WorldWideScience

Sample records for attack wastewater utilities

  1. Reducing the Risks. In the aftermath of a terrorist attack, wastewater utilities may have to contend with decontamination water containing chemical, biological, or radiological substances

    Energy Technology Data Exchange (ETDEWEB)

    Warren, Linda P.; Hornback, Chris; Strom, Daniel J.

    2006-08-01

    In the aftermath of a chemical, biological, or radiological (CBR) attack, decontamination of people and infrastructure will be needed. Decontamination inevitably produces wastewater, and wastewater treatment plants (WTPs) need to know how to handle decontamination wastewater. This article describes CBR substances; planning, coordinating, and communicating responses across agencies; planning within a utility; coordination with local emergency managers and first responders; mitigating effects of decontamination wastewater; and mitigating effects on utility personnel. Planning for Decontamination Wastewater: A Guide for Utilities, the document on which this article is based, was developed under a cooperative agreement from the U.S. Environmental Protection Agency by the National Association of Clean Water Agencies (NACWA) and its contractor, CH2MHILL, Inc.

  2. Protecting water and wastewater infrastructure from cyber attacks

    Institute of Scientific and Technical Information of China (English)

    Srinivas Panguluri; William Phillips; John Cusimano

    2011-01-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion:cyber attacks are real and can cause significant damages.This paper presents some recent statistics on cyber attacks and resulting damages.Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks.Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are:1) the increasing interconnection of their business and control system networks,2) large variation of proprietary industrial control equipment utilized,3) multitude of cross-sector cyber-security standards,and 4) the differences in the equipment vendor's approaches to meet these security standards.The utilities can meet these challenges by voluntarily selecting and adopting security standards,conducting a gap analysis,performing vulnerability/risk analysis,and undertaking countermeasures that best meets their security and organizational requirements.Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years.Implementing cyber security does not necessarily have to be expensive,substantial improvements can be accomplished through policy,procedure,training and awareness.Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  3. Resourceful Utilization of Tannery Wastewater

    Institute of Scientific and Technical Information of China (English)

    Wang Chen; Wang Xikui; Ding Maochen; Zhang Chaoyu

    2012-01-01

    Leather industry is an important light industry in China. Leather making requires a series of chemical treatment. Degreasing, unhairing and chrome tanning wastewaters are the main portions of tannery wastewater. Reclaiming and reusing these wastewaters can eliminate 80% of COD, 75% of BOD, 95% of chromium and 93% of sulfuret, furthermore reduce environment impact, decrease treatment costs, save chemicals and water. Some application methods of wastewater reclamation and reuse for dif- ferent operations were reported. The suitable reclamation and reuse technologies can enable leather making processes more ra- tional, and realize the recovery and recycle of several chemicals in the tannery. Resourceful utilization of tannery wastewater should mate with renovating production technology, updating equipment, and must be guaranteed sufficiently by environmental protection measures.

  4. Utilizing Probabilistic Linear Equations in Cube Attacks

    Institute of Scientific and Technical Information of China (English)

    Yuan Yao; Bin Zhang; Wen-Ling Wu

    2016-01-01

    Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of cube attacks. Moreover, cube attacks are hard to apply if linear equations are rare. Therefore, it is of significance to make use of probabilistic linear equations, namely nonlinear superpolys that can be approximated by linear expressions effectively. In this paper, we suggest a way to test out and utilize these probabilistic linear equations, thus extending cube attacks to a wider scope. Concretely, we employ the standard parameter estimation approach and the sequential probability ratio test (SPRT) for linearity test in the preprocessing phase, and use maximum likelihood decoding (MLD) for solving the probabilistic linear equations in the online phase. As an application, we exhibit our new attack against 672 rounds of Trivium and reduce the number of key bits to search by 7.

  5. Subsurface Utility Engineering for Drinking Water and Wastewater Utilities

    Directory of Open Access Journals (Sweden)

    Berk Uslu,

    2015-11-01

    Full Text Available Buried utility locating practices are an integral part of condition assessment, renewal engineering, and damage prevention programs for drinking water and wastewater utilities. An extensive literature review was conducted to determine the underground utility practices, locating technologies, data management practice, as well as education and outreach programs. This literature review synthesized the practices form other industries. The practices from water and wastewater utilities were determined by the help of participation utilities to the WATERiD Database. Case studies in locating technology applications and locating practice application was written to capture these practices. These case studies were also supplemented by phone interviews with various utilities. Comparison between the literature and utility practice indicated various gaps in the utility practice. Recommendations are offered to fill these gaps for an effective use of underground utility practices by water and wastewater utilities. These recommendation include adaptation and implementation of specific best practices of transportation industry by the water and wastewater utilities. Specifically, adaptations of; standards, decision support tools for data quality levels and locating technologies, data standardization and integration, as well as participation on education and outreach programs are discussed.

  6. A Primer on Energy Efficiency for Municipal Water and Wastewater Utilities

    OpenAIRE

    Liu, Feng; Ouedraogo, Alain; Manghee, Seema; Danilenko, Alexander

    2012-01-01

    This primer is concerned with energy use and efficiency of network-based water supply and wastewater treatment in urban areas. It focuses on the supply side of the municipal water cycle, including the extraction, treatment, and distribution of water, and collection and treatment of wastewater-activities which are directly managed by Water and Wastewater Utilities (WWUs). The main challenge...

  7. Balance in Training for Latin American Water and Wastewater Utilities

    Science.gov (United States)

    Carefoot, Neil F.

    1977-01-01

    Using a Peru case study, this article examines the problem of training imbalance for water and wastewater operators. Guidelines towards achieving adequate training for all water and wastewater personnel are suggested. (Author/MA)

  8. A comprehensive review on utilization of wastewater from coffee processing.

    Science.gov (United States)

    Rattan, Supriya; Parande, A K; Nagaraju, V D; Ghiwari, Girish K

    2015-05-01

    The coffee processing industry is one of the major agro-based industries contributing significantly in international and national growth. Coffee fruits are processed by two methods, wet and dry process. In wet processing, coffee fruits generate enormous quantities of high strength wastewater requiring systematic treatment prior to disposal. Different method approach is used to treat the wastewater. Many researchers have attempted to assess the efficiency of batch aeration as posttreatment of coffee processing wastewater from an upflow anaerobic hybrid reactor (UAHR)-continuous and intermittent aeration system. However, wet coffee processing requires a high degree of processing know-how and produces large amounts of effluents which have the potential to damage the environment. Characteristics of wastewater from coffee processing has a biological oxygen demand (BOD) of up to 20,000 mg/l and a chemical oxygen demand (COD) of up to 50,000 mg/l as well as the acidity of pH below 4. In this review paper, various methods are discussed to treat coffee processing wastewaters; the constitution of wastewater is presented and the technical solutions for wastewater treatment are discussed. PMID:25598156

  9. Estimated Buried Utility Water and Wastewater Lines at Little Bighorn Battlefield National Monument, Montana

    Data.gov (United States)

    National Park Service, Department of the Interior — The water and wastewater lines were compiled from utility lines collected with GPS equipment in the summer of 2003 and then merged with older water line data...

  10. Production of Spirulina sp by utilization of wastewater from the powder type energy drinks

    Science.gov (United States)

    Sumantri, Indro; Priyambada, Ika Bagus

    2015-12-01

    Wastewater of energy drink type of powder produced when the the production equipment required cleaning treatment to produce one taste to others. These equipments washed by water, so that, it produced wastewater. It contains high organic substances and classified as high degradable due to food product. The content of wastewater is high carbon and nitrogen substances. Microalgae is an autotrophic microorganism, live without carbon presence, utilized to digest the substances in wastewater especially for nitrogen substances. Spirulina sp is the type of microalgae selected to utilize the wastewater of energy drink, the selection criteria is the size of Spirulina sp is relatively large and easy to separated from its solution. The experiment conducted by cultivate the seeding microalgae with certain nutrients until the certain volume. The synthetic wastewater obtained from one of energy drink type of powder with commercial brand as Kuku Bima Ener-G, the wastewater concentration selected under the close to the real condition of wastewater as basis of COD measurement (6 sachet/L or COD of 12.480mg/L) and aqueous concentration (1 sachet/L or COD of 2080mg/L). The batch experiments with 1L volume conducted and with variable of percent volume of wastewater added in order to observe the growth of microlagae. The response of the microalgae growth obtained by increasing the optical density of the microalgae solution and continued by calculation for the growth rate of microalgae. The result of the experiments indicated that for the aqueous concentration (1 sachet/L or COD of 2080mg/L) the optimum added of wastewater is 40 % with growrate of 0.55/day while for the concentrated wastewater (6 sachet/L or COD of 12.480mg/L), the optimum condition is 25 % wastewater added with growth rate of 0.43/day.

  11. Recovery of astaxanthin from seafood wastewater utilizing fish scales waste.

    Science.gov (United States)

    Stepnowski, P; Olafsson, G; Helgason, H; Jastorff, B

    2004-01-01

    The paper presents basic data on astaxanthin adsorption from fisheries wastewater to fish scales. This process has been proposed to be applicable in fisheries and shrimp waste management [Helgason, Recovery of compounds using a natural adsorbent, Patent WO 01/77230, 2001]. The innovative feature of the method is the application of a solid waste (fish scales) as a natural adsorbent for a carotenoid pigment (astaxanthin) from the seafood industry wastewater. The model investigations were performed with pure synthetic carotenoids to exclude the role of matrix in which astaxanthin is present in the wastewater. Under the experimental conditions used, the maximum loading capacity of astaxanthin onto the scales is 360 mg kg(-1) dry wt. Studies of the thus formed value added product indicated that drying causes significant loss of astaxanthin activity. Due to the effective filtration characteristics of the studied sorption material, we suggest the scale/astaxanthin sorption process to be suitable for treatment of wastewater from different industries. PMID:14575754

  12. Utilization of municipal wastewater for cooling in thermoelectric power plants

    Energy Technology Data Exchange (ETDEWEB)

    Safari, Iman [Illinois Inst. of Technology, Chicago, IL (United States); Walker, Michael E. [Illinois Inst. of Technology, Chicago, IL (United States); Hsieh, Ming-Kai [Carnegie Mellon Univ., Pittsburgh, PA (United States); Dzombak, David A. [Carnegie Mellon Univ., Pittsburgh, PA (United States); Liu, Wenshi [Univ. of Pittsburgh, PA (United States); Vidic, Radisav D. [Univ. of Pittsburgh, PA (United States); Miller, David C. [National Energy Technology Lab. (NETL), Morgantown, WV (United States); Abbasian, Javad [Illinois Inst. of Technology, Chicago, IL (United States)

    2013-09-01

    A process simulation model has been developed using Aspen Plus® with the OLI (OLI System, Inc.) water chemistry model to predict water quality in the recirculating cooling loop utilizing secondary- and tertiary-treated municipal wastewater as the source of makeup water. Simulation results were compared with pilot-scale experimental data on makeup water alkalinity, loop pH, and ammonia evaporation. The effects of various parameters including makeup water quality, salt formation, NH3 and CO2 evaporation mass transfer coefficients, heat load, and operating temperatures were investigated. The results indicate that, although the simulation model can capture the general trends in the loop pH, experimental data on the rates of salt precipitation in the system are needed for more accurate prediction of the loop pH. It was also found that stripping of ammonia and carbon dioxide in the cooling tower can influence the cooling loop pH significantly. The effects of the NH3 mass transfer coefficient on cooling loop pH appear to be more significant at lower values (e.g., kNH3 < 4×10-3 m/s) when the makeup water alkalinity is low (e.g., <90 mg/L as CaCO3). The effect of the CO2 mass transfer coefficient was found to be significant only at lower alkalinity values (e.g., kCO2<4×10-6 m/s).

  13. Purification and utilization of garlic processing wastewater in lotus pond wetlands

    Institute of Scientific and Technical Information of China (English)

    Jun PANG; Xue-ling FENG; Xiu-feng WANG

    2014-01-01

    Based on the experiments of utilization of garlic processing wastewater in a lotus pond, this study demonstrates that lotus pond wetlands have a remarkable ability to remove organic pollutants and decrease chemical oxygen demand (CODCr), biochemical oxygen demand (BOD5), and suspended substances (SS) in garlic processing wastewater. Results also show evident effects of lotus roots on absorption of NH3-N. The pH value in a lotus pond with wastewater discharged was relatively stable. The water quality in the lotus pond reached the classⅡ emission standard, according to the Integrated Wastewater Discharge Standard (GB8978-1996), seven days after pretreated garlic processing wastewater had been discharged into the lotus pond. Garlic processing wastewater irrigation does not produce pollution in the pond sediment and has no negative effect on the growth of lotus roots. Due to utilization of garlic processing wastewater, the output of lotus roots increased by 3.0% to 8.3%, and the quality of lotus roots was improved. Therefore, better purification and utilization results can be achieved.

  14. Purification and utilization of garlic processing wastewater in lotus pond wetlands

    Directory of Open Access Journals (Sweden)

    Jun PANG

    2015-10-01

    Full Text Available Based on the experiments of utilization of garlic processing wastewater in a lotus pond, this study demonstrates that lotus pond wetlands have a remarkable ability to remove organic pollutants and decrease chemical oxygen demand (CODCr, biochemical oxygen demand (BOD5, and suspended substances (SS in garlic processing wastewater. Results also show evident effects of lotus roots on absorption of NH3-N. The pH value in a lotus pond with wastewater discharged was relatively stable. The water quality in the lotus pond reached the class Ⅱ emission standard, according to the Integrated Wastewater Discharge Standard (GB8978-1996, seven days after pretreated garlic processing wastewater had been discharged into the lotus pond. Garlic processing wastewater irrigation does not produce pollution in the pond sediment and has no negative effect on the growth of lotus roots. Due to utilization of garlic processing wastewater, the output of lotus roots increased by 3.0% to 8.3%, and the quality of lotus roots was improved. Therefore, better purification and utilization results can be achieved.

  15. Explaining health care utilization for panic attacks using cusp catastrophe modeling.

    Science.gov (United States)

    Katerndahl, David

    2008-10-01

    Despite increased health care utilization, patients with panic disorder continue to report unmet needs. The objective was to compare the fit of linear and Cusp Catastrophe Modeling in explaining changes in utilization of emergency, general and mental health settings, and self-treatments for panic symptoms. This community-based study surveyed 97 subjects with panic attacks drawn from a sample of randomly-selected adults from randomly-selected households. The stressor (splitting) variable used was Phobic Anxiety while predisposing variables included Family Health Care Utilization, Perceived Life Threat and Need For Treatment, and Treatment Experience. Outcomes consisted of the number of sites and self-treatments used for panic symptoms when first seeking care and during the 2 months prior to survey. Use of mental health sites and self-treatments demonstrated superior modeling with cusp catastrophe approaches using treatment experience as the predisposing variable, accounting for 47% and 38% of variances respectively, improving the fit by over 20% compared to the best linear models in both cases. Cusp catastrophe modeling accounted for more variance than all linear models when describing use of mental health settings and self-treatments. Cusp catastrophe may explain bimodal distributions in behavior, delays in behavior change, and sudden shifts in behavior in stressful situations. PMID:18765074

  16. Utilization of Waste Materials for Microbial Carrier in Wastewater Treatment

    Directory of Open Access Journals (Sweden)

    H. T. Le

    2016-01-01

    Full Text Available This research focused on the ammonium-nitrogen (NH4-N removal from the domestic wastewater using the attached growth reactors. Two types of waste material of corncob (biodegradable material and concrete (nonbiodegradable material were used as the carrier for microorganisms’ attachment. During operation, both reactors achieved absolutely high performance of ammonium removal (up to 99% and total nitrogen removal (up to 95%. The significant advantage of corncob carrier was that the corncob was able to be a source of carbon for biological denitrification, leading to no external carbon requirement for operating the system. However, the corncob caused an increasing turbidity of the effluent. On the other hand, the concrete carrier required the minimal external carbon of 3.5 C/N ratio to reach the good performance. Moreover, a longer period for microorganisms’ adaptation was found in the concrete carrier rather than the corncob carrier. Further, the same physiological and biochemical characteristics of active bacteria were found at the two carriers, which were negative gram, cocci shape, and smooth and white-turbid colony. Due to the effluent quality, the concrete was more appropriate carrier than the corncob for wastewater treatment.

  17. Utilization of Gamma Radiation for Disinfecting Domestic Wastewater

    International Nuclear Information System (INIS)

    Wastewater treatment by Gamma radiation is an effective, economic and environmentally friendly as the water produced has the specification to be reused for watering trees, gardens, football fields and golf courses instead of using fresh water that can be saved for drinking purposes as we suffer a severe shortage of fresh water. Sewage water samples were brought from Elhadba Elkhadra wastewater treatment plant which is located in the City of Tripoli. Samples were taken from two places: the inlet of the plant and from the stream coming out from the biological treatment, they are taken in sterile plastic bottles to ensure that cross contamination does not take place. Samples were irradiated at Tajura Research Centre with different doses ranged between 0.5 and 2 kGy with a dose rate of 10 Gy/min. These samples were investigated chemically and microbiologically. A study was carried out on the effect of gamma radiation on pathogenic organisms, and the total suspended solids in the raw and treated samples. Results showed that the doses 2.0 kGy and 1.5 kGy were enough to terminate the total microbial count and Enterobacter ease respectively but only a dose of 1.0 kGy was needed to eliminate total coliform, fecal coliform and spore forming bacteria. There were also higher BOD, pH and E.C. values in raw sewage than the sewage that was subjected to biological treatment which gave a good indication for the efficiency of the biological treatment. (authors)

  18. NEUTRALIZING WASTEWATER FROM PUBLIC UTILITIES ON RURAL AREAS

    Directory of Open Access Journals (Sweden)

    Piotr Bugajski

    2015-10-01

    Full Text Available The research aimed at determining a potential use of domestic sewage treatment plants based on activated sludge for the disposal of wastes drained from schools in rural areas. Selected pollutant indicators, such as: BOD5, COD, total suspended solids, total nitrogen and phosphates were the basis for determining the composition of raw sewage discharged by public utility objects and the quality of treated sewage considering the days when lessons were taking place at school and days free from classes. The analysis of the results revealed that household sewage treatment plants based on activated sludge may be used for waste disposal from public facilities, such as schools.

  19. An innovative integrated system utilizing solar energy as power for the treatment of decentralized wastewater

    Institute of Scientific and Technical Information of China (English)

    Changfu Han; Junxin Liu; Hanwen Liang; Xuesong Guo; Lin Li

    2013-01-01

    This article reports an innovative integrated system utilizing solar energy as power for decentralized wastewater treatment,which consists of an oxidation ditch with double channels and a photovoltaic (PV) system without a storage battery.Because the system operates without a storage battery,which can reduce the cost of the PV system,the solar radiation intensity affects the amount of power output from the PV system.To ensure that the power output is sufficient in all different weather conditions,the solar radiation intensity of 78 W/m2 with 95% confidence interval was defined as a threshold of power output for the PV system according to the monitoring results in this study,and a step power output mode was used to utilize the solar energy as well as possible.The oxidation ditch driven by the PV system without storage battery ran during the day and stopped at night.Therefore,anaerobic,anoxic and aerobic conditions could periodically appear in the oxidation ditch,which was favorable to nitrogen and phosphate removal from the wastewater.The experimental results showed that the system was efficient,achieving average removal efficiencies of 88% COD,98% NH4+-N,70% TN and 83% TP,under the loading rates of 140 mg COD/(g MLSS·day),32 mg NH4+-N/(g MLSS·day),44 mg TN/(g MLSS·day) and 5mg TP/(g MLSS·day).

  20. An innovative integrated system utilizing solar energy as power for the treatment of decentralized wastewater.

    Science.gov (United States)

    Han, Changfu; Liu, Junxin; Liang, Hanwen; Guo, Xuesong; Li, Lin

    2013-02-01

    This article reports an innovative integrated system utilizing solar energy as power for decentralized wastewater treatment, which consists of an oxidation ditch with double channels and a photovoltaic (PV) system without a storage battery. Because the system operates without a storage battery, which can reduce the cost of the PV system, the solar radiation intensity affects the amount of power output from the PV system. To ensure that the power output is sufficient in all different weather conditions, the solar radiation intensity of 78 W/m2 with 95% confidence interval was defined as a threshold of power output for the PV system according to the monitoring results in this study, and a step power output mode was used to utilize the solar energy as well as possible. The oxidation ditch driven by the PV system without storage battery ran during the day and stopped at night. Therefore, anaerobic, anoxic and aerobic conditions could periodically appear in the oxidation ditch, which was favorable to nitrogen and phosphate removal from the wastewater. The experimental results showed that the system was efficient, achieving average removal efficiencies of 88% COD, 98% NH4+-N, 70% TN and 83% TP, under the loading rates of 140 mg COD/(g MLSS x day), 32 mg NH4+-N/(g MLSS x day), 44 mg TN/(g MLSS x day) and 5 mg TP/(g MLSS x day). PMID:23596946

  1. Estimation of Viable Biomass In Wastewater And Activated Sludge By Determination of ATP, Oxygen Utilization Rate And FDA Hydrolysis

    DEFF Research Database (Denmark)

    Jørgensen, Poul-Erik; Eriksen, T.; Jensen, B.K.

    1992-01-01

    wastewater plants, it was found that ATP content and respiration rate estimated viable biomass to range from 81 to 293 mg dw/g SS for raw wastewater and from 67 to 187 mg dw/g SS for activated sludge with a rather weak correlation between ATP and respiration measurements. The FDA hydrolysis estimated viable......ATP content, oxygen utilization rate (OUR) and fluorescein diacetate (FDA) hydrolysis were tested for the ability to express the amount of viable biomass in wastewater and activated sludge. The relationship between biomass and these activity parameters was established in growth cultures made by...... inoculating a nutrient medium with either wastewater or activated sludge. Biomass was then determined directly by measurement of dry weight of growth culture (dw), and compared to data obtained by using the previously mentioned methods. In the exponential growth phase, ATP content showed the best correlation...

  2. The Effects of Operational and Environmental Variables on Efficiency of Danish Water and Wastewater Utilities

    Directory of Open Access Journals (Sweden)

    Andrea Guerrini

    2015-06-01

    Full Text Available Efficiency improvement is one of three patterns a public utility should follow in order to get funds for investments realization. The other two are recourse to bank loans or to private equity and tariff increase. Efficiency can be improved, for example, by growth and vertical integration and may be conditioned by environmental variables, such as customer and output density. Prior studies into the effects of these variables on the efficiency of water utilities do not agree on certain points (e.g., scale and economies of scope and rarely consider others (e.g., density economies. This article aims to contribute to the literature by analysing the efficiency of water utilities in Denmark, observing the effects of operational and environmental variables. The method is based on two-stage Data Envelopment Analysis (DEA applied to 101 water utilities. We found that the efficiency of the water sector was not affected by the observed variables, whereas that of wastewater was improved by smaller firm size, vertical integration strategy, and higher population density.

  3. Removal of basic dye (methylene blue) from wastewaters utilizing beer brewery waste

    International Nuclear Information System (INIS)

    In the work, the beer brewery waste has been shown to be a low-cost adsorbent for the removal of basic dye from the aqueous solution as compared to its precursor (i.e., diatomite) based on its physical and chemical characterizations including surface area, pore volume, scanning electron microscopy (SEM), and non-mineral elemental analyses. The pore properties of this waste were significantly larger than those of its raw material, reflecting that the trapped organic matrices contained in the waste probably provided additional adsorption sites and/or adsorption area. The results of preliminary adsorption kinetics showed that the diatomite waste could be directly used as a potential adsorbent for removal of methylene blue on the basis of its adsorption-biosorption mechanisms. The adsorption parameters thus obtained from the pseudo-second-order model were in accordance with their pore properties. From the results of adsorption isotherm at 298 K and the applicability examinations in treating industrial wastewater containing basic dye, it was further found that the adsorption capacities of diatomite waste were superior to those of diatomite, which were also in good agreement with their corresponding physical properties. From the results mentioned above, it is feasible to utilize the food-processing waste for removing dye from the industrial dying wastewater

  4. Barriers to Innovation in Urban Wastewater Utilities: Attitudes of Managers in California

    Science.gov (United States)

    Kiparsky, Michael; Thompson, Barton H.; Binz, Christian; Sedlak, David L.; Tummers, Lars; Truffer, Bernhard

    2016-06-01

    In many regions of the world, urban water systems will need to transition into fundamentally different forms to address current stressors and meet impending challenges—faster innovation will need to be part of these transitions. To assess the innovation deficit in urban water organizations and to identify means for supporting innovation, we surveyed wastewater utility managers in California. Our results reveal insights about the attitudes towards innovation among decision makers, and how perceptions at the level of individual managers might create disincentives for experimentation. Although managers reported feeling relatively unhindered organizationally, they also spend less time on innovation than they feel they should. The most frequently reported barriers to innovation included cost and financing; risk and risk aversion; and regulatory compliance. Considering these results in the context of prior research on innovation systems, we conclude that collective action may be required to address underinvestment in innovation.

  5. Optimal number of energy generators for biogas utilization in wastewater treatment facility

    International Nuclear Information System (INIS)

    A technoeconomic analysis has been undertaken considering the optimum number of energy producing generators using biogas coming from anaerobic digestion. Inputs for this analysis originate from available data on the first generator for energy production from biogas, installed in Greece at the wastewater treatment facility of Iraklio city. The data spans a period of 5.5 years of operation. It is concluded that the cost per kWh produced is 0.0876 Euro /kWh if one generator is used covering 15.9% of the facility's needs. If two generators are used, more biogas is utilized contributing 32.6% of the facility's needs at a marginal production cost of 0.0886 Euro /kWh. Similar estimations have been made for scenarios involving up to six generators. In contrast, the marginal cost of conventionally produced energy is 0.1383-0.2483 Euro /kWh

  6. Biodiversity and secretion of enzymes with potential utility in wastewater treatment

    OpenAIRE

    Evanguedes Kalapothakis; Júnia Maria Netto Victória; Tatiana Moura Barroca; Susanne Facchin; Priscila Divina Diniz Alves; Flávia de Faria Siqueira

    2013-01-01

    The main organic contaminants in municipal wastewater are proteins, polysaccharides, and lipids, which must be hydrolyzed to smaller units. A high concentration of oil and grease in wastewater affects biological wastewater treatment processes by forming a layer on the water surface, which decreased the oxygen transfer rate into the aerobic process. Microbial proteases, lipases, amylases, and celullases should play essential roles in the biological wastewater treatment process. The present st...

  7. Caffeine in Boston Harbor past and present, assessing its utility as a tracer of wastewater contamination in an urban estuary

    Science.gov (United States)

    Sites throughout Boston Harbor were analyzed for caffeine to assess its utility as a tracer in identifying sources of sanitary wastewater. Caffeine ranged from 15 ng/L in the outer harbor to a high of 185 ng/L in the inner harbor. Inner harbor concentrations were a result of comb...

  8. Utilization of Paper Sludge Wastes for Treatment of Wastewater from Food Processing Industries

    OpenAIRE

    Tohru Suzuki; Hideyuki Katsumata; Daizo Imai; Kiyoyuki Egusa; Ahmed H.A. Dabwan; Satoshi Kaneco

    2012-01-01

    The food processing industries usually produced large amount of wastewater containing fine and small particles. It takes long time for complete settlement of the fine and small particles in the wastewater. The coagulation method appears to become one of the useful treatments. New inorganic coagulant named “Agoclean‒P” has been developed from paper sludge ash. The treatment by coagulation and flocculation were carried out for the wastewater from three different food processing industries namel...

  9. The Nutritive Value of Wastewater Grown Barley and its Utilization in Fish Feed

    OpenAIRE

    A. M. Snow; Abdel E. Ghaly

    2007-01-01

    The feasibility of using wastewater grown barley plants as a component of fish feed was evaluated. The barley plants were grown in a hydroponics system on wastewater from a recirculating aquaculture facility. The effects of wastewater application rate on plant growth and pollution potential reduction were investigated. At the end of the experiment, the average crop heights and yields were 31.0 and 36.0 cm and 59 and 83 t ha -1 at wastewater application rates of 690 and 1380 mL compartment -1 ...

  10. A GIS based national assessment of algal bio-oil production potential through flue gas and wastewater co-utilization

    International Nuclear Information System (INIS)

    The high theoretical productivity of microalgae makes it a promising energy crop, but economically viable large-scale production facilities have yet to emerge. Coupling algae cultivation ponds with flue gas emissions from power utilities to provide carbon dioxide and municipal wastewater to provide nutrients has been recommended as a solution. This flue gas and wastewater co-utilization (FWC) strategy not only reduces the upstream impacts and costs associated with providing inputs, but also provides a credit for wastewater treatment, a service currently required to reduce production costs to a viable level. This study provides the first national assessment of the potential for producing algal bio-oil in the United States using FWC. Spatial-temporal algae growth was simulated using solar radiation and temperature data to calculate the average annual algae yield for any location, which significantly impacts feasibility. The results of this model were integrated into a geospatial analysis which establishes the economically viable bio-oil production potential of FWC by accounting for the relative abundance of the input resources and their proximity. At most, 1.7 billion liters of bio-oil could be produced annually in a manner economically competitive with crude oil prices of $80 per barrel. The amount of nutrients in wastewater limits yields to 20.5 L of bio-oil per capita annually, and climatic constraints further reduce this potential by nearly 60%. Carbon dioxide constraints play a negligible role. Although the bio-oil production potential of FWC is relatively small, it does provide an opportunity to increase national biofuel output while providing a needed service. - Highlights: • Spatial-temporal algae growth was simulated using historical climate data. • A geospatial overlay analysis was used to assess national production potential. • Nutrient availability in wastewater is most limiting. • At most, 1.7 billion liters of algal biofuel per year could be

  11. The Nutritive Value of Wastewater Grown Barley and its Utilization in Fish Feed

    Directory of Open Access Journals (Sweden)

    A. M. Snow

    2007-01-01

    Full Text Available The feasibility of using wastewater grown barley plants as a component of fish feed was evaluated. The barley plants were grown in a hydroponics system on wastewater from a recirculating aquaculture facility. The effects of wastewater application rate on plant growth and pollution potential reduction were investigated. At the end of the experiment, the average crop heights and yields were 31.0 and 36.0 cm and 59 and 83 t ha -1 at wastewater application rates of 690 and 1380 mL compartment -1 day -1, respectively. The hydroponics system reduced the TS, COD, NH4+-N, NO2--N, NO3--N and PO4 -3-P of the aquaculture wastewater by 51.5-52.9, 72.3-72.3, 81.8-82.3, 97.9-98.2, 78.9-79.7 and 84.7-86.3%, respectively. The aquaculture wastewater grown barley met the energy, fat, Ca, Mg, P, Na, S and Mn dietary requirements of aquatic animals. It exceeded the carbohydrate, crude fiber, Cl, K, Cu, Fe, Se and Zn dietary requirements of fish and shellfish. It did not contain sufficient amounts of protein. The aquaculture wastewater grown barley could potential be used as a component in fish feed, but will require supplementation with a high protein source that contains low concentrations of carbohydrate, crude fiber, Cl, K, Cu, Fe, Se and Zn. Common protein sources that could be used for supplementation included fishmeal, bone meal and blood meal.

  12. Utilization of Spirulina platensis for wastewater treatment in fermented rice noodle factory

    Directory of Open Access Journals (Sweden)

    Sumontip Bunnag

    2010-12-01

    Full Text Available Spirulina platensis is a single-cell blue-green alga which belongs to the family Oscillatoriaceae.S. platensis can grow in polluted water and it has been widely used to remove excess nitrate-nitrogenand total phosphorus content in wastewater from noodle factories. This study was aimed to investigatethe effect of wastewater on growth of S. platensis and to examine its potential to reduce nitrate-nitrogenand total phosphorus contents in wastewater from fermented rice noodle factory. Twenty five percentwastewatermixed Zarrouk’s medium gave rise to the highest growth rate of S. platensis. Optical density(OD of S. platensis culture increased from 0.07±0.04 to 0.24±0.12. Also, the results exhibited the leastvalue of nitrate-nitrogen and total phosphorus contents when performed in 25 % and 100 %wastewater-mixed Zarrouk’s media, respectively.

  13. Assessment of wastewater treatment plant effluent on fish reproduction utilizing the adverse outcome pathway conceptual framework

    Science.gov (United States)

    Wastewater treatment plant (WWTP) effluents are a known contributor of chemical mixture inputs into the environment. Whole effluent testing guidelines were developed to screen these complex mixtures for acute toxicity. However, efficient and cost-effective approaches for screenin...

  14. Utilization of Paper Sludge Wastes for Treatment of Wastewater from Food Processing Industries

    Directory of Open Access Journals (Sweden)

    Tohru Suzuki

    2012-12-01

    Full Text Available The food processing industries usually produced large amount of wastewater containing fine and small particles. It takes long time for complete settlement of the fine and small particles in the wastewater. The coagulation method appears to become one of the useful treatments. New inorganic coagulant named “Agoclean‒P” has been developed from paper sludge ash. The treatment by coagulation and flocculation were carried out for the wastewater from three different food processing industries namely soup, tofu, and natto. “Hi‒Biah‒System”, which is an in‒situ solidification system, was used for the continuous treatment of wastewater. The parameters for the water quality were pH, five‒day biochemical oxygen demand (BOD5, chemical oxygen demand (COD, total suspended solids (TSS, total nitrogen (TN and total phosphorus (TP. These parameters after the treatment became much lower values relative to those obtained before the treatment.

  15. Oil and Grease Removal from Industrial Wastewater Using New Utility Approach

    OpenAIRE

    H. S. Abd El-Gawad

    2014-01-01

    The present study is an attempt to investigate oil and grease pollution that may pollute fresh water and influence aquatic environment. Then removal of oil and grease from manufacturing wastewater befall essential but common techniques not enough. Enzyme and adsorption units representing major developed new laboratory were selected to assess the water quality and humiliation prospective of oil and grease from wastewater. Several components and environmental variables that were dissolved oxyge...

  16. Benchmarking the scientific output of industrial wastewater research in Arab world by utilizing bibliometric techniques

    OpenAIRE

    Zyoud, Shaher H.; Al-Rawajfeh, Aiman E.; Shaheen, Hafez Q.; Fuchs-Hanusch, Daniela

    2016-01-01

    Rapid population growth, worsening of the climate, and severity of freshwater scarcity are global challenges. In Arab world countries, where water resources are becoming increasingly scarce, the recycling of industrial wastewater could improve the efficiency of freshwater use. The benchmarking of scientific output of industrial wastewater research in the Arab world is an initiative that could support in shaping up and improving future research activities. This study assesses the scientific ou...

  17. The total coking plant wastewater, the problem of its treatment and utilization

    Energy Technology Data Exchange (ETDEWEB)

    Vyskrebets, A.M.; Kozenko, L.I.; Nikolaeva, N.A.; Ludyanskii, M.L.

    1982-01-01

    An investigation was made into the characteristics, treatment, and possible uses of the coking plant wastewater. Included were data on the volumes of wastewater from various processes in the coking plants. Also included were data on the contaminants of the various components and the total wastewater. Among other suggestions, it was recommended that all contaminated waters be kept from the storm sewer system. It was concluded that an increase in the coefficients of evaporation and treatment of the water with copper tetraamine sulfate would permit a decrease in the demand for fresh water and a decrease in the discharge from the plant. Also, it was concluded that a major obstacle in the use of the total effluent was mineralization. Seven tables of data were included in the work.

  18. Cultivation of Nannochloropsis oceanica biomass rich in eicosapentaenoic acid utilizing wastewater as nutrient resource.

    Science.gov (United States)

    Mitra, Madhusree; Shah, Freny; Bharadwaj, S V Vamsi; Patidar, Shailesh Kumar; Mishra, Sandhya

    2016-10-01

    The eicosapentaenoic acid rich marine eustigmatophyte Nannochloropsis oceanica was grown in wastewaters sampled from four different industries (i.e. pesticides industry, pharmaceutical industry, activated sludge treatment plant of municipality sewage and petroleum (oil) industry). Under the wastewater based growth conditions used in this study, the biomass productivity ranged from 21.78±0.87 to 27.78±0.22mgL(-1)d(-1) in relation to freeze dried biomass, while the lipid productivity varied between 5.59±0.02 and 6.81±0.04mgL(-1)d(-1). Although comparatively higher biomass, lipid and EPA productivity was observed in Conway medium, the %EPA content was similarly observed in pesticides industry and municipal effluents. The results highlight the possibility of selectively using wastewater as a growth medium, demonstrating the elevated eicosapentaenoic acid content and biodiesel properties, that complies with the European standards for biodiesel. PMID:27472494

  19. Panic Attack or Heart Attack?

    Science.gov (United States)

    Panic Attack or Heart Attack? Diagnosing heart disease in women A Healthy Hearts Guide ® Heart disease in women is often mistaken for panic attack with shortness of breath, anxiety, palpitations and indigestion. ...

  20. Oil and Grease Removal from Industrial Wastewater Using New Utility Approach

    Directory of Open Access Journals (Sweden)

    H. S. Abd El-Gawad

    2014-01-01

    Full Text Available The present study is an attempt to investigate oil and grease pollution that may pollute fresh water and influence aquatic environment. Then removal of oil and grease from manufacturing wastewater befall essential but common techniques not enough. Enzyme and adsorption units representing major developed new laboratory were selected to assess the water quality and humiliation prospective of oil and grease from wastewater. Several components and environmental variables that were dissolved oxygen, bacteriology measure, flow rate and adsorption material amount studied to assess the removal performance of oil and grease. The results elucidated significant variations among different tests which influenced microbial necessary role of oxidation declining develop biological treatment process reached to 72%. The study stressed out natural material (zeolite that enhanced organic reduction under optimal conditions. These conditions were closer spacing and high length of adsorbing unit that led to increase oil and grease contact period with adsorbent and added to increase performance removal reached to 99%.

  1. Removal and Utilization of Wastewater Nutrients for Algae Biomass and Biofuels

    OpenAIRE

    Griffiths, Erick W.

    2009-01-01

    The Logan City Environmental Department operates a facility that consists of 460 acres of fairly shallow lagoons (~ 5'deep) for biological wastewater treatment that meets targets for primary and secondary treatments (solids, biological oxygen demand (BOD), and pathogen removal). Significant natural algal growth occurs in these lagoons, which improves BOD removal through oxygenation and also facilitates N removal through volatilization as ammonia under high pH conditions created by algal grow...

  2. Utilization of water hyacinths to upgrade heavily loaded wastewater treatment plant effluents

    Science.gov (United States)

    McAnally, Anthony Stephen

    1989-03-01

    Many municipal wastewater treatment plants are presently failing to meet their discharge permit requirements. Recently, considerable attention has been focused on the use of aquatic plants of various types to treat municipal wastewaters. While several species of plants have been found to be useful in this regard, water hyacinths appear to offer the most promise in areas where the climate is mild enough for them to flourish during most of the year. Accordingly, the primary purpose was to test the acceptability of such systems for use in southern states such as Alabama. A wastewater treatment plant located at Union Springs, Alabama was selected as the study site. The experimental water hyacinth system was configured as a set of two treatment trains with two growth channels in series for each train. One train was harvested and the other was not. Each growth channel was constructed of 3/4-inch marine plywood and was 8 feet wide, 2 feet deep and 32 feet long. Observations indicate that a water hyacinth treatment system can be a reliable method for upgrading secondary effluents to advanced secondary levels in central Alabama. The reliable treatment period will extend from about May through December with no plant protection (possibly longer in Southern Alabama).

  3. Utilization of Water Hyacinth (Eichhorniacrassipes for Phytoremediation of Hexavalent Chromium in Simulated Wastewater

    Directory of Open Access Journals (Sweden)

    Rhonalyn V. Maulion

    2015-11-01

    Full Text Available One of the most common sources of contamination in surface water is the discharge of waste water containing heavy metals from different industrial applications.Methods in the removal of contaminants like hexavalent chromium, Cr+6 ,that are available nowadays are too costly and difficult to operate efficiently. A new approach to solve such problem is Phytoremediation or the use of green plants in the removal of contaminants from wastewater that contains heavy metals.In this study, the effectiveness of water hyacinth (Eichhorniacrassipes was evaluated for its capability in removing hexavalent chromium from simulated wastewater.The effect of a co-ion, specifically Cu2+ ions, on the percentage removal of Cr6+ was also studied. Diphenyl carbazide colorimetric method was used to quantify the amount of Cr6+ left after treatment with water hyacinth.The percentage removal of Cr6+ was determined under varying conditions. The parameters varied were concentration of Cr6+ (3, 6, & 9 mg/L, contact time (4, 8, and 12 days and concentration of Cu2+ (0, 4, and 8 mg/L. Results showed that the percentage removal of Cr6+ is directly proportional to the initial concentration of Cr6+ and contact time but inversely proportional to the concentration of co-ions which is Cu2+ ions. Results and statistical data showed that the optimum condition for phytoremediation of Cr6+ using water hyacinth is 12 days of contact time, and initial concentrations of 9 mg/L and 4 mg/L of Cr6+ and Cu2+ respectively.Overall results indicated that Eichhorniacrassipes can be used for phytoremediation of Cr+6contaminated wastewater.

  4. Utilizing acid mine drainage sludge and coal fly ash for phosphate removal from dairy wastewater.

    Science.gov (United States)

    Wang, Y R; Tsang, Daniel C W; Olds, William E; Weber, Paul A

    2013-01-01

    This study aims to investigate a new and sustainable approach for the reuse of industrial by-products from wastewater treatment. The dairy industry produces huge volumes of wastewater, characterized by high levels of phosphate that can result in eutrophication and degradation of aquatic ecosystems. This study evaluated the application of acid mine drainage (AMD) sludge, coal fly ash, and lignite as low-cost adsorbents for the removal of phosphate from dairy wastewater. Material characterization using X-ray fluorescence, X-ray diffraction, and Brunauer-Emmett-Teller surface area analysis revealed significant amounts of crystalline/amorphous Fe/Al/Si/Ca-based minerals and large surface areas of AMD sludge and fly ash. Batch adsorption isotherms were best described using the Freundlich model. The Freundlich distribution coefficients were 13.7 mg(0.577) L(0.423) g(-1) and 16.9 mg(0.478) L(0.522) g(-1) for AMD sludge and fly ash, respectively, and the nonlinearity constants suggested favourable adsorption for column applications. The breakthrough curves of fixed-bed columns, containing greater than 10 wt% of the waste materials (individual or composite blends) mixed with sand, indicated that phosphate breakthrough did not occur within 100 pore volumes while the cumulative removal was 522 and 490 mg kg(-1) at 10 wt% AMD sludge and 10 wt% fly ash, respectively. By contrast, lignite exhibited negligible phosphate adsorption, possibly due to small amounts of inorganic minerals suitable for phosphate complexation and limited surface area. The results suggest that both AMD sludge and fly ash were potentially effective adsorbents if employed individually at a ratio of 10 wt% or above for column application. PMID:24617077

  5. Benchmarking the scientific output of industrial wastewater research in Arab world by utilizing bibliometric techniques.

    Science.gov (United States)

    Zyoud, Shaher H; Al-Rawajfeh, Aiman E; Shaheen, Hafez Q; Fuchs-Hanusch, Daniela

    2016-05-01

    Rapid population growth, worsening of the climate, and severity of freshwater scarcity are global challenges. In Arab world countries, where water resources are becoming increasingly scarce, the recycling of industrial wastewater could improve the efficiency of freshwater use. The benchmarking of scientific output of industrial wastewater research in the Arab world is an initiative that could support in shaping up and improving future research activities. This study assesses the scientific output of industrial wastewater research in the Arab world. A total of 2032 documents related to industrial wastewater were retrieved from 152 journals indexed in the Scopus databases; this represents 3.6 % of the global research output. The h-index of the retrieved documents was 70. The total number of citations, at the time of data analysis, was 34,296 with an average citation of 16.88 per document. Egypt, with a total publications of 655 (32.2 %), was ranked the first among the Arab countries followed by Saudi Arabia 300 (14.7 %) and Tunisia 297 (14.6 %). Egypt also had the highest h-index, assumed with Saudi Arabia, the first place in collaboration with other countries. Seven hundred fifteen (35.2 %) documents with 66 countries in Arab/non-Arab country collaborations were identified. Arab researchers collaborated mostly with researchers from France 239 (11.7 %), followed by the USA 127 (6.2 %). The top active journal was Desalination 126 (6.2 %), and the most productive institution was the National Research Center, Egypt 169 (8.3 %), followed by the King Abdul-Aziz University, Saudi Arabia 75 (3.7 %). Environmental Science was the most prevalent field of interest 930 (45.8 %). Despite the promising indicators, there is a need to close the gap in research between the Arab world and the other nations. Optimizing the investments and developing regional experiences are key factors to promote the scientific research. PMID:26996912

  6. Utilization of AMD sludges from the anthracite region of Pennsylvania for removal of phosphorus from wastewater

    Science.gov (United States)

    Sibrell, P.L.; Cravotta, C.A., III; Lehman, W.G.; Reichert, W.

    2010-01-01

    Excess phosphorus (P) inputs from human sewage, animal feeding operations, and nonpoint source discharges to the environment have resulted in the eutrophication of sensitive receiving bodies of water such as the Great Lakes and Chesapeake Bay. Phosphorus loads in wastewater discharged from such sources can be decreased by conventional treatment with iron and aluminum salts but these chemical reagents are expensive or impractical for many applications. Acid mine drainage (AMD) sludges are an inexpensive source of iron and aluminum hydrous oxides that could offer an attractive alternative to chemical reagent dosing for the removal of P from local wastewater. Previous investigations have focused on AMD sludges generated in the bituminous coal region of western Pennsylvania, and confirmed that some of those sludges are good sorbents for P over a wide range of operating conditions. In this study, we sampled sludges produced by AMD treatment at six different sites in the anthracite region of Pennsylvania for potential use as P sequestration sorbents. Sludge samples were dried, characterized, and then tested for P removal from water. In addition, the concentrations of acid-extractable metals and other impurities were investigated. Test results revealed that sludges from four of the sites showed good P sorption and were unlikely to add contaminants to treated water. These results indicate that AMD sludges could be beneficially used to sequester P from the environment, while at the same time decreasing the expense of sludge disposal.

  7. The Effects of Operational and Environmental Variables on Efficiency of Danish Water and Wastewater Utilities

    OpenAIRE

    Andrea Guerrini; Giulia Romano; Chiara Leardini; Martina Martini

    2015-01-01

    Efficiency improvement is one of three patterns a public utility should follow in order to get funds for investments realization. The other two are recourse to bank loans or to private equity and tariff increase. Efficiency can be improved, for example, by growth and vertical integration and may be conditioned by environmental variables, such as customer and output density. Prior studies into the effects of these variables on the efficiency of water utilities do not agree on certain points (e...

  8. Using EPA Tools and Data Services to Inform Changes to Design Storm Definitions for Wastewater Utilities based on Climate Model Projections

    Science.gov (United States)

    Tryby, M.; Fries, J. S.; Baranowski, C.

    2014-12-01

    Extreme precipitation events can cause significant impacts to drinking water and wastewater utilities, including facility damage, water quality impacts, service interruptions and potential risks to human health and the environment due to localized flooding and combined sewer overflows (CSOs). These impacts will become more pronounced with the projected increases in frequency and intensity of extreme precipitation events due to climate change. To model the impacts of extreme precipitation events, wastewater utilities often develop Intensity, Duration, and Frequency (IDF) rainfall curves and "design storms" for use in the U.S. Environmental Protection Agency's (EPA) Storm Water Management Model (SWMM). Wastewater utilities use SWMM for planning, analysis, and facility design related to stormwater runoff, combined and sanitary sewers, and other drainage systems in urban and non-urban areas. SWMM tracks (1) the quantity and quality of runoff made within each sub-catchment; and (2) the flow rate, flow depth, and quality of water in each pipe and channel during a simulation period made up of multiple time steps. In its current format, EPA SWMM does not consider climate change projection data. Climate change may affect the relationship between intensity, duration, and frequency described by past rainfall events. Therefore, EPA is integrating climate projection data available in the Climate Resilience Evaluation and Awareness Tool (CREAT) into SWMM. CREAT is a climate risk assessment tool for utilities that provides downscaled climate change projection data for changes in the amount of rainfall in a 24-hour period for various extreme precipitation events (e.g., from 5-year to 100-year storm events). Incorporating climate change projections into SWMM will provide wastewater utilities with more comprehensive data they can use in planning for future storm events, thereby reducing the impacts to the utility and customers served from flooding and stormwater issues.

  9. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion of at...... attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  10. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  11. Blocking of Brute Force Attack

    Directory of Open Access Journals (Sweden)

    M.Venkata Krishna Reddy

    2012-08-01

    Full Text Available A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it could take years to find it. Depending on the password's length and complexity, there could be trillions of possible combinations. To speed things up a bit, a brute-force attack could start with dictionary words or slightly modified dictionary words because most people will use those rather than a completely random password. These attacks are called dictionary attacks or hybrid brute-force attacks. Brute-force attacks put user accounts at risk and flood your site with unnecessary traffic. Hackers launch brute-force attacks using widely available tools that utilize wordlists and smart rule set to intelligently and automatically guess user passwords. Although such attacks are easy to detect, they are not so easy to prevent

  12. Performance Evaluation of the Town of Monterery Wastewater Treatment Plant Utilizing Subsurface Flow Constructed Wetlands

    OpenAIRE

    Kiracofe, Brandon Dean

    2000-01-01

    Field tests were conducted and historical operating data were evaluated to assess the performance of the Monterey WWTP utilizing subsurface flow (SF) constructed wetlands. Previous work with SF wetlands has demonstrated adequate, but variable removal of organic matter, suspended solids, and nitrogen. Few research studies have observed the generation of compounds in the wetlands that affect other treatment processes, specifically reduced compounds that contribute to the chlorine demand. Thi...

  13. Scope for utilizing gamma radiation for microbiological control of sewage waste-water in India

    International Nuclear Information System (INIS)

    Conventional methods, including the activated sludge process, the trickling filter process and oxidation pond process, of treating sewage waste in India, do not adequately ensure safe utilization of the secondary effluent for land irrigation purposes. Preliminary findings indicate that gamma radiation in the range of 0.1-0.3 Mrad effectively destroys pathogens in the secondary effluent, thereby making available very large quantities of water for land irrigation and industrial purposes. (author)

  14. Manpower Planning for the Wastewater Treatment Workforce of Texas: An Emerging Function. Presented at the Annual Meeting of the Texas Water Utilities Association (58th, College Station, Texas, March, 1976).

    Science.gov (United States)

    Jackson, Tom

    This paper, presented at the 58th annual meeting of the Texas Water Utilities Association, attempts to point out the need for manpower planning for the wastewater treatment workforce of Texas. As reasons for manpower planning, this document discloses estimates of 1400-1500 new jobs, 1300 of which will be in wastewater treatment facilities of 1 MGD…

  15. Heart Attack

    Science.gov (United States)

    ... having another heart attack. These medicines include: aspirin, beta blockers, statins, ACE inhibitors and fish oil. Your doctor ... have had a stent placed in your heart. Beta blockers are a group of drugs that lower the ...

  16. Panic Attack

    OpenAIRE

    Scantamburlo, Gabrielle; Ansseau, Marc

    2004-01-01

    Panic attacks can occur unexpectedly and in almost any situation. The present article discusses the main features of anxiety states, the approach, the management and the practice guidelines for the treatment of panic disorder. Peer reviewed

  17. 愈创木酚水汽蒸馏废水的综合利用%Comprehensive Utilization of Guaiacol Wastewater Generated from Steam Distillation

    Institute of Scientific and Technical Information of China (English)

    杜德祥; 邹炳其; 梁丽军; 周永军; 毛海舫

    2012-01-01

    介绍了一种由邻氨基苯甲醚经重氮、水解过程生产愈创木酚过程中产生的水汽蒸馏废水的综合利用方法.将愈创木酚水汽蒸馏所得水相直接应用于香兰素的合成,大大减少了香兰素缩合反应所需的投料工艺水,同时省略了愈创木酚水汽蒸馏水相的萃取与废水处理过程,达到节能与循环利用的目的.按公司的生产规模,年可减少约20万t废水,使香兰素绿色生产工艺上了一个新台阶.%The comprehensive utilization of wastewater generated from the steam distillation of guaiacol which was produced through the diazo and hydrolysis processes from o-aminoanisole is described in this paper. The water phase generated from the steam distillation of guaiacol is directly applied to the synthesis of vanillin, so that the amount of process water required for adding to the condensation reaction of vanillin is decreased significantly, and the steps for extraction of aqueous phase in steam distillation of guaiacol and the treatment process of wastewater are also omitted. According to the scale of production of our company, the amount of wastewater can be reduced by about 200 thousand tons annually, the comprehensive utilization of guaiacol wastewater leads the green production process of vanillin to a new level.

  18. Generic attack approaches for industrial control systems.

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, David P.

    2006-01-01

    This report suggests a generic set of attack approaches that are expected to be used against Industrial Control Systems that have been built according to a specific reference model for control systems. The posed attack approaches are ordered by the most desirable, based upon the goal of an attacker. Each attack approach is then graded by the category of adversary that would be capable of utilizing that attack approach. The goal of this report is to identify necessary levels of security required to prevent certain types of attacks against Industrial Control Systems.

  19. Heart Attack Risk Assessment

    Science.gov (United States)

    ... Pressure Tools & Resources Stroke More Heart Attack Risk Assessment Updated:May 31,2016 We're sorry, but ... Can You Recognize a Heart Attack? Quiz Risk Assessment Patient Information Sheets: Heart Attack Heart Attack Personal ...

  20. Attack warning

    Energy Technology Data Exchange (ETDEWEB)

    1988-12-01

    The North American Aerospace Defense Command, located at Cheyenne Mountain Air Force Station, is responsible for warning the United States and Canadian leaders that North America is under air, missile, or space attack. The Air Force has been developing a replacement for NORAD's communications computer system, and it expects to spend about $281 million on this program-about $72 million for block I and $209 million for block II. Block I of the replacement system has experienced significant schedule and performance problems, such as the inability to meet the requirement for the unit to restore full mission capability within 267 minutes after a total loss of power, and the incompatibility of the unit with other computer equipment due to the wiring standard. These problems have pushed the planned installation data from 1986 to 1999. The Air Force intends to have the contractor correct the deficiencies during block II development. This report discusses how the replacement program should be reassessed.

  1. Integrative approach for utilization of olive mill wastewater and lebna's whey for ethanol production

    Energy Technology Data Exchange (ETDEWEB)

    Ibrahim, M.A.; Hayek, B.O.; Al-Hmoud, N.; Al-Gogazeh, L.

    2009-09-15

    The industry of olive oil extraction in Jordan involves an intensive consumption of water and generates large quantities of olive mill wastewater (OMW). This wastewater has a high pollution risk with biological oxygen demand (BOD). The organic fraction of OMW includes sugars, tannins, polyphenols, polyalcohols, pectins and lipids. The presence of remarkable amounts of aromatic compounds in OMW is responsible for its phytotoxic and antimicrobial effects. The environmental problems and potential hazards caused by OMW had led olive oil producing countries to limit their discharge and to propose and develop new technologies for OMW treatments, such as physicochemical and biological treatments. In the present investigation lebna's whey a local byproduct of widely consumed local yogurt was used with OMW for ethanol production. The obtained results showed that the proteins of lebna's whey can remove substantial amounts of aromatic compounds present in OMW. This was reflected on the reduction of the intensity of black color of OMW and removal of 37% polyphenols. Moreover, the production of ethanol was ascertained in fermentation media composed of whey and in presence of various concentrations of OMW up to 20% OMW. The obtained results showed the possibility to develop a process for improvement and enhancement of ethanol production from whey and olive oil waste in mixed yeast cultures. (au)

  2. Integrated wastewater aquaculture

    OpenAIRE

    Das, C R

    1995-01-01

    Utilization of wastewater in fish culture is based on nutrient recycling, which enhances primary productivity, planktonic biomass, macrophytes and benthic organisms which determine fish production. Production of fishes could be enhanced to 10 ton/ha through wastewater recycling by judicial stock manipulation and management. The fallow lands around a sewage fish farm could be utilized for agri-horticultural production by recycling both sludge and sewage water, resulting in a total agro product...

  3. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... Pressure High Blood Pressure Tools & Resources Stroke More Heart Attack Recovery FAQs Updated:Aug 24,2016 Most people ... recovery. View an animation of a heart attack . Heart Attack Recovery Questions and Answers What treatments will I ...

  4. Wastewater Outfalls

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — Outfalls which discharge wastewater from wastewater treatment facilities with individual NPDES permits. It does not include NPDES general permits.

  5. Utilization of wastewater originated from naturally fermented virgin coconut oil manufacturing process for bioextract production: physico-chemical and microbial evolution.

    Science.gov (United States)

    Tripetchkul, Sudarut; Kusuwanwichid, Sasithorn; Koonsrisuk, Songpon; Akeprathumchai, Saengchai

    2010-08-01

    Production of virgin coconut oil via natural fermentation has led to large amount of wastes being generated, i.e., coconut pulp and wastewater containing coconut crème. Objective of this study is to gain more insight into the feasibility of utilization of such wastes as raw materials together with several types of wastes such as fish waste and/or pineapple peel for bioextract production. Chemical, physico-chemical and biological changes including phytotoxicity of the fermented mixture were closely monitored. Physical observation suggested that fermentation of bioextract obtained with fish waste appeared to be complete within the first month of fermentation while bioextract obtained using pineapple waste seemed to be complete after 8 months post-fermentation. Fermentation broth is of blackish color with alcoholic as well as acidic odour with no gas bubble and/or yeast film present on top of the surface. During the whole fermentation interval, several attributes of both bioextracts, e.g., pH, chemical oxygen demand (COD) and organic acids, were statistically different. Further, the total bacteria and lactic acid bacteria present in pineapple bioextract were statistically higher than those of the fish bioextract (ppineapple bioextracts, respectively. In addition, qualities of both bioextracts conformed well with those specified by the Thai standard for liquid biofertilizer after 1 month fermentation. Results further showed that wastewater derived from virgin coconut oil manufacturing process could effectively be employed together with other types of wastes such as fish waste and pineapple peel for bioextract production. However, for the best bioextract quality, fermentation should be carefully planned since over fermentation led to bioextract of low qualities. PMID:20362440

  6. Active Linkability Attacks

    OpenAIRE

    Schnoor, Henning; Woizekowski, Oliver

    2013-01-01

    We study linking attacks on communication protocols. We show that an active attacker is strictly more powerful in this setting than previously-considered passive attackers. We introduce a formal model to reason about active linkability attacks, formally define security against these attacks and give very general conditions for both security and insecurity of protocols. In addition, we introduce a composition-like technique that allows to obtain security proofs by only studying small component...

  7. 焦化酚氰废水在炼铁烧结系统的综合利用%Comprehensive Utilization of Coking Phenol Cyanogen Wastewater in the Ironmaking and Sintering System

    Institute of Scientific and Technical Information of China (English)

    童静

    2014-01-01

    The basic situation and current treatment status of Angang coking phenol cyanogen wastewater are introduced .In view of problems existing in coking phenol cyanogen wastewater , by utilization of a series of technical modification , compre-hensive utilization of coking phenol cyanogens wastewater in iron-making and sintering system is realized and the environ-mental protection problems in iron and steel industry is solved , and the goal of zero discharge of industrial wastewater is a-chieved successfully .%介绍安钢焦化酚氰废水的基本情况和处理现状;针对酚氰废水存在的问题,通过一系列的技术改造,实现了焦化酚氰废水在炼铁烧结系统的综合利用,解决了困扰钢铁行业的环保难题,顺利完成工业废水零排放的目标。

  8. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks

    CERN Document Server

    Duan, Lingjie; Huang, Jianwei; Shin, Kang G

    2011-01-01

    Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy. Moreover, attackers may not follow the fusion center's decision regarding their spectrum access. This paper considers a challenging attack scenario where multiple rational attackers overhear all honest SUs' sensing reports and cooperatively maximize attackers' aggregate spectrum utilization. We show that, without attack-prevention mechanisms, honest SUs are unable to transmit over the licensed spectrum, and they may further be penalized by the primary user for collisions due to attackers' aggressive transmissions. To prevent such attacks, we propose two novel attack-prevention mechanisms with direct and indirect punishments. The key idea is to identify collisions...

  9. Utilization of municipal wastewater for cooling in thermoelectric power plants: Evaluation of the combined cost of makeup water treatment and increased condenser fouling

    Energy Technology Data Exchange (ETDEWEB)

    Walker, Michael E. [Illinois Inst. of Technology, Chicago, IL (United States). Dept. of Chemical and Biological Engineering; Theregowda, Ranjani B. [Carnegie Mellon Univ., Pittsburgh, PA (United States). Dept of Civil and Mechanical Engineering; Safari, Iman [Illinois Inst. of Technology, Chicago, IL (United States). Dept. of Chemical and Biological Engineering; Abbasian, Javad [Illinois Inst. of Technology, Chicago, IL (United States). Dept. of Chemical and Biological Engineering; Arastoopour, Hamid [Illinois Inst. of Technology, Chicago, IL (United States). Dept. of Chemical and Biological Engineering; Dzombak, David A. [Carnegie Mellon Univ., Pittsburgh, PA (United States). Dept of Civil and Mechanical Engineering; Hsieh, Ming-Kai [Tamkang Univ., Taipei (Taiwan). Waer Resources Management and Policy Research Center; Miller, David C. [National Energy Technology Lab. (NETL), Morgantown, WV (United States)

    2013-10-01

    A methodology is presented to calculate the total combined cost (TCC) of water sourcing, water treatment and condenser fouling in the recirculating cooling systems of thermoelectric power plants. The methodology is employed to evaluate the economic viability of using treated municipal wastewater (MWW) to replace the use of freshwater as makeup water to power plant cooling systems. Cost analyses are presented for a reference power plant and five different tertiary treatment scenarios to reduce the scaling tendencies of MWW. Results indicate that a 550 MW sub-critical coal fired power plant with a makeup water requirement of 29.3 ML/day has a TCC of $3.0 - 3.2 million/yr associated with the use of treated MWW for cooling. (All costs USD 2009). This translates to a freshwater conservation cost of $0.29/kL, which is considerably lower than that of dry air cooling technology, $1.5/kL, as well as the 2020 conservation cost target set by the U.S. Department of Energy, $0.74/kL. Results also show that if the available price of freshwater exceeds that of secondary-treated MWW by more than $0.13-0.14/kL, it can be economically advantageous to purchase secondary MWW and treat it for utilization in the recirculating cooling system of a thermoelectric power plant.

  10. Biodegradation and reversible inhibitory impact of sulfamethoxazole on the utilization of volatile fatty acids during anaerobic treatment of pharmaceutical industry wastewater

    Energy Technology Data Exchange (ETDEWEB)

    Cetecioglu, Zeynep, E-mail: cetecioglu@itu.edu.tr [Istanbul Technical University, Environmental Engineering Department, 34469 Maslak, Istanbul (Turkey); Catalan Institute for Water Research (ICRA), Emili Grahit 101, 17003 Girona (Spain); Ince, Bahar [Bogazici University, Institute of Environmental Sciences, Rumelihisarustu - Bebek, 34342 Istanbul (Turkey); Gros, Meritxell; Rodriguez-Mozaz, Sara; Barceló, Damia [Catalan Institute for Water Research (ICRA), Emili Grahit 101, 17003 Girona (Spain); Ince, Orhan; Orhon, Derin [Istanbul Technical University, Environmental Engineering Department, 34469 Maslak, Istanbul (Turkey)

    2015-12-01

    This study evaluated the chronic impact and biodegradability of sulfamethoxazole under anaerobic conditions. For this purpose, a lab-scale anaerobic sequencing batch reactor was operated in a sequence of different phases with gradually increasing sulfamethoxazole doses of 1 to 45 mg/L. Conventional parameters, such as COD, VFA, and methane generation, were monitored with corresponding antimicrobial concentrations in the reactor and the methanogenic activity of the sludge. The results revealed that anaerobic treatment was suitable for pharmaceutical industry wastewater with concentrations of up to 40 mg/L of sulfamethoxazole. Higher levels exerted toxic effects on the microbial community under anaerobic conditions, causing the inhibition of substrate/COD utilization and biogas generation and leading to a total collapse of the reactor. The adverse long-term impact was quite variable for fermentative bacteria and methanogenic achaea fractions of the microbial community based on changes inflicted on the composition of the residual organic substrate and mRNA expression of the key enzymes. - Highlights: • Chronic impact of sulfamethoxazole was lethal at 45 mg/L on the microbial community. • Sulfamethoxazole was highly biodegradable under anaerobic conditions. • While the COD removal stopped, the sorption of sulfamethoxazole into the sludge increased. • Sulfamethoxazole has a reversible inhibitory effect on acetoclastic methanogens.

  11. Biodegradation and reversible inhibitory impact of sulfamethoxazole on the utilization of volatile fatty acids during anaerobic treatment of pharmaceutical industry wastewater

    International Nuclear Information System (INIS)

    This study evaluated the chronic impact and biodegradability of sulfamethoxazole under anaerobic conditions. For this purpose, a lab-scale anaerobic sequencing batch reactor was operated in a sequence of different phases with gradually increasing sulfamethoxazole doses of 1 to 45 mg/L. Conventional parameters, such as COD, VFA, and methane generation, were monitored with corresponding antimicrobial concentrations in the reactor and the methanogenic activity of the sludge. The results revealed that anaerobic treatment was suitable for pharmaceutical industry wastewater with concentrations of up to 40 mg/L of sulfamethoxazole. Higher levels exerted toxic effects on the microbial community under anaerobic conditions, causing the inhibition of substrate/COD utilization and biogas generation and leading to a total collapse of the reactor. The adverse long-term impact was quite variable for fermentative bacteria and methanogenic achaea fractions of the microbial community based on changes inflicted on the composition of the residual organic substrate and mRNA expression of the key enzymes. - Highlights: • Chronic impact of sulfamethoxazole was lethal at 45 mg/L on the microbial community. • Sulfamethoxazole was highly biodegradable under anaerobic conditions. • While the COD removal stopped, the sorption of sulfamethoxazole into the sludge increased. • Sulfamethoxazole has a reversible inhibitory effect on acetoclastic methanogens

  12. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  13. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle becomes ...

  14. Pericarditis - after heart attack

    Science.gov (United States)

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack. Causes Two types of pericarditis can occur after ...

  15. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  16. Recent Advances in Treating Molasses Wastewater by Physical-chemical Technology and Utilization of Resources%糖蜜废水的物化处理与资源化利用的进展

    Institute of Scientific and Technical Information of China (English)

    吴松平; 古国榜

    2001-01-01

    The result of molasses wastewater treatment by means ofsedimentation process,adsorption process,electrical-chemical process,magnetic separation process,AOP and concentrated liquid process are reviewed.The fine chemicals and yeast made from dried malasses wastewater are introduced.It is pointed that physical-chemical technology can be used in pretreatment or deep treatment of molasses wastewater.Utilization of resources is an important way in molasses wastewater treatment.%综述了沉淀法、吸附法、电化学法、磁分离法、高级氧化法AOP、蒸发浓缩法等物理方法处理糖蜜废水的效果,资源化利用主要介绍了利用浓缩液进行深加工处理生成各种高附加值的精细化学品和饲料酵母的生产,指出物化法可用于糖蜜废水的预处理或深处理,资源化利用应为治理糖蜜废水的一个重要方向。

  17. Seven Deadliest Network Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  18. What Is a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Is a Heart Attack? Español A heart attack happens when the flow ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  19. What Causes a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Causes a Heart Attack? Coronary Heart Disease A heart attack happens if ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  20. Life After a Heart Attack

    Science.gov (United States)

    ... from the NHLBI on Twitter. Life After a Heart Attack Many people survive heart attacks and live active, ... a few weeks. Anxiety and Depression After a Heart Attack After a heart attack, many people worry about ...

  1. Nocturnal panic attacks

    OpenAIRE

    Lopes Fabiana L; Nardi Antonio E; Nascimento Isabella; Valença Alexandre M.; Zin Walter A.

    2002-01-01

    The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sle...

  2. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  3. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  4. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  5. Wetlands for Wastewater Treatment.

    Science.gov (United States)

    Jiang, Yi; Martinez-Guerra, Edith; Gnaneswar Gude, Veera; Magbanua, Benjamin; Truax, Dennis D; Martin, James L

    2016-10-01

    An update on the current research and development of the treatment technologies, which utilize natural processes or passive components in wastewater treatment, is provided in this paper. The main focus is on wetland systems and their applications in wastewater treatment (as an advanced treatment unit or decentralized system), nutrient and pollutant removal (metals, industrial and emerging pollutants including pharmaceutical compounds). A summary of studies involving the effects of vegetation, wetland design and modeling, hybrid and innovative systems, storm water treatment and pathogen removal is also included. PMID:27620086

  6. The Feasibility Analysis of Wastewater Source Heat Pump Using the Urban Wastewater Heat

    OpenAIRE

    Yaxiu Gu; Huqiu Deng

    2012-01-01

    There is a large potential in the heat losses from the urban wastewater. By integrating a heat pump to utilize this heat, we can produce a higher temperature heat supply while maintaining a low temperature-lift requirement. This leads to the possibility of directly regenerating the hot water supply through wastewater heat recovery. Based on the plan of Xi’an urban Wastewater Source Heat Pump (WWSHP) system, the discussion and summary about wastewater characteristic parameters were made accord...

  7. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  8. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  9. Advanced wastewater treatment system (SEADS)

    International Nuclear Information System (INIS)

    'Full text:' This presentation will describe the nature, scope, and findings of a third-party evaluation of a wastewater treatment technology identified as the Advanced Wastewater Treatment System Inc.'s Superior Extended Aerobic Digester System (SEADS). SEADS is an advanced miniaturized wastewater treatment plant that can meet advanced wastewater treatment standards for effluent public reuse. SEADS goes beyond primary and secondary treatment operations to reduce nutrients such as nitrogen and phosphorus, which are typically found in excessive quantities in traditional wastewater treatment effluent. The objective of this evaluation will be to verify the performance and reliability of the SEADS to treat wastewater from a variety of sources, including domestic wastewater and commercial industrial wastewater. SEADS utilizes remote telemetry equipment to achieve added reliability and reduces monitoring costs as compared to many package wastewater treatment plants. The evaluation process will be overseen and coordinated by the Environmental Technology Evaluation Center (EvTEC), a program of the Civil Engineering Research Foundation (CERF), the research and technology transfer arm of the American Society of Civil Engineers (ASCE). EvTEC is a pilot program evaluating innovative environmental technologies under the US Environmental Protection Agency's (USEPA) Environmental Technology Verification (ETV) Program. Among other performance issues, the SEADS technology evaluation will address its ability to treat low flows-from remote individual and clustered housing applications, and individual commercial applications in lieu of a main station conventional wastewater treatment plant. The unneeded reliance on particular soil types for percolation and the improved effluent water quality over septic systems alone look to make these types of package treatment plants a viable option for rural communities, small farms, and other low-flow remote settings. Added benefits to be examined

  10. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  11. Signs of a Heart Attack

    Science.gov (United States)

    ... attack Heart Health and Stroke Signs of a heart attack Related information Make the Call. Don't Miss ... to top More information on Signs of a heart attack Read more from womenshealth.gov Make the Call, ...

  12. Utilization of Dairy Wastewater for Pollutants Removal and High Lipid Biomass Production by a Newly Isolated Microalgal Strains Chloromonas playfairii and Desmodesmus opoliensis

    Directory of Open Access Journals (Sweden)

    Mahendraperumal Guruvaiah

    2015-12-01

    Full Text Available Two new unicellular microalgal species from milk processing unit situated at Anand, India were screened and tested for their growth rate and nutrient removal capability under dairy wastewater at outdoor conditions in a simple column aeration photobioreactor. Results of 18s rRNA sequence analysis indicated that these strains have a close relationship with Chloromonas playfairii and Desmodesmus opoliensis named as SBC 2 and SBC 3, respectively. Both the strains removed more than 92% of ammonical nitrogen and 99% of total phosphorus, whereas COD and BOD reductions were found to be more than 95%. Maximum biomass production was 1.7 and 1.2 g L-1 and lipid content was 15 and 12%, respectively from SBC 2 and SBC 3 after 15 d cultivation. This study demonstrates the potential of algae based biofuel production by coupling wastewater treatment with microalgae cultivation for high lipid containing biomass production using Chloromonas playfairii and Desmodesmus opoliensis.

  13. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  14. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  15. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for...

  16. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  17. Wastewater Treatment.

    Science.gov (United States)

    Zoltek, J., Jr.; Melear, E. L.

    1978-01-01

    Presents the 1978 literature review of wastewater treatment. This review covers: (1) process application; (2) coagulation and solids separation; (3) adsorption; (4) ion exchange; (5) membrane processes; and (6) oxidation processes. A list of 123 references is also presented. (HM)

  18. Jamming aided Generalized Data Attacks: Exposing Vulnerabilities in Secure Estimation

    OpenAIRE

    Deka, Deepjyoti; Baldick, Ross; Vishwanath, Sriram

    2015-01-01

    Jamming refers to the deletion, corruption or damage of meter measurements that prevents their further usage. This is distinct from adversarial data injection that changes meter readings while preserving their utility in state estimation. This paper presents a generalized attack regime that uses jamming of secure and insecure measurements to greatly expand the scope of common 'hidden' and 'detectable' data injection attacks in literature. For 'hidden' attacks, it is shown that with jamming, t...

  19. WASTEWATER REUSE

    OpenAIRE

    Milan R. Radosavljević; Vanja M. Šušteršič

    2013-01-01

    Water scarcity and water pollution are some of the crucial issues that must be addressed within local and global perspectives. One of the ways to reduce the impact of water scarcity  and to minimizine water pollution is to expand water and wastewater reuse. The local conditions including regulations, institutions, financial mechanisms, availability of local technology and stakeholder participation have a great influence on the decisions for wastewater reuse. The increasing awareness of food s...

  20. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    OpenAIRE

    Yi-Hsun Wang; Ching-Hao Mao; Hahn-Ming Lee

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of...

  1. Generation and energy utilization of methane form industrial wastewater; Produccion y aprovechamiento energetico de metano a partir de agua residual industrial

    Energy Technology Data Exchange (ETDEWEB)

    Lebek, M.

    2009-07-01

    At the production site of a natural ingredients manufacturer for the food industry was necessary the adjustment of the WWTP to the enlargement of the production and its complement with a pre-treatment. The core of the treatment plan tis an UASB (Upflow Anaerobic Sludge Blanket) reactor where the wastewater is removed under anaerobic conditions. The main advantages of this treatment ar the operation stability and the high methane production. The biogas generated is cleaned before it is used during the production process as an energy resource. (Author)

  2. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  3. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  4. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  5. Fatal crocodile attack.

    Science.gov (United States)

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out. PMID:24237838

  6. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  7. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  8. Wastewater reuse

    Directory of Open Access Journals (Sweden)

    Milan R. Radosavljević

    2013-12-01

    Full Text Available Water scarcity and water pollution are some of the crucial issues that must be addressed within local and global perspectives. One of the ways to reduce the impact of water scarcity  and to minimizine water pollution is to expand water and wastewater reuse. The local conditions including regulations, institutions, financial mechanisms, availability of local technology and stakeholder participation have a great influence on the decisions for wastewater reuse. The increasing awareness of food safety and the influence of the countries which import food are influencing policy makers and agriculturists to improve the standards of wastewater reuse in agriculture. The environmental awareness of consumers has been putting pressure on the producers (industries to opt for environmentally sound technologies including those which conserve water and reduce the level of pollution. It may be observed that we have to move forwards to implement strategies and plans for wastewater reuse. However, their success and sustainability will depend on political will, public awareness and active support from national and international agencies to create favorable    environment for the promotion of environmentally sustainable technologies. Wastewater treatment has a long history, especially in agriculture, but also in industry and households. Poor quality of wastewater can pose a significant risk to the health of farmers and users of agricultural products. The World Health Organization (WHO is working on a project for the reuse of wastewater in agriculture. To reduce effects of human activities to the minimum, it is necessary to provide such technical and technological solutions that would on the one hand ensure complying with  the existing regulations and legislation, and on the other hand provide economically viable systems as seen through investments and operating costs. The use of wastewater The practice of using wastewater varies from country to country. Its

  9. Wastewater Treatment in Greenland

    DEFF Research Database (Denmark)

    Gunnarsdottir, Ragnhildur

    . Wastewater contains a variety of substances, including anthropogenic pollutants, residues of pharmaceuticals and personal care products (PPCPs), pathogenic microorganisms and parasites as well as antibiotic resistant bacteria that can be harmful for the environment as well as human health. Due...... or water saving toilets. This opens up for co-treatment of organic waste fractions. Freezing and thawing has also been recognised as being a cost-effective wastewater treatment method in cold regions. Thus it was chosen to concentrate on the effect of the mentioned processes, namely freezing, anaerobic...... alternative could be to use small and simple biogas plants, followed by dewatering of the degassed biomass, either by utilizing possible surplus of energy from the biogas plant or natural freezing, which might be a more cost-effective way. After dewatering the liquid part can be treated by filtration...

  10. Cell Counting Attack and Browser Attack against TOR Network

    OpenAIRE

    Swati

    2014-01-01

    The onion router (TOR) allows to hide your identity various software under this categories are available that allows online anonymity network, supporting TCP applications over the Internet. It doesn't allow network surveillance or traffic analysis to get tracked but most of these software used equal size of cells (512B). In this paper we are comparing cell-counting attacks and browser attacks against TOR. Different from cell-counting attacks, these attacks can confirm anonymou...

  11. ATTACK PATTERNS FOR DETECTING AND PREVENTING DDOS AND REPLAY ATTACKS

    Directory of Open Access Journals (Sweden)

    A.MADHURI,

    2010-09-01

    Full Text Available In this paper, we discuss the methods for detecting and preventing the DDoS Attacks and Replay Attacks, which have been posing the problems for the Internet. We explained a scheme AMFDR (AttackPatterns for Marking Filtering DoS and Replay attacks that identifies the attack packets from the packets that are sent by legitimate users and filters the attack packets. A Denial of service attack is generally launched to make a service unavailable even to an unauthorized user. If this attack uses many computers across the world, it is called Distributed Denial of service attack. Replay attack is retransmission of a data transmission which used to gain authentication in a fraudulent manner. These replayed packets or attack packets are identified. This scheme is less expensive and the implementation of this scheme needs minimal interaction with routers. The scheme is like firewall system, so that the occurrence of an attack is recognized quickly and a punitive action is taken without any loss genuine packets.

  12. Simultaneous Attacks by Terrorist Organisations

    Directory of Open Access Journals (Sweden)

    Kathleen Deloughery

    2013-12-01

    Full Text Available While terror attacks that are a part of a coordinated effort receive attention in the popular media, they have not received much attention in the academic literature. The decision to carry out simultaneous attacks should be examined as one of the choices a terrorist organisation makes about the method of attack. Determining the impact of simultaneous attacks vis-à-vis a single attack can explain why groups would use this method. Up to one quarter of all attacks coded in two major databases, GTD and ITERATE, may be part of a simultaneous campaign. Empirical analysis shows simultaneous attacks are more likely to be successful and cause more fatalities, though not in a one-to-one fashion. These results underline the importance of considering simultaneous attacks in empirical analysis.

  13. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart. PMID:26399945

  14. LITERATURE SURVEY ON WORMHOLE ATTACK

    OpenAIRE

    Avinash S. Bundela

    2015-01-01

    Security plays an important role in Mobile Ad Hoc Network when data transmission is performed within un - trusted wireless scenario. Various attacks like Black hole, Wormhole, Gray hole and many more have been identified & corresponding solutions have been proposed. These attacks are caused by the malicious node hence ad hoc wireless network is unprotected from the attacks of the malicious node. Between all these attacks the wormhole att ...

  15. Magnetic solid phase extraction of gemfibrozil from human serum and pharmaceutical wastewater samples utilizing a β-cyclodextrin grafted graphene oxide-magnetite nano-hybrid.

    Science.gov (United States)

    Abdolmohammad-Zadeh, Hossein; Talleb, Zeynab

    2015-03-01

    A magnetic solid phase extraction method based on β-cyclodextrin (β-CD) grafted graphene oxide (GO)/magnetite (Fe3O4) nano-hybrid as an innovative adsorbent was developed for the separation and pre-concentration of gemfibrozil prior to its determination by spectrofluorometry. The as-prepared β-CD/GO/Fe3O4 nano-hybrid possesses the magnetism property of Fe3O4 nano-particles that makes it easily manipulated by an external magnetic field. On the other hand, the surface modification of GO by β-CD leads to selective separation of the target analyte from sample matrices. The structure and morphology of the synthesized adsorbent were characterized using powder X-ray diffraction, Fourier transform infrared spectroscopy, and field emission scanning electron microscopy. The experimental factors affecting the extraction/pre-concentration and determination of the analyte were investigated and optimized. Under the optimized experimental conditions, the calibration graph was linear in the range between 10 and 5000 pg mL(-1) with a correlation coefficient of 0.9989. The limit of detection and enrichment factor for gemfibrozil were 3 pg mL(-1) and 100, respectively. The maximum sorption capacity of the adsorbent for gemfibrozil was 49.8 mg g(-1). The method was successfully applied to monitoring gemfibrozil in human serum and pharmaceutical wastewaters samples with recoveries in the range of 96.0-104.0% for the spiked samples. PMID:25618684

  16. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  17. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  18. Quantum Key Distribution against Trojan Horse Attacks

    Institute of Scientific and Technical Information of China (English)

    CAI Qing-Yu; LV Hua

    2007-01-01

    Realistic experimental apparatus of quantum cryptography are imperfect, which may be utilized by a potential eavesdropper to eavesdrop on the communication. We show that quantum communication may be improved with quantum teleportation and entanglement swapping, which is robustly secure against the most general Trojan horse attacks. Our scheme is not an improvement of the communication apparatus, but the improvement of quantum communication protocol itself. We show that our modified schemes may be implemented with current technology.

  19. Interactions within wastewater systems

    OpenAIRE

    Langeveld, J.G.

    2004-01-01

    Wastewater systems consist of sewer systems and wastewater treatment works. As the performance of a wastewater treatment plant is affected by the characteristics, i.e. operation and design, of the contributing sewer systems, knowledge of the interactions between sewers and wastewater treatment works is very important when trying to understand and improve wastewater systems. The thesis comprises three main topics: Firstly, the sensitivity of wastewater treatment plant performance to influent f...

  20. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    Energy Technology Data Exchange (ETDEWEB)

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  1. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  2. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks that are...... caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  3. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  4. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Treated? Early treatment for a heart attack can ... or years after the procedure. Other Treatments for Heart Attack Other treatments for heart attack include: Medicines Medical ...

  5. How Is a Heart Attack Diagnosed?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Diagnosed? Your doctor will diagnose a heart attack ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  6. A Taxonomy of Attacks on the DNP3 Protocol

    Science.gov (United States)

    East, Samuel; Butts, Jonathan; Papa, Mauricio; Shenoi, Sujeet

    Distributed Network Protocol (DNP3) is the predominant SCADA protocol in the energy sector - more than 75% of North American electric utilities currently use DNP3 for industrial control applications. This paper presents a taxonomy of attacks on the protocol. The attacks are classified based on targets (control center, outstation devices and network/communication paths) and threat categories (interception, interruption, modification and fabrication). To facilitate risk analysis and mitigation strategies, the attacks are associated with the specific DNP3 protocol layers they exploit. Also, the operational impact of the attacks is categorized in terms of three key SCADA objectives: process confi- dentiality, process awareness and process control. The attack taxonomy clarifies the nature and scope of the threats to DNP3 systems, and can provide insights into the relative costs and benefits of implementing mitigation strategies.

  7. Aggressive Influences of Water from Wastewater Treatment Plants on Reinforced Concrete Members

    OpenAIRE

    Mihai, Petru; Giuşcă, Răzvan; Roşca, Bogdan; Corobceanu, Vladimir

    2011-01-01

    The impact of wastewater within water treatment plants on the reinforced concrete members is studied. Structural members exposed to wastewater environment are susceptible to different forms of chemical attack. Usually, concrete is resistant to most natural environments and many chemicals. Concrete is virtually the only material used for the construction of wastewater transportation and treatment facilities because of its ability to resist to corrosion caused by the highly aggressive contamina...

  8. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  9. Wastewater treatment

    Directory of Open Access Journals (Sweden)

    Ranđel N. Kitanović

    2013-10-01

    Full Text Available Quality of life on Earth in the future will largely depend on the amount of safe water. As the most fundamental source of life, water is relentlessly consumed and polluted. To halt this trend, many countries are taking extensive measures and investing substantial resources in order to stop the contamination of water and return at least tolerably good water quality to nature. The goal of water purification is to obtain clean water with the sewage sludge as a by-product. Clean water is returned to nature, and further treatment of sludge may be subject to other procedures. The conclusion of this paper is simple. The procedure with purified water is easily achievable, purified water is discharged into rivers, lakes and seas, but the problem of further treatment of sludge remains. This paper presents the basic methods of wastewater treatment and procedures for processing the products from contaminated water. The paper can serve as a basis for further elaboration. Water Pollution In order to ensure normal life of living creatures, the water in which they live or the water they use must have a natural chemical composition and natural features. When, as a result of human activities, the chemical composition of water and the ratio of its chemical elements significantly change, we say that water is polluted. When the pollutants come from industrial plants, we are talking about industrial wastewater, and when they come from households and urban areas, we are talking about municipal wastewater. Both contain a huge amount of pollutants that eventually end up in rivers. Then, thousands of defenseless birds, fish and other animals suffer, and environmental consequences become immeasurable. In addition, the waste fed to the water often ends up in the bodies of marine animals, so they can return to us as food. Thermal water pollution also has multiple effects on the changes in the wildlife composition of aquatic ecosystems. Polluted water can be purified by

  10. Lattice Based Attack on Common Private Exponent RSA

    Directory of Open Access Journals (Sweden)

    Santosh Kumar Ravva

    2012-03-01

    Full Text Available Lattice reduction is a powerful concept for solving diverse problems involving point lattices. Lattice reduction has been successfully utilizing in Number Theory, Linear algebra and Cryptology. Not only the existence of lattice based cryptosystems of hard in nature, but also has vulnerabilities by lattice reduction techniques. In this paper, we show that Wieners small private exponent attack, when viewed as a heuristic lattice based attack, is extended to attack many instances of RSA when they have the same small private exponent.

  11. FLOODING ATTACK AWARE SECURE AODV

    OpenAIRE

    Madhavi, S; K. Duraiswamy

    2013-01-01

    Providing security in a Mobile Ad hoc Network (MANET) is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS) attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the ...

  12. Sulfate attack expansion mechanisms

    Energy Technology Data Exchange (ETDEWEB)

    Müllauer, Wolfram, E-mail: wolf_m@gmx.at; Beddoe, Robin E.; Heinz, Detlef

    2013-10-15

    A specially constructed stress cell was used to measure the stress generated in thin-walled Portland cement mortar cylinders caused by external sulfate attack. The effects of sulfate concentration of the storage solution and C{sub 3}A content of the cement were studied. Changes in mineralogical composition and pore size distribution were investigated by X-ray diffraction and mercury intrusion porosimetry, respectively. Damage is due to the formation of ettringite in small pores (10–50 nm) which generates stresses up to 8 MPa exceeding the tensile strength of the binder matrix. Higher sulfate concentrations and C{sub 3}A contents result in higher stresses. The results can be understood in terms of the effect of crystal surface energy and size on supersaturation and crystal growth pressure.

  13. Interactions within wastewater systems

    NARCIS (Netherlands)

    Langeveld, J.G.

    2004-01-01

    Wastewater systems consist of sewer systems and wastewater treatment works. As the performance of a wastewater treatment plant is affected by the characteristics, i.e. operation and design, of the contributing sewer systems, knowledge of the interactions between sewers and wastewater treatment works

  14. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  15. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  16. Wastewater treatment pilot

    OpenAIRE

    Paraskevopoulos, Christos Alkiviadis

    2016-01-01

    The aim of this thesis was to investigate the functionality of the wastewater treatment pilot and produce a learning manual-handout, as well as to define the parameters of wastewater clarification by studying the nutrient removal and the effluent clarification level of the processed wastewater. As part of the Environmental Engineering studies, Tampere University of Applied Sciences has invested on a Wastewater Treatment Pilot. The pilot simulates the basic wastewater treatment practices u...

  17. Thrombolytic drugs for heart attack

    Science.gov (United States)

    ... attack URL of this page: //medlineplus.gov/ency/article/007488.htm Thrombolytic drugs for heart attack To use the sharing features on this page, ... the management of patients with non-ST-elevation acute coronary syndromes: a report ... myocardial infarction: a report of the American College of Cardiology ...

  18. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus;

    2011-01-01

    information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security of...... string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...... several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  19. Audio Sensing Aid based Wireless Microphone Emulation Attacks Detection

    Directory of Open Access Journals (Sweden)

    Wang Shan-shan

    2013-10-01

    Full Text Available The wireless microphone network is an important PU network for CRN, but there is no effective technology to solve the problem of microphone evaluation attacks. Therefore, this paper propose ASA algorithm, which utilizes three devices to detect MUs, and they are loudspeaker audio sensor (LAS, environment audio sensor (EAS, and radio frequency fingerprint detector (RFFD. LASs are installed near loudspeakers, which have two main effects: One is to sense loudspeakers’ output, and the other is to broadcast warning information to all SUs through the common control channel when detecting valid output. EASs are pocket voice captures provided to SU, and utilized to sense loudspeaker sound at SU’s location. Utilizing EASs and energy detections in SU can detect primary user emulation attack (PUEA fast. But to acquire the information of attacked channels, we need explore RFFDs to analyze the features of PU transmitters. The results show that the proposed algorithm can detect PUEA well.    

  20. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  1. Optimization of culture conditions of producing bacterial cellulose utilizing starch wastewater%淀粉废水发酵产细菌纤维素发酵条件的优化

    Institute of Scientific and Technical Information of China (English)

    徐伟; 张妍; 傅徐阳

    2012-01-01

    The culture conditions of Gluconacetobacter xylinus producing bacterial cellulose utilizing corn starch wastewater(adding glucose 20g/L,corn steep liquor 40g/L,ethanol 150mL/L) were investigated through singlefactor and orthogonal tests. The suitable culture conditions were as follows.liquid level was 80mL in 250mL triangle bottle,pH4.0,inoculation volume was 9% (VN),culture temperature was 28℃ ,the the yield of bacterial cellulose reached the peak(4.41g/L) at this time. The bacterial cellulose was verified by FTIR,SEM was used to observe the surface pattern of bacterial cellulose membrane.%以玉米淀粉废水添加葡萄糖20g/L,玉米浆40班,乙醇150mL/L为发酵基质,采用单因素和正交实验设计对葡糖醋杆菌(Gluconacetobacter xylinus)发酵产细菌纤维素条件进行优化。结果表明,最佳发酵条件为:装液量80mL/250mL,pH4.0,接种量9%(V/V),温度28℃;在此条件下得到细菌纤维素产量为4.41g/L。采用傅立叶转换红外光谱FTIR验证产物为细菌纤维素,并由SEM扫描电镜观察纤维素膜表面形貌。

  2. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying the...... security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  3. Suicide Attacks on the Rise

    OpenAIRE

    CCS Research Staff

    2008-01-01

    This article was published in Culture and Conflict Review (March 2008), v.2 no.2 "The last six weeks has brought some of the worst violence in Afghanistan since 2001. In 2007, there were more than 230 Improvised Explosive Device (IED) attacks and 145 suicide attacks. Casualty rates were at least 25 percent higher in 2007 than the previous year. In the past 18 months, IED attacks have targeted numerous police and army busses, a group of legislators outside a factory at Baghlan, a five-star ...

  4. Attacks on Emerging Architectures

    OpenAIRE

    Hanna, Steven Craig

    2012-01-01

    New architectures require careful examination of security properties in order to assess and contain new threats. In light of this, emerging technologies, such as web APIs, medical devices, and applications on mobile phones, are a new security landscape that has recurring security problems. We develop new techniques to analyze these applications for security vulnerabilities, utilizing techniques including: dynamic symbolic execution, binary analysis and reverse engineering, and wide scale appl...

  5. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Can a Heart Attack Be Prevented? Lowering your risk factors for coronary ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  6. Social Engineering:A Partial Technical attack

    OpenAIRE

    P.S.Maan; Manish Sharma

    2012-01-01

    This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that...

  7. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  8. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  9. Acute ischemic cerebral attack

    Directory of Open Access Journals (Sweden)

    Franco-Garcia Samir

    2010-12-01

    Full Text Available The decrease of the cerebral blood flow below the threshold of autoregulation led to changes of cerebral ischemia and necrosis that traduce in signs and symtoms of focal neurologic dysfunction called acute cerebrovascular symdrome (ACS or stroke. Two big groups according to its etiology are included in this category the hemorragic that constitue a 20% and the ischemic a 80% of cases. Great interest has wom the ischemic ACS because of its high social burden, being the third cause of no violent death in the world and the first of disability. Many risk factors favor the presentation of these events and some of them are susceptible of modification and therfore are objetives of primary prevention just as the control of diabetes, hypertension and the practice of healthy habits of life. The advances in the knowledge of the physiopatology, had taken to sustantial change in the nomenclature and management of ischemic ACS. Within these changes it was substituted the term cerebrovascular accident fo acute stroke, making emphasis in the key rol of a timely management with goals of time similiar to the acute coronary syndrome. It was redefined the time of acute ischemic attack to a one hour. Once stablished the cerebrovascular attack the semiology of symtoms with frecuency will led us make a topographic diagnosis of the in injury that joined to the cerebral TAC will allow us to exclude an hemorragic event and to start the treatment. In the management of these patients its essential the coordination of the differents teams of work, from the early recognition of symtoms on the part of patients andthe family, the rapid activation and response of emergency systems and the gearing of health care institutions. Are pillars of treatment: the abcde of reanimatiion, to avoid the hiperpirexis, the seizures, the hipoglicemy, the hiperglicemy, to achieve the thrombolysis in the first three hours of the begining of symtoms, to use antiplatelets, antithrombotic profilaxis

  10. Panic Attacks and Panic Disorders

    OpenAIRE

    Fontaine, Rejean; Beaudry, Paul

    1984-01-01

    The diagnosis and treatment of panic attacks and panic disorders have progressed markedly during the last decade. Unlike phobic disorders, the key feature of panic disorders is the many panic attacks that are mostly spontaneous or not caused by a particular situation. Recent studies linking its pathogenesis with lactate infusion tests are reviewed. For treatment, psychotherapy combined with in vivo exposure and pharmacotherapy is more efficacious than either treatment alone. In most cases, ps...

  11. Impersonation Attack on EKE Protocol

    OpenAIRE

    Shirisha Tallapally

    2010-01-01

    The key exchange protocol is one of the most elegant ways of establishing secure communication between pair of users by using a session key. The passwords are of low entropy, hence the protocol should resist all types of password guessing attacks. Recently ECC-3PEKE protocol has been proposed by Chang and Chang. They claimed the protocol is secure, efficient and practical. Unless their claims Yoon and Yoo presented an Undetectable online password guessing attack on the above protocol. A key r...

  12. Migraine attacks the Basal Ganglia

    OpenAIRE

    Bigal Marcelo; Brawn Jennifer; Pendse Gautam; Nutile Lauren; Becerra Lino; Maleki Nasim; Burstein Rami; Borsook David

    2011-01-01

    Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month). The pathophysiology of this progression is completely unknown. Attempting to unr...

  13. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  14. Metal Removal in Wastewater

    OpenAIRE

    Sanchez Roldan, Laura

    2014-01-01

    The aim of this work was to study Copper removal capacity of different algae species and their mixtures from the municipal wastewater. This project was implemented in the greenhouse in the laboratories of Tampere University of Applied Sciences and the wastewater used was the one from the Tampere municipal wastewater treatment plant. Five algae species and three mixtures of them were tested for their Copper removal potential in wastewater in one batch test run. The most efficient algae mixture...

  15. Design and Analysis of an Attack Resilient and Adaptive Medium access Control Protocol for Computer Networks

    CERN Document Server

    Shukla, Piyush Kumar; Bhadoria, Dr Sarita Singh

    2009-01-01

    The challenge of designing an efficient Medium Access Control (MAC) protocol and analyzing it has been an important research topic for over 30 years. This paper focuses on the performance analysis (through simulation) and modification of a well known MAC protocol CSMA/CD. The existing protocol does not consider the wastage of bandwidth due to unutilized periods of the channel. By considering this fact, performance of MAC protocol can be enhanced. The purpose of this work is to modify the existing protocol by enabling it to adapt according to state of the network. The modified protocol takes appropriate action whenever unutilized periods detected. In this way, to increase the effective bandwidth utilization and determine how it behaves under increasing load, and varying packet sizes. It will also include effects of attacks i.e. Denial of service attacks, Replay Attack, Continuous Channel Access or Exhaustion attack, Flooding attack, Jamming (Radio interference) attack, Selective forwarding attack which degrade...

  16. Evaluation of Wastewater Filtration

    OpenAIRE

    Benth, Bryant L.; Middlebrooks, E. Joe; George, Dennis B.; Reynolds, James H.

    1981-01-01

    Tertiary filtration of secondary wastewater is frequently used to improve wastewater treatment plant effluent quality. Four experimental filter columns were operated at the Preston, Idaho, Wastewater Treatment Plant to evaluate the effectiveness of granular media, gravity filtration. The Preston plant is a trickling filter secondary treatment plant and services a population of approximately 3600 people. Four filt...

  17. Integrated Hidden Markov Model and Bayes Packet Classifier for effective Mitigation of Application DDoS attacks

    OpenAIRE

    Prabha, S.; R Anitha

    2011-01-01

    Resisting distributed denial of service (DDoS) attacks become more challenging with the availability of resources and techniques to attackers. The application-layer-based DDoS attacks utilize legitimate HTTP requests to overwhelm victim resources are more undetectable and are protocol compliant and non-intrusive. Focusing on the detection for application layer DDoS attacks, the existing scheme provide an access matrix which capture the spatial-temporal patterns of a normal flash crowd on non ...

  18. Time Synchronization Attack in Smart Grid-Part I: Impact and Analysis

    OpenAIRE

    Zhang, Zhenghao; Gong, Shuping; Dimitrovski, Aleksandar D.; Li, Husheng

    2012-01-01

    Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel Time Synchronization Attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. Th...

  19. Vulnerability of water supply systems to cyber-physical attacks

    Science.gov (United States)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  20. VoIP Malware: Attack Tool & Attack Scenarios

    OpenAIRE

    Nassar, Mohamed; State, Radu; Festor, Olivier

    2009-01-01

    With the appearance of new Internet services like Voice over IP and IP television, malwares are in the way to update and extend their targets. In this paper, we discuss the emergence of a new generation of malwares attacking VoIP infrastructures and services. Such malwares constitute a real threat to the currently deployed VoIP architectures without strong security measures in place. We present one implemented environment that can be used to evaluate such attacks. Our ``VoIP bots'' support a ...

  1. RESIST SRP AGAINST WORMHOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Marjan Kuchaki Rafsanjani

    2013-06-01

    Full Text Available Ad-hoc networks refer to temporary or interim networks which form for special purposes. Actually they are wireless networks with mobile nodes. These networks use no network assisting element for path routing and in these networks available nodes are responsible for path routing. Therefore when malicious nodes want to find a way to interfere with the path routing then the existence of a secure route protocol (SRP can prevent the interference. SRP protocol is one of the secure algorithms of path routing protocol but it is notresistant against wormhole attack. Wormhole attack is considered as a subtle attack in which two malicious nodes make a short connection in network's topology through private or implicit connection and represent two non neighbor nodes as neighbors and prevent the correctoperation of path routing protocol by using this method. One of the methods of preventing wormhole attack is by using packet leashes. We try to decrease the wormhole attack occurrence in this routing protocol by a kind of packet leashes called temporal leashes. We alsowill minimize problems resulting from using temporal leashes by different methods and modifications in its structure.

  2. The potential of dairy wastewater for denitrification

    Directory of Open Access Journals (Sweden)

    Tibela Landeka Dragičević

    2010-09-01

    Full Text Available In this work the potential of dairy wastewater for denitrification process by means of a microbial culture of nitrificants and denitrificants was investigated. The aim of this work was to remove nitrate by using organic compounds from the dairy wastewater as an electron donors. The minimal ratio of COD/NO3-N of 10 (COD-chemical oxygen demand/NO3-N-nitrate nitrogen was required to achieve complete reduction of NO3-N. The microbial culture of nitrificants and denitrificants, that was previously adapted on the dairy wastewater, carried out nitrate reduction with a different substrate utilization rate. The denitrification rate of 5.75 mg NO3-N/Lh was achieved at the beginning of denitrification when the microbial culture utilizes readily biodegradable COD. Further degradation occurred with the denitrification rate of 1.7 mg NO3-N/Lh.

  3. Climate protection and wastewater. Practical examples for climate protection in the municipal wastewater treatment; Klimaschutz and Abwasser. Praxisbeispiele zum Klimaschutz in der kommunalen Abwasserbehandlung

    Energy Technology Data Exchange (ETDEWEB)

    Beisswenger, Klaus-Dieter; Wittkoetter, Franziska (comps.)

    2012-07-01

    The brochure under consideration reports on practical examples in the municipal wastewater treatment. It consists of the following contributions: (1) Introduction: Potentials of climate protection in the municipal waste water treatment (Franziska Wittkoetter); (2) Theenergy concept of the wastewater treatment plant Cologne (Heinz Brandenburg); (3) Mannheim on the way to an energy self-sufficient wastewater treatment plant (Agnes Haehnel-Schoenfelder); (4) The Wolfsburg model of utilization of wastewater - Example for sustainable water cycles and power cycles (Gerhard Meier); (5) Energetic utilization of sewage gas in Warendorf (Volker Cornelsen); (6) Thermal power station sewage plant Waiblingen: Utilization of wastewater heat with tradition (Rolf Bartel); (7) Production of energy from wastewater with the example of Donaumarkt Regensburg (Friedrich Bachsteffel); (8) Service center: Municipal climate protection - Information and consultancy for municipalities.

  4. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica...

  5. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst ...

  6. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on major American networks the first 24 hours...

  7. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  8. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number of a...

  9. Nitrification in Saline Industrial Wastewater

    NARCIS (Netherlands)

    Moussa, M.S.

    2004-01-01

    Biological nitrogen removal is widely and successfully applied for municipal wastewater. However, these experiences are not directly applicable to industrial wastewater, due to its specific composition. High salt levels in many industrial wastewaters affect nitrification negatively and improved unde

  10. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  11. A Study and Detection of TCP SYN Flood Attacks with IP spoofing and its Mitigations

    Directory of Open Access Journals (Sweden)

    Deepak Singh Rana

    2012-07-01

    Full Text Available Flooding attacks are major threats on TCP/IP protocol suite these days; Maximum attacks are launched through TCP and exploit the resources and bandwidth of the machine. Flooding attacks are DDOS (Distributed denial of service attacks and utilize the weakness of the network protocols. SYN flood exploits the 3-way handshaking of the TCP by sending many SYN request with IP spoofing technique to victim host and exhaust the backlog queue resource of the TCP and deny legitimate user to connect. Capturing the packet flow is very important to detecting the DOS attack. This paper present how the TCP SYN flood takes place and show the number of packets received by the victim server under the attack.

  12. Hydrogen attack evaluation of boiler tube using ultrasonic wave

    International Nuclear Information System (INIS)

    The presence of hydrogen in industrial plants is a source of damage. Hydrogen attack is one such form of degradation and often causing large tube ruptures that necessitate an immediate shutdown. Hydrogen attack may reduce the fracture toughness as well as the strength of steels. This reduction is caused partially by the presence of cavities and microcracks at the grain boundaries. In the past several techniques have been used with limited results. This paper describes the application of an ultrasonic velocity, attenuation and backscatter techniques for detecting the presence of hydrogen damage in utility boiler tubes. Ultrasonic tests showed a decrease in wave velocity and an increase in attenuation. Such results demonstrate the potential for ultrasonic nondestructive testing to quantify damage. Based on this study, recommendations are that both velocity and attenuation be used to detect hydrogen attack in steels.

  13. Anaerobic procedures of wastewater treatment

    OpenAIRE

    Zupančič, Tadeja

    2013-01-01

    Highly polluted wastewater is formed in dairies, pig farms and slaughterhouses. Before released into watercourses, wastewater should be properly processed with different treatment procedures in wastewater treatment plants. The thesis deals with the descriptions of mechanical, physical and chemical, and biological wastewater treatment procedures and the description of the factors which affect the reactions in wastewater treatment plants. I give special emphasis on anaerobic wastewater treatmen...

  14. Wastewater Industrial Contributors

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — Industrial contributors to municipal wastewater treatment facilities in Iowa for the National Pollutant Discharge Elimination System (NPDES) program.

  15. Network robustness under large-scale attacks

    CERN Document Server

    Zhou, Qing; Liu, Ruifang

    2012-01-01

    Network Robustness under Large-Scale Attacks provides the analysis of network robustness under attacks, with a focus on large-scale correlated physical attacks. The book begins with a thorough overview of the latest research and techniques to analyze the network responses to different types of attacks over various network topologies and connection models. It then introduces a new large-scale physical attack model coined as area attack, under which a new network robustness measure is introduced and applied to study the network responses. With this book, readers will learn the necessary tools to

  16. Hidden Attacks on Power Grid: Optimal Attack Strategies and Mitigation

    OpenAIRE

    Deka, Deepjyoti; Baldick, Ross; Vishwanath, Sriram

    2014-01-01

    Real time operation of the power grid and synchronism of its different elements require accurate estimation of its state variables. Errors in state estimation will lead to sub-optimal Optimal Power Flow (OPF) solutions and subsequent increase in the price of electricity in the market or, potentially overload and create line outages. This paper studies hidden data attacks on power systems by an adversary trying to manipulate state estimators. The adversary gains control of a few meters, and is...

  17. Detection of Attacks on MAODV Association Rule Mining Optimization

    Directory of Open Access Journals (Sweden)

    A. Fidalcastro

    2015-02-01

    Full Text Available Current mining algorithms can generate large number of rules and very slow to generate rules or generate few results, omitting interesting and valuable information. To address this problem, we propose an algorithm Optimized Featured Top Association Rules (OFTAR algorithm, where every attack have many features and some of the features are more important. The Features are selected by genetic algorithm and processed by the OFTAR algorithm to find the optimized rules. The algorithm utilizes Genetic Algorithm feature selection approach to find optimized features. OFTAR incorporate association rules with several rule optimization techniques and expansion techniques to improve efficiency. Increasing popularity of Mobile ad hoc network users of wireless networks lead to threats and attacks on MANET, due to its features. The main challenge in designing a MANET is protecting from various attacks in the network. Intrusion Detection System is required to monitor the network and to detect the malicious node in the network in multi casting mobility environment. The node features are processed in Association Analysis to generate rules, the generated rules are applied to nodes to detect the attacks. Experimental results show that the algorithm has higher scalability and good performance that is an advantageous to several association rule mining algorithms when the rule generation is controlled and optimized to detect the attacks.

  18. Research Note on the Energy Infrastructure Attack Database (EIAD

    Directory of Open Access Journals (Sweden)

    Jennifer Giroux

    2013-12-01

    Full Text Available The January 2013 attack on the In Amenas natural gas facility drew international attention. However this attack is part of a portrait of energy infrastructure targeting by non-state actors that spans the globe. Data drawn from the Energy Infrastructure Attack Database (EIAD shows that in the last decade there were, on average, nearly 400 annual attacks carried out by armed non-state actors on energy infrastructure worldwide, a figure that was well under 200 prior to 1999. This data reveals a global picture whereby violent non-state actors target energy infrastructures to air grievances, communicate to governments, impact state economic interests, or capture revenue in the form of hijacking, kidnapping ransoms, theft. And, for politically motivated groups, such as those engaged in insurgencies, attacking industry assets garners media coverage serving as a facilitator for international attention. This research note will introduce EIAD and position its utility within various research areas where the targeting of energy infrastructure, or more broadly energy infrastructure vulnerability, has been addressed, either directly or indirectly. We also provide a snapshot of the initial analysis of the data between 1980-2011, noting specific temporal and spatial trends, and then conclude with a brief discussion on the contribution of EIAD, highlighting future research trajectories. 

  19. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  20. Ciprofloxacin oxidation by UV-C activated peroxymonosulfate in wastewater

    Energy Technology Data Exchange (ETDEWEB)

    Mahdi-Ahmed, Moussa; Chiron, Serge, E-mail: Serge.Chiron@msem.univ-montp2.fr

    2014-01-30

    Highlights: • UV/PMS more efficient than UV/H{sub 2}O{sub 2} for ciprofloxacin removal in wastewater. • PMS decomposition into sulfate radical was activated by bicarbonate ions. • CIP degradation pathways elucidation support sulfate radical attacks as a main route. • Sulfate radical generation allows for CIP antibacterial activity elimination. -- Abstract: This work aimed at demonstrating the advantages to use sulfate radical anion for eliminating ciprofloxacin residues from treated domestic wastewater by comparing three UV-254 nm based advanced oxidation processes: UV/persulfate (PDS), UV/peroxymonosulfate (PMS) and UV/H{sub 2}O{sub 2}. In distilled water, the order of efficiency was UV/PDS > UV/PMS > UV/H{sub 2}O{sub 2} while in wastewater, the most efficient process was UV/PMS followed by UV/PDS and UV/H{sub 2}O{sub 2} mainly because PMS decomposition into sulfate radical anion was activated by bicarbonate ions. CIP was fully degraded in wastewater at pH 7 in 60 min for a [PMS]/[CIP] molar ratio of 20. Nine transformation products were identified by liquid chromatography–high resolution-mass spectrometry allowing for the establishment of degradation pathways in the UV/PMS system. Sulfate radical anion attacks prompted transformations at the piperazinyl ring through a one electron oxidation mechanism as a major pathway while hydroxyl radical attacks were mainly responsible for quinolone moiety transformations as a minor pathway. Sulfate radical anion generation has made UV/PMS a kinetically effective process in removing ciprofloxacin from wastewater with the elimination of ciprofloxacin antibacterial activity.

  1. Ciprofloxacin oxidation by UV-C activated peroxymonosulfate in wastewater

    International Nuclear Information System (INIS)

    Highlights: • UV/PMS more efficient than UV/H2O2 for ciprofloxacin removal in wastewater. • PMS decomposition into sulfate radical was activated by bicarbonate ions. • CIP degradation pathways elucidation support sulfate radical attacks as a main route. • Sulfate radical generation allows for CIP antibacterial activity elimination. -- Abstract: This work aimed at demonstrating the advantages to use sulfate radical anion for eliminating ciprofloxacin residues from treated domestic wastewater by comparing three UV-254 nm based advanced oxidation processes: UV/persulfate (PDS), UV/peroxymonosulfate (PMS) and UV/H2O2. In distilled water, the order of efficiency was UV/PDS > UV/PMS > UV/H2O2 while in wastewater, the most efficient process was UV/PMS followed by UV/PDS and UV/H2O2 mainly because PMS decomposition into sulfate radical anion was activated by bicarbonate ions. CIP was fully degraded in wastewater at pH 7 in 60 min for a [PMS]/[CIP] molar ratio of 20. Nine transformation products were identified by liquid chromatography–high resolution-mass spectrometry allowing for the establishment of degradation pathways in the UV/PMS system. Sulfate radical anion attacks prompted transformations at the piperazinyl ring through a one electron oxidation mechanism as a major pathway while hydroxyl radical attacks were mainly responsible for quinolone moiety transformations as a minor pathway. Sulfate radical anion generation has made UV/PMS a kinetically effective process in removing ciprofloxacin from wastewater with the elimination of ciprofloxacin antibacterial activity

  2. Intermittent hypoendorphinaemia in migraine attack.

    Science.gov (United States)

    Baldi, E; Salmon, S; Anselmi, B; Spillantini, M G; Cappelli, G; Brocchi, A; Sicuteri, F

    1982-06-01

    Beta-endorphin (RIA method, previous chromatographic extraction) was evaluated in plasma of migraine sufferers in free periods and during attacks. Decreased levels of the endogenous opioid peptide were found in plasma sampled during the attacks but not in free periods. Even chronic headache sufferers exhibited significantly lowered levels of beta-endorphin, when compared with control subjects with a negative personal and family history of head pains. The mechanism of the hypoendorphinaemia is unknown: lowered levels of the neuropeptide, which controls nociception, vegetative functions and hedonia, could be important in a syndrome such as migraine, characterized by pain, dysautonomia and anhedonia. The impairment of monoaminergic synapses ("empty neuron" condition) constantly present in sufferers from serious headaches, could be due to the fact that opioid neuropeptides, because of a receptoral or metabolic impairment, poorly modulate the respective monoaminergic neurons, resulting in imbalance of synaptic neurotransmission. PMID:6290072

  3. Diabetes Ups Risk of Heart Attack Death

    Science.gov (United States)

    ... 159557.html Diabetes Ups Risk of Heart Attack Death Study points to need for better coordinated care, ... people with diabetes have a higher risk of death after a heart attack. "We knew that following ...

  4. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    ... medlineplus.gov/ency/patientinstructions/000080.htm Diabetes - preventing heart attack and stroke To use the sharing features on ... with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure ...

  5. Heart attack - what to ask your doctor

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000231.htm Heart attack - what to ask your doctor To use the ... features on this page, please enable JavaScript. A heart attack occurs when blood flow to a part of ...

  6. Being active after a heart attack (image)

    Science.gov (United States)

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  7. DULOXETINE-RELATED PANIC ATTACKS

    OpenAIRE

    Sabljić, Vladimir; Rakun, Radmir; Ružić, Klementina; Grahovac, Tanja

    2011-01-01

    Side-effects arising on the grounds of antidepressant administration pose as a substantial obstacle hindering successful depressive disorder treatment. Side-effects, especially those severe or those manifested through dramatic clinical presentations such as panic attacks, make the treatment far more difficult and shake patients’ trust in both the treatment and the treating physician. This case report deals with a patient experiencing a moderately severe depressive episode, who respon...

  8. Characteristics of grey wastewater

    DEFF Research Database (Denmark)

    Eriksson, Eva; Auffarth, Karina Pipaluk Solvejg; Henze, Mogens;

    2002-01-01

    The composition of grey wastewater depends on sources and installations from where the water is drawn, e.g. kitchen, bathroom or laundry. The chemical compounds present originate from household chemicals, cooking, washing and the piping. In general grey wastewater contains lower levels of organic...

  9. Electrocoagulation in Wastewater Treatment

    OpenAIRE

    Mohammed Suleiman Al Ahmad; Ruth Yu-Li Yeh; Yung-Tse Hung; Erick Butler

    2011-01-01

    A review of the literature published in from 2008 to 2010 on topics related to electrochemical treatment within wastewater was presented. The review included several sections such as optimization, modeling, various wastewater treatment techniques, analytical and instrumentation, and comparison with other treatment methods.

  10. Electrocoagulation in Wastewater Treatment

    Directory of Open Access Journals (Sweden)

    Mohammed Suleiman Al Ahmad

    2011-04-01

    Full Text Available A review of the literature published in from 2008 to 2010 on topics related to electrochemical treatment within wastewater was presented. The review included several sections such as optimization, modeling, various wastewater treatment techniques, analytical and instrumentation, and comparison with other treatment methods.

  11. Analysis of Industrial Wastewaters.

    Science.gov (United States)

    Mancy, K. H.; Weber, W. J., Jr.

    A comprehensive, documented discussion of certain operating principles useful as guidelines for the analysis of industrial wastewaters is presented. Intended primarily for the chemist, engineer, or other professional person concerned with all aspects of industrial wastewater analysis, it is not to be considered as a substitute for standard manuals…

  12. Coyote Attacks: An Increasing Suburban Problem

    OpenAIRE

    Timm, Robert M.; Baker, Rex O.; Bennett, Joe R.; Coolahan, Craig C.

    2004-01-01

    Coyote attacks on humans and pets have increased within the past 5 years in California. We discuss documented occurrences of coyote aggression and attacks on people, using data from USDA Wildlife Services, the California Department of Fish & Game, and other sources. Forty-eight such attacks on children and adults were verified from 1998 through 2003, compared to 41 attacks during the period 1988 through 1997; most incidents occurred in Southern California near the suburban-wildland interfac...

  13. Sybil attack in Wireless Sensor Network

    OpenAIRE

    Abirami.K; Santhi.B

    2013-01-01

    Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for secur...

  14. Faked states attack and quantum cryptography protocols

    CERN Document Server

    Denny, Travis

    2011-01-01

    Leveraging quantum mechanics, cryptographers have devised provably secure key sharing protocols. Despite proving the security in theory, real-world application falls short of the ideal. Last year, cryptanalysts completed an experiment demonstrating a successful eavesdropping attack on commercial quantum key distribution (QKD) systems. This attack exploits a weakness in the typical real-world implementation of quantum cryptosystems. Cryptanalysts have successfully attacked several protocols. In this paper, we examine the Kak quantum cryptography protocol and how it may perform under such attacks.

  15. Panic attacks simulate presence of somatic illnesses

    OpenAIRE

    Latas Milan; Soldatović Ivan; Stamenović Marko; Starčević Vladan

    2009-01-01

    Introduction. Panic attacks are characterized with sudden attacks of anxiety with numerous somatic symptoms, such as palpitations, tachycardia, tachypnea, nausea, vertigo. The objective of this study was to analyze symptoms of panic attacks in patients with panic disorder, especially, to determine the specific relationship of somatic and neurological symptoms of panic attacks in boundaries of somatic systems. Material and methods. The study sample consisted of 97 patients with primary diagnos...

  16. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  17. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... Stroke More Understand Your Risks to Prevent a Heart Attack Updated:Aug 2,2016 Knowledge is power, so ... medication. This content was last reviewed June 2016. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  18. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    foreseeable while the rounds are performed. ECC (Elliptic Curve Cryptography) is used as a public key crypto system with the key purpose of creating a private shared between two participants in a communication network. Attacks on ECC include the Pohlig-Hellman attack and the Pollard's rho attack. Furthermore...

  19. A Novel Attack against Android Phones

    CERN Document Server

    Backes, Michael; von Styp-Rekowsky, Philipp

    2011-01-01

    In the first quarter of 2011, Android has become the top-selling operating system for smartphones. In this paper, we present a novel, highly critical attack that allows unprompted installation of arbitrary applications from the Android Market. Our attack is based on a single malicious application, which, in contrast to previously known attacks, does not require the user to grant it any permissions.

  20. Elimination of a Second-Law-Attack, and All Cable-Resistance-Based Attacks, in the Kirchhoff-Law-Johnson-Noise (KLJN Secure Key Exchange System

    Directory of Open Access Journals (Sweden)

    Laszlo B. Kish

    2014-10-01

    Full Text Available We introduce the so far most efficient attack against the Kirchhoff-law-Johnson-noise (KLJN secure key exchange system. This attack utilizes the lack of exact thermal equilibrium in practical applications and is based on cable resistance losses and the fact that the Second Law of Thermodynamics cannot provide full security when such losses are present. The new attack does not challenge the unconditional security of the KLJN scheme, but it puts more stringent demands on the security/privacy enhancing protocol than for any earlier attack. In this paper we present a simple defense protocol to fully eliminate this new attack by increasing the noise-temperature at the side of the smaller resistance value over the noise-temperature at the side with the greater resistance. It is shown that this simple protocol totally removes Eve’s information not only for the new attack but also for the old Bergou-Scheuer-Yariv attack. The presently most efficient attacks against the KLJN scheme are thereby completely nullified.

  1. Resilience of LTE networks against smart jamming attacks

    KAUST Repository

    Aziz, Farhan M.

    2014-12-08

    Commercial LTE networks are being studied for mission-critical applications, such as public safety and smart grid communications. In this paper, LTE networks are shown vulnerable to Denial-of-Service (DOS) and loss of service attacks from smart jammers, who may employ simple narrowband jamming techniques to attack without any need to hack the network or its users. We modeled the utilities of jamming and anti-jamming actions played by the jammer and the network under the framework of single-shot and repeated Bayesian games. In a single-shot game formulation the only Nash Equilibria (NE) are pure strategy equilibria at which network utility is severely compromised. We propose a repeated-game learning and strategy algorithm for the network that outperforms single-shot games by a significant margin. Furthermore, all of our proposed actions and algorithms can be implemented with current technology.

  2. Methods of Identifying and Preventing SQL Attacks

    Directory of Open Access Journals (Sweden)

    Bojken Shehu

    2012-11-01

    Full Text Available The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

  3. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  4. Energy Efficiency Strategies for Municipal Wastewater Treatment Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Daw, J.; Hallett, K.; DeWolfe, J.; Venner, I.

    2012-01-01

    Water and wastewater systems are significant energy consumers with an estimated 3%-4% of total U.S. electricity consumption used for the movement and treatment of water and wastewater. Water-energy issues are of growing importance in the context of water shortages, higher energy and material costs, and a changing climate. In this economic environment, it is in the best interest for utilities to find efficiencies, both in water and energy use. Performing energy audits at water and wastewater treatment facilities is one way community energy managers can identify opportunities to save money, energy, and water. In this paper the importance of energy use in wastewater facilities is illustrated by a case study of a process energy audit performed for Crested Butte, Colorado's wastewater treatment plant. The energy audit identified opportunities for significant energy savings by looking at power intensive unit processes such as influent pumping, aeration, ultraviolet disinfection, and solids handling. This case study presents best practices that can be readily adopted by facility managers in their pursuit of energy and financial savings in water and wastewater treatment. This paper is intended to improve community energy managers understanding of the role that the water and wastewater sector plays in a community's total energy consumption. The energy efficiency strategies described provide information on energy savings opportunities, which can be used as a basis for discussing energy management goals with water and wastewater treatment facility managers.

  5. Somatic panic-attack equivalents in a community sample of Rwandan widows who survived the 1994 genocide.

    Science.gov (United States)

    Hagengimana, Athanase; Hinton, Devon; Bird, Bruce; Pollack, Mark; Pitman, Roger K

    2003-01-25

    The present study is the first to attempt to determine rates of panic attacks, especially 'somatically focused' panic attacks, panic disorder, symptoms of post-traumatic stress disorder (PTSD), and depression levels in a population of Rwandans traumatized by the 1994 genocide. The following measures were utilized: the Rwandan Panic-Disorder Survey (RPDS); the Beck Depression Inventory (BDI); the Harvard Trauma Questionnaire (HTQ); and the PTSD Checklist (PCL). Forty of 100 Rwandan widows suffered somatically focused panic attacks during the previous 4 weeks. Thirty-five (87%) of those having panic attacks suffered panic disorder, making the rate of panic disorder for the entire sample 35%. Rwandan widows with panic attacks had greater psychopathology on all measures. Somatically focused panic-attack subtypes seem to constitute a key response to trauma in the Rwandan population. Future studies of traumatized non-Western populations should carefully assess not only somatoform disorder but also somatically focused panic attacks. PMID:12581815

  6. Attacking Embedded Systems through Power Analysis

    Directory of Open Access Journals (Sweden)

    Dr. Sastry JKR

    2011-03-01

    Full Text Available Embedded Systems are being used for the development and implementation of Safety and Mission Critical Systems. Malfunctions of such type of embedded systems will lead to disasters at times. The embedded systems must be fully secured from outside intervention in order to have effective functioning as well as to provide protective environment to these mission critical systems. There are several attacking systems discussed in the literature each requiring a kind of counter attacking system. Power Analysis and variations of power analysis are the significant attacking mechanisms discussed in the literature. Crypto servers are the main areas of attacking as they deal with securing the data that flow in-between several components of the embedded systems. Most of the attacking systems suggested in the litterer suffer from lack of experimental models to emulate the attacking system. An attacking system could be amply proved when several samples of data are used for attacking and the samples of data provides for knowledge base. In this paper an experimental setup is proposed which is an embedded system itself for creation of a Knowledgebase which shall form the basis for attacking. The experimental setup required for undertaking the actual attacking with the usage of the knowledgebase is also presented. Further the proposed attacking system is applied for mission critical system and the experimental results obtained through the simulation are also presented.

  7. Wastewater from monosodium glutamate industry as a low cost fertilizer source for corn (Zea mays L.)

    International Nuclear Information System (INIS)

    Nitrogen rich wastewater from monosodium glutamate industry (MSG) and paper-mill wastewater were used in this study as low cost fertilizers for growing corn, a common fuel crop. Detailed characterization of the wastewaters and toxicity testes were conducted to assure the safety of these wastewaters. In a greenhouse pot experiment, effects of these wastewaters on corn growth and biomass yield along with the soil properties were evaluated. MSG-wastewater was applied at three rates i.e., zero, 5 m3 ha-1 and 7.5 m3 ha-1 and paper-mill wastewater was applied at and zero, 3.5 m3 ha-1 and 5 m3 ha-1 in a complete randomized blocks design experiment. Significant increase in the corn biomass yield was observed in all the wastewater treatments compared to the Control. Both these wastewaters did not show any adverse effects on plant. N-use efficiency from the MSG-wastewater was comparable to urea-N application. This study emphasizes on sustainable practices for energy crop production by utilizing wastewaters as fertilizer sources. Hence, we report for the first time that the MSG-wastewater can be used for growing corn as a low cost green practice without adverse affects on the soil properties. -- Highlights: → MSG-wastewater acidity neutralization with highly alkaline paper-mill effluent is sustainable practice. → Growing fuel crops using wastewaters comprises multiple benefits on plant, soil, and environment. → Organic rich wastewaters improve SOC. → Co-application of MSG and paper-mill wastewaters stimulates humification.

  8. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  9. Hybrid constructed wetlands for wastewater treatment: A worldwide review

    OpenAIRE

    M.H. Sayadi; R. Kargar; M.R. Doosti, et al.

    2012-01-01

    The utilization of environmentally friendly and eco-safe wastewater treatment plan is nowadays widespread. This study aimed to assess the potentiality of hybrid constructed wetlands for treating of landfill leachate, river polluted water, domestic, industrial, hospital, runoff and agricultural wastewaters in lab-scale, pilot-scale and full-scale with various configurations. The results revealed that the hybrid constructed wetlands are effective to remove organic matter (BOD5, COD) and suspend...

  10. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  11. What Are the Symptoms of a Heart Attack?

    Science.gov (United States)

    ... on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks begin with the sudden, ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  12. An Anti-attack Model Based on Complex Network Theory in P2P networks

    CERN Document Server

    Peng, Hao; Zhao, Dandan; Zhang, Aixin; Li, Jianhua

    2011-01-01

    Complex network theory is a useful way to study many real systems. In this paper, an anti-attack model based on complex network theory is introduced. The mechanism of this model is based on dynamic compensation process and reverse percolation process in P2P networks. The main purpose of the paper is: (i) a dynamic compensation process can turn an attacked P2P network into a power-law (PL) network with exponential cutoff; (ii) a local healing process can restore the maximum degree of peers in an attacked P2P network to a normal level; (iii) a restoring process based on reverse percolation theory connects the fragmentary peers of an attacked P2P network together into a giant connected component. In this way, the model based on complex network theory can be effectively utilized for anti-attack and protection purposes in P2P networks.

  13. Attacking practical quantum key distribution system with wavelength dependent beam splitter and multi-wavelength sources

    CERN Document Server

    Li, Hong-Wei; Huang, Jing-Zheng; Chen, Wei; Yin, Zhen-Qiang; Li, Fang-Yi; Zhou, Zheng; Liu, Dong; Zhang, Yang; Guo, Guang-Can; Bao, Wan-Su; Han, Zheng-Fu

    2011-01-01

    Unconditional security of quantum key distribution protocol can be guaranteed by the basic property of quantum mechanics. Unfortunately, the practical quantum key distribution system always have some imperfections, and the practical system may be attacked if the imperfection can be controlled by the eavesdropper Eve. Applying the fatal security loophole introduced by the imperfect beam splitter's wavelength dependent optical property, we propose wavelength-dependent attacking model, which can be applied to almost all practical quantum key distribution systems with the passive state modulation and photon state detection after the practical beam splitter. Utilizing our attacking model, we experimentally demonstrate the attacking system based on practical polarization encoding quantum key distribution system with almost 100% success probability. Our result demonstrate that all practical devices require tightened security inspection for avoiding side channel attacks in practical quantum key distribution experimen...

  14. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  15. To mitigate Black-hole attack with CBDS in MANET

    OpenAIRE

    Navjot; Er.Pooja Ran

    2015-01-01

    Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperati...

  16. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  17. The Tokyo subway sarin attack-lessons learned

    International Nuclear Information System (INIS)

    The sarin gas attack in the Tokyo subway system is reviewed from a clinical toxicology perspective. Based on the lessons learned from this attack, the following areas should be addressed on a global scale. First, an adequate supply of protective equipment is required, including level B protective equipment with a pressure demand breathing apparatus. In addition, a system should be established that enables a possible cause to be determined based on symptoms, physical findings, general laboratory tests, and a simple qualitative analysis for poisonous substances. If an antidote is needed, the system should enable it to be administered to the victims as quickly as possible. Preparation for a large-scale chemical attack by terrorists requires the prior establishment of a detailed decontamination plan that utilizes not only mass decontamination facilities but also public facilities in the area. A system should be established for summarizing, evaluating, and disseminating information on poisonous substances. Finally, a large-scale scientific investigation of the Tokyo sarin attack should be conducted to examine its long-term and subclinical effects and the effects of exposure to asymptomatic low levels of sarin

  18. Skimming oily wastewater

    International Nuclear Information System (INIS)

    As large generators of oily wastewater tighten effluent controls, the US Environmental Protection Agency (EPA) is targeting smaller generators. Some of the firms receiving their attention are smaller manufacturing plants, automotive garages, mobile equipment service shops and truck farms. Many of these firms do not have access to a sanitary sewer system that will accept oily wastewater. One EPA concern is that oily wastewater will find its way into an underground aquifer that is a source of drinking water. Many oily wastes contain organic and inorganic chemicals in concentrations that exceed the primary drinking water standards established by the Safe Drinking Water Act. So the focus of one EPA program is aimed at preventing contamination of groundwater by controlling oil wastewater at the generator's site

  19. Wastewater Treatment Plants

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — The actual treatment areas for municipal, industrial, and semi-public wastewater treatment facilities in Iowa for the National Pollutant Discharge Elimination...

  20. Wastewater Treatment Facilities

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — Individual permits for municipal, industrial, and semi-public wastewater treatment facilities in Iowa for the National Pollutant Discharge Elimination System...

  1. TECHNICAL AND ECONOMICAL SOLUTION IN SEWAGE SLUDGE MANAGEMENT OF THE MUNICIPAL WASTEWATER TREATMENT PLANTS

    OpenAIRE

    Natalia Pasterak; Bożena Maria Mrowiec

    2015-01-01

    The paper presents a comparison of realized wastewater sludge disposal processes in six municipal wastewater treatment plants with a pe of 50 000 to 400 000. For that evaluation, quantity and quality of raw wastewater, functioning line of sludge disposal, the quantity and quality of the produced sludge and their utilization were the important issues. A significant element of the assessment was also action in introducing modern technologies in the aspect of reducing the sludge storage.

  2. Chlorella vulgaris production enhancement with supplementation of synthetic medium in dairy manure wastewater

    OpenAIRE

    Shi, Jun; Pandey, Pramod K.; Franz, Annaliese K.; Deng, Huiping; Jeannotte, Richard

    2016-01-01

    To identify innovative ways for better utilizing flushed dairy manure wastewater, we have assessed the effect of dairy manure and supplementation with synthetic medium on the growth of Chlorella vulgaris. A series of experiments were carried out to study the impacts of pretreatment of dairy wastewater and the benefits of supplementing dairy manure wastewater with synthetic medium on C. vulgaris growth increment and the ultrastructure (chloroplast, starch, lipid, and cell wall) of C. vulgaris ...

  3. Percolation of localized attack on complex networks

    CERN Document Server

    Shao, Shuai; Stanley, H Eugene; Havlin, Shlomo

    2014-01-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erd\\H{o}s-R\\'{e}nyi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  4. Attack methodology Analysis: SQL Injection Attacks and Their Applicability to Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston

    2005-09-01

    Database applications have become a core component in control systems and their associated record keeping utilities. Traditional security models attempt to secure systems by isolating core software components and concentrating security efforts against threats specific to those computers or software components. Database security within control systems follows these models by using generally independent systems that rely on one another for proper functionality. The high level of reliance between the two systems creates an expanded threat surface. To understand the scope of a threat surface, all segments of the control system, with an emphasis on entry points, must be examined. The communication link between data and decision layers is the primary attack surface for SQL injection. This paper facilitates understanding what SQL injection is and why it is a significant threat to control system environments.

  5. DETECTING SLEEP DEPRIVATION ATTACK OVER MANET USING A DANGER THEORY-BASED ALGORITHM

    Directory of Open Access Journals (Sweden)

    Maha Abdelhaq

    2011-01-01

    Full Text Available MANET is a collection of mobile, decentralized, and self organized nodes. Securing MANET is a problem which adds more challenges on the research. This is because MANET properties make it harder to be secured than the other types of static networks. This paper objective is to summarize different types of attacks over MANET, and concerns with studying sleep deprivation attack. Therefore, this paper utilizes one of the danger theory intrusion detection algorithms, namely, the dendritic cell algorithm (DCA to detect the sleep deprivation attack over MANET. In this paper, DCA is plugged in a proposed mobile dendritic cell algorithm called MDCA which represented through a proposed MDCA architecture.

  6. Classification of Attacks in Wireless Sensor Networks

    OpenAIRE

    Messai, Mohamed-Lamine

    2014-01-01

    In wireless sensor networks (WSNs), security has a vital importance. Recently, there was a huge interest to propose security solutions in WSNs because of their applications in both civilian and military domains. Adversaries can launch different types of attacks, and cryptography is used to countering these attacks. This paper presents challenges of security and a classification of the different possible attacks in WSNs. The problems of security in each layer of the network's OSI model are dis...

  7. Detection Block Model for SQL Injection Attacks

    OpenAIRE

    Diksha G. Kumar; Madhumita Chatterjee

    2014-01-01

    With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack te...

  8. New Framework to Detect and Prevent Denial of Service Attack in Cloud Computing Environment

    Directory of Open Access Journals (Sweden)

    Mohd Nazri Ismail

    2012-08-01

    Full Text Available Cloud computing paradigm as one of new concept in world of computing in general and especially in computer network, give a new facilities such as IaaS (infrastructure as service, PaaS (platform as stricter and SaaS (software as service. All this services offered by utilization of new and old techniques such as resources sharing distributed networking, virtualization. But it still suffering from some shortages and one of the most important one is security threats. and one of the most dangers is Distributed denial-of-service (DDoS, and for overcome this threat many techniques has been proposed and most of them give more attention to one aspect either detecting or preventing or tracing the sources of attack and a few which address the attack in all its aspect. here we propose new framework to counter this attack by detect the attack using covariance matrix statistical method and determine the sources of attack using TTl Distance average and Finlay we apply a technique to eliminate attack by get benefit from the Honeypot method to block all attacks sources and transfer the legitimate traffic to another virtual machine not affected by attack.

  9. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

    Science.gov (United States)

    Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y

    2016-04-01

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures. PMID:25847370

  10. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to...... properties of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs....

  11. Detecting Denial of Service Attacks in Tor

    Science.gov (United States)

    Danner, Norman; Krizanc, Danny; Liberatore, Marc

    Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we propose an algorithm for detecting such attacks and examine the effectiveness of the obvious approach to evading such detection. We implement a simplified version of the detection algorithm and study whether the attack may be in progress on the current Tor network. Our preliminary measurements indicate that the attack was probably not implemented during the period we observed the network.

  12. Off-Path Attacking the Web

    CERN Document Server

    Gilad, Yossi

    2012-01-01

    We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured with SSL/TLS. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a the victim client machine, and attacker capable of IP-spoofing on the Internet. Our attacks use a technique allowing an off-path attacker to learn the sequence numbers of both client and server in a TCP connection. The technique exploits the fact that many computers, in particular those running Windows, use a global IP-ID counter, which provides a side channel allowing efficient exposure of the connection sequence numbers. We present results of experiments evaluating the learning technique and the attacks ...

  13. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  14. Reclamation and reuse of distributed wastewater and programming based on cost analysis

    Institute of Scientific and Technical Information of China (English)

    HE Jun-guo; HAN Bao-ping; XU Chun-sheng; LI Ke; ZHANG Jie

    2010-01-01

    In order to improve the water environment of Songhua River,develop and maintain a healthy water cycle,the article has made theoretical and mathematical analyses of wastewater treatment and reuse.It proposes that the important link of sustainable utilization of urban water resources is wastewater treatment and reuse,and the main approach of sustainable utilization of water resources is water saving,wastewater reclamation and reuse.Through establishing the cost equation of recycle water system and optimizing it by Matlab,an optimal treatment scale of the city recycle distributed wastewater system is obtained.The principles of recycle water system in northern areas are put forward based on the research of sustainable utilization of water resource in Songbei district.The results can provide experiences and references for water saving,wastewater reclamation and reuse in northern cities of China.

  15. Treatment Of Wastewater For Reuse With Mobile Electron Beam Plant

    International Nuclear Information System (INIS)

    The use of alternative disinfectants to chlorine for the wastewater treatment has received increasing attention in recent years to treat either liquid or solids streams within wastewater treatment plants for pathogens and trace organics (TOrCs). Although several technologies have come to the forefront as an alternative to chlorine (e.g., ultraviolet [UV] and hydrogen peroxide), the majority of these technologies are chemically based, with the exception of UV. An attractive physical disinfection approach is by electron beam (EB) irradiation. EB treatment of wastewater leads to their purification from various pollutants. It is caused by the decomposition of pollutants as a result of their reactions with highly reactive species formed from water radiolysis: hydrated electron, OH free radical and H atom [Pikaev (1986)]. Sometimes methods such as EB with biological treatment, adsorption and others improve the effect of EB treatment of the wastewater purification. In the process of EB treatment of wastewater there are utilized chemical transformations of pollutants induced by ionizing radiation. At sufficiently high absorbed doses these transformations can result in complete decomposition (removal) of the substance. Under real conditions, i.e., at rather high content of pollutants in a wastewater and economically acceptable doses, partial decomposition of pollutant takes place as well as transformations of pollutant molecules that result in improving subsequent purification stages, efficiency of the process being notably influenced by irradiation conditions and wastewater composition [Woods and Pikaev (1994)]. (author)

  16. Agent Based Preventive Measure for UDP Flood Attack in DDoS Attacks

    Directory of Open Access Journals (Sweden)

    AARTI SINGH,

    2010-08-01

    Full Text Available Distributed Denial-of-Service (DDoS attack is an attack which makes victim resources and services unavailable to its intended users. In particular, User Datagram Protocol (UDP flood attack in DDoS attacks is a method causing host based denial of service. It occurs when attacker sends UDP packets to a random port on the victim system,causing responses to be sent to forged IP address. The basic thrust of this paper is agent based solution for UDP lood attack because software agent technology seems to be a strong candidate for defending DDoS attacks and very few researchers have thought of deploying agents towards providing solution for UDP attack earlier.

  17. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  18. Attacks and Countermeasures in Social Network Data Publishing

    Institute of Scientific and Technical Information of China (English)

    XIANG Yang

    2016-01-01

    With the increasing prevalence of social networks, more and more social network data are published for many applications, such as social network analysis and data mining. However, this brings privacy problems. For example, adversaries can get sensitive in⁃formation of some individuals easily with little background knowledge. How to publish social network data for analysis purpose while preserving the privacy of individuals has raised many concerns. Many algorithms have been proposed to address this issue. In this paper, we discuss this privacy problem from two aspects: attack models and countermeasures. We analyse privacy con⁃cerns, model the background knowledge that adversary may utilize and review the recently developed attack models. We then sur⁃vey the state⁃of⁃the⁃art privacy preserving methods in two categories: anonymization methods and differential privacy methods. We also provide research directions in this area.

  19. Wastewater Mass Rates as a Sustainable Wastewater Treatment Plant Indicator

    OpenAIRE

    Neilands, R; Govša, J; Gjunsburgs, B

    2012-01-01

    his article presents a methodology for wastewater treatment plant sustainability consideration and process evaluation in to the selection of wastewater treatment process improvement options. For illustration, the indicator approach is applied to a case study of the Jurmala town wastewater treatment plant in Latvia.

  20. RECOVERY AND DESTRUCTIVE TREATMENT OF HARMFUL SUBSTANCE IN COKING PLANT WASTEWATER

    Institute of Scientific and Technical Information of China (English)

    Cheng Jianguang

    2000-01-01

    This paper discussed the comprehensive treatment of coking plant effluent.Cyanide-containing and phenol wastewater was first recovered and utilized respectively, and then, mixed it with other low harmful wastewater for destroying treatment.Treated water was reused in quenching coke.

  1. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  2. Wastewater treatment after reactive printing

    OpenAIRE

    Šostar-Turk, Sonja; Simonič, Marjana; Petrinić, Irena

    2012-01-01

    Membrane filtration of wastewater after textile printing with reactive dyes isdescribed. The wastewater from a Slovenian factory, whose output is approx. 80% reactive dyes printed and dyed on cotton, was studied. In particular, the presence of urea, sodium alginate, oxidation agent and reactive dyes, used forthe printing paste preparation, in the wastewater was studied. Chemical analyses of actual, non-purified, wastewater showed that many Slovenian regulations were exceeded. The study of mem...

  3. Microalgal biofilms for wastewater treatment

    OpenAIRE

    Boelee, N.C.

    2013-01-01

    The objective of this thesis was to explore the possibilities of using microalgal biofilms for the treatment of municipal wastewater, with a focus on the post-treatment of municipal wastewater effluent. The potential of microalgal biofilms for wastewater treatment was first investigated using a scenario analysis. Then biofilms were grown on wastewater treatment plant effluent in horizontal flow cells under different nutrient loads to determine the maximum uptake capacity of the biofilms for N...

  4. Decontamination of piggery wastewater by lettuce planted in a floating phytoremediation system and its comprehensive utilization%漂浮栽培直叶生菜对猪场废水的净化及其利用

    Institute of Scientific and Technical Information of China (English)

    钟宁; 蔡秋亮

    2014-01-01

    在漂浮植物修复系统中种植直叶生菜对猪场废水进行净化试验。结果表明:经过28 d种植之后,生菜对供试猪场废水中总氮、氨氮、总磷、可溶性磷、COD的去除率分别达51.73%、59.45%、57.52%、41.11%、60.15%,其贡献量分别达27.95%、30.08%、21.02%、15.56%、20.64%;在供试废水中栽培直叶生菜的生物量显著高于土壤栽培的生物量,而且生产植株体内NO3--N、P、Zn、Cu等含量均显著低于土培后的生菜。%Lettuce(Sativa L. var. longigolia lam.) has been planted in a floating phytoremediation system for the de-contamination of piggery wastewater. The results show that after lettuce has been planted for 28 days ,the removing rates of total N(TN),ammonia-nitrogen(NH4+-N),nitrate-nitrogen(NO3--N),total P(TP),soluble P(SP),chemical oxygen demand(COD) by the plant are 51.73%,59.45%,57.52%,41.11%and 60.15%respectively,and contribu-tion rates of TN,NH4+-N,TP,SP and COD are 27.95%,30.08%,21.02%,15.56% and 20.64% respectively. The biomass of lettuce planted in the wastewater for experiments is obviously higher than that of lettuce planted in soils. Furthermore,the contents of NO3--N,P,Zn,Cu,etc. in the body of the plant in the floating phytoremediation system are significantly lower than that in soils.

  5. A Efficient Approach for Password Attacks

    Directory of Open Access Journals (Sweden)

    I. Naga Geethika

    2014-03-01

    Full Text Available Online password guessing attacks has emerged as a major problem in password based systems. To avoid this we implemented many solutions day by day to restrict bruteforce attacks and password guessing attacks and dictionary attacks. The approach in this paper is that using of mobile alert messages and giving options to the mobile user for more security that will intimate admin that someone is trying to hack his email. The legal users/attackers are challenged to answer the code that is sent to the mobile to retrieve the login page when the number of failed login attempts from a single machine crosses certain threshold value. This protocol uses either the IP addresses of the machines or the browser cookies, or both to identify the machines from which successful logins are made previously. A machine is said to be known when a successful login is made from it and its IP address is added to whitelist. The main goal of this protocol is to limit the attackers with a few failed login attempts made from each unknown machine and forcing them to challenge the security options. Attackers can have a threshold value (For ex 5 which is Whenever a user/attacker types an invalid username.

  6. Panic attacks simulate presence of somatic illnesses

    Directory of Open Access Journals (Sweden)

    Latas Milan

    2009-01-01

    Full Text Available Introduction. Panic attacks are characterized with sudden attacks of anxiety with numerous somatic symptoms, such as palpitations, tachycardia, tachypnea, nausea, vertigo. The objective of this study was to analyze symptoms of panic attacks in patients with panic disorder, especially, to determine the specific relationship of somatic and neurological symptoms of panic attacks in boundaries of somatic systems. Material and methods. The study sample consisted of 97 patients with primary diagnosis of panic disorder, without any acute, severe and unstable somatic illness. The presence and frequency of symptoms of panic attacks were estimated by the Panic Disorder Questionnaire. Results. The study results indicate that the most frequent symptoms of panic attacks were cardiological signs (heart pounding or racing and trembling, followed by unsteady and fainting feeling symptoms, sweating, respiratory symptoms and gastroenterological symptoms. The results of correlation analyses indicate that symptoms of panic attacks classified into cardio-vascular, gastro-enterological, respiratory and neuro-otological systems show statistically significant correlations. Conclusion. The results of analyses of symptoms of panic attacks point to their intercorrelation. This specific association of the symptoms, if they are examined on their own in the patients, could lead to false clinical manifestation of some somatic illness. Therefore, it is necessary to analyze adequately and make the proper differential diagnosis of patients with panic disorder.

  7. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    Stevens, M.M.J.

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfi

  8. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  9. The cost of attack in competing networks.

    Science.gov (United States)

    Podobnik, B; Horvatic, D; Lipic, T; Perc, M; Buldú, J M; Stanley, H E

    2015-11-01

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor's nodes after their long inactivity. However, owing to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilience dynamics for two competing networks. Within this formalism, we determine the cost and optimal duration of an attack, allowing a network to evaluate the risk of initiating hostilities. PMID:26490628

  10. Automated Detection System for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Dr K.V.N.Sunitha

    2010-10-01

    Full Text Available Many software systems have evolved to include a Web-based component that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. One of these attacks is SQL Injection vulnerability (SQLIV, which can give attackers unrestricted access to the databases that underlie Web applications and has become increasingly frequent and serious. The intent is that Web applications will limit the kinds of queries that can be generated to a safe subset of all possible queries, regardless of what input users provide. SQL Injection attacks are possible due to the design drawbacks of the web sites, which interact with back-end databases. Successful attacks may damage more. We introduce a system that deals with new automated technique for preventing SQLIA based on the novel concept of regular expressions is to detect SQL Injection attacks. The proposed system can detect the attacks that are from Internet and Insider Attacks, by analyzing the packets of the network servers.

  11. Problems with textile wastewater discharge

    International Nuclear Information System (INIS)

    The general character of textile industry wastewaters is briefly discussed. General guidelines and practice in Finland when discharging textile industry wastewaters to municipal sewer systems is described. A survey revealed that most municipalities experience some problems due to textile industry wastewaters. Pretreatment is not always practiced and in some cases pretreatment is not operated efficiently. (author)

  12. Microalgal biofilms for wastewater treatment

    NARCIS (Netherlands)

    Boelee, N.C.

    2013-01-01

    The objective of this thesis was to explore the possibilities of using microalgal biofilms for the treatment of municipal wastewater, with a focus on the post-treatment of municipal wastewater effluent. The potential of microalgal biofilms for wastewater treatment was first investigated using a scen

  13. Evaluating Deterioration of Concrete by Sulfate Attack

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Effects of factors such as water to cement ratio, fly ash and silica fume on the resistance of concrete to sulfate attack were investigated by dry-wet cycles and immersion method. The index of the resistance to sulfate attack was used to evaluate the deterioration degree of concrete damaged by sulfate. The relationship between the resistance of concrete to sulfate attack and its permeability/porosity were analyzed as well as its responding mechanism. Results show that the depth of sulfate crystal attack from surface to inner of concrete can be reduced by decreasing w/c and addition of combining fly ash with silica fume. The variation of relative elastic modulus ratio and relative flexural strength ratio of various specimens before and after being subjected to sulfate attack was compared.

  14. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  15. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  16. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers....

  17. New Multi-step Worm Attack Model

    CERN Document Server

    Robiah, Y; Shahrin, S; Faizal, M A; Zaki, M Mohd; Marliza, R

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

  18. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  19. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  20. Treatment of electroplating wastewater

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    To study the feasibility of treated water being used as rinsing water with CP/ED (chemical precipitation/electrodialysis) system, the relation between concentration of Cr (VI) and conductivity of water is investigated, the effect of electrodialysis (ED) for different wastewater is also studied. And several parameters of importance that are relevant to the process are identified. Analysis of ICP (Inductively coupled plasma) and IC (Ion chromatography) shows that the main reason of conductivity increase in CP treated water is the increase of Na+ and Cl- ions. The 93.8%-100% of ions from wastewater both in ED and CP/ED systems was removed successfully. The results of experiments indicate that the CP/ED system is a feasible method for electroplating wastewater treatment, the CP/ED system used as a way of wastwater is not only in favour of environment, but also economic beneficial to achieve.

  1. Detection Block Model for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Diksha G. Kumar

    2014-10-01

    Full Text Available With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack.

  2. Research on First Attack Probability Model of an Attacker Level Bombing Anti-air Radars

    Institute of Scientific and Technical Information of China (English)

    LUO Peng-cheng; MU Fu-ling; ZHOU Jing-lun

    2007-01-01

    The paper mainly studies the first attack probability (FAP) of an attacker level bombing anti-air radars through analyzing the radiant point orientation and attack (RPOA) process of attackers. Firstly, the searching target process is analyzed, and a corresponding target finding model is brought forward. Secondly, the target approaching process is concretely analyzed when the attacker levelly bombs the anti-air radar, and a corresponding target approaching model is presented. Finally, a demonstration is given to analyze the major factors in the model and prove its validity.

  3. Wastewater Treatment Models

    DEFF Research Database (Denmark)

    Gernaey, Krist; Sin, Gürkan

    2008-01-01

    The state-of-the-art level reached in modeling wastewater treatment plants (WWTPs) is reported. For suspended growth systems, WWTP models have evolved from simple description of biological removal of organic carbon and nitrogen in aeration tanks (ASM1 in 1987) to more advanced levels including...... practice of WWTP modeling by linking the wastewater treatment line with the sludge handling line in one modeling platform. Application of WWTP models is currently rather time consuming and thus expensive due to the high model complexity, and requires a great deal of process knowledge and modeling expertise...

  4. Wastewater treatment models

    DEFF Research Database (Denmark)

    Gernaey, Krist; Sin, Gürkan

    2011-01-01

    The state-of-the-art level reached in modeling wastewater treatment plants (WWTPs) is reported. For suspended growth systems, WWTP models have evolved from simple description of biological removal of organic carbon and nitrogen in aeration tanks (ASM1 in 1987) to more advanced levels including...... WWTP modeling by linking the wastewater treatment line with the sludge handling line in one modeling platform. Application of WWTP models is currently rather time consuming and thus expensive due to the high model complexity, and requires a great deal of process knowledge and modeling expertise...

  5. Biokinetic study for SRC-I wastewater

    Energy Technology Data Exchange (ETDEWEB)

    1984-06-01

    Biooxidation is an important part of the overall wastewater treatment system for the proposed SRC-I Demonstration Plant in Newman, Kentucky. After the completion of a Baseline Design for the plant in April 1982, various refinements were evaluated. One of these was the inclusion of a process for phenol recovery from four sour-water streams. As part of this evaluation, an extensive laboratory treatability study was conducted on wastewaters both with and without this phenol recovery step. The purpose of the study was to compare the results of different treatment schemes on different wastewaters and did not include the development of the kinetic coefficients that govern the biooxidation process. Additional treatability testing documented herein, has been performed to establish the kinetic coefficients for biooxidation of the SRC-I wastewaters. This will provide a rational basis for any subsequent changes in design. The wastewater feed used in this study was process recycle water from the Fort Lewis, Washington, pilot plant. Prior to biooxidation, it was pretreated by solvent extraction for removal of phenolics and by steam stripping for removal of ammonia and hydrogen sulfide. Two, 2-stage bench scale bioreactors were operated for approximately eight months, during which time they were stabilized at various steady-state conditions. Kinetic coefficients were evaluated according to the Lawrence and McCarty model, based on BOD, COD, and TOC. Nitrification, oxygen utilization, and solids settling velocities were also studied. The results showed that BOD is a poor basis for the model mainly because almost all BOD/sub 5/ was removed at all steady-state conditions. Also, the model was more accurate for steady-state conditions of lower solids retention times. The bulk of both organic and ammonia reductions occurred in the first stage reactors.

  6. Reduction in toxicity of wastewater from three wastewater treatment plants to alga (Scenedesmus obliquus) in northeast China.

    Science.gov (United States)

    Zhang, Ying; Sun, Qing; Zhou, Jiti; Masunaga, Shigeki; Ma, Fang

    2015-09-01

    The toxicity of municipal wastewater to the receiving water bodies is still unknown, due to the lack of regulated toxicity based index for wastewater discharge in China. Our study aims at gaining insight into the acute toxic effects of local municipal wastewater on alga, Scenedesmus obliquus. Four endpoints, i.e. cell density, chlorophyll-A concentration, superoxide dismutase (SOD) activity and cell membrane integrity, of alga were analyzed to characterize the acute toxicity effects of wastewater from municipal wastewater treatment plants (WWTPs) with different treatment techniques: sequencing batch reactor (SBR), Linpor and conventional activated sludge. Influent and effluent from each treatment stage in these three WWTPs were sampled and evaluated for their acute toxicity. Our results showed that all three techniques can completely affect the algal chlorophyll-A synthesis stimulation effects of influent; the algal cell growth stimulation effect was only completely removed by the secondary treatment process in conventional activated sludge technique; toxic effects on cell membrane integrity of two influents from WWTPs with SBR and conventional activated sludge techniques were completely removed; the acute toxicity on SOD activity was partially reduced in SBR and conventional activated sludge techniques while not significantly reduced by Linpor system. As to the disinfection unit, NaClO disinfection enhanced wastewater toxicity dramatically while UV radiation had no remarkable influence on wastewater toxicity. Our results illustrated that SOD activity and chlorophyll-A synthesis were relatively sensitive to municipal wastewater toxicity. Our results would aid to understand the acute toxicity of municipal wastewater, as well as the toxicity removal by currently utilized treatment techniques in China. PMID:25996525

  7. Opportunities for Automated Demand Response in California Wastewater Treatment Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Aghajanzadeh, Arian [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Wray, Craig [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); McKane, Aimee [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2015-08-30

    Previous research over a period of six years has identified wastewater treatment facilities as good candidates for demand response (DR), automated demand response (Auto-­DR), and Energy Efficiency (EE) measures. This report summarizes that work, including the characteristics of wastewater treatment facilities, the nature of the wastewater stream, energy used and demand, as well as details of the wastewater treatment process. It also discusses control systems and automated demand response opportunities. Furthermore, this report summarizes the DR potential of three wastewater treatment facilities. In particular, Lawrence Berkeley National Laboratory (LBNL) has collected data at these facilities from control systems, submetered process equipment, utility electricity demand records, and governmental weather stations. The collected data were then used to generate a summary of wastewater power demand, factors affecting that demand, and demand response capabilities. These case studies show that facilities that have implemented energy efficiency measures and that have centralized control systems are well suited to shed or shift electrical loads in response to financial incentives, utility bill savings, and/or opportunities to enhance reliability of service. In summary, municipal wastewater treatment energy demand in California is large, and energy-­intensive equipment offers significant potential for automated demand response. In particular, large load reductions were achieved by targeting effluent pumps and centrifuges. One of the limiting factors to implementing demand response is the reaction of effluent turbidity to reduced aeration at an earlier stage of the process. Another limiting factor is that cogeneration capabilities of municipal facilities, including existing power purchase agreements and utility receptiveness to purchasing electricity from cogeneration facilities, limit a facility’s potential to participate in other DR activities.

  8. Dielectric Barrier Discharge Plasma-Induced Photocatalysis and Ozonation for the Treatment of Wastewater

    Science.gov (United States)

    Mok, Young Sun; Jo, Jin-Oh; Lee, Heon-Ju

    2008-02-01

    The physicochemical processes of dielectric barrier discharge (DBD) such as in-situ formation of chemically active species and emission of ultraviolet (UV)/visible light were utilized for the treatment of a simulated wastewater formed with Acid Red 4 as the model organic contaminant. The chemically active species (mostly ozone) produced in the DBD reactor were well distributed in the wastewater using a porous gas diffuser, thereby increasing the gas-liquid contact area. For the purpose of making the best use of the light emission, a titanium oxide-based photocatalyst was incorporated in the wastewater treating system. The experimental parameters chosen were the voltage applied to the DBD reactor, the initial pH of the wastewater, and the concentration of hydrogen peroxide added to the wastewater. The results have clearly shown that the present system capable of degrading organic contaminants in two ways (photocatalysis and ozonation) may be a promising wastewater treatment technology.

  9. Dielectric Barrier Discharge Plasma-Induced Photocatalysis and Ozonation for the Treatment of Wastewater

    Institute of Scientific and Technical Information of China (English)

    MOK Young Sun; JO Jin-Oh; LEE Heon-Ju

    2008-01-01

    The physicochemical processes of dielectric barrier discharge (DBD) such as in-situ formation of chemically active species and emission of ultraviolet (UV)/visible light were utilized for the treatment of a simulated wastewater formed with Acid Red 4 as the model organic contaminant. The chemically active species (mostly ozone) produced in the DBD reactor were well distributed in the wastewater using a porous gas diffuser, thereby increasing the gas-liquid contact area. For the purpose of making the best use of the light emission, a titanium oxide-based photocatalyst was incorporated in the wastewater treating system. The experimental parameters chosen were the voltage applied to the DBD reactor, the initial pH of the wastewater, and the concentration of hydrogen peroxide added to the wastewater. The results have clearly shown that the present system capable of degrading organic contaminants in two ways (photocatalysis and ozonation) may be a promising wastewater treatment technology.

  10. Dielectric Barrier Discharge Plasma-Induced Photocatalysis and Ozonation for the Treatment of Wastewater

    International Nuclear Information System (INIS)

    The physicochemical processes of dielectric barrier discharge (DBD) such as in-situ formation of chemically active species and emission of ultraviolet (UV)/visible light were utilized for the treatment of a simulated wastewater formed with Acid Red 4 as the model organic contaminant. The chemically active species (mostly ozone) produced in the DBD reactor were well distributed in the wastewater using a porous gas diffuser, thereby increasing the gas-liquid contact area. For the purpose of making the best use of the light emission, a titanium oxide-based photocatalyst was incorporated in the wastewater treating system. The experimental parameters chosen were the voltage applied to the DBD reactor, the initial pH of the wastewater, and the concentration of hydrogen peroxide added to the wastewater. The results have clearly shown that the present system capable of degrading organic contaminants in two ways (photocatalysis and ozonation) may be a promising wastewater treatment technology.

  11. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  12. Forensics Investigation of Web Application Security Attacks

    Directory of Open Access Journals (Sweden)

    Amor Lazzez

    2015-02-01

    Full Text Available Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.

  13. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  14. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  15. Detecting relay attacks on RFID communication systems using quantum bits

    Science.gov (United States)

    Jannati, Hoda; Ardeshir-Larijani, Ebrahim

    2016-08-01

    RFID systems became widespread in variety of applications because of their simplicity in manufacturing and usability. In the province of critical infrastructure protection, RFID systems are usually employed to identify and track people, objects and vehicles that enter restricted areas. The most important vulnerability which is prevalent among all protocols employed in RFID systems is against relay attacks. Until now, to protect RFID systems against this kind of attack, the only approach is the utilization of distance-bounding protocols which are not applicable over low-cost devices such as RFID passive tags. This work presents a novel technique using emerging quantum technologies to detect relay attacks on RFID systems. Recently, it is demonstrated that quantum key distribution (QKD) can be implemented in a client-server scheme where client only requires an on-chip polarization rotator that may be integrated into a handheld device. Now we present our technique for a tag-reader scenario which needs similar resources as the mentioned QKD scheme. We argue that our technique requires less resources and provides lower probability of false alarm for the system, compared with distance-bounding protocols, and may pave the way to enhance the security of current RFID systems.

  16. Sanitization Techniques against Personal Information Inference Attack on Social Network

    Directory of Open Access Journals (Sweden)

    Jyoti B.Mhaske

    2014-12-01

    Full Text Available Online social networking has become one of the most popular activities on the web. Online social networks such as Facebook are increasingly utilized by many people. OSNs allow users to control and customize what personal information is available to other users. These networks allow users to publish details about themselves and to connect to their friends. Some of the information revealed inside these networks is meant to be private. A privacy breach occurs when sensitive information about the user the information that an individual wants to keep from public is disclosed to an adversary. Yet it is possible to use learning algorithms on released data to predict private information. Private information leakage could be an important issue in some cases. Here the goal is simulate the inference attacks using released social networking data to predict private information. In the proposed system desired use of data and individual privacy presents an opportunity for privacy preserving social network data mining. Here in the system there are three possible sanitization techniques that could be used in various situations for preventing inference attack, those techniques are removing details, adding some new information and manipulate some field these techniques are used for preventing inference attack.

  17. Denial of Service Attack: Analysis of Network Traffic Anormaly using Queuing Theory

    CERN Document Server

    Singh, Neetu; Chaudhuri, Pranay

    2010-01-01

    Denial-of-service (DOS) attacks increasingly gained reputation over the past few years. As the Internet becomes more ubiquitous, the threat of the denial-of-service attacks becomes more realistic and important for individuals, businesses, governmental organizations, and even countries. There is intensive need to detect an attack in progress as soon as possible. The efficiency of diagnosing the DOS attack using concepts of queuing theory and performance parameter of the system has been investigated in the present work, as the servers definitely have some mechanisms to store and process the requests. Utilizing this concept of queuing theory, the collection of data patterns were generated. With the performance parameter of the system, the analysis of the data pattern had been made to diagnose the network anomaly. Performance analysis and results show the accuracy of the proposed scheme in detecting anomalies.

  18. Vietnam Urban Wastewater Review

    OpenAIRE

    World Bank

    2013-01-01

    Vietnam is facing the challenge of trying to keep pace with increasing environmental pollution associated with rapid urbanization, especially in the larger cities. Over the past 20 years, the Government of Vietnam has made considerable effort to develop urban sanitation policies, legislations and regulations, and to invest in urban sanitation including wastewater treatment systems. This st...

  19. FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER

    Institute of Scientific and Technical Information of China (English)

    Ma Weiju; Feng Dengguo

    2006-01-01

    A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper.This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the security of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.

  20. Review Paper on Flooding Attack in MANET

    Directory of Open Access Journals (Sweden)

    Ruchita Meher,

    2014-01-01

    Full Text Available Mobile ad-hoc network (MANET is widely applicable in various areas like military services, civilian environments and emergency operations. The issues in MANET are broadcasting, clustering, mobility management, bandwidth management and power management. Broadcasting becomes an important issue in MANET for route information discovery. The different routing attacks in MANET are flooding, black hole, link spoofing and wormhole attack. In this paper we are representing works proposed by various author on flooding attack. Our contribution in this paper is that we have presented details comparison of various counter based schemes.

  1. RAPTOR: Routing Attacks on Privacy in Tor

    OpenAIRE

    Sun, Yixin; Edmundson, Anne; Vanbever, Laurent; Li, Oscar; Rexford, Jennifer; Chiang, Mung; Mittal, Prateek

    2015-01-01

    The Tor network is a widely used system for anonymous communication. However, Tor is known to be vulnerable to attackers who can observe traffic at both ends of the communication path. In this paper, we show that prior attacks are just the tip of the iceberg. We present a suite of new attacks, called Raptor, that can be launched by Autonomous Systems (ASes) to compromise user anonymity. First, AS-level adversaries can exploit the asymmetric nature of Internet routing to increase the chance of...

  2. Security Attacks On MANET Routing Protocols

    Directory of Open Access Journals (Sweden)

    Chiragkumar V. Patel

    2013-10-01

    Full Text Available The paper gives idea about various routing protocols for Mobile Ad-Hoc Network against security issues. MANET is vulnerable to various security attacks due to its dynamically changing topology, self configurable nature and lack of centralized control. Malicious node can significantly degrade the performance and reliability of Ad-hoc Network routing protocols. From the survey it has been made quite clear that basic MANET protocols are vulnerable to various routing attacks. While Secure AODV (SAODV routing protocol performs quite well to improve performance in presence of security attack in MANET.

  3. Who Is at Risk for a Heart Attack?

    Science.gov (United States)

    ... on Twitter. Who Is at Risk for a Heart Attack? Certain risk factors make it more likely that ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  4. Proposed Methodology for Securing Wireless LANs from Wormhole Attack

    OpenAIRE

    Patel, A K; Jaypalsinh. A. Gohil; D.T. Meva

    2010-01-01

    Wormhole attacks enable an attacker with limited Resources and no cryptographic material to wreak havoc on wireless networks. Initial research focused that this attack is possible only on Adhoc networks, but in present condition wormhole attack is possible on infrastructure based wireless LANs also. We propose architecture and analyze the possibility of wormhole attack along with a countermeasure to avoid such an attack. The proposed mechanism involves the shared information between commun...

  5. A study on the treatment of industrial wastewater containing heavy metals

    International Nuclear Information System (INIS)

    It is essential to treat heavy metals contained in industrial wastewater safely and economically for the protection of the environment. An effective method of separating heavy metals using acornic acid for the first time in the world must be utilized for wastewater treatment. One of the merits of this method lies in its cheap treatment cost. Furthermore, the secondary contamination, which occurs often when chemical purifiers are used, could be minimized. Another advantage of utilizing the acornic acid is that various kinds of heavy metals contained in industrial wastewater can be purified at once. The final purpose of this project is to commercialize the method by 1994. (Auther)

  6. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  7. Recovery of infrastructure networks after localised attacks

    Science.gov (United States)

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  8. SECURING MANET FROM BLACKHOLE AND WORMHOLE ATTACKS

    Directory of Open Access Journals (Sweden)

    C.M.Vidhyapathi

    2013-06-01

    Full Text Available Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol. Blackhole and Wormhole nodes are malicious nodeswhich degrade the performance of the network. They actively participate in the network and conform to forward packets to the destination. The Watchdog Mechanism is used to correct the network from both blackhole and wormhole attacks. The networks originally, with the attacks and after being prevented from attacks are compared on the basis of packets received, throughput, end-to-end delay and packet delivery ratio. ns2 software is used for the simulation.

  9. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  10. Karachi Commander Escapes Attack, 10 Dead

    Institute of Scientific and Technical Information of China (English)

    潘志强

    2004-01-01

    KARACHI: The army commander in the Pakistani city of Karachi narrowly① escaped assassination② yesterday when gunmen attacked his convoy③ with gunfire and a bomb, killing at least 10 and wounding his driver, officials said.

  11. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  12. AN APPROACH OF DEFENDING AGAINST DDOS ATTACK

    Institute of Scientific and Technical Information of China (English)

    Wu Zhijun; Duan Haixin; Li Xing

    2006-01-01

    An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%,drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP 1200.

  13. A NEW METHOD FOR RESYNCHRONIZATION ATTACK

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(217), and that of O(267) for LILI-128.

  14. Desynchronization Attacks on RFID Security Protocols

    Directory of Open Access Journals (Sweden)

    Miaolei Deng

    2013-02-01

    Full Text Available The characteristics of radio frequency identification (RFID systems introduce growing security and privacy concerns. RFID systems need security protocols to provide confidentiality, user privacy, mutual authentication and etc. Many security protocols for the RFID system have been presented. This paper analyze several of the newest RFID security protocols which proposed by Niu et al., Fu et al. and Habibi et al. respectively form the security viewpoint of data desynchronization attack. These lightweight protocols were expected to proposed security protections for the RFID system and safeguard against almost all major attacks. However, we found that these RFID security protocols were vulnerable to the attack of data desynchronization. Based on strand spaces model, data desynchronization attacks on these protocols were analyzed and described. Furthermore, improvements to overcome the security vulnerabilities of two protocols presented by Niu et al. and Fu et al. were given.

  15. Dengue Virus May Bolster Zika's Attack

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_159534.html Dengue Virus May Bolster Zika's Attack Prior exposure to ... 23, 2016 (HealthDay News) -- Prior exposure to the dengue fever virus may increase the severity of Zika ...

  16. Fault attacks on two software countermeasures

    OpenAIRE

    Moro, Nicolas; Heydemann, Karine; Dehbaoui, Amine; Robisson, Bruno; Encrenaz, Emmanuelle

    2014-01-01

    Short version of the article "Experimental evaluation of two software countermeasures against fault attacks" presented at the 2014 IEEE Symposium on Hardware-Oriented Security and Trust (HOST) in May 2014.

  17. Integrated control of the wastewater system – potentials and barriers

    DEFF Research Database (Denmark)

    Mollerup, Ane Loft; Grum, Morten; Muschalla, Dirk;

    2013-01-01

    Applying integrated control to a sewer system and wastewater treatment plant often leads to additional benefits for both systems when compared to controlling them independently. However, barriers such as a lack of incentive for utilities to put this type of control in place mean that in practice...

  18. CASE STUDY OF SQL INJECTION ATTACKS

    OpenAIRE

    Sonakshi*, Rakesh Kumar, Girdhar Gopal

    2016-01-01

    Today, most of the web applications are associated with database at back-end so there are possibilities of SQL injection attacks (SQLIA) on it. A number of preventive measures have also been discovered by various researchers to overcome this attack, but which measure is more convenient and provides fast access to application without compromising the security is also a major concern nowadays. This paper provides a clear distinction among different types of SQLIAs and how these can be performed...

  19. Compiling symbolic attacks to protocol implementation tests

    OpenAIRE

    Michael Rusinowitch; Ghazi Maatoug; Hatem Ghabri

    2013-01-01

    Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically g...

  20. Panic Attack during Elective Gastrointestinal Endoscopy

    OpenAIRE

    Charalampos Mitsonis; Nikolaos Dimopoulos; Marianna Zavrou; Vassiliki Psarra; Christos Giofkos; Christos Fiorakis; Athanasios Dimitriadis; Dimitrios Valavanis; Eleni Vousoura; Iannis Zervas; Efstathios Papavassiliou

    2011-01-01

    Background. Esophagogastroduodenoscopy (EGD) and colonoscopy (CS) can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE). Methods. The study population comprised of 79 Greek outpatie...

  1. Attacks in WEB Based Embedded Applications

    OpenAIRE

    C. Yaashuwanth; Ramesh, R.

    2010-01-01

    This paper deals with the issues related to embedded applications when they are implemented in internet. There are various attacks in embedded systems when implemented in the internet. These attacks have a negligible effect in the operating system which results in the decrease in the system performance. But in embedded system case, it has life and death consequence attached to it. Many of these embedded systems work in hazardous environment where a system failure results to catastrophic effec...

  2. Wireless Sensor Networks Attacks and Solutions

    OpenAIRE

    Alajmi, Naser

    2014-01-01

    A few years ago, wireless sensor networks (WSNs) used by only military. Now, we have seen many of organizations use WSNs for some purposes such as weather, pollution, traffic control, and healthcare. Security is becoming on these days a major concern for wireless sensor network. In this paper I focus on the security types of attacks and their detection. This paper anatomizes the security requirements and security attacks in wireless sensor networks. Also, indicate to the benchmarks for the se...

  3. Cluster headache attacks and multiple sclerosis

    OpenAIRE

    Gentile, Salvatore; Ferrero, Margherita; Vaula, Giovanna; Rainero, Innocenzo; Pinessi, Lorenzo

    2007-01-01

    We report the case of a patient who developed typical cluster headache attacks and was diagnosed as having multiple sclerosis (MS) at the same time. The headache attacks resolved after i.v. treatment with methylprednisolone. MR imaging showed a pontine demyelinating lesion involving the trigeminal nerve root inlet area, on the same side as the pain. The association between cluster headache and MS has been rarely described before. This case suggests that in patients with cluster headache neuro...

  4. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  5. Two Improved Multiple-Differential Collision Attacks

    OpenAIRE

    An Wang; Liji Wu; Zongyue Wang; Xuexin Zheng; Man Chen; Jing Ma

    2014-01-01

    In CHES 2008, Bogdanov proposed multiple-differential collision attacks which could be applied to the power analysis attacks on practical cryptographic systems. However, due to the effect of countermeasures on FPGA, there are some difficulties during the collision detection, such as local high noise and the lack of sampling points. In this paper, keypoints voting test is proposed for solving these problems, which can increase the success ratio from 35% to 95% on the example of one implementat...

  6. Various Database Attacks and its Prevention Techniques

    OpenAIRE

    K.A.VarunKumar; M.Prabakaran; Ajay Kaurav; S.Sibi Chakkaravarthy; Thiyagarajan, S; Pokala Venkatesh

    2014-01-01

    Increasing in the popularity of internet, the application of database also widely spread. There are some serious threats because of hackers done various attempts to steal the data in the database. Various attacks like Sql injection, Cross site scripting may change the information in the databases which decreases the truthfulness of the database. Intrusion detection system is used to detect whether the attack is carried on the database. In this paper we surveyed different types of database att...

  7. Private Circuits II versus Fault Injection Attacks

    OpenAIRE

    Rakotomalala, Henitsoa; Ngo, Xuan Thuy; Najm, Zakaria; Danger, Jean-Luc; Guilley, Sylvain

    2015-01-01

    —Cryptographic implementations are subject to physical attacks. Private circuits II is a proven protection against a strong attacker, able to read and write on a finite number of chosen internal nodes. In practice, side-channel analyses and fault injections are less accurate: typically, classical injection techniques (clock and power glitches, electromagnetic pulses, etc.) can be reproducible, but they do not allow to choose the targeted nodes (the situation is different for software dual-rai...

  8. Logical Modes of Attack in Argumentation Networks

    OpenAIRE

    Gabbay, Dov M.; Garcez, A. S. D. Avila

    2009-01-01

    This paper studies methodologically robust options for giving logical contents to nodes in abstract argumentation networks. It defines a variety of notions of attack in terms of the logical contents of the nodes in a network. General properties of logics are refined both in the object level and in the meta level to suit the needs of the application. The network-based system improves upon some of the attempts in the literature to define attacks in terms of defeasible proofs, the...

  9. Session Initiation Protocol Attacks and Challenges

    OpenAIRE

    Keshavarz, Hassan; Sattari, Mohammad Reza Jabbarpour; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are comp...

  10. Agricultural use of treated municipal wastewaters preserving environmental sustainability

    Directory of Open Access Journals (Sweden)

    Pietro Rubino

    2007-07-01

    Full Text Available In this paper the utility of the treated municipal wastewaters in agriculture, analyzing the chemical, physical and microbiological characteristics and their pollution indicators evaluation are being illustrated. Some methods employed for treating wastewaters are examined, as well as instructions and rules actually in force in different countries of the world, for evaluating the legislative hygienic and sanitary and agronomic problems connected with the treated wastewaters use, are being collected and compared. Successively, in order to provide useful indications for the use of treated municipal wastewaters, results of long-term field researches, carried out in Puglia, regarding two types of waters (treated municipal wastewater and conventional water and two irrigation methods (drip and capillary sub-irrigation on vegetable crops grown in succession, are being reported. For each crop cycle, chemical physical and microbiological analyses have been performed on irrigation water, soil and crop samples. The results evidenced that although irrigating with waters having high colimetric values, higher than those indicated by law and with two different irrigation methods, never soil and marketable yield pollutions have been observed. Moreover, the probability to take infection and/or disease for ingestion of fruits coming from crops irrigated with treated wastewaters, calculated by Beta-Poisson method, resulted negligible and equal to 1 person for 100 millions of exposed people. Concentrations of heavy metals in soil and crops were lesser than those admissible by law. The free chlorine, coming from disinfection, found in the wastewaters used for watering, in some cases caused toxicity effects, which determined significant yield decreases. Therefore, municipal wastewaters, if well treated, can be used for irrigation representing a valid alternative to the conventional ones.

  11. To mitigate Black-hole attack with CBDS in MANET

    Directory of Open Access Journals (Sweden)

    Navjot

    2015-06-01

    Full Text Available Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.

  12. Noncombatants and liability to be attacked in wars

    DEFF Research Database (Denmark)

    Lippert-Rasmussen, Kasper

    2013-01-01

    attack," I mean that S has forfeited his or her right not to be attacked by armed forces. Here, "liable" is used in a normative-cum-legal sense, not descriptively as it is when one says "some colors are liable to darken in perpetual shade," and "attack" is used passively, as an equivalent of be attacked...... mean to focus on intended, as opposed to incidental, attacks. Finally, although "attack" often implies initiation of a conflict ("I didn't attack him! He started it!"), it does not do so here. An unjust aggressor who initiates a conflict can be, and indeed very often is, liable to attack. All...

  13. Electrochemical wastewater treatment directly powered by photovoltaic panels: electrooxidation of a dye-containing wastewater.

    Science.gov (United States)

    Valero, David; Ortiz, Juan M; Expósito, Eduardo; Montiel, Vicente; Aldaz, Antonio

    2010-07-01

    Electrochemical technologies have proved to be useful for the treatment of wastewater, but to enhance their green characteristics it seems interesting to use a green electric energy such as that provided by photovoltaic (PV) cells, which are actually under active research to decrease the economic cost of solar kW. The aim of this work is to demonstrate the feasibility and utility of using an electrooxidation system directly powered by a photovoltaic array for the treatment of a wastewater. The experimental system used was an industrial electrochemical filter press reactor and a 40-module PV array. The influence on the degradation of a dye-containing solution (Remazol RB 133) of different experimental parameters such as the PV array and electrochemical reactor configurations has been studied. It has been demonstrated that the electrical configuration of the PV array has a strong influence on the optimal use of the electric energy generated. The optimum PV array configuration changes with the intensity of the solar irradiation, the conductivity of the solution, and the concentration of pollutant in the wastewater. A useful and effective methodology to adjust the EO-PV system operation conditions to the wastewater treatment is proposed. PMID:20540540

  14. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  15. Electrochemical disinfection of toilet wastewater using wastewater electrolysis cell

    OpenAIRE

    Huang, Xiao; Qu, Yan; Cid, Clément A.; Finke, Cody; Hoffmann, Michael R; Lim, Keahying; Jiang, Sunny C.

    2016-01-01

    The paucity of proper sanitation facilities has contributed to the spread of waterborne diseases in many developing countries. The primary goal of this study was to demonstrate the feasibility of using a wastewater electrolysis cell (WEC) for toilet wastewater disinfection. The treated wastewater was designed to reuse for toilet flushing and agricultural irrigation. Laboratory-scale electrochemical (EC) disinfection experiments were performed to investigate the disinfection efficiency of the ...

  16. Identification of wastewater processes

    DEFF Research Database (Denmark)

    Carstensen, Niels Jacob

    The introduction of on-line sensors for monitoring of nutrient salts concentrations on wastewater treatment plants with nutrient removal, opens a wide new area of modelling wastewater processes. The subject of this thesis is the formulation of operational dynamic models based on time series...... of ammonia, nitrate, and phosphate concentrations, which are measured in the aeration tanks of the biological nutrient removal system. The alternatign operation modes of the BIO-DENITRO and BIO-DENIPHO processes are of particular interest. Time series models of the hydraulic and biological processes are very......-known theory of the processes with the significant effects found in data. These models are called grey box models, and they contain rate expressions for the processes of influent load of nutrients, transport of nutrients between the aeration tanks, hydrolysis and growth of biomass, nitrification...

  17. Constructed Wetlands for Wastewater Treatment

    OpenAIRE

    Jan Vymazal

    2010-01-01

    The first experiments using wetland macrophytes for wastewater treatment were carried out in Germany in the early 1950s. Since then, the constructed wetlands have evolved into a reliable wastewater treatment technology for various types of wastewater. The classification of constructed wetlands is based on: the vegetation type (emergent, submerged, floating leaved, free-floating); hydrology (free water surface and subsurface flow); and subsurface flow wetlands can be further classified accordi...

  18. VARIATION OF PURIFIED WASTEWATER EFFLUENT

    OpenAIRE

    Izabela Bartkowska

    2016-01-01

    Proper functioning of the elements of the system of discharge and purification of waste water depends to a large extent on their proper engineering. Correct manufacturing and operation of these elements is also essential. The most important parameter for designing is the wastewater volume. The article presents analysis of the sewage amount with the town of Olecko as an example. Analysed was the volumes of wastewater in between 201 and 2014. The largest monthly wastewater volume was recor...

  19. Comprehensive techno-economic analysis of wastewater-based algal biofuel production: A case study.

    Science.gov (United States)

    Xin, Chunhua; Addy, Min M; Zhao, Jinyu; Cheng, Yanling; Cheng, Sibo; Mu, Dongyan; Liu, Yuhuan; Ding, Rijia; Chen, Paul; Ruan, Roger

    2016-07-01

    Combining algae cultivation and wastewater treatment for biofuel production is considered the feasible way for resource utilization. An updated comprehensive techno-economic analysis method that integrates resources availability into techno-economic analysis was employed to evaluate the wastewater-based algal biofuel production with the consideration of wastewater treatment improvement, greenhouse gases emissions, biofuel production costs, and coproduct utilization. An innovative approach consisting of microalgae cultivation on centrate wastewater, microalgae harvest through flocculation, solar drying of biomass, pyrolysis of biomass to bio-oil, and utilization of co-products, was analyzed and shown to yield profound positive results in comparison with others. The estimated break even selling price of biofuel ($2.23/gallon) is very close to the acceptable level. The approach would have better overall benefits and the internal rate of return would increase up to 18.7% if three critical components, namely cultivation, harvest, and downstream conversion could achieve breakthroughs. PMID:27039331

  20. Biomembranes for wastewater treatment

    OpenAIRE

    Aznar Jiménez, Antonio

    2008-01-01

    Engineering laboratory for wastewater treatment of UC3M (Spain), optimizes the set-up and the design of membrane bioreactors (MBR), advised for higher quality of the treated water or to increase the treatment capacity. MBR system is a versatile method that achieves a fast depuration of biodegradable water, where nitrogen and phosphorous removal can be integrated in a simple way. Companies interested in applying or developing this technology or micro and ultra filtration membrane produc...

  1. Wastewater treatment with algae

    Energy Technology Data Exchange (ETDEWEB)

    Wong Yukshan [Hong Kong Univ. of Science and Technology, Kowloon (China). Research Centre; Tam, N.F.Y. [eds.] [City Univ. of Hong Kong, Kowloon (China). Dept. of Biology and Chemistry

    1998-05-01

    Immobilized algal technology for wastewater treatment purposes. Removal of copper by free and immobilized microalga, Chlorella vulgaris. Biosorption of heavy metals by microalgae in batch and continuous systems. Microalgal removal of organic and inorganic metal species from aqueous solution. Bioaccumulation and biotransformation of arsenic, antimony and bismuth compounds by freshwater algae. Metal ion binding by biomass derived from nonliving algae, lichens, water hyacinth root and spagnum moss. Metal resistance and accumulation in cyanobacteria. (orig.)

  2. PFP Wastewater Sampling Facility

    International Nuclear Information System (INIS)

    This test report documents the results obtained while conducting operational testing of the sampling equipment in the 225-WC building, the PFP Wastewater Sampling Facility. The Wastewater Sampling Facility houses equipment to sample and monitor the PFP's liquid effluents before discharging the stream to the 200 Area Treated Effluent Disposal Facility (TEDF). The majority of the streams are not radioactive and discharges from the PFP Heating, Ventilation, and Air Conditioning (HVAC). The streams that might be contaminated are processed through the Low Level Waste Treatment Facility (LLWTF) before discharging to TEDF. The sampling equipment consists of two flow-proportional composite samplers, an ultrasonic flowmeter, pH and conductivity monitors, chart recorder, and associated relays and current isolators to interconnect the equipment to allow proper operation. Data signals from the monitors are received in the 234-5Z Shift Office which contains a chart recorder and alarm annunciator panel. The data signals are also duplicated and sent to the TEDF control room through the Local Control Unit (LCU). Performing the OTP has verified the operability of the PFP wastewater sampling system. This Operability Test Report documents the acceptance of the sampling system for use

  3. Parametric approximation of airfoil aerodynamic coefficients at high angles of attack

    DEFF Research Database (Denmark)

    Skrzypinski, Witold Robert; Zahle, Frederik; Bak, Christian

    2014-01-01

    Three methods for estimating the lift and drag curves in the 360° angle of attack (α) range with harmonic approximation functions were analyzed in the present work. The first method assumes aerodynamic response of a flat plate, the second utilizes even sine and even cosine approximation functions...

  4. Innovation in Radioactive Wastewater Stream Management

    International Nuclear Information System (INIS)

    Treatment of radioactive wastewater streams is receiving considerable attention in most countries having nuclear reactors. Among these countries is Egypt, which has two nuclear research reactors. The first research reactor, ETRR-1, has been in operation over 40 years, resulting in the accumulation of large quantities of wastewater collected in special drainage tanks (SDTs). Previous attempts were aimed at the volumetric reduction of streams present in SDTs, by a reverse osmoses (RO) system. The proposed RO system previously succeeded in reducing the water volume present in SDTs from 450 m3 to 50 m3 (during the period 1998 to 2000). The main drawbacks of the RO system are the additional amount of secondary wastes (turbidity and emulsion filters media replacement, and the excessive amounts of chemicals for cleaning, flushing and storing of the membranes), and a limited contaminant release in the SDTs area, resulting in the decommissioning of the RO system. Meanwhile, the SDTs waste contents reached 500 m3, according to the inspection project of ETRR-1. Recently, an invention of a system for volume reduction of the wastewater streams present in SDTs has been achieved. This system substantially utilized the air conditioning and ventilation techniques in water transfer from the wastewater to air. This process is promoted by mutual heating and humidification of compressed dry air introduced through SDTs (or in another tank). From the point of view of the probable release of radioactive nuclides, the analysis of the evaporation of waste streams present in SDTs has indicated that the proposed optimal evaporating temperature is around 75oC. The design curve of the daily volumetric reduction of the wastewater streams versus the necessary volumetric airflow rates at different operating temperature has been achieved. The evaporating temperature varied from 40oC to 95oC with a step of 5oC. The obtained curve illustrates that the required volumetric airflow rate utilized to

  5. A quantitative method to evaluate microbial electrolysis cell effectiveness for energy recovery and wastewater treatment

    KAUST Repository

    Ivanov, Ivan

    2013-10-01

    Microbial electrolysis cells (MECs) are potential candidates for sustainable wastewater treatment as they allow for recovery of the energy input by producing valuable chemicals such as hydrogen gas. Evaluating the effectiveness of MEC treatment for different wastewaters requires new approaches to quantify performance, and the establishment of specific procedures and parameters to characterize the outcome of fed-batch treatability tests. It is shown here that Coulombic efficiency can be used to directly calculate energy consumption relative to wastewater treatment in terms of COD removal, and that the average current, not maximum current, is a better metric to evaluate the rate of the bioelectrochemical reactions. The utility of these methods was demonstrated using simulated current profiles and actual wastewater tests. Industrial and domestic wastewaters were evaluated using small volume MECs, and different inoculation strategies. The energy needed for treatment was 2.17kWhkgCOD-1 for industrial wastewater and 2.59kWhkgCOD-1 for domestic wastewater. When these wastewaters were combined in equal amounts, the energy required was reduced to 0.63kWhkgCOD-1. Acclimation of the MEC to domestic wastewater, prior to tests with industrial wastewaters, was the easiest and most direct method to optimize MEC performance for industrial wastewater treatment. A pre-acclimated MEC accomplished the same removal (1847 ± 53 mg L-1) as reactor acclimated to only the industrial wastewater (1839 ± 57 mg L-1), but treatment was achieved in significantly less time (70 h versus 238 h). © 2013, Hydrogen Energy Publications, LLC. Published by Elsevier Ltd. All rights reserved.

  6. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  7. Detecting and Localizing Wireless Network Attacks Techniques

    Directory of Open Access Journals (Sweden)

    Iyad Aldasouqi

    2010-03-01

    Full Text Available In order to increase employee productivity within a feasible budget, we have to track newtechnologies, investigate and choose the best plan and implementation of these technologies.WLAN is vulnerable to malicious attacks due to their shared medium in unlicensed frequencyspectrum, thus requiring security features for a variety of applications.This paper will discuss some techniques and approaches which can help to detect, localize andidentify wireless network attacks, which present a unique set of challenges to IT and securityprofessionals. All efforts were focusing on the ability to identity based attacks in which amalicious device uses forged MAC addresses to masquerade as a specific client or to createmultiple illegitimate identities. Also, to be sure that the network is able to robustly identify eachtransmitter independently of packet contents, allowing detection of a large class of identity-basedattacks with high probability.The attacker can listen to all wireless traffic, compromise encryption and Use attenuators,amplifiers, directional antennas, software radios, but he cannot be at the location of user or at thelocation of access points. However, we have to choose the best design, implementation, andevaluation techniques in order to secure our network from attackers, where our choice willdepend on a technical implementation to mitigate the risk on the enterprise network infrastructure.

  8. Power analysis attacks revealing the secrets of smart cards

    CERN Document Server

    Mangard, Stefan; Popp, Thomas

    2008-01-01

    A comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. It discusses simple and differential power analysis as well as advanced techniques like template attacks.

  9. Coronary Artery Dissection: Not Just a Heart Attack

    Science.gov (United States)

    ... Stroke More Coronary Artery Dissection: Not Just a Heart Attack Updated:May 24,2016 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  10. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  11. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2016-01-01

    approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  12. Water Pollution: Part I, Municipal Wastewaters; Part II, Industrial Wastewaters.

    Science.gov (United States)

    Fowler, K. E. M.

    This publication is an annotated bibliography of municipal and industrial wastewater literature. This publication consists of two parts plus appendices. Part one is entitled Municipal Wastewaters and includes publications in such areas as health effects of polluted waters, federal policy and legislation, biology and chemistry of polluted water,…

  13. A Probabilistic Framework for Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.; Halappanavar, Mahantesh

    2015-12-28

    Quantification and propagation of uncertainties in cyber attacker payoffs is a key aspect within multiplayer, stochastic security games. These payoffs may represent penalties or rewards associated with player actions and are subject to various sources of uncertainty, including: (1) cyber-system state, (2) attacker type, (3) choice of player actions, and (4) cyber-system state transitions over time. Past research has primarily focused on representing defender beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and mathematical intervals. For cyber-systems, probability distributions may help address statistical (aleatory) uncertainties where the defender may assume inherent variability or randomness in the factors contributing to the attacker payoffs. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as generalizations of probability boxes. This paper explores the mathematical treatment of such mixed payoff uncertainties. A conditional probabilistic reasoning approach is adopted to organize the dependencies between a cyber-system’s state, attacker type, player actions, and state transitions. This also enables the application of probabilistic theories to propagate various uncertainties in the attacker payoffs. An example implementation of this probabilistic framework and resulting attacker payoff distributions are discussed. A goal of this paper is also to highlight this uncertainty quantification problem space to the cyber security research community and encourage further advancements in this area.

  14. Proposed Methodology for Securing Wireless LANs from Wormhole Attack

    Directory of Open Access Journals (Sweden)

    A.K. Patel

    2010-05-01

    Full Text Available Wormhole attacks enable an attacker with limited Resources and no cryptographic material to wreak havoc on wireless networks. Initial research focused that this attack is possible only on Adhoc networks, but in present condition wormhole attack is possible on infrastructure based wireless LANs also. We propose architecture and analyze the possibility of wormhole attack along with a countermeasure to avoid such an attack. The proposed mechanism involves the shared information between communicating Access Points to prevent Rouge Access Points from masquerading as false neighbours. Our defense greatly diminishes the threat of wormhole attacks and requires no location information or clock synchronization.

  15. Liability for damage caused by terrorist attacks

    International Nuclear Information System (INIS)

    After the terrorist attacks on September 11, 2001, one of the questions raised was about the potential liability of the operator of a nuclear power plant for damage sustained by a third party as a result of a comparable terrorist attack on a nuclear power plant. Internationally, this situation is regulated by the Convention on Third-Party Liability in Nuclear Power, the so-called Paris Liability Convention, of 1960, 1964, 1982. Among other things, that Convention excludes liability in cases directly resulting form 'actions of armed conflict..'. The problem arises, among other things, from the absence of an internationally acknowledged definition of terrorism or terrorist attack, and from the idea that, according to the Paris Convention, the legal entities assumed to be involved in such actions are states and weapons. National and international agreements and laws about the liability of the operator of nuclear facility for damage to third parties as a result of terrorist actions are analyzed and discussed. (orig.)

  16. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  17. Early Detection of SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hossain Shahriar

    2013-07-01

    Full Text Available SQL Injection (SQLI is a common vulnerability found in web applications.The starting point of SQLIattack is the client-side (browser. If attack inputs can be detected early at the browse side, then it could bethwarted early by not forwarding the malicious inputs to the server-side for further processing.This paperpresents a client-side approach to detect SQLI attacks1. The client-side accepts shadow SQL queries fromthe server-side and checks any deviation betweenshadow queries with dynamic queries generated withuser supplied inputs. We measure the deviation of shadow query and dynamic query based on conditionalentropy metrics and propose four metrics in this direction. We evaluate the approach with three PHPapplications containing SQLI vulnerabilities. The evaluation results indicate that our approach can detectwell-known SQLI attacks early at the client-side and impose negligible overhead.

  18. Quantifying Public Response towards Islam on Twitter after Paris Attacks

    OpenAIRE

    Magdy, Walid; Darwish, Kareem; Abokhodair, Norah

    2015-01-01

    The Paris terrorist attacks occurred on November 13, 2015 prompted a massive response on social media including Twitter, with millions of posted tweets in the first few hours after the attacks. Most of the tweets were condemning the attacks and showing support to Parisians. One of the trending debates related to the attacks concerned possible association between terrorism and Islam and Muslims in general. This created a global discussion between those attacking and those defending Islam and M...

  19. Somatic panic-attack equivalents in a community sample of Rwandan widows who survived the 1994 genocide

    OpenAIRE

    Hagengimana, Athanase; Hinton, Devon; Bird, Bruce; Pollack, Mark; Pitman, roger k

    2003-01-01

    The present study is the first to attempt to determine rates of panic attacks, especially ‘somatically focused’ panic attacks, panic disorder, symptoms of post-traumatic stress disorder (PTSD), and depression levels in a population of Rwandans traumatized by the 1994 genocide. The following measures were utilized: the Rwandan Panic-Disorder Survey (RPDS); the Beck Depression Inventory (BDI); the Harvard Trauma Questionnaire (HTQ); and the PTSD Checklist (PCL). Forty of 100 Rwandan widows suff...

  20. Microbial desalination cells for improved performance in wastewater treatment, electricity production, and desalination.

    Science.gov (United States)

    Luo, Haiping; Xu, Pei; Roane, Timberley M; Jenkins, Peter E; Ren, Zhiyong

    2012-02-01

    The low conductivity and alkalinity in municipal wastewater significantly limit power production from microbial fuel cells (MFCs). This study integrated desalination with wastewater treatment and electricity production in a microbial desalination cell (MDC) by utilizing the mutual benefits among the above functions. When using wastewater as the sole substrate, the power output from the MDC (8.01 W/m(3)) was four times higher than a control MFC without desalination function. In addition, the MDC removed 66% of the salts and improved COD removal by 52% and Coulombic efficiency by 131%. Desalination in MDCs improved wastewater characteristics by increasing the conductivity by 2.5 times and stabilizing anolyte pH, which therefore reduced system resistance and maintained microbial activity. Microbial community analysis revealed a more diverse anode microbial structure in the MDC than in the MFC. The results demonstrated that MDC can serve as a viable option for integrated wastewater treatment, energy production, and desalination. PMID:22178493

  1. Decomposition of colored wastewater for recycling water by gamma-ray irradiation

    International Nuclear Information System (INIS)

    Utilization of advanced treated water from wastewater treatment plants for the restoration of waterway is in progress to improve the waterside environment. However, the colored wastewater containing molasses pigments, melanoidins, is not decolorized by activated sludge process, and the water can not be applied for recycling water. We have studied the radiation treatment for decolorization of wastewater discharged from baker's yeast factory. The decolorization after decomposition of colored biorefractory organic substances in wastewater, enhancement in biodegradability and effective decrease in values of COD were observed after gammaray irradiation. Although the decrease in values of COD was observed, however chromaticity was not improved after the combined treatment of wastewater by radiation together with activated sludge. The result suggests that it is necessary to find the optimum conditions for stimulation of sludge in the combined treatment. (author)

  2. Effect of migraine attacks on paracetamol absorption.

    OpenAIRE

    Tokola, R A; Neuvonen, P J

    1984-01-01

    The absorption of effervescent paracetamol (1000 mg) was investigated in nine female patients during a migraine attack and in the same patients when headache free. Migraine attack decreased (P less than 0.05) the areas under the serum paracetamol concentration-time curves (AUC) of 0-2 h, 0-4 h and 0-6 h and the peak serum concentration. The severity of nausea correlated significantly with the decrease in the AUC values. Our results support findings of delayed gastric emptying in migraine atta...

  3. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  4. Session Initiation Protocol Attacks and Challenges

    CERN Document Server

    Keshavarz, Hassan; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are compared, the representative existing solutions are highlighted, and several remaining research challenges are identified. Finally, the taxonomy of SIP threat will be presented.

  5. Fast Collision Attack on MD5

    OpenAIRE

    Stevens, Marc

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfill restrictions to properly rotate the differentials in the first round. We will present a new algorithm to find the first block and we will use an algorithm of Klima to find the second block. To o...

  6. Textual Manipulation for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hussein AlNabulsi

    2013-11-01

    Full Text Available SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, we highlighted several examples of such text manipulations that can be successfully used in SQL injection attacks. We evaluated the usage of those strings on several websites and web pages using SNORT open source. We also conducted an extensive comparison study of some relevant papers.

  7. Defending Against Wormhole Attack in OLSR

    Institute of Scientific and Technical Information of China (English)

    HONG Liang; HONG Fan; FU Cai

    2006-01-01

    OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoc Networks by the MANET working group of IETF(Internet engineering task force). OLSR, a proactive routing protocol, is based on a multipoint relaying flooding technique to reduce the number of topology broadcast. OLSR uses periodic HELLO packets to neighbor detection. As introduced in Reference [1], the wormhole attack can form a serious threat in wireless Networks, especially against many ad hoc Network routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in OLSR is provided and simulated in NS2.

  8. Trends in advanced wastewater treatment

    DEFF Research Database (Denmark)

    Henze, M.

    1997-01-01

    The paper examines the present trends within wastewater handling and treatment. The trend is towards the extremes, either local low-tech treatment or centralized advanced treatment plants. The composition of the wastewater will change and it will be regarded as a resource. There will be more...

  9. Thermal Treatment of Industrial Wastewater

    OpenAIRE

    Vysokomornaya Olga V.; Balakhnina Julia E.; Shikhman M. V.

    2015-01-01

    The paper provides an overview on the major methods of thermal wastewater treatment in the power industry. Here, we present the main advantages and disadvantages of methods based on the concentration of inorganic substances (evaporation or distillation) or the burning of organic compounds (combustion neutralization). The study suggests the possible future directions for the development of thermal wastewater treatment.

  10. Wastewater Treatment I. Instructor's Manual.

    Science.gov (United States)

    California Water Pollution Control Association, Sacramento. Joint Education Committee.

    This instructor's manual provides an outline and guide for teaching Wastewater Treatment I. It consists of nine sections. An introductory note and a course outline comprise sections 1 and 2. Section 3 (the bulk of the guide) presents lesson outlines for teaching the ten chapters of the manual entitled "Operation of Wastewater Treatment Plants."…

  11. WASTEWATER TREATMENT BY ARTIFICIAL WETLANDS

    Science.gov (United States)

    Studies of artificial wetlands at Santee, California demonstrated the capacity of wetlands systems for integrated secondary and advanced treatment of municipal wastewaters. When receiving a blend of primary and secondary wastewaters at a blend ratio of 1:2 (6 cm per day: 12 cm pe...

  12. Physico-chemical wastewater treatment

    NARCIS (Netherlands)

    Mels, A.R.; Teerikangas, E.

    2002-01-01

    Wastewater reclamation strategies aimed at closing industrial water cycles and recovery of valuable components will in most cases require a combination of wastewater treatment unit operations. Biological unit operations are commonly applied as the core treatment. In addition, physico-chemical unit o

  13. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  14. Radiation treatment of wastewater, (11)

    International Nuclear Information System (INIS)

    High-energy electron treatment of wastewaters from dyeing factories (in Kiryu city, Gunma Prefecture) was investigated in a series on wastewater treatment by radiation. Experiments were made on decoloration f printing and dip dyeing wastewaters using a dual-tube bubbling column reactor. Changes in absorption spectra and pH of irradiated solutions and influence of dissolved oxygen on decoloration were examined. Water soluble dyes were decolored at low doses, but disperse dyes were not easily decolored. Although the wastewaters included number of different additives such as sizing stuff, surfactant and other chemicals, the decoloration was not influenced by these substances under the experimental conditions. The irradiation cost by electron beams was estimated as a function of plant capacity. A hybrid system of biological and radiation processes to reduce BOD and color in the wastewaters is presented, with this treatment cost also estimated. (author)

  15. Hybrid constructed wetlands for wastewater treatment: A worldwide review

    Directory of Open Access Journals (Sweden)

    M.H. Sayadi

    2012-12-01

    Full Text Available The utilization of environmentally friendly and eco-safe wastewater treatment plan is nowadays widespread. This study aimed to assess the potentiality of hybrid constructed wetlands for treating of landfill leachate, river polluted water, domestic, industrial, hospital, runoff and agricultural wastewaters in lab-scale, pilot-scale and full-scale with various configurations. The results revealed that the hybrid constructed wetlands are effective to remove organic matter (BOD5, COD and suspended solid, while in terms of nutrient removal such as N and Pcomponents, the removal efficiencies were depending to system properties and operational condition. Additionally it is very useful system to remove the heavy metals and pharmaceuticals pollutants from different wastewaters. Combination of constructed wetlands enhances pollutants removal efficiency as hybrid constructed wetlands could cover the limitation of each single constructed wetlands. It could be concluded that the hybrid constructed wetlands ensure a more stable removal rate of pollutants from various wastewaters in comparison with other wastewaters treatment plans.

  16. Simpler radioactive wastewater processing.

    Science.gov (United States)

    Rodríguez, José Canga; Luh, Volker

    2011-11-01

    José Canga Rodríguez, key account manager, Pharmaceutical and Life Sciences, EnviroChemie, and Volker Luh, CEO of EnviroDTS, describe the development, and recent successful application, of a new technology for dealing safely and effectively with the radioactive "wastewater" generated by patients who have undergone radiotherapy in nuclear medicine facilities. The BioChroma process provides what is reportedly not only a more flexible means than traditional "delay and decay" systems of dealing with this "by-product" of medical treatment, but also one that requires less plant space, affords less risk of leakage or cross-contamination, and is easier to install. PMID:22368885

  17. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    OpenAIRE

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (200...

  18. Cryptographic Attacks and Countermeasures - A Mathematical View

    OpenAIRE

    Canright, David; Stanica, Pantelimon

    2009-01-01

    2009 CyberSecurity Summit, Naval Postgraduate School 1st NPS Cyber Summit was held at the Naval Postgraduate School in Monterey, California on October 29, 2009. Sessions were held on the following topics: security requirements, Kerchkoffs' principle, mathematics of cybersecurity, the data encryption standard, nonlinear equations, Cyber attacks on Bluetooth EQ, Crypto properties of S-boxes.

  19. Modified localized attack on complex network

    Science.gov (United States)

    Dong, Gaogao; Du, Ruijin; Hao, Huifang; Tian, Lixin

    2016-01-01

    Since a shell structure contains a wealth of information, it is not only very important for understanding the transport properties of the network, but also essential to identify influential spreaders in complex networks. Nodes within each shell can be classified into two categories: protected nodes and unprotected nodes. In this paper, we propose a generalization of the localized attack, modified localized attack, which means that when a randomly chosen node (root node) is under attack, protected nodes will not be removed, but unprotected nodes in the nearest shells will fail. We numerically and analytically study the system robustness under this attack by taking an Erdös-Rényi (ER) network, a regular random (RR) network and a scale-free (SF) network as examples. Moreover, a fraction of nodes belonging to giant component S and a critical threshold q c , where S approaches to zero, are given. The result implies that increasing connection density has been found to be useful to significantly improve network robustness.

  20. Chemical Attack of Malaysian Pozzolans Concrete

    Directory of Open Access Journals (Sweden)

    Mohd Hilton Ahmad

    2011-09-01

    Full Text Available Malaysia produces more than 10 million tonne of by-product from industrial sector per year. As the environmental impact concerns, more than half of the by-product can be recycled to be used as construction materials. One of them is pozzolan, a cement replacing material that can be used to enhance the properties of the concrete. This paper studies the chemical attack to local prozzolans concrete. The parameters studied include weight loss, length change, and residual strength of local pozzolans concrete after been exposed to severe environment. The specimen were tested under normal room temperature, exposed to magnesium sulfate, MgSO4. 2H2O where both sulfate attack and acid attack take place. Two series of pozzolans< which is Pulverized fly ash (PFA and Palm oil fuel ash (POFA were identified. Another series of admixture, Quarry Dust (QD from quarry waste that contain high amount of silica content also been carried out. Each series will study the effect of cement replacement percentage of 5%, 10% and 15%. The parameters were compared to conventional ordinary Portland cement (OPC concrete as control mix. Accelerated testing was conducted at 3, 7, 28, 56 and 90 days. The result shows that the local pozzolans concrete were found to be in good resistance against sulfate attack compared to conventional concrete. Compared to all series conducted, series of PFA replacement gave the best resistance followed by POFA and QD replacement series.

  1. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection. PMID:25910268

  2. Why Does Asthma Attack Severely at Night?

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ The rhythmic changes of human physiological activities by day and at night may cause regular change of the patient's condition within one day. The following is the explanation with the theory of Chinese medicine for the reason why asthma attacks severely at night.

  3. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  4. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the variables, with…

  5. After Heart Attack, New Threat: Heart Failure

    Science.gov (United States)

    ... nih.gov/medlineplus/news/fullstory_159007.html After Heart Attack, New Threat: Heart Failure 1 in 4 survivors develops this serious ... TUESDAY, May 24, 2016 (HealthDay News) -- Risk of heart failure appears high within a few years of ...

  6. Toxicity evaluation of wastewater collected at different treatment stages from a pharmaceutical industrial park wastewater treatment plant.

    Science.gov (United States)

    Ma, Ke; Qin, Zhe; Zhao, Zhongqing; Zhao, Chunxia; Liang, Shuxuan

    2016-09-01

    The toxicity of water-receiving bodies, the effluent and other treatment stages in wastewater treatment plants has recently been of interest to the public due to the lack of a regulated toxicity-based index for wastewater discharge in China. This study aimed to evaluate the conventional pollution parameters and toxicities of wastewaters collected at different treatment stages from a pharmaceutical industrial park wastewater treatment plant through dehydrogenase activity (DHA) and bioluminescent bacteria (Vibrio qinghaiensis) tests. The results of an analysis of conventional parameters indicated that the total suspended solids (TSS), chemical oxygen demand (COD), total nitrogen (TN), ammonia nitrogen (NH3N), and total phosphorus (TP) were largely removed after various treatments. However, the TN, NH3N and COD still exceeded the regulated standards. The tested pharmaceutical park effluents were mainly polluted with organic pollutants and nitrogenous. The toxicity test results indicated that the toxicities could be markedly reduced after treatment, with the toxicities of two out of the six effluent samples at different treatment stages being greater than the influent toxicity. Spearman's rank correlation coefficients indicated a significantly positive correlation between the toxicity values obtained using the DHA and Vibrio qinghaiensis tests. Compared with the DHA measurement, the Vibrio qinghaiensis test was faster and more sensitive. Meanwhile, the toxicity indicators were significantly and positively correlated with the TSS, TN, TP and COD concentrations. These results may aid the understanding of the toxicity of pharmaceutical industrial park wastewaters and toxicity removal using the treatment techniques that are currently utilized in China. PMID:27262686

  7. Nonepileptic attack disorder among married women

    Directory of Open Access Journals (Sweden)

    Dhanaraj M

    2005-01-01

    Full Text Available Aim : To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD among married women. Design: Prospective cohort study with 1-year follow-up. Setting: A tertiary care teaching hospital. Subjects: Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. Materials and Methods: The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized ′attack.′ The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. Results: The mean duration of illness was 18 months, and the pattern of the attack was ′fall and lying still′ in 53% and ′fall with generalized motor movements′ in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (c2 = 9.02, P = 0.003 and constant quarrel with other family members (c2 = 5.19, P = 0.02. The prevalence of sexual abuse was low (7%. Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (c2 = 4.52, P = 0.03 and lower frequency of attack at the time of reporting (c2 = 3.88, P = 0.05 correlated with good outcomes. Conclusion : Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  8. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  9. A graph based system for multi-stage attacks recognition

    Institute of Scientific and Technical Information of China (English)

    Safaa O. Al-Mamory; Zhai Jianhong; Zhang Hongli

    2008-01-01

    Building attack scenario is one of the most important aspects in network security. This paper proposed a system which collects intrusion alerts, clusters them as sub-attacks using alerts abstraction, aggregates the similar sub-attacks, and then correlates and generates correlation graphs. The scenarios were represented by alert classes instead of alerts themselves so as to reduce the required rules and have the ability of detecting new variations of attacks. The proposed system is capable of passing some of the missed attacks. To evaluate system effectiveness, it was tested with different datasets which contain multi-step attacks. Compressed and easily understandable correlation graphs which reflect attack scenarios were generated. The proposed system can correlate related alerts, uncover the attack strategies, and detect new variations of attacks.

  10. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim. PMID:16936505

  11. A Distributed Protocol for Detection of Packet Dropping Attack in Mobile Ad Hoc Networks

    CERN Document Server

    Sen, Jaydip; Balamuralidhar, P; G., Harihara S; Reddy, Harish

    2011-01-01

    In multi-hop mobile ad hoc networks (MANETs),mobile nodes cooperate with each other without using any infrastructure such as access points or base stations. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. Among the various attacks to which MANETs are vulnerable, malicious packet dropping attack is very common where a malicious node can partially degrade or completely disrupt communication in the network by consistently dropping packets. In this paper, a mechanism for detection of packet dropping attack is presented based on cooperative participation of the nodes in a MANET. The redundancy of routing information in an ad hoc network is utilized to make the scheme robust so that it works effectively even in presence of transient network partitioning and Byzantine failure of nodes. The proposed scheme is fully cooperative an...

  12. Using received signal strength indicator to detect node replacement and replication attacks in wireless sensor networks

    Science.gov (United States)

    Hussain, Sajid; Rahman, Md Shafayat

    2009-04-01

    With the advent of powerful and efficient wireless sensor nodes, the usage of wireless sensor networks (WSNs) has been greatly increased. However, various kinds of security breaches have also been introduced, which exposes the vulnerability of these nodes to defend the valuable data from some specific types of attacks. In this paper, we address node replication, replacement, and man-in-the-middle attacks. We analyze the feasibility of using received signal strength indicator (RSSI) values measured at the receiver node to detect these kinds of attacks. As RSSI value is readily available for every message received by a node, a successful utilization of this information in security breach detection can be a very important contribution.

  13. Drivers for and against municipal wastewater recycling: a review.

    Science.gov (United States)

    Kunz, Nadja C; Fischer, Manuel; Ingold, Karin; Hering, Janet G

    2016-01-01

    The reclamation, treatment and reuse of municipal wastewater can provide important environmental benefits. In this paper, 25 studies on this topic were reviewed and it was found that there are many (>150) different drivers acting for and against wastewater recycling. To deal with the challenge of comparing studies which entailed different research designs, a framework was developed which allowed the literature to be organized into comparable study contexts. Studies were categorized according to the level of analysis (wastewater recycling scheme, city, water utility, state, country, global) and outcome investigated (development/investment in new schemes, program implementation, percentage of wastewater recycled, percentage of water demand covered by recycled water, multiple outcomes). Findings across comparable case studies were then grouped according to the type (for or against recycling) and category of driver (social, natural, technical, economic, policy or business). The utility of the framework is demonstrated by summarizing the findings from four Australian studies at the city level. The framework offers a unique approach for disentangling the broad range of potential drivers for and against water recycling and to focus on those that seem relevant in specific study contexts. It may offer a valuable starting point for building hypotheses in future work. PMID:26819379

  14. Treated and Terminated: Sulphuric Acid Attack

    Directory of Open Access Journals (Sweden)

    Dan Babor

    2007-01-01

    Full Text Available Mineral coatings protect waste-water treatment plants from the destruction of biogenous sulphuric acid corrosion ”The stench is unbearable!”. As residential areas are built up and populated more and more densely, local waste-water treatment plants often give rise to bitter, yet totally justified complaints by local residents. Many communities have obviously opted to solve an urgent problem quickly, only to find themselves in more trouble with high amounts of follow-up costs: foul-smelling clarifiers are frequently simply capped or enclosed. However, this supposedly safe measure creates new dangers, if there is no additional concrete protection as well. What kind of chemical processes can develop in these enclosed environments and how can damage to the concrete structure be avoided?

  15. Analysis of the SYN Flood DoS Attack

    Directory of Open Access Journals (Sweden)

    Mitko Bogdanoski

    2013-06-01

    Full Text Available The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol segments when SYN flag is ON, which gives space for a DoS (Denial of Service attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection algorithms as an effective mechanism against this type of attack. Finally, practical approaches against SYN flood attack for Linux and Windows environment which are followed by are shown.

  16. A Survey of Mobile Ad Hoc Network Attacks

    Directory of Open Access Journals (Sweden)

    PRADIP M. JAWANDHIYA,

    2010-09-01

    Full Text Available Security is an essential requirement in mobile ad hoc network (MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge, this is the first paper that studies all the existing attacks on MANETs.

  17. Designing a framework to guide renewal engineering decision-making for water and wastewater pipelines

    OpenAIRE

    Maniar, Saumil Hiren

    2010-01-01

    Federal, state and private organizations have an urgent need for renewal of water and wastewater pipelines. A pertinent gap remains in understanding the relationship between deteriorated host-pipe conditions and renewal products cost and performance. This work provides a framework Decision-Support System that supports water and wastewater pipeline renewal-products. Various renewal products fit utility needs, and the optimization of this process streamlines the decision-making for renewal prod...

  18. Removal Of Phenol From Wastewater By Using Low-Cost Catalyst From Metal Production

    Science.gov (United States)

    Galbičková, Blanka; Soldán, Maroš; Belčík, Michal; Balog, Karol

    2014-12-01

    Utilization of AOPs (Advanced oxidation processes) as an emerging technology for removing of pollutants from wastewater is developed. In this paper, UV photodegradation was used for removing of phenol from wastewater. As a source of UV radiation medium pressure mercury lamp with output 400W was used. The influence of low-cost catalysts on this process was also monitored. Wastes from metal production, red mud and black nickel mud, were used as catalysts.

  19. Removal Of Phenol From Wastewater By Using Low-Cost Catalyst From Metal Production

    Directory of Open Access Journals (Sweden)

    Galbičková Blanka

    2014-12-01

    Full Text Available Utilization of AOPs (Advanced oxidation processes as an emerging technology for removing of pollutants from wastewater is developed. In this paper, UV photodegradation was used for removing of phenol from wastewater. As a source of UV radiation medium pressure mercury lamp with output 400W was used. The influence of low-cost catalysts on this process was also monitored. Wastes from metal production, red mud and black nickel mud, were used as catalysts.

  20. Removal Of Phenol From Wastewater By Using Low-Cost Catalyst From Metal Production

    OpenAIRE

    Galbičková Blanka; Soldán Maroš; Belčík Michal; Balog Karol

    2014-01-01

    Utilization of AOPs (Advanced oxidation processes) as an emerging technology for removing of pollutants from wastewater is developed. In this paper, UV photodegradation was used for removing of phenol from wastewater. As a source of UV radiation medium pressure mercury lamp with output 400W was used. The influence of low-cost catalysts on this process was also monitored. Wastes from metal production, red mud and black nickel mud, were used as catalysts.

  1. Experimental Study of Dye Removal from Industrial Wastewater by Membrane Technologies of Reverse Osmosis and Nanofiltration

    OpenAIRE

    Mohammad Fadhil Abid; Mumtaz Abdulahad Zablouk; Abeer Muhssen Abid-Alameer

    2012-01-01

    Currently, biological method has been utilized in the treatment of wastewater -containing synthetic dyes used by textile industries in Iraq. The present work was devoted to study the operating feasibility using reverse osmosis (RO) and nanofiltration (NF) membrane systems as an alternative treatment method of wastewater discharged from Iraqi textile mills. Acid red, reactive black and reactive blue dyes were selected, based on the usage rate in Iraq. Effects of dye concentration, pH of soluti...

  2. Experimental study of dye removal from industrial wastewater by membrane technologies of reverse osmosis and nanofiltration

    OpenAIRE

    Abid Mohammad Fadhil; Zablouk Mumtaz Abdulahad; Abid-Alameer Abeer Muhssen

    2012-01-01

    Abstract Currently, biological method has been utilized in the treatment of wastewater -containing synthetic dyes used by textile industries in Iraq. The present work was devoted to study the operating feasibility using reverse osmosis (RO) and nanofiltration (NF) membrane systems as an alternative treatment method of wastewater discharged from Iraqi textile mills. Acid red, reactive black and reactive blue dyes were selected, based on the usage rate in Iraq. Effects of dye concentration, pH ...

  3. Experimental study of dye removal from industrial wastewater by membrane technologies of reverse osmosis and nanofiltration

    OpenAIRE

    Abid, Mohammad Fadhil; Zablouk, Mumtaz Abdulahad; Abid-Alameer, Abeer Muhssen

    2012-01-01

    Currently, biological method has been utilized in the treatment of wastewater -containing synthetic dyes used by textile industries in Iraq. The present work was devoted to study the operating feasibility using reverse osmosis (RO) and nanofiltration (NF) membrane systems as an alternative treatment method of wastewater discharged from Iraqi textile mills. Acid red, reactive black and reactive blue dyes were selected, based on the usage rate in Iraq. Effects of dye concentration, pH of soluti...

  4. Critical supply network protection against intentional attacks: A game-theoretical model

    International Nuclear Information System (INIS)

    A crucial issue in today's critical supply chains is how to protect facilities against intentional attacks, since it has become unacceptable to ignore the high impact of low probability disruptions caused by these attacks. This article develops a game-theoretical model to deal with the protection of facilities, in the context of the uncapacitated fixed-charge location problem. Given a set of investment alternatives for protecting the facilities against identified threats, the objective is to select the optimal defence strategy. The attacker is considered as a player who tries to maximise the expected damage while weighing against the attacks expenditures. The conflict on facilities vulnerability is modelled using the concept of contest. The vulnerability of a facility is defined by its destruction probability. Contest success functions determine the vulnerability of each facility dependent on the relative investments of the defender and the attacker on each facility, and on the characteristics of the contest. A method is developed to evaluate the utilities of the players (i.e., the defender and the attacker). This method evaluates many expected costs, including the cost needed to restore disabled facilities, the backorder cost, and the cost incurred because of the increase in transportation costs after attacks. In fact, when one or several facilities are unavailable, transportation costs will increase since reassigned customers may receive shipments from facilities which are farther away. The model considers a non-cooperative two-period game between the players, and an algorithm is presented to determine the equilibrium solution and the optimal defence strategy. An illustrative example is presented. The approach is compared to other suggested strategies, and some managerial insights are provided in the context of facility location

  5. Cost assessment of e-beam wastewater treatment

    International Nuclear Information System (INIS)

    Electron beam treatment of wastewater leads to purification by the decomposition of pollutants as a result of their reactions with highly reactive species formed from water radiolysis: hydrated electron, OH free radical and H atom. Sometimes such reactions are accompanied by the other processes, and the synergistic effect upon the use of combined methods such as electron beam with biological treatment, adsorption and others improves the effect of electron beam treatment of the wastewater purification. In the process of electron-beam treatment of wastewater there are utilized chemical transformations of pollutants induced by ionizing radiation. The key to the successful implementation of electron beam process in environmental protection depends on how to manage the economics in its application. To compete with other processes in economic evaluation, the electron beam system should be operated with cost-effective manners. To result in complete decomposition of the pollutants, sufficiently high absorbed doses are required. However, in real conditions of rather high content of pollutants in wastewater, high absorbed doses are not economically acceptable, and it is better to utilize the partial decomposition of pollutant as well as transformations of pollutant molecules that result in improving subsequent purification stages. To apply electron beam process to the treatment of industrial wastewater and disinfection of effluent from municipal wastewater plant, we accomplished the cost assessment together with the laboratory irradiation experiments. Cost assessments of industrial e-beam treatment plant for treating textile dyeing wastewater were carried out for the treatment capacity of 10 000 m3 per day. The total construction cost for this plant was USD 4M and the operation cost was not more than USD 1M per year and it was about USD 0.3 per each m3 of wastewater. Another study on the disinfection plant designed for the flow rate of 100 000 m3 effluent per day showed the

  6. Constructed Wetlands for Wastewater Treatment

    Directory of Open Access Journals (Sweden)

    Jan Vymazal

    2010-08-01

    Full Text Available The first experiments using wetland macrophytes for wastewater treatment were carried out in Germany in the early 1950s. Since then, the constructed wetlands have evolved into a reliable wastewater treatment technology for various types of wastewater. The classification of constructed wetlands is based on: the vegetation type (emergent, submerged, floating leaved, free-floating; hydrology (free water surface and subsurface flow; and subsurface flow wetlands can be further classified according to the flow direction (vertical or horizontal. In order to achieve better treatment performance, namely for nitrogen, various types of constructed wetlands could be combined into hybrid systems.

  7. Xenobiotic organic compounds in wastewater

    DEFF Research Database (Denmark)

    Eriksson, Eva; Baun, Anders; Henze, Mogens; Ledin, Anna

    Information regarding the contents of xenobiotic organic compounds (XOCs) in wastewater is limited, but it has been shown that at least 900 different compounds / compound groups could potentially be present in grey wastewater. Analyses of Danish grey wastewater revealed the presence of several...... hundred of XOCs, among them mainly originating from hygiene products: chlorophenols, detergents and phthalates. Several compounds not deriving from hygiene products were also identified e.g. flame-retardants and drugs. A environmental hazard identification showed that a large number of compounds with high...... aquatic toxicity were present and that data for environmental fate could only be retrieved for about half of the compounds....

  8. Xenobiotic organic compounds in wastewater

    DEFF Research Database (Denmark)

    Eriksson, Eva; Baun, Anders; Henze, Mogens;

    2002-01-01

    Information regarding the contents of xenobiotic organic compounds (XOCs) in wastewater is limited, but it has been shown that at least 900 different compounds / compound groups could potentially be present in grey wastewater. Analyses of Danish grey wastewater revealed the presence of several...... hundred of XOCs, among them mainly originating from hygiene products: chlorophenols, detergents and phthalates. Several compounds not deriving from hygiene products were also identified e.g. flame-retardants and drugs. A environmental hazard identification showed that a large number of compounds with high...... aquatic toxicity were present and that data for environmental fate could only be retrieved for about half of the compounds....

  9. Behavioral Modeling of WSN MAC Layer Security Attacks: A Sequential UML Approach

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.;

    2012-01-01

    Wireless sensor networks (WSNs) are growing enormously and becoming increasingly attractive for a variety of application areas such as tele-health monitoring, industry monitoring, home automation and many more. The primary weakness shared by all wireless application and technologies is the vulner......Wireless sensor networks (WSNs) are growing enormously and becoming increasingly attractive for a variety of application areas such as tele-health monitoring, industry monitoring, home automation and many more. The primary weakness shared by all wireless application and technologies...... is the vulnerability to security attacks/threats. The performance and behavior of a WSN are vastly affected by such attacks. In order to be able to better address the vulnerabilities of WSNs in terms of security, it is important to understand the behavior of the attacks. This paper addresses the behavioral modeling...... of medium access control (MAC) security attacks in WSNs. The MAC layer is responsible for energy consumption, delay and channel utilization of the network and attacks on this layer can introduce significant degradation of the individual sensor nodes due to energy drain and in performance due to delays...

  10. Opportunities and Challenges for Water and Wastewater Industries to Provide Exchangeable Services

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, Bethany [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hunsberger, Randolph [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2015-11-13

    Water and wastewater treatment plants and distribution systems use significant amounts of energy, around 2 - 4% of the total electricity used in the US, and their energy use is projected to increase as populations increase and regulations become more stringent. Water and wastewater systems have largely been disconnected from the electric utilities' efforts to improve energy efficiency and provide energy efficiency and provide grid services, likely because their core mission is to provide clean water and treated wastewater. Energy efficiency has slowly crept into the water and wastewater industry as the economic benefit has become more apparent, but there is still potential for significant improvement. Some of the larger, more progressive water utilities are starting to consider providing grid services; however, it remains a foreign concept to many. This report explores intrinsic mechanisms by which the water and wastewater industries can provide exchangeable services, the benefit to the parties involved, and the barriers to implementation. It also highlights relevant case studies and next steps. Although opportunities for increasing process efficiencies are certainly available, this report focuses on the exchangeable services that water and wastewater loads can provide to help maintain grid reliability, keep overall costs down, and increase the penetration of distributed renewables on the electric grid. These services have potential to provide water utilities additional value streams, using existing equipment with modest or negligible upgrade cost.

  11. Wastewater treatment by flotation

    Directory of Open Access Journals (Sweden)

    F.P. Puget

    2000-12-01

    Full Text Available This work deals with the performance analysis of a separation set-up characterized by the ejector-hydrocyclone association, applied in the treatment of a synthetic dairy wastewater effluent. The results obtained were compared with the results from a flotation column (cylindrical body of a hydrocyclone operated both batch and continuously. As far as the experimental set-up studied in this work and the operating conditions imposed to the process, it is possible to reach a 25% decrease in the total effluent chemical oxygen demand (COD. This corresponds approximately to 60% of the COD of the material in suspension. The best results are obtained for ratios air flow rate-feed flow rate (Qair/Q L greater then 0.15 and for ratios underflow rate-overflow rate (Qu/Qo lower than 1.0.

  12. Integrated Hidden Markov Model and Bayes Packet Classifier for effective Mitigation of Application DDoS attacks

    Directory of Open Access Journals (Sweden)

    S Prabha

    2011-07-01

    Full Text Available Resisting distributed denial of service (DDoS attacks become more challenging with the availability of resources and techniques to attackers. The application-layer-based DDoS attacks utilize legitimate HTTP requests to overwhelm victim resources are more undetectable and are protocol compliant and non-intrusive. Focusing on the detection for application layer DDoS attacks, the existing scheme provide an access matrix which capture the spatial-temporal patterns of a normal flash crowd on non stationary object. The access matrix captures the spatial-temporal patterns of the normal flash crowd and the anomaly detector based on hidden Markov model (HMM described the dynamics of Access Matrix (AM to detect the application DDoS attacks. However current application layer attacks have high influence on the stationary object as well. In addition the detection threshold for non stationary object should be reevaluated to improve the performance of false positive rate and detection rate of the DDoS attacks.

  13. Satellite Threat Warning and Attack Reporting

    Energy Technology Data Exchange (ETDEWEB)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  14. GNSS-based positioning: Attacks and Countermeasures

    CERN Document Server

    Papadimitratos, P

    2010-01-01

    Increasing numbers of mobile computing devices, user-portable, or embedded in vehicles, cargo containers, or the physical space, need to be aware of their location in order to provide a wide range of commercial services. Most often, mobile devices obtain their own location with the help of Global Navigation Satellite Systems (GNSS), integrating, for example, a Global Positioning System (GPS) receiver. Nonetheless, an adversary can compromise location-aware applications by attacking the GNSS-based positioning: It can forge navigation messages and mislead the receiver into calculating a fake location. In this paper, we analyze this vulnerability and propose and evaluate the effectiveness of countermeasures. First, we consider replay attacks, which can be effective even in the presence of future cryptographic GNSS protection mechanisms. Then, we propose and analyze methods that allow GNSS receivers to detect the reception of signals generated by an adversary, and then reject fake locations calculated because of ...

  15. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date. PMID:26115644

  16. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  17. Mitigation of Malicious Attacks on Networks

    CERN Document Server

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  18. Treating Wastewater With Immobilized Enzymes

    Science.gov (United States)

    Jolly, Clifford D.

    1991-01-01

    Experiments show enzymes are immobilized on supporting materials to make biocatalyst beds for treatment of wastewater. With suitable combination of enzymes, concentrations of various inorganic and organic contaminants, including ammonia and urea, reduced significantly.

  19. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof;

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation. In...... this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible...... attacks in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  20. Heart Attack Before 50 Ups Early Death Risk

    Science.gov (United States)

    ... 160692.html Heart Attack Before 50 Ups Early Death Risk But healthy living can improve those odds, ... 30, 2016 (HealthDay News) -- The risk of early death after a heart attack has lessened over the ...

  1. Nonlinear optical cryptosystem resistant to standard and hybrid attacks

    Science.gov (United States)

    Sinha, Aloka

    2016-06-01

    We propose a nonlinear optical cryptosystem that is resistant to amplitude-phase retrieval attacks, known-plaintext attack and chosen-plaintext attack. A squaring operation is introduced in the encryption path, which thwarts the iterative attacks. This nonlinear operation tends to amplify the error in the estimation during an iterative attack. The decryption process requires the use of a square-root operation. Thus, in the reverse path also, the attacks encounter the nonlinear square-root operation. These two nonlinearities make the iterative attacks unstable, thereby leading to non-convergence of the mean square error (MSE). Our technique is also resistant to hybrid attacks. The technique is general and is shown to work on a variety of images of the type grayscale and binary. Numerical simulation results corroborate the effectiveness of the proposed cryptosystem.

  2. Concrete Deterioration under Alternate Action of Carbonation and Sulfate Attack

    Directory of Open Access Journals (Sweden)

    Fenglan Li

    2013-11-01

    Full Text Available By micro- and macro-observations, the study reveals the deterioration mechanisms of concrete under alternate action of carbonation and sodium sulfate solution attack (C-SA comparied with the single sodium sulfate solution attack (SA. The studies indicate that in both cases, the main attack product is ettringite, some gypsum is checked only in the first layer of case SA, the thaumasite form of sulfate attack is not initiated in case C-SA. Compared with the single sodium sulfate solution attack, although the carbonation layer mitigates the extent of sulfate attack in limited exposure period, the alternate action of carbonation and sulfate attack still leads to strength degradation to some extent. The effect of carbonation on sulfate attack for longer exposure period deserves further research.

  3. Sex Suffers for Younger Adults After Heart Attack

    Science.gov (United States)

    ... gov/news/fullstory_160722.html Sex Suffers for Younger Adults After Heart Attack Lack of interest a ... 2016 (HealthDay News) -- After a heart attack, many younger adults experience sexual difficulties -- and women more so ...

  4. Heart Attack Help? There's an App for That

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_159504.html Heart Attack Help? There's an App for That Emergency medicine ... American Heart Association. When someone is suffering a heart attack, stroke or cardiac arrest, quick action can be ...

  5. Extensions of the Cube Attack Based on Low Degree Annihilators

    Science.gov (United States)

    Zhang, Aileen; Lim, Chu-Wee; Khoo, Khoongming; Wei, Lei; Pieprzyk, Josef

    At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an initialization vector. In a stream cipher setting where the filter function is known, we can extend it to the cube attack with annihilators: By applying the cube attack to Boolean functions for which we can find low-degree multiples (equivalently annihilators), the attack complexity can be improved. When the size of the filter function is smaller than the LFSR, we can improve the attack complexity further by considering a sliding window version of the cube attack with annihilators. Finally, we extend the cube attack to vectorial Boolean functions by finding implicit relations with low-degree polynomials.

  6. Heart Attack: Tips for Recovering and Staying Well

    Science.gov (United States)

    ... version Heart Attack | Tips for Recovering and Staying Well If you have had a heart attack, you ... healthy diet. The food you eat affects how well your blood flows through your heart and arteries. ...

  7. Robustness of Complex Networks against Attacks Guided by Damage

    CERN Document Server

    Wang, Hui; Xu, Xiaomin; Xiao, Yanghua; Wang, Wei

    2011-01-01

    Extensive researches have been dedicated to investigating the performance of real networks and synthetic networks against random failures or intentional attack guided by degree (degree attack). Degree is one of straightforward measures to characterize the vitality of a vertex in maintaining the integrity of the network but not the only one. Damage, the decrease of the largest component size that was caused by the removal of a vertex, intuitively is a more destructive guide for intentional attack on networks since the network functionality is usually measured by the largest component size. However, it is surprising to find that little is known about behaviors of real networks or synthetic networks against intentional attack guided by damage (damage attack), in which adversaries always choose the vertex with the largest damage to attack. In this article, we dedicate our efforts to understanding damage attack and behaviors of real networks as well as synthetic networks against this attack. To this end, existing ...

  8. Securing iris recognition systems against masquerade attacks

    OpenAIRE

    Galbally Herrero, Javier; Gómez-Barrero, Marta; Ross, Arun A.; Fiérrez, Julián; Ortega-García, Javier

    2013-01-01

    Javier Galbally ; Marta Gomez-Barrero ; Arun Ross ; Julian Fierrez ; Javier Ortega-Garcia; "Securing iris recognition systems against masquerade attacks", Biometric and Surveillance Technology for Human and Activity Identification X, Proc. SPIE 8712 (May 31, 2013); doi:10.1117/12.2015690. Copyright 2013 Society of Photo‑Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in...

  9. Incidence of Fungal attack on Aircraft Fuselage

    Directory of Open Access Journals (Sweden)

    H. M. Dayal

    1968-10-01

    Full Text Available Incidence of fungal attack on the fuselage of a few Vampire aircraft has been observed. The fungus isolated from the infected regions has been tentatively indentified as TorulaSp. Laboratory experiments have revealed that within four weeks this fungus causes about 44 percent loss in the tensile strength of the brich plywood used in the manufacture of the fuselage of the aircraft.

  10. Transient ischemic attack after Mesobuthus gibbosus envenomation

    OpenAIRE

    Golcuk, Yalcin; Ozsarac, Murat; Bilge, Adnan; Golcuk, Burcu; Cinar, Bilge Piri; Hayran, Mustafa

    2014-01-01

    Endometriosis Mesobuthus gibbosus is a medically important venomous scorpion in western of Turkey which causes significant morbidity. Envenoming of this species scorpion results with varying degrees of local symptoms and clinically important systemic effects. This case describes an authenticated first case of transient ischemic attack in a 68 year-old-woman following envenoming by M. gibbosus in Turkey.Keywords: Scorpion, Envenomation, Emergency department

  11. Visualizing Endpoint Security Technologies using Attack Trees

    OpenAIRE

    Pettersson , Stefan

    2008-01-01

    Software vulnerabilities in programs and malware deployments have been increasing almost every year since we started measuring them. Information about how to program securely, how malware shall be avoided and technological countermeasures for this are more available than ever. Still, the trend seems to favor the attacker. This thesis tries to visualize the effects of a selection of technological countermeasures that have been proposed by researchers. These countermeasures: non-executable memo...

  12. Towards a translational model of panic attacks

    OpenAIRE

    Luiz Carlos Schenberg

    2010-01-01

    About 20 years ago, Deakin and Graeff proposed that whereas generalized anxiety disorder is produced by the overactivity of 5-HT excitatory projections from dorsal raphe nucleus to the areas of prefrontal cortex and amygdala which process distal threat, panic attacks are a dysfunction of 5-HT inhibitory projections from dorsal raphe nucleus to the dorsal periaqueductal gray matter, thereby releasing the responses to proximal threat, innate fear or anoxia. Besides, they suggested that the decr...

  13. Sharkonomics How to attack market leaders

    CERN Document Server

    Engeseth, Stefan

    2012-01-01

    Sharks are nature's most revered and feared killing machines. But if you study the behaviour of sharks, you will learn they are also highly strategic and efficient in the way they survive and thrive in nature's competitive environment. Inspired by the shark's evolved (over 420 million years) instincts and strategic moves, this book provides businesses with 10 ways on how to attack the market leaders, and take market share, in your sector.

  14. An Analysis of Various Attacks in MANET

    OpenAIRE

    M.Udhayamoorthi; C. Senthilkumar; Dr S. Karthik; Dr. T.Kalaikumaran

    2014-01-01

    An Ad-hoc network is a self-organized network, without a central coordinator, and which frequently changes its topology. According to the perspective of our paper, we try to connect the current status of computers era to adhoc networking. As adhoc networks has been unleashing several updated technologies, it is the most growing area in the field of networks in information and communication Engineering has ever seen .we start with area introduction, deeply reviewed about the various attacks es...

  15. Attacks and Counterattacks on Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nusrat Fatema

    2013-12-01

    Full Text Available WSN is formed by autonomous nodes with partial memo ry, communication range, power, and bandwidth. Their occupation depends on inspecting corporal and environmental conditions and communing through a system and performing data processing. The applicat ion field is vast, comprising military, ecology, healthcare, home or commercial and require a highly secured communication. The paper analyses different types of attacks and counterattacks and provides so lutions for the WSN threats.

  16. Nonepileptic attack disorder among married women

    OpenAIRE

    Dhanaraj M; Rangaraj R; Arulmozhi T; Vengatesan A

    2005-01-01

    Aim : To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Design: Prospective cohort study with 1-year follow-up. Setting: A tertiary care teaching hospital. Subjects: Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. Materials and Methods: The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the...

  17. Securing iris recognition systems against masquerade attacks

    Science.gov (United States)

    Galbally, Javier; Gomez-Barrero, Marta; Ross, Arun; Fierrez, Julian; Ortega-Garcia, Javier

    2013-05-01

    A novel two-stage protection scheme for automatic iris recognition systems against masquerade attacks carried out with synthetically reconstructed iris images is presented. The method uses different characteristics of real iris images to differentiate them from the synthetic ones, thereby addressing important security flaws detected in state-of-the-art commercial systems. Experiments are carried out on the publicly available Biosecure Database and demonstrate the efficacy of the proposed security enhancing approach.

  18. NETWORK SECURITY: ATTACKS, TOOLS AND TECHNIQUES

    OpenAIRE

    Mhatre Suvidnya Shashikant; Potadar Devangi; Salvi Bhageshree

    2015-01-01

    Network security is main issue of this generation of computing because many types of attacks are increasing day by day. Establishing a network is not a big issue for network admini st rators but protecting the entire network is a big issue. There are various methods and tools are available today for destroying the existing network. In this paper we mainly emphasize on the network security also we present some major issues that can affect our network.

  19. Biological wastewater treatment in brewhouses

    OpenAIRE

    Voronov Yuriy Viktorovich; Bertsun Svetlana Petrovna

    2014-01-01

    In the article the working principles of wastewater biological treatment for food companies is reviewed, including dairies and breweries, the waters of which are highly concentrated with dissolved organic contaminants and suspended solids. An example of successful implementation is anaerobic-aerobic treatment plants. Implementation of these treatment plants can achieve the required wastewater treatment at the lowest operational expenses and low volumes of secondary waste generated. Waste wate...

  20. Attack Detection By Clustering And Classification Approach

    Directory of Open Access Journals (Sweden)

    Priyanka J. Pathak, Prof. Snehlata Dongre

    2012-04-01

    Full Text Available Intrusion detection is a software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. Security is becoming big issue for all networks. Hackers and intruders have made many successful attempts to bring down high profile company networks and web services. Intrusion Detection System (IDS is an important detection that is used as a countermeasure to preserve data integrity and system availability from attacks. The work is implemented in two phases, in first phase clustering by K-means is done and in next step of classification is done with k-nearest neighbours and decision trees. The objects are clustered or grouped based on the principle of maximizing the intra-class similarity and minimizing the interclass similarity. This paper proposes an approach which make the clusters of similar attacks and in next step of classification with K nearest neighbours and Decision trees it detect the attack types. This method is advantageous over single classifier as it detect better class than single classifier system.

  1. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    OpenAIRE

    Honglong Chen; Wei Lou; Xice Sun; Zhi Wang

    2010-01-01

    Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against worm...

  2. A Structured Multi-signature Scheme Against Forgery Attack

    Directory of Open Access Journals (Sweden)

    Wenjun Luo

    2011-12-01

    Full Text Available There are some classic structured multi-signature programs, such as Burmester’s, Harn’s and Lin’s schemes that can not resist inside attack and outside attack. In this paper, we briefly review Burmester’s program and relate safety analysis, Burmester’s scheme vulnerable to forgery attack. Then we propose a structured multi-signature scheme against forgery attack. In the new scheme, we increase the signature parameter verification to improve security.

  3. Migraineurs with exercise-triggered attacks have a distinct migraine

    OpenAIRE

    Koppen, Hille; van Veldhoven, Peter LJ

    2013-01-01

    Background Sport as a migraine trigger has been reported, but extensive information on these triggered attacks and the patients experiencing these attacks is lacking. Goal of this study was to investigate the lifetime prevalence of exercise triggered migraine attacks in migraine patients and if patients with exercise triggered attacks experience specific prodromal or ictal migraine symptoms. Methods 103 consecutive migraine patients seen during their first visit at a Dutch headache clinic wer...

  4. Machine Learning Methods for Attack Detection in the Smart Grid

    OpenAIRE

    Ozay, Mete; Esnaola, Inaki; Vural, Fatos T. Yarman; Kulkarni, Sanjeev R.; Poor, H. Vincent

    2015-01-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed appro...

  5. Detecting man-in-the-middle attacks by precise timing

    OpenAIRE

    Aziz, Benjamin; Hamilton, G.

    2009-01-01

    Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with advances in distributed computing technologies and have assumed several shapes ranging from simple IP spoofing to complicated attacks on wireless communications, which have safety-critical applications such as remote wireless passport verification. This paper proposes a static analysis algorithm for the detection of man-in-the-middle attacks in mobile processes using a s...

  6. Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack

    Science.gov (United States)

    Ma, Hong-Xin; Bao, Wan-Su; Li, Hong-Wei; Chou, Chun

    2016-08-01

    We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulse-width, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward. Project supported by the National Basic Research Program of China (Grant No. 2013CB338002) and the National Natural Science Foundation of China (Grant Nos. 11304397 and 61505261).

  7. A Formal Classification of Internet Banking Attacks and Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Laerte Peotta

    2011-02-01

    Full Text Available A formal classification of attacks and vulnerabilities that affect current internet banking systems is presented along with two attacks which demonstrate the insecurity of such systems. Based ona thoroughanalysis of current security models, we propose a guidelines for designing secure internet banking systems which are not affected by the presented attacks and vulnerabilities.

  8. Attacks Prevention and Detection Techniques In MANET: A Survey

    Directory of Open Access Journals (Sweden)

    Pranjali D. Nikam,

    2014-11-01

    Full Text Available Wireless sensor network is a set of distributed sensor nodes. Which are randomly deployed in geographical area to capture climatic changes like temperature, humidity and pressure. In Wireless Network MANET is a Mobile Ad-Hoc Networks which is a one self-configurable network. MANET is a collection of Wireless mobile node which is dynamically moves from one location to another location. Both attacks Active as well as Passive attacks is in MANET. It doesn’t have a static structure. Security for wireless network is much difficult as compare to wired networks. In last few years many security and attacks issue are face many researchers in MANET. Attacks like Packet dropping attack, Black-Hole attack, Denial of Service attack, wormhole attacks and Packet modification attacks found in MANET. At the time of data communication all the above mentioned attacks access data easily without permission. To solve the problem of attacks in MANET and secure data communication use Intrusion Detection System. In This paper propose the survey of different kinds of attacks on MANET and Wireless sensor networks. This paper helps to young researcher for implement new hybrid algorithm for secure intrusion detection in MANET.

  9. A Review of Man-in-the-Middle Attacks

    OpenAIRE

    Gangan, Subodh

    2015-01-01

    This paper presents a survey of man-in-the-middle (MIM) attacks in communication networks and methods of protection against them. In real time communication, the attack can in many situations be discovered by the use of timing information. The most common attacks occur due to Address Resolution Protocol (ARP) cache poisoning, DNS spoofing, session hijacking, and SSL hijacking.

  10. Vulnerability Assessment by Learning Attack Specifications in Graphs

    OpenAIRE

    Franqueira, Virginia N L; Lopes, Raul H. C.

    2007-01-01

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies to networks in general, including social networks and computer grid.

  11. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  12. The development of empirical models to evaluate energy use and energy cost in wastewater collection

    Science.gov (United States)

    Young, David Morgan

    This research introduces a unique data analysis method and develops empirical models to evaluate energy use and energy cost in wastewater collection systems using operational variables. From these models, several Best Management Processes (BMPs) are identified that should benefit utilities and positively impact the operation of existing infrastructure as well as the design of new infrastructure. Further, the conclusions generated herein display high transferability to certain manufacturing processes. Therefore, it is anticipated that these findings will also benefit pumping applications outside of the water sector. Wastewater treatment is often the single largest expense at the local government level. Not surprisingly, significant research effort has been expended on examining the energy used in wastewater treatment. However, the energy used in wastewater collection systems remains underexplored despite significant potential for energy savings. Estimates place potential energy savings as high as 60% within wastewater collection; which, if applied across the United States equates to the energy used by nearly 125,000 American homes. Employing three years of data from Renewable Water Resources (ReWa), the largest wastewater utility in the Upstate of South Carolina, this study aims to develop useful empirical equations that will allow utilities to efficiently evaluate the energy use and energy cost of its wastewater collection system. ReWa's participation was motivated, in part, by their recent adoption of the United States Environmental Protection Agency "Effective Utility Strategies" within which exists a focus on energy management. The study presented herein identifies two primary variables related to the energy use and cost associated with wastewater collection: Specific Energy (Es) and Specific Cost (Cs). These two variables were found to rely primarily on the volume pumped by the individual pump stations and exhibited similar power functions for the three year

  13. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  14. Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Flach, G. P. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2015-05-12

    Recent Special Analysis modeling of Saltstone Disposal Units consider sulfate attack on concrete and utilize degradation rates estimated from Cementitious Barriers Partnership software simulations. This study provides an independent verification of those simulation results using an alternative analysis method and an independent characterization data source. The sulfate penetration depths estimated herein are similar to the best-estimate values in SRNL-STI-2013-00118 Rev. 2 and well below the nominal values subsequently used to define Saltstone Special Analysis base cases.

  15. Thwarting the Photon Number Splitting Attack with Entanglement Enhanced BB84 Quantum Key Distribution

    CERN Document Server

    Sabottke, Carl F; Anisimov, Petr M; Yurtsever, Ulvi; Lamas-Linares, Antia; Dowling, Jonathan P

    2011-01-01

    We develop an improvement to the weak laser pulse BB84 scheme for quantum key distribution, which utilizes entanglement to improve the security of the scheme and enhance its resilience to the photon-number-splitting attack. This protocol relies on the non-commutation of photon phase and number to detect an eavesdropper performing quantum non-demolition measurement on number. The potential advantages and disadvantages of this scheme are compared to the coherent decoy state protocol.

  16. Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling

    International Nuclear Information System (INIS)

    Recent Special Analysis modeling of Saltstone Disposal Units consider sulfate attack on concrete and utilize degradation rates estimated from Cementitious Barriers Partnership software simulations. This study provides an independent verification of those simulation results using an alternative analysis method and an independent characterization data source. The sulfate penetration depths estimated herein are similar to the best-estimate values in SRNL-STI-2013-00118 Rev. 2 and well below the nominal values subsequently used to define Saltstone Special Analysis base cases.

  17. Impact of paper mill wastewater on soil properties and crop yield through lysimeter studies.

    Science.gov (United States)

    Singh, P K; Ladwani, K; Ladwani, K; Deshbhratar, P B; Ramteke, D S

    2013-01-01

    Paper and pulp industries produce large quantities of wastewater which can have adverse effects on the receiving water systems. In the present study lysimeters were used and filled with different soils replicating natural soil horizons and provided with a leachate collection system. The physico-chemical characteristics of the soil in each lysimeter and the quality of wastewater before leaching were assessed. Treated wastewater was evaluated for crop irrigation, and was categorized according to the irrigation water class 'Increasing Problem to Severe Problem' with respect to salinity and specific ion toxicity. Sandy loam soils showed 96% chemical oxygen demand (COD) removal while clay loam soils removed 99% of COD, and the colour removal in both the cases was found to be 100%. Application of wastewater resulted in an increase of pH value, ranging from 6.2-7.6; the electrical conductivity (ECe) of saturated extracts was found to be 0.6-1.7 dS m(-1), and exchangeable sodium percentage (ESP) ranged from 7.8-11.1% in soils. Similarly, an increase in the organic carbon, available nitrogen, phosphorus and potash content of soils was observed when irrigated with wastewater. Wastewater irrigation showed increased grain and straw yield of jowar, wheat and moong. These results permit successful utilization of pulp and paper mill wastewater for crop production without damaging the soils. PMID:23837309

  18. Bioremediation of chromium solutions and chromium containing wastewaters.

    Science.gov (United States)

    Malaviya, Piyush; Singh, Asha

    2016-08-01

    Cr(VI) represents a serious threat to human health, living resources and ecological system as it is persistent, carcinogenic and toxic, whereas, Cr(III), another stable oxidation state of Cr, is less toxic and can be readily precipitated out of solution. The conventional methods of Cr(VI) removal from wastewaters comprise of chemical reduction followed by chemical precipitation. However, these methods utilize large amounts of chemicals and generate toxic sludge. This necessitates the need for devising an eco-technological strategy that would use the untapped potential of the biological world for remediation of Cr(VI) containing wastewaters. Among several viable approaches, biotransformation of Cr(VI) to relatively non-toxic Cr(III) by chromium resistant bacteria offers an economical- and environment-friendly option for its detoxification. Various studies on use of Cr(VI) tolerant viable bacterial isolates for treatment of Cr(VI) containing solutions and wastewater have been reported. Therefore, a detailed account of mechanisms and processes involved in bioreduction of Cr(VI) from solutions and wastewaters by bacterial isolates are the focus of this review article in addition to a discussion on toxicity of Cr(VI) on bacterial strains and various factors affecting Cr(VI) bioreduction. PMID:25358056

  19. Kinetic coefficients for the biological treatment of tannery wastewater

    International Nuclear Information System (INIS)

    Determination of kinetic coefficients for a particular wastewater is imperative for the rational design of biological treatment-facilities. The present study was undertaken with the objective of finding out kinetic coefficients for tannery wastewater. A bench-scale model of aerated lagoon, consisting of an aeration tank and final clarifier, was use to conduct the studies. The model was operated continuously for 96 days, by varying the detention times from 3 to 9 days. Influent for the aerated lagoon was settled tannery wastewater. Biochemical oxygen demand (BOD) of the influent and effluent and the mixed-liquor suspended solids (MLSS) of aeration tank were determined at various detention-times so as to generate data for kinetic coefficients. The kinetic coefficients k, Ks, Y and Ed were found to be 3.125 day/sup -1/, 488 mg/L, 0.64 and 0.035 day/sup -1/ respectively. Overall rate-constant of BOD, removal 'K' was also determined and was found to be 1.43 day/sup -1/. Kinetic coefficients were determined, at mean reactor-temperature of 30.2 degree C. These coefficients may be utilized for the design of biological-treatment facilities for tannery wastewater. (author)

  20. A Discrete Event Simulator for Extensive Defense Mechanism for Denial of Service Attacks Analysis

    Directory of Open Access Journals (Sweden)

    Maryam Tanha

    2012-01-01

    Full Text Available Problem statement: Seeking for defense mechanisms against low rate Denial of Service (DoS attacks as a new generation of DoS attacks has received special attention during recent years. As a decisive factor, evaluating the performance of the offered mitigation techniques based on different metrics for determining the viability and ability of these countermeasures requires more research. Approach: The development of a new generalized discrete event simulator has been deliberated in detail. The research conducted places high emphasis on the benefits of creating a customized discrete event simulator for the analysis of security and in particular the DoS attacks. The simulator possesses a niche in terms of the small scale, low execution time, portability and ease of use. The attributes and mechanism of the developed simulator is complemented with the proposed framework. Results: The simulator has been extensively evaluated and has proven to provide an ideal tool for the analysis and exploration of DoS attacks. In-depth analysis is enabled by this simulator for creating multitudes of defense mechanisms against HTTP low rate DoS attacks. The acquired results from the simulation tool have been compared against a simulator from the same domain. Subsequently, it enables the validation of developed simulator utilizing selected performance metrics including mean in-system time, average delay and average buffer size. Conclusion: The proposed simulator serves as an efficient and scalable performance analysis tool for the analysis of HTTP low rate DoS attack defense mechanism. Future work can encompass the development of discrete event simulators for analysis of other security issues such as Intrusion Detection Systems.

  1. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework. PMID:25807571

  2. PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK

    Directory of Open Access Journals (Sweden)

    Mohammad Abdus Salam

    2016-03-01

    Full Text Available Wireless sensor network (WSN is highly used in many fields. The network consists of tiny lightweight sensor nodes and is largely used to scan or detect or monitor environments. Since these sensor nodes are tiny and lightweight, they put some limitations on resources such as usage of power, processing given task, radio frequency range. These limitations allow network vulnerable to many different types of attacks such as hello flood attack, black hole, Sybil attack, sinkhole, and many more. Among these attacks, hello flood is one of the most important attacks. In this paper,we have analyzed the performance of hello flood attack and compared the network performance as number of attackers increases. Network performance is evaluated by modifying the ad-hoc on demand distance vector (AODV routing protocol by using NS2 simulator. It has been tested under different scenarios like no attacker, single attacker, and multiple attackers to know how the network performance changes. The simulation results show that as the number of attackers increases the performance in terms of throughput and delay changes.

  3. WIRELESS AD-HOC NETWORK UNDER BLACK-HOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Shree Om

    2011-01-01

    Full Text Available Wireless Ad-hoc Network is a temporary and decentralized type of wireless network. Due to security vulnerabilities in the routing protocol currently, this type of network is unprotected to network layer attacks. Black-hole attack is such a type of attack and is a Denial-of-Service (DoS attack. Due to its nature, the attack makes the source node send all the data packets to a Black-hole node that ends up dropping all the packets. The aim of this paper is to reflect light on the severe effects of a Black-hole attack in a Wireless Ad-hoc network and the drawbacks of the security mechanisms being used for the mitigation of this attack.

  4. Attack Graph-Based Risk Assessment and Optimisation Approach

    Directory of Open Access Journals (Sweden)

    Mohammed Alhomidi

    2014-06-01

    Full Text Available Attack graphs are models that offer significant capabilities to analyse security in network systems. An attack graph allows the representation of vulnerabilities, exploits and conditions for each attack in a single unifying model. This paper proposes a methodology to explore the graph using a genetic algorithm (GA. Each attack path is considered as an independent attack scenario from the source of attack to the target. Many such paths form the individuals in the evolutionary GA solution. The population-based strategy of a GA provides a natural way of exploring a large number of possible attack paths to find the paths that are most important. Thus unlike many other optimization solutions a range of solutions can be presented to a user of the methodology.

  5. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism...

  6. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.;

    2012-01-01

    Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop...... and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  7. Improving quality of textile wastewater with organic materials as multi soil layering

    Science.gov (United States)

    Supriyadi; Widijanto, H.; Pranoto; Dewi, AK

    2016-02-01

    On agricultural land, fresh water is needed especially for irrigation. Alternative ways to fulfill needs of fresh water is by utilizing wastewater from industry. Wastewater that produced in the industry in Surakarta is over flowing especially textile wastewater. Wastewater that produced from industry has many pollutants that affected decreasing fresh water quality for irrigation. Multi Soil Layering (MSL) is one of method that utilize the soil ability as main media by increasing its function of soil structure to purify wastewater, so it does not contaminate the environment and reusable. This research was purposed to know affectivity of organic materials (such as rice straw, baggase, sawdust, coconut fibre, and corncob) and dosage (5%, 10% and 25%) in MSL, also get alternative purification ways with easy and cheaper price as natural adsorbent. This study using field and laboratory experiment. The result shows that MSL can be an alternative method of purification of wastewater. The appropriate composition of organic materials that can be used as adsorbent is MSL with wood sawdust 10% dosage because it can increase pH, decrease the number of Cr, ammonia, and phosphate but less effective to decrease BOD and COD.

  8. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. PMID:20804980

  9. Explosive attack: Lessons learned in Seyed Al Shohada mosque attack, April 2008, Shiraz, Iran

    Directory of Open Access Journals (Sweden)

    Shahram Paydar

    2012-01-01

    Full Text Available Introduction: The threat of explosive attacks has become a worldwide problem. Bombing is the preferred method of attacks. These attacks result in specific physical and psychiatric trauma. In this paper, we present an epidemiologic description of the physical injuries of patients who survived the explosive attack in Seyed Al Shohada mosque April 2008 Shiraz, Iran. Materials and Methods: All medical records of the patients admitted at Shiraz Hospitals on April 2008 due to Seyed Al Shohada mosque bombing attacks, Shiraz, Iran, were reviewed. Results: A total of 202 patients were referred to the hospitals over 24 h following the terrorist attack. One hundred sixty-four patients were admitted for short periods of observation (<24 h. Thirty-eight patients needed more than 1 day of hospitalization. The mean age of the patients was 26.2 (range 2 to 51 years. One hundred thirty-five (66.8% patients were males. Twenty-six (12.8% were children. Burn was the most prevalent cause of admission. Five (13.5% patients needed chest tube insertion and eight (21% needed skin grafts due to burn. Overall, 12 patients expired (5%. Three (25% of them were children (2 and 6, and 11 years old. Mortality rate was significantly higher among the children than adults (P value <0.05. The most important cause of death was head trauma which was seen in five (41.6% of the expired patients followed by burn (including air way burn in four (33%, and internal bleeding in three (25%. Patients with head trauma had significantly a higher rate of mortality than other patients (P value <0.05. Discussion: Following a bombing attack, numerous victims were brought to the emergency unit suffering from a combination of multi-organ injuries caused by the blast, penetrating injuries caused by shrapnel and other debris, and burns. It is important for a physician to be familiar with the clinical features and treatments of explosive attacks victims. Early management of patients at the scene and

  10. Biodegradation of di-n-Butyl Phthalate by Achromobacter sp. Isolated from Rural Domestic Wastewater

    OpenAIRE

    Decai Jin; Xiao Kong; Yujie Li; Zhihui Bai; Guoqiang Zhuang; Xuliang Zhuang; Ye Deng

    2015-01-01

    A bacterial strain W-1, isolated from rural domestic wastewater, can utilize the environmental hormone di-n-butyl phthalate (DBP) as the sole carbon and energy source. The isolated bacterium species was confirmed to belong to the genus Achromobacter based on its 16S rRNA gene sequence. The results of substrate utilization tests showed that the strain W-1 could utilize other common phthalates and phenol. High-performance liquid chromatography analysis revealed that the optimal conditions for D...

  11. Suicide bomb attack causing penetrating craniocerebral injury

    Institute of Scientific and Technical Information of China (English)

    Manzar Hussain; Muhammad Ehsan Bari

    2013-01-01

    Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma,although there are various reports of blast or gunshot injuries in warfare due to multiple foreign bodies like pellets and nails.In our case,a 30-year-old man presented to neurosurgery clinic with signs and symptoms of right-sided weakness after suicide bomb attack.The skull X-ray showed a single intracranial nail.Small craniotomy was done and the nail was removed with caution to avoid injury to surrounding normal brain tissue.At 6 months' follow-up his right-sided power improved to against gravity.

  12. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria;

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... can recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length. This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All...

  13. Competitive Reactions to Advertising and Promotion Attacks

    OpenAIRE

    Jan-Benedict E. M. Steenkamp; Vincent R. Nijs; Dominique M. Hanssens; Dekimpe, Marnik G.

    2005-01-01

    How do competitors react to each other's price-promotion and advertising attacks? What are the reasons for the observed reaction behavior? We answer these questions by performing a large-scale empirical study on the short-run and long-run reactions to promotion and advertising shocks in over 400 consumer product categories over a four-year time span. Our results clearly show that the most predominant form of competitive response is passive in nature. When a reaction does occur, it is usually ...

  14. Competitive reactions to advertising and promotion attacks.

    OpenAIRE

    Steenkamp, Jan-Benedict E.M.; Vincent R. Nijs; Hanssens, Dominique M; Dekimpe, Marnik G.

    2005-01-01

    How do competitors react to each other's price-promotion and advertising attacks? What are the reasons for the observed reaction behavior? We answer these questions by performing a large-scale empirical study on the short-run and long-run reactions to promotion and advertising shocks in over 400 consumer product categories over a four-year time span. Our results clearly show that the most predominant form of competitive response is passive in nature. When a reaction does occur, it is usually ...

  15. Quantum attacks on public-key cryptosystems

    CERN Document Server

    Yan, Song Y

    2013-01-01

    The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.Quantum Attacks on Public-Key Cryptosystems presemts almost all?known quantum comput

  16. Toxicological issues after depleted uranium weapons attacked

    International Nuclear Information System (INIS)

    Depleted Uranium (DU) is a byproduct of the uranium enrichment for producing nuclear reactor or nuclear weapon. DU is used in the military as an armor-piercing projectile due to its hardness, strength, and density. A lot of DU weapons were fired in the Gulf War, and bring about critical environmental and internal contamination. Therefore, DU becomes suddenly a hot issue. Some toxicological problems after DU weapons attacked have been reviewed, which include features of internal DU contamination. Hazard of wound contamination and inhalation with insoluble uranium, and other urgent toxicological issues. The healthy effects of implanted with depleted uranium pellets were illustrated in particular

  17. Bobcat attack on a cottontail rabbit

    Science.gov (United States)

    Biggins, D.E.; Biggins, D.M.

    2006-01-01

    We observed an attack by a bobcat (Lynx rufus) on a cottontail rabbit (Sylvilagus) that involved stealthy approach by the cat for >1 h, followed by a 12.3-s chase covering 116.0 m for the cat and 128.4 m for the rabbit. During the chase, the route of the cat from starting point to kill site was more direct than the semi-circular route of the rabbit. Stride lengths for the cat and total distance covered by the chase were longer than those previously reported for bobcats.

  18. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    In this paper we combine two powerful methods of symmetric cryptanalysis: rotational cryptanalysis and the rebound attack. Rotational cryptanalysis was designed for the analysis of bit-oriented designs like ARX (Addition-Rotation-XOR) schemes. It has been applied to several hash functions and block...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property for the...

  19. Robustness of correlated networks against propagating attacks

    CERN Document Server

    Hasegawa, Takehisa; Nemoto, Koji

    2012-01-01

    We investigate robustness of correlated networks against propagating attacks modeled by a susceptible-infected-removed model. By Monte-Carlo simulations, we numerically determine the first critical infection rate, above which a global outbreak of disease occurs, and the second critical infection rate, above which disease disintegrates the network. Our result shows that correlated networks are robust compared to the uncorrelated ones, regardless of whether they are assortative or disassortative. This behavior is related to the layered network structure inevitably generated by a rewiring procedure we adopt to realize correlated networks.

  20. SQL Injection Attacks: Techniques and Protection Mechanisms

    Directory of Open Access Journals (Sweden)

    Santosh Soni

    2011-01-01

    Full Text Available When an internet user interacts in web environment by surfing the Net, sending electronic mail messages and participating in online forums lot of data is generated which may have user’s private information. If this information is captured by third party tools and techniques; it may cause a breach in end user privacy. In the Web environment, end user privacy is one of the most controversial legal issues. In this paper issues related to information leakage through SQL injection attacks are presented and protection mechanisms are also discussed.

  1. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey;

    2015-01-01

    twisted polynomials from Ore rings as forgery polynomials. We show how to construct sparse forgery polynomials with full control over the sets of roots. We also achieve complete and explicit disjoint coverage of the key space by these polynomials. We furthermore leverage this new construction in an...... improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which is a...

  2. ELECTRICITY GENERATION FROM SWINE WASTEWATER USING MICROBIAL FUEL CELL

    Directory of Open Access Journals (Sweden)

    Chimezie Jason Ogugbue

    2015-11-01

    Full Text Available Electricity generation from swine wastewater using microbial fuel cell (MFC was investigated. Swine wastewater was collected into dual-chambered (aerobic and anaerobic fuel cell. The maximum power output using copper and carbon electrodes were 250.54 and 52.33 µW, while 10.0 and 5.0 cm salt bridge length between the cathode and anode were 279.50 and 355.26 µW, respectively. Potassium permanganate and ordinal water gave a maximum power output of 1287.8 and 13 9.18 µW. MFCs utilize microbial communities to degrade organic materials found within wastewater and converted stored chemical energy to electrical energy in a single step. The initial bacterial and fungal counts were 7.4×106 and 1.1×103 CFU ml-1. Bacterial counts steadily increased with time to 1.40×107 CFU ml-1 while fungal count declined to 4.4×106 CFU ml-1 after day 60. The declined in microbial counts may be attributed to the time necessary for acclimatization of microbes to the anode. The genera identified were Bacillus, Citrobacter, Pseudomonas, Lactobacillus, Escherichia coli, Aspergillus and Rhizopus. These microbes acted as primary and secondary utilizers, utilizing carbon and other organics of the wastewater. Chemical parameters indicated that the biochemical oxygen demand ranged from 91.4–23.2 mg/L, giving 75% while the chemical oxygen demand ranged from 243.1–235.2 mg/L, representing 3.3%. Although, the metabolic activities of microbes were responsible for the observed degradation, leading to electricity, the overall power output depended on the distance between the anode and cathode compartment, types of electrode materials and mediators and oxygen reaction at the cathode.

  3. Role of wastewater irrigation in mosquito breeding in south Punjab, Pakistan

    DEFF Research Database (Denmark)

    Mukhtar, Muhammad; Herrel, Nathaly; Amerasinghe, Felix P;

    2003-01-01

    Mosquito breeding within the wastewater irrigation system around the town of Haroonabad in the southern Punjab, Pakistan, was studied from July to September 2000 as part of a wider study of the costs and benefits of wastewater use in agriculture. The objective of this study was to assess the vector......-borne human disease risks associated with mosquito species utilizing wastewater for breeding. Mosquito larvae were collected on a fortnightly basis from components of the wastewater disposal system and irrigated sites. In total, 133 samples were collected, about equally divided between agricultural sites and...... quality and the presence of fauna and flora. Anophelines and Aedes mosquitos were mainly collected during the month of July, while Culex were collected in September. The prevalence of established vectors of human diseases such as An. stephensi (malaria), Cx. tritaeniorhynchus (West Nile fever, Japanese...

  4. Effect of treatment in a constructed wetland on toxicity of textile wastewater

    Science.gov (United States)

    Baughman, G.L.; Perkins, W.S.; Lasier, P.J.; Winger, P.V.

    2003-01-01

    Constructed wetlands for treating wastewater have proliferated in recent years and their characteristics have been studied extensively. In most cases, constructed wetlands have been used primarily for removal of nutrients and heavy metals. Extensive literature is available concerning construction and use of wetlands for treatment of wastewater. Even so, quantitative descriptions of wetland function and processes are highly empirical and difficult to extrapolate. The processes involved in removal of pollutants by wetlands are poorly understood, especially for waste streams as complex as textile effluents. The few studies conducted on treatment of textile wastewater in constructed wetlands were cited in earlier publications. Results of a two-year study of a full-scale wetland treating textile effluent are presented here. The paper describes the effects of the wetland on aquatic toxicity of the wastewater and draws conclusions about the utility and limitations of constructed wetlands for treatment of textile effluents.

  5. Demonstration plant for electron-beam treatment of Taegu dye industry complex wastewater

    International Nuclear Information System (INIS)

    The main features of basic design of the plant for industrial wastewater treatment using electron beam are described, including chemical aspects of the process, process technology, and building construction. The plant with treatment capacity 10,000 cubic meters of wastewater a day is proposed to be located at the area of existing wastewater treatment facility of Dye Industry Complex in Taegu city, Korea. Total area required for the plant is 220 m2. Total electric energy consumption is inside the range 764 (min) and 1265 (max) kW. For electron-beam treatment 1 MeV-400 kW accelerator will be utilized. Besides conventional purposes, the plant will be used also for collection of new data on radiation treatment of wastewater under real industrial conditions and as a demonstration facility for training and for popularization (advertising) of radiation technology. (author)

  6. Estimating Utility

    DEFF Research Database (Denmark)

    Arndt, Channing; Simler, Kenneth R.

    2010-01-01

    information-theoretic approach to estimating cost-of-basic-needs (CBN) poverty lines that are utility consistent. Applications to date illustrate that utility-consistent poverty measurements derived from the proposed approach and those derived from current CBN best practices often differ substantially, with...

  7. Surfactant scouring wastewater modified bentonites-promising material for unmanageable wastewater treatment%洗刷废水改性膨润土--一种有效的废水处理剂

    Institute of Scientific and Technical Information of China (English)

    钱光人; 余丽佳; 夏方远; 刘强; 裘祖楠

    2006-01-01

    Trimeric quaternary ammonium surfactants are newly developed surfactants, their widespread synthesis and utilization results in a great amount of scouring wasterwater of high COD, which is unmanageable. The present investigation aims to find a new type of organo-bentonites modified by the scouring wastewater and to treat the scouring wastewater at the same time. Results of adsorption experiments of phenol and formaldehyde by the modified bentonite show that, at the optimal ratio 24 % (W/V) of modified bentonite to scouring wastewater, the removal rate of phenol and formaldehyde by FTAT scouring wastewater modified bentonite is 3.53 times and 2.48 times higher than that of Na-bentonite, and the COD of treated scouring wastewater reduces to below 200 mg/L, meeting the second level of Standards for Discharge of Water Pollutants from the Ammonia Industry of China.

  8. Fate of Radionuclides in Wastewater Treatment Plants

    OpenAIRE

    Shabani Samgh Abadi, Farzaneh

    2013-01-01

    In the western United States and in many arid regions, wastewater reclamation is becoming a common way of increasing water supplies. More and more wastewater is being reclaimed for non-potable uses such as irrigation, but reclamation for potable use is also being practiced. One of the concerns for wastewater reclamation is the distribution of contaminants that are not removed by either the wastewater treatment plant or the water treatment plant in the case of potable reclamation. The recent a...

  9. Evaluation of alternative institutional arrangements in public utilities

    Directory of Open Access Journals (Sweden)

    Ermishina Anna, V.

    2015-06-01

    Full Text Available Since early 2000s a policy of attracting private operators to public utilities, which should help to increase productivity, reduce costs, and as a result, reduce utility prices takes place in Russia. The aim of the study is to identify the relationship between institutional arrangements and pricing for water and wastewater services. Applying statistical and cluster analysis to empirical data on water utilities in 13 largest cities has revealed the differences in the level and dynamics of prices for water and wastewater services in the group of public utilities and public private water utilities. In 2011-2014 the level and growth price rates in the group of public private partnerships were higher than in group of municipal water utilities. Thus, the involvement of private operators has not yet lead to the expected reduction in prices.

  10. Low-head saltwater recirculating aquaculture systems utilized for juvenile red drum production

    Science.gov (United States)

    Recirculating aquaculture systems reuse water with mechanical and biological treatment between each use and thus require wastewater treatment techniques for continuous waste removal. However, the traditional techniques and equipment utilized in recirculating aquaculture systems are expensive. The d...

  11. Orientation to Municipal Wastewater Treatment. Training Manual.

    Science.gov (United States)

    Office of Water Program Operations (EPA), Cincinnati, OH. National Training and Operational Technology Center.

    Introductory-level material on municipal wastewater treatment facilities and processes is presented. Course topics include sources and characteristics of municipal wastewaters; objectives of wastewater treatment; design, operation, and maintenance factors; performance testing; plant staffing; and laboratory considerations. Chapter topics include…

  12. Wastewater use in aquaculture: research in Peru

    OpenAIRE

    Prein, M.

    1995-01-01

    Use of wastewater is an issue gaining importance throughout the (developing) world, as water sources become scarcer and competition for them increases. In Peru, research has shown the technical, economic and social feasibility of growing fish in wastewater. Such fish farms could recover 100% of the wastewater treatment costs.

  13. Lipid-based biofuel production from wastewater

    OpenAIRE

    Muller, Emilie; Sheik, Abdul; Wilmes, Paul

    2014-01-01

    Increasing world population, urbanization and industrialization are driving global increases in wastewater production. Wastewater comprises significant amounts of chemical energy primarily in the form of organic molecules (in particular lipids), which are currently not being recovered comprehensively. Within biological wastewater treatment (BWWT) systems, specialized microorganisms assimilate and store lipids anaerobically. These intracellular stores represent interesting feedstocks for biofu...

  14. Reclaimed wastewater use alternatives and quality standards

    OpenAIRE

    Dalahmeh, Sahar; Baresel, Christian

    2014-01-01

    Reclaimed wastewater use is crucial for increasing water availability, improving water resources management, minimising environmental pollution and permitting sustainable nutrient recycling. However, wastewater also contains microbiological and chemical pollutants posing risks to human health and the environment, and these risks have to be handled. Successful use of reclaimed wastewater requires stringent standards for its treatment, disposal and distribution. This report summarises global an...

  15. Enhancing network robustness for malicious attacks

    CERN Document Server

    Zeng, An

    2012-01-01

    In a recent work [Proc. Natl. Acad. Sci. USA 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. With a greedy algorithm, they found the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly, complementary to the node-robustness measurement ($R_{n}$), we propose a link-robustness index ($R_{l}$). We show that solely enhancing $R_{n}$ cannot guarantee the improvement of $R_{l}$. Moreover, the structure of $R_{l}$-optimized network is found to be entirely different from that of onion network. In order to design robust networks resistant to more realistic attack condition, we propose a hybrid greedy algorithm which takes both the $R_{n}$ and $R_{l}$ into account. We validate the robustness of our generated networks a...

  16. Drop attack during chest radiography: Case report

    International Nuclear Information System (INIS)

    Chest radiography is the first line of thoracic imaging performed in patients with thoracic diseases. It is probably the most frequently performed type of X-ray examination. It is recommended to be performed in the full upright position except where the patient's condition will not permit. This is because the erect technique allows full expansion of the lungs, prevents engorgement of pulmonary vessels and also helps in fluid level evaluation. However, little is reported on the negative effects associated with erect radiography. Herein, we present a case of drop attack during erect chest radiography. - Highlights: • Radiographers should be aware of the possibilities of drop attach during erect chest radiography. • A patient's determination to stand for chest radiograph may not always relate with the ability. • The causes of some drop attacks may be unknown. • Watching patients during radiographic exposure is essential. • Being alert and working very fast during erect chest examinations is important

  17. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  18. Public knowledge of heart attack symptoms in Beijing residents

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qing-tan; HU Da-yi; YANG Jin-gang; ZHANG Shou-yan; ZHANG Xin-quan; LIU Shu-shan

    2007-01-01

    Background Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy,and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care.Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack.Methods A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006.Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community.Results A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms.Conclusions Public knowledge of common heart attack

  19. Wastewater Treatment: The Natural Way

    Science.gov (United States)

    1988-01-01

    Wolverton Environmental Services, Inc. is widely acclaimed for innovative work in natural water purification which involves use of aquatic plants to remove pollutants from wastewater at a relatively low-cost. Haughton, Louisiana, visited Wolverton's artificial marsh test site and decided to use this method of wastewater treatment. They built an 11 acre sewage lagoon with a 70 by 900 foot artificial marsh called a vascular aquatic plant microbial filter cell. In the cell, microorganisms and rooted aquatic plants combine to absorb and digest wastewater pollutants, thereby converting sewage to relatively clean water. Raw waste water, after a period in the sewage lagoon, flows over a rock bed populated by microbes that digest nutrients and minerals from the sewage thus partially cleaning it. Additional treatment is provided by the aquatic plants growing in the rock bed, which absorb more of the pollutants and help deodorize the sewage.

  20. Land treatment of nitroguanidine wastewater

    International Nuclear Information System (INIS)

    Nitroguanidine (NQ) wastewaters contain nitroguianidine, guanidine nitrate (GN), ammonia, nitrate, and sulfate. Simulated NQ wastewater is being applied to continuous and perfusion soil columns, with continuous flow column influent and effluent samples being analyzed for wastewater components and transformation products (nitrosoguanidine, guanidine, cyanamide, melamine, and cyanoguanidine). Whey, molasses, and glucose are being tested as carbon supplements. Mineralization rate experiments are being conducted using 14-C-NQ and 14-C-Gn as test substrates. The number of microbes capable of degrading NQ and GN is being determined, as is microflora acclimation. Preliminary data indicate that carbon supplements facilitate NG degradation after 70 days of application in continuous flow soil column. Batch mineralization experiments generally support these findings. To date, cyanamide is the only transformation product detected in significant quantities. 9 refs., 1 tab

  1. Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ibrahim S. I. Abuhaiba

    2012-11-01

    Full Text Available The objective of this paper is to study the vulnerabilities of sensor networks, design, and implement new approaches for routing attack. As one of the cornerstones of network infrastructure, routing systems are facing more threats than ever; they are vulnerable by nature and challenging to protect. We present a new attack, Swarm Flooding Attack, against Directed Diffusion based WSNs, which targets the consumption of sensors computational resources, such as bandwidth, disk space, or processor time. Two variants of swarm attack have been introduced: Bee and Ant. Both approaches are inspired from the natural swarming difference between bees and ants. In all cases, the strategy used to mount an attack is the same. An attack consists of a set of malicious user queries represented by interests that are inserted into the network. However, the two forms of attack vary in the synchronization aspects among attackers. These types of attacks are hard to defend against as illustrated. For each of the proposed attack models, we present analysis, simulation, and experimental measurements. We show that the system achieves maximal damage on system performance represented by many metrics.

  2. Stealth-MITM DoS Attacks on Secure Channels

    CERN Document Server

    Herzberg, Amir

    2009-01-01

    We define stealth Man-in-the-Middle adversaries, and analyse their ability to launch denial and degradation of service (DoS) attacks on secure channels. We show realistic attacks, disrupting TCP communication over secure VPNs using IPsec. We present: First amplifying DoS attack on IPsec, when deployed without anti-replay window. First amplifying attack on IPsec, when deployed with a `small' anti-replay window, and analysis of `sufficient' window size. First amplifying attack on IPsec, when deployed with `sufficient' window size. This attack (as the previous) is realistic: attacker needs only to duplicate and speed-up few packets. We also suggest a solution designed to prevent the presented attacks, and to provide secure channel immune to degradation and other DoS attacks. Our solution involves changes (only) to the two gateway machines running IPsec. In addition to their practical importance, our results also raise the challenge of formally defining secure channels immune to DoS and degradation attacks, and p...

  3. Bioremediation of wastewater using microalgae

    Science.gov (United States)

    Chalivendra, Saikumar

    Population expansion and industrial development has deteriorated the quality of freshwater reservoirs around the world and has caused freshwater shortages in certain areas. Discharge of industrial effluents containing toxic heavy metals such as Cd and Cr into the environment have serious impact on human, animal and aquatic life. In order to solve these problems, the present study was focused on evaluating and demonstrating potential of microalgae for bioremediation of wastewater laden with nitrogen (N) in the form of nitrates, phosphorous (P) in the form of phosphates, chromium (Cr (VI)) and cadmium (Cd (II)). After screening several microalgae, Chlorella vulgaris and algae taken from Pleasant Hill Lake were chosen as candidate species for this study. The viability of the process was demonstrated in laboratory bioreactors and various experimental parameters such as contact time, initial metal concentration, algae concentration, pH and temperature that would affect remediation rates were studied. Based on the experimental results, correlations were developed to enable customizing and designing a commercial Algae based Wastewater Treatment System (AWTS). A commercial AWTS system that can be easily customized and is suitable for integration into existing wastewater treatment facilities was developed, and capital cost estimates for system including installation and annual operating costs were determined. The work concludes that algal bioremediation is a viable alternate technology for treating wastewater in an economical and sustainable way when compared to conventional treatment processes. The annual wastewater treatment cost to remove N,P is ~26x lower and to remove Cr, Cd is 7x lower than conventional treatment processes. The cost benefit analysis performed shows that if this technology is implemented at industrial complexes, Air Force freight and other Department of Defense installations with wastewater treatment plants, it could lead to millions of dollars in

  4. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version.

    Science.gov (United States)

    Babu, M Rajesh; Dian, S Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things. PMID:26495430

  5. Experimental demonstration of phase-remapping attack in a practical quantum key distribution system

    Energy Technology Data Exchange (ETDEWEB)

    Xu Feihu; Qi Bing; Lo, Hoi-Kwong, E-mail: feihu.xu@utoronto.c [Center for Quantum Information and Quantum Control (CQIQC), Department of Physics and Department of Electrical and Computer Engineering, University of Toronto, Toronto, ON M5S 3G4 (Canada)

    2010-11-15

    Quantum key distribution (QKD) can, in principle, provide unconditional security based on the fundamental laws of physics. Unfortunately, a practical QKD system may contain overlooked imperfections and may thus violate some of the assumptions in the security proofs of QKD. It is important to explore these assumptions. One key assumption is that the sender (Alice) can prepare the required quantum states without errors. However, such an assumption may be violated in a practical QKD system. In this paper, we perform a proof-of-principle experiment to demonstrate a technically feasible 'intercept- and-resend' attack that exploits such a security loophole in a commercial 'plug and play' QKD system. The resulting quantum bit error rate is 19.7%, which is substantially lower than the well-known 25% error rate for an intercept-and-resend attack in BB84. The attack we utilize is the phase-remapping attack (Fung et al 2007 Phys. Rev. A 75 32314) proposed by our group.

  6. Innovation in radioactive wastewater-stream management. Pt. 1

    International Nuclear Information System (INIS)

    Recently an invention of a system for volume reduction of the wastewater streams present in SDTs has been achieved. This system substantially utilized the air conditioning and ventilation techniques in water transfer from the wastewater to air. This process is promoted by a mutual heating and humidification of a compressed dry air introduced through SDTs (or in another tank). From the probable release of radioactive nuclides point of view, the analysis of the evaporation of waste streams present in SDTs have been indicated that the proposed optimal evaporating temperature is round 75 C. The design curve of the daily volumetric reduction of the wastewater streams versus the necessary volumetric airflow rates at different operating temperature has been achieved. The evaporating temperature varied from 40 C to 95 C with a step of 5 C. The obtained curve illustrates that the required volumetric airflow rate utilized to evaporate one m3/day (when maintaining SDTs at the temperature 75 C) is less than 90 m3/h. The assessments of the obtained curve have been indicated that this system is feasible and viable, economic and has no secondary waste residuals. Recently, an experimental facility proposed to be constructed to obtain the optimal operating parameters of the system, regarding to the probable emissions of the radioactive nuclides within the permissible release limits. (authors)

  7. Innovation in radioactive wastewater-stream management. Pt. 1

    Energy Technology Data Exchange (ETDEWEB)

    Karameldin, A. [Reactor Dept., Nuclear Research Center, Atomic Energy Authority, Cairo (Egypt)

    2002-07-01

    Recently an invention of a system for volume reduction of the wastewater streams present in SDTs has been achieved. This system substantially utilized the air conditioning and ventilation techniques in water transfer from the wastewater to air. This process is promoted by a mutual heating and humidification of a compressed dry air introduced through SDTs (or in another tank). From the probable release of radioactive nuclides point of view, the analysis of the evaporation of waste streams present in SDTs have been indicated that the proposed optimal evaporating temperature is round 75 C. The design curve of the daily volumetric reduction of the wastewater streams versus the necessary volumetric airflow rates at different operating temperature has been achieved. The evaporating temperature varied from 40 C to 95 C with a step of 5 C. The obtained curve illustrates that the required volumetric airflow rate utilized to evaporate one m{sup 3}/day (when maintaining SDTs at the temperature 75 C) is less than 90 m{sup 3}/h. The assessments of the obtained curve have been indicated that this system is feasible and viable, economic and has no secondary waste residuals. Recently, an experimental facility proposed to be constructed to obtain the optimal operating parameters of the system, regarding to the probable emissions of the radioactive nuclides within the permissible release limits. (authors)

  8. An Indistinguishability Model for Evaluating Diverse Classes of Phishing Attacks and Quantifying Attack Efficacy

    Directory of Open Access Journals (Sweden)

    Narasimha Shashidhar

    2015-07-01

    Full Text Available Phishing is a growing threat to Internet users and causes billions of dollars in damage every year. While there are a number of research articles that study the tactics, techniques and procedures employed by phishers in the literature, in this paper, we present a theoretical yet practical model to study this menacing threat in a formal manner. While it is common folklore knowledge that a successful phishing attack entails creating messages that are indistinguishable from the natural, expected messages by the intended victim, this concept has not been formalized. Our model attempts to capture a phishing attack in terms of this indistinguishability between the natural and phishing message probability distributions. We view the actions performed by a phisher as an attempt to create messages that are indistinguishable to the victim from that of “normal” messages. To the best of our knowledge, this is the first study that places phishing on a concrete theoretical framework and offers a new perspective to analyze this threat. We propose metrics to analyze the success probability of a phishing attack taking into account the input used by a phisher and the work involved in creating deceptive email messages. Finally, we study and apply our model to a new class of phishing attacks called collaborative spear phishing that is gaining momentum. Recent examples include Operation Woolen-Goldfish in 2015, Rocket Kitten in 2014 and Epsilon email breach in 2011. We point out fundamental flaws in the current email-based marketing business model which enables such targeted spear phishing collaborative attacks. In this sense, our study is very timely and presents new and emerging trends in phishing.

  9. Coupling UV irradiation and electrocoagulation for reclamation of urban wastewater

    International Nuclear Information System (INIS)

    Graphical abstract: - Highlights: • Iron electrodes allow removing turbidity and E. coli in urban wastewaters. • Enmeshment into growing flocs and oxidation are the key disinfection processes. • A synergistic effect of coupling UV and EC is found at low current densities. • Efficiency of UV irradiation is lowered at high current density. - Abstract: This work focuses on coupling electrocoagulation, with iron electrodes, and UV irradiation (photo-electrocoagulation) for the simultaneous removal of turbidity and E. coli from actual treated municipal wastewaters. Results show that single electrocoagulation behaves as a very efficient technology even using low current densities. E. coli is removed not only by the enmeshment of microorganisms into growing flocs, but also by the attack of electrochemically produced chlorine disinfectant species. Coupling UV irradiation to electrocoagulation with iron electrodes improves the process performance in terms of E. coli and turbidity removal. The effect of current density on process performance was evaluated, finding a synergistic interaction of both techniques at low current density (1.44 A m−2) but an antagonistic effect at higher values of current density (7.20 A m−2). This antagonistic effect is caused by the less efficient transmission of UV irradiation to the bulk solution due to the increase in the concentration of solids

  10. Causal Attribution, Perceived Benefits, and Morbidity After a Heart Attack: An 8-Year Study.

    Science.gov (United States)

    Affleck, Glenn; And Others

    1987-01-01

    Interviewed heart attack victims (N=287) seven weeks and eight years after their attack. Explored interrelations among causal attributions for the attack, survivor morbidity, and heart attack recurrence. Found that patients who cited benefits from their misfortune seven weeks after the first attack were less likely to have another attack and had…

  11. Realization Utility

    OpenAIRE

    Nicholas C. Barberis; Wei Xiong

    2008-01-01

    A number of authors have suggested that investors derive utility from realizing gains and losses on assets that they own. We present a model of this "realization utility," analyze its predictions, and show that it can shed light on a number of puzzling facts. These include the disposition effect, the poor trading performance of individual investors, the higher volume of trade in rising markets, the effect of historical highs on the propensity to sell, the individual investor preference for vo...

  12. The Impact of Imperfect Information on Network Attack

    CERN Document Server

    Melchionna, Andrew; Squires, Shane; Antonsen, Thomas M; Ott, Edward; Girvan, Michelle

    2014-01-01

    This paper explores the effectiveness of network attack when the attacker has imperfect information about the network. For Erd\\H{o}s-R\\'enyi networks, we observe that dynamical importance and betweenness centrality-based attacks are surprisingly robust to the presence of a moderate amount of imperfect information and are more effective compared with simpler degree-based attacks even at moderate levels of network information error. In contrast, for scale-free networks the effectiveness of attack is much less degraded by a moderate level of information error. Furthermore, in the Erd\\H{o}os-R\\'enyi case the effectiveness of network attack is much more degraded by missing links as compared with the same number of false links.

  13. Efficient Detection of Sybil attack Based on Cryptography in Vanet

    Directory of Open Access Journals (Sweden)

    Mina Rahbari

    2011-12-01

    Full Text Available Vehicular communications play a substantial role in providing safety transportation by means of safetymessage exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed keyinfrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular adhoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.

  14. Simulating Cyber-Attacks for Fun and Profit

    CERN Document Server

    Futoransky, Ariel; Orlicki, Jose; Sarraute, Carlos

    2010-01-01

    We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware and configuration requirements, while making the simulation a realistic experience from the attacker's standpoint. The scenarios include a crowd of simulated actors: network devices, hardware devices, software applications, protocols, users, etc. A novel characteristic of this tool is to simulate vulnerabilities (including 0-days) and exploits, allowing an attacker to compromise machines and use them as pivoting stones to continue the attack. A user can test and modify complex scenarios, with several interconnected networks, where the attacker has no initial connectivity with the objective of the attack. We give a concise description of this new technology, and its possible uses in the security research field, such as pentesting training, study of the impact of 0-days vulnerabilities, evaluation of security countermeasures, and risk...

  15. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Honglong Chen

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  16. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  17. Preventing Recommendation Attack in Trust-Based Recommender Systems

    Institute of Scientific and Technical Information of China (English)

    Fu-Guo Zhang

    2011-01-01

    Despite its success,similarity-based collaborative filtering suffers from some limitations,such as scalability,sparsity and recommendation attack.Prior work has shown incorporating trust mechanism into traditional collaborative filtering recommender systems can improve these limitations.We argue that trust-based recommender systems are facing novel recommendation attack which is different from the profile injection attacks in traditional recommender system.To the best of our knowledge,there has not any prior study on recommendation attack in a trust-based recommender system.We analyze the attack problem,and find that "victim" nodes play a significant role in the attack.Furthermore,we propose a data provenance method to trace malicious users and identify the "victim" nodes as distrust users of recommender system.Feasibility study of the defend method is done with the dataset crawled from Epinions website.

  18. Attacker Control and Impact for Confidentiality and Integrity

    CERN Document Server

    Askarov, Aslan

    2011-01-01

    Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Security-typed languages have therefore introduced declassification mechanisms for relaxing confidentiality policies, and endorsement mechanisms for relaxing integrity policies. However, a continuing challenge has been to define what security is guaranteed when such mechanisms are used. This paper presents a new semantic framework for expressing security policies for declassification and endorsement in a language-based setting. The key insight is that security can be characterized in terms of the influence that declassification and endorsement allow to the attacker. The new framework introduces two notions of security to describe the influence of the attacker. Attacker control defines what the attacker is able to learn from observable effects of this code; attacker impact captures the attacker's influence on trusted locations. This ap...

  19. Performance Analysis of Manet Before and After Black Hole Attack

    Directory of Open Access Journals (Sweden)

    Ms.Heena Bhalla

    2012-01-01

    Full Text Available A Mobile ad-hoc network is a temporary network set up by wireless mobile computers (or nodes moving arbitrary in the places that have no network infrastructure. Due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. One of the prominent attacks is the Black Hole Attack which absorbs all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper we simulated MANETs with and without Black Hole to study the effects of Black hole attack on network performance. Because of Black Hole Attack the average packet drop increased form 0.25% to 90.69% . The throughput of the network decreased 93.56% due to Black Hole effect.

  20. Efficient Detection of Sybil Attack Based on Cryptography in Vanet

    CERN Document Server

    Rahbari, Mina

    2011-01-01

    Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed key infrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular ad hoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.