is spared. Previously reported cases are related to severe vascular insufficiency of the rectal...... circulation caused by systemic atherosclerosis, usually following aortic or aortoiliac operations. We report one case of acute ischemic proctitis following an epileptic attack Udgivelsesdato: 2008/9/29...

  16. Detecting Cyber Attacks On Nuclear Power Plants

    Science.gov (United States)

    Rrushi, Julian; Campbell, Roy

    This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

  17. Resveratrol products resulting by free radical attack

    Science.gov (United States)

    Bader, Yvonne; Quint, R. M.; Getoff, Nikola

    2008-06-01

    Trans-resveratrol ( trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  18. Resveratrol products resulting by free radical attack

    Energy Technology Data Exchange (ETDEWEB)

    Bader, Yvonne; Quint, R.M. [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria); Getoff, Nikola [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria)], E-mail: nikola.getoff@univie.ac.at

    2008-06-15

    Trans-resveratrol (trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  19. [Cerebral infarction and transient ischemic attack].

    Science.gov (United States)

    Sahara, Noriyuki; Kuwashiro, Takahiro; Okada, Yasushi

    2016-04-01

    Japanese Guidelines for the Management of Stroke 2015 was published. Here, we describe several points revised from the 2009 edition about "Cerebral infarction and transient ischemic attack (TIA)". The revision points are as follows; 1. Extension of possible time window of intravenous recombinant tissue-plasminogen activator treatment (from within 3 hours to within 4.5 hours); 2. Antiplatelet therapy in acute stage (dual antiplatelet therapy (DAPT) for non-cardioembolic ischemic stroke or TIA); 3. Endovascular recanalization therapy in acute stage; 4. Antiplatelet therapy in chronic stage (Cilostazol is recommended similar to aspirin or clopidogrel); 5. Non-vitamin K antagonist oral anticoagulants (NOACs) for non-valvular atrial fibrillation (NVAF) stroke or TIA patients; 6. Management of TIA. We explain the revised points of the guideline in the text.

  20. Performance Evaluations of IPTables Firewall Solutions under DDoS attacks

    Directory of Open Access Journals (Sweden)

    Šimon M.

    2015-12-01

    Full Text Available The paper presents design, background and experimental results of the IPTables applied in IPv4 and IP6Tables applied in IPv6 network compared through several tested parameters. The experimental testbed environment is based on P2P grid utilized for DDoS attacks. IPTables tool is used for packet filtering and consequently for preventing DoS/DDoS attacks. It allows a system administrator to configure the tables, the chains and rules it stores in order to manage the incoming and outgoing packets. The packets are treated according to the rules’ results provided by the packet processing. A rule in a chain can be bound with another chain in the table etc.

  1. Feasible attack on detector-device-independent quantum key distribution.

    Science.gov (United States)

    Wei, Kejin; Liu, Hongwei; Ma, Haiqiang; Yang, Xiuqing; Zhang, Yong; Sun, Yongmei; Xiao, Jinghua; Ji, Yuefeng

    2017-03-27

    Recently, to bridge the gap between security of Measurement-device-independent quantum key distribution (MDI-QKD) and a high key rate, a novel protocol, the so-called detector-device-independent QKD (DDI-QKD), has been independently proposed by several groups and has attracted great interest. A higher key rate is obtained, since a single photon bell state measurement (BSM) setup is applied to DDI-QKD. Subsequently, Qi has proposed two attacks for this protocol. However, the first attack, in which Bob's BSM setup is assumed to be completely a "black box", is easily prevented by using some additional monitoring devices or by specifically characterizing the BSM. The second attack, which combines the blinding attack and the detector wavelength-dependent efficiency, is not explicitly discussed, and its feasibility is not experimentally confirmed. Here, we show that the second attack is not technically viable because of an intrinsically wavelength-dependent property of a realistic beam splitter, which is an essential component in DDI-QKD. Moreover, we propose a feasible attack that combines a well-known attack-detector blinding attack with intrinsic imperfections of single-photon detectors. The experimental measurement and proof-of-principle test results confirm that our attack can allow Eve to get a copy of quantum keys without being detected and that it is feasible with current technology.

  2. Noncombatants and liability to be attacked in wars

    DEFF Research Database (Denmark)

    Lippert-Rasmussen, Kasper

    2013-01-01

    The paper assumes that some people, at least, are liable to attack in war. In a number of ways, this is an ambiguous statement, so before proceeding, I need to clarify the specific senses in which I shall generally be using the terms "liable" and "attack." When I write that "S is liable to military...... attack," I mean that S has forfeited his or her right not to be attacked by armed forces. Here, "liable" is used in a normative-cum-legal sense, not descriptively as it is when one says "some colors are liable to darken in perpetual shade," and "attack" is used passively, as an equivalent of be attacked....... Colloquially, then, "S is liable to attack" means roughly that S is a legitimate target. Given this, it should be clear that when I talk about the criteria of "liability to attack," I am talking in effect about the features separating people who may and may not be attacked. Unless I indicate otherwise, I also...

  3. PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS

    Directory of Open Access Journals (Sweden)

    Ravinuthala Sruthi

    2013-06-01

    Full Text Available DOS ATTACKS ARE ONE OF THE TOP SECURITY PROBLEMS AFFECTING NETWORKS AND DISRUPTING SERVICES TO LEGITIMATE USERS. THE VITAL STEP IN DEALING WITH THIS PROBLEM IS THE NETWORK'S ABILITY TO DETECT SUCH ATTACKS. APPLICATION DDOS ATTACK, WHICH AIMS AT DISRUPTING APPLICATION SERVICE RATHER THAN DEPLETING THE NETWORK RESOURCE. UP TO NOW ALL THE RESEARCHES MADE ON THIS DDOS ATTACKS ONLY CONCENTRATES EITHER ON NETWORK RESOURCES OR ON APPLICATION SERVERS BUT NOT ON BOTH. IN THIS PAPER WE PROPOSED A SOLUTION FOR BOTH THESE PROBLEMS BY AUTHENTICATION METHODS AND GROUP TESTING.

  4. Flooding Distributed Denial of Service Attacks-A Review

    Directory of Open Access Journals (Sweden)

    Khadijah W.M. Ghazali

    2011-01-01

    Full Text Available Problem statement: Flaws either in users’ implementation of a network or in the standard specification of protocols has resulted in gaps that allow various kinds of network attack to be launched. Of the kinds of network attacks, denial-of-service flood attacks have caused the most severe impact. Approach: This study reviews recent researches on flood attacks and their mitigation, classifying such attacks as either high-rate flood or low-rate flood. Finally, the attacks are compared against criteria related to their characteristics, methods and impacts. Results: Denial-of-service flood attacks vary in their rates, traffic, targets, goals and impacts. However, they have general similarities that are the methods used are flooding and the main purpose is to achieve denial of service to the target. Conclusion/Recommendations: Mitigation of the denial-of-service flood attacks must correspond to the attack rates, traffic, targets, goals and impacts in order to achieve effective solution.

  5. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  6. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  7. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  8. Performance analysis of black hole attacks in geographical routing MANET

    Directory of Open Access Journals (Sweden)

    H.J Shanthi

    2014-10-01

    Full Text Available The MANET (Mobile Adhoc Network is vulnerable to several types of attacks. The most commonly classified attack is black hole attack, which is carried by single or multiple attackers, advertising itself of having a short fresh route to transmit data. The aim is to ensure security against the black hole attack and analyze the performance in geographical routing. The simple method is to send data as small blocks instead of entire data. The traffic is monitored independently in its neighborhood. The mechanism uses geographic information to detect variance in neighbor relations and node movements. We analyze the black hole attack in two popular location based protocol LAR and DREAM. It provides the stimulation study of black hole attack with the minimum attacker and also provides analysis on the parameters such as throughput, packet delivery and delay done with OMNET++ simulator. The simulation results show that packet loss increases and throughput decreases in the network with a black hole node in geographical routing. The proposed mechanism can be combined with existent routing protocols to defend against black hole attacks.

  9. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  10. Intrusions into Privacy in Video Chat Environments: Attacks and Countermeasures

    CERN Document Server

    Xing, Xinyu; Han, Richard; Liu, Xue; Mishra, Shivakant

    2010-01-01

    Video chat systems such as Chatroulette have become increasingly popular as a way to meet and converse one-on-one via video and audio with other users online in an open and interactive manner. At the same time, security and privacy concerns inherent in such communication have been little explored. This paper presents one of the first investigations of the privacy threats found in such video chat systems, identifying three such threats, namely de-anonymization attacks, phishing attacks, and man-in-the-middle attacks. The paper further describes countermeasures against each of these attacks.

  11. The timing of terrorist attacks: An optimal stopping approach

    Directory of Open Access Journals (Sweden)

    Thomas Jensen

    2016-02-01

    Full Text Available I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later.

  12. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore...

  13. Fake BTS Attacks of GSM System on Software Radio Platform

    Directory of Open Access Journals (Sweden)

    Yubo Song

    2012-02-01

    Full Text Available The 2G GSM communication system only provides one-way authentication mechanism which just authenticate the identities of mobile users. As we know, this is not resistant to fake BTS attack. But for the huge cost for building a fake BTS before, this kind of attack were not really implemented before. This paper presents an implement of fake BTS based on software radio technologies. Furthermore, this paper discusses two types of fake BTS attacks on our software radio platform. The first attack is IMSI/IMEI catch attack, which can get the mobile phone’s IMSI and IMEI. With this information, attacker can got the track of the man with this phone. The second attack is selective jamming attack. After get the IMSI and IMEI of the mobile phone, the attackers can decide whether the mobile phone is blocked or not. We will analyze the GSM protocol which is relevant to the interception system and later present the performance of such a system by real tests and demonstrate its feasibility.

  14. Impact Analysis of Recent DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Ketki Arora

    2011-02-01

    Full Text Available In the present era Internet has changed the way of traditional essential services such as banking, transportation, power, health, and defence being operated. These operations are being replacedby cheaper, more efficient Internet-based applications. It is all because of rapid growth and success of Internet in every sector. Unfortunately with the growth of Internet, count of attacks on Internet has also increased incredibly fast. Denial-of-service attack is one of them, which poses immense threat on the availability. Since, the World is highly dependent on the Internet, availability of the Internet is very critical for the socio-economic growth of the society. Denial-of-service attacks occur almost every day,and the frequency and the volume of these attacks are increasing day by day. One of the biggest challenges before researchers is to find the details of such attacks because due to damaging reputationissues, most of the commercial sites do not even disclose that they were blitzed by such attacks. Details of attacks can guide very well in the formulation of comprehensive defensive solution for such attacks. In this paper, an overview on DDoS problem, major factors causing DDoS attacks are demonstrated, brief detail of most recent DDoS incidents on online organizations is outlined and finally, the need for a comprehensive distributed solution is highlighted.

  15. An Improved Model of Attack Probability Prediction System

    Institute of Scientific and Technical Information of China (English)

    WANG Hui; LIU Shufen; ZHANG Xinjia

    2006-01-01

    This paper presents a novel probability generation algorithm to predict attacks from an insider who exploits known system vulnerabilities through executing authorized operations. It is different from most intrusion detection systems (IDSs) because these IDSs are inefficient to resolve threat from authorized insiders. To deter cracker activities, this paper introduces an improved structure of augmented attack tree and a notion of "minimal attack tree", and proposes a new generation algorithm of minimal attack tree. We can provide a quantitative approach to help system administrators make sound decision.

  16. The Need for Situational Awareness in a CBRNE Attack

    Directory of Open Access Journals (Sweden)

    Jordan Nelms

    2011-02-01

    Full Text Available Six years before the terrorist attacks on the World Trade Center and the Pentagon, and eight years before the United States went to war with Saddam Hussein for his alleged concealment of chemical and biological weapons caches, Japan's Tokyo subway was struck by one of the most vicious terror attacks in modern history.  The 1995 Sarin terrorist attack represents an important case study for post-9/11 emergency managers because it highlights the key issues first responders and public health officials face when confronted with a CBRNE ('C'hemical, 'B'iological, 'R'adiological, 'N'uclear, 'E'xplosive mass-casualty attack.

  17. Prevention Of WormholeAttacks In Geographic Routing Protocol

    Directory of Open Access Journals (Sweden)

    E.Poornima,

    2011-01-01

    Full Text Available As mobile ad hoc network applications are deployed, security emerges as a central requirement..Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Boundary State Routing (BSR is a geographic routing protocol which routes the data using the location of the nodes. Geographic routing protocols are known to be particularly susceptible to attacks.. In this paper we present the possible attacks on BSR protocol. One of the most popular and serious attacks in ad hoc networks is wormhole attack in which two or more colluding attackers record packets at one location, and tunnel them to another location for a replay at that remote location. A wormhole attack is very powerful, and preventing the attack has proven to be very difficult. In this paper, we devise efficient methods to detect and avoid wormhole attacks in the BSR protocol. The first method namely Reverse Routing Scheme (RRS attempts to detect the intrusion action .The second technique namely Authentication of Nodes Scheme (ANS uses cryptographic concepts to detect and prevent wormhole attacks. It not only detects the fake route but also adopts preventive measures against action wormhole nodes from reappearing during routing. The proposed system is designed in Boundary state routing (BSRprotocol and analysis and simulations are performed in network simulator (NS-2.

  18. Software test attacks to break mobile and embedded devices

    CERN Document Server

    Hagar, Jon Duncan

    2013-01-01

    Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It

  19. Seed yeast cultivation for salad oil manufacturing wastewater treatment

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    The mixture of five yeast strains obtained from soil could remove about 85% TOC of oil-rich wastewater in batch test.While the highest MLSS was obtained at an N:C of 1:5, the oil removal decreased with the increase of N:C during yeast sludge cultivation. Ammonium chloride was the best nitrogen source for yeast cultivation from the viewpoint of yeast growth and oil utilization. An ammonia concentration of over 1300 mg l-1 led to mass death of yeast at a pH of 5. The ammonia concentration should be controlled at a level of 1000 mg l-1 or lower.

  20. Quality and management of wastewater in sugar industry

    Science.gov (United States)

    Poddar, Pradeep Kumar; Sahu, Omprakash

    2015-02-01

    Wastewater from sugar industries is one that has complex characteristics and is considered a challenge for environmental engineers in terms of treatment as well as utilization. Before treatment and recycling, determination of physicochemical parameter is an important mechanism. Many different types of techniques are introduced and modified for the purpose, but depend upon the water quality parameters. The main aim of this study is to determine the physicochemical characteristics of sugar industry waste water by the standard method and minimize the fresh water consumption in sugar industry by water pinch methodology.