WorldWideScience

Sample records for attack wastewater utilities

  1. Reducing the Risks. In the aftermath of a terrorist attack, wastewater utilities may have to contend with decontamination water containing chemical, biological, or radiological substances

    International Nuclear Information System (INIS)

    Warren, Linda P.; Hornback, Chris; Strom, Daniel J.

    2006-01-01

    In the aftermath of a chemical, biological, or radiological (CBR) attack, decontamination of people and infrastructure will be needed. Decontamination inevitably produces wastewater, and wastewater treatment plants (WTPs) need to know how to handle decontamination wastewater. This article describes CBR substances; planning, coordinating, and communicating responses across agencies; planning within a utility; coordination with local emergency managers and first responders; mitigating effects of decontamination wastewater; and mitigating effects on utility personnel. Planning for Decontamination Wastewater: A Guide for Utilities, the document on which this article is based, was developed under a cooperative agreement from the U.S. Environmental Protection Agency by the National Association of Clean Water Agencies (NACWA) and its contractor, CH2MHILL, Inc.

  2. Protecting water and wastewater infrastructure from cyber attacks

    Institute of Scientific and Technical Information of China (English)

    Srinivas Panguluri; William Phillips; John Cusimano

    2011-01-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion:cyber attacks are real and can cause significant damages.This paper presents some recent statistics on cyber attacks and resulting damages.Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks.Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are:1) the increasing interconnection of their business and control system networks,2) large variation of proprietary industrial control equipment utilized,3) multitude of cross-sector cyber-security standards,and 4) the differences in the equipment vendor's approaches to meet these security standards.The utilities can meet these challenges by voluntarily selecting and adopting security standards,conducting a gap analysis,performing vulnerability/risk analysis,and undertaking countermeasures that best meets their security and organizational requirements.Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years.Implementing cyber security does not necessarily have to be expensive,substantial improvements can be accomplished through policy,procedure,training and awareness.Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  3. Protecting water and wastewater infrastructure from cyber attacks

    Science.gov (United States)

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  4. Utility Bill Insert for Wastewater Services

    Science.gov (United States)

    Intended for use by wastewater and water supply utilities, one side of the utility bill insert has information for customers that discharge to sanitary sewer systems; the other side is for customers with septic systems.

  5. Utilization of portable effluent wastewater in brick manufacturing

    International Nuclear Information System (INIS)

    EI-Mahllawy, M.S.; El-Sokkary, T.M.

    2005-01-01

    Portable wastewater is produced from sedimentation and filtration tanks in portable water treatment plants. Usually, this useless wastewater is drained into River Nile Canal and not to the sewer system causing a potential pollution. Wastewater has been taken from Portable Treatment Plant located at Qalubia Province, Delta, Egypt. Evaluation of raw materials was carried out by using X-ray diffraction (XRD), X-ray fluorescence (XRF), thermal analyses (DTA and TGA) as well as plasticity and drying sensitivity coefficient (DSC) measurements. Technological properties of fired bricks were investigated according to Egyptian and American Specifications. The obtained experimental results encourage substitution of the drained portable wastewater for the tap water in bricks manufacturing. Thus, utilization of the studied portable effluent wastewater in such industry is possible and fulfills the double target of saving drinking water used in clay bricks manufacturing, rather than its environmental pollution prevention. Keywords: Portable wastewater, tap water, clay building bricks, physicomechanical properties

  6. Asset Management for Water and Wastewater Utilities

    Science.gov (United States)

    Renewing and replacing the nation's public water infrastructure is an ongoing task. Asset management can help a utility maximize the value of its capital as well as its operations and maintenance dollars.

  7. A comprehensive review on utilization of wastewater from coffee processing.

    Science.gov (United States)

    Rattan, Supriya; Parande, A K; Nagaraju, V D; Ghiwari, Girish K

    2015-05-01

    The coffee processing industry is one of the major agro-based industries contributing significantly in international and national growth. Coffee fruits are processed by two methods, wet and dry process. In wet processing, coffee fruits generate enormous quantities of high strength wastewater requiring systematic treatment prior to disposal. Different method approach is used to treat the wastewater. Many researchers have attempted to assess the efficiency of batch aeration as posttreatment of coffee processing wastewater from an upflow anaerobic hybrid reactor (UAHR)-continuous and intermittent aeration system. However, wet coffee processing requires a high degree of processing know-how and produces large amounts of effluents which have the potential to damage the environment. Characteristics of wastewater from coffee processing has a biological oxygen demand (BOD) of up to 20,000 mg/l and a chemical oxygen demand (COD) of up to 50,000 mg/l as well as the acidity of pH below 4. In this review paper, various methods are discussed to treat coffee processing wastewaters; the constitution of wastewater is presented and the technical solutions for wastewater treatment are discussed.

  8. Production of Spirulina sp by utilization of wastewater from the powder type energy drinks

    Science.gov (United States)

    Sumantri, Indro; Priyambada, Ika Bagus

    2015-12-01

    Wastewater of energy drink type of powder produced when the the production equipment required cleaning treatment to produce one taste to others. These equipments washed by water, so that, it produced wastewater. It contains high organic substances and classified as high degradable due to food product. The content of wastewater is high carbon and nitrogen substances. Microalgae is an autotrophic microorganism, live without carbon presence, utilized to digest the substances in wastewater especially for nitrogen substances. Spirulina sp is the type of microalgae selected to utilize the wastewater of energy drink, the selection criteria is the size of Spirulina sp is relatively large and easy to separated from its solution. The experiment conducted by cultivate the seeding microalgae with certain nutrients until the certain volume. The synthetic wastewater obtained from one of energy drink type of powder with commercial brand as Kuku Bima Ener-G, the wastewater concentration selected under the close to the real condition of wastewater as basis of COD measurement (6 sachet/L or COD of 12.480mg/L) and aqueous concentration (1 sachet/L or COD of 2080mg/L). The batch experiments with 1L volume conducted and with variable of percent volume of wastewater added in order to observe the growth of microlagae. The response of the microalgae growth obtained by increasing the optical density of the microalgae solution and continued by calculation for the growth rate of microalgae. The result of the experiments indicated that for the aqueous concentration (1 sachet/L or COD of 2080mg/L) the optimum added of wastewater is 40 % with growrate of 0.55/day while for the concentrated wastewater (6 sachet/L or COD of 12.480mg/L), the optimum condition is 25 % wastewater added with growth rate of 0.43/day.

  9. Financing Disaster Recovery and Resilience Mitigation for Water and Wastewater Utilities

    Science.gov (United States)

    Free webinar series on Financing for Disaster Recovery and Resilience Mitigation for Water and Wastewater Utilities, hosted by EPA's Water Infrastructure and Resiliency Finance Center and Water Security Division.

  10. Utilization of municipal wastewater for cooling in thermoelectric power plants

    Energy Technology Data Exchange (ETDEWEB)

    Safari, Iman [Illinois Inst. of Technology, Chicago, IL (United States); Walker, Michael E. [Illinois Inst. of Technology, Chicago, IL (United States); Hsieh, Ming-Kai [Carnegie Mellon Univ., Pittsburgh, PA (United States); Dzombak, David A. [Carnegie Mellon Univ., Pittsburgh, PA (United States); Liu, Wenshi [Univ. of Pittsburgh, PA (United States); Vidic, Radisav D. [Univ. of Pittsburgh, PA (United States); Miller, David C. [National Energy Technology Lab. (NETL), Morgantown, WV (United States); Abbasian, Javad [Illinois Inst. of Technology, Chicago, IL (United States)

    2013-09-01

    A process simulation model has been developed using Aspen Plus® with the OLI (OLI System, Inc.) water chemistry model to predict water quality in the recirculating cooling loop utilizing secondary- and tertiary-treated municipal wastewater as the source of makeup water. Simulation results were compared with pilot-scale experimental data on makeup water alkalinity, loop pH, and ammonia evaporation. The effects of various parameters including makeup water quality, salt formation, NH3 and CO2 evaporation mass transfer coefficients, heat load, and operating temperatures were investigated. The results indicate that, although the simulation model can capture the general trends in the loop pH, experimental data on the rates of salt precipitation in the system are needed for more accurate prediction of the loop pH. It was also found that stripping of ammonia and carbon dioxide in the cooling tower can influence the cooling loop pH significantly. The effects of the NH3 mass transfer coefficient on cooling loop pH appear to be more significant at lower values (e.g., kNH3 < 4×10-3 m/s) when the makeup water alkalinity is low (e.g., <90 mg/L as CaCO3). The effect of the CO2 mass transfer coefficient was found to be significant only at lower alkalinity values (e.g., kCO2<4×10-6 m/s).

  11. Supply-chain environmental effects of wastewater utilities

    International Nuclear Information System (INIS)

    Stokes, Jennifer R; Horvath, Arpad

    2010-01-01

    This letter describes a comprehensive modeling framework and the Wastewater-Energy Sustainability Tool (WWEST) designed for conducting hybrid life-cycle assessments of the wastewater collection, treatment, and discharge infrastructure in the United States. Results from a case study treatment plant which produces electricity using methane offgas are discussed. The case study system supplements influent with 'high-strength organic waste' to augment electricity production. The system balance is 55 kg of greenhouse gases per million liters of wastewater. Sensitivity analysis confirms that reusing biogas from anaerobic digestion for electricity reduces life-cycle greenhouse gas emissions by nine times. When biogas is captured and reused for electricity, material production (e.g., chemicals and pipes) and the corresponding supply chains, rather than energy production, are responsible for most of the environmental effects. When biogas is flared, the material and energy production contributions are similar.

  12. Factors affecting ambulance utilization for asthma attack treatment: understanding where to target interventions.

    Science.gov (United States)

    Raun, L H; Ensor, K B; Campos, L A; Persse, D

    2015-05-01

    Asthma is a serious, sometimes fatal condition, in which attacks vary in severity, potentially requiring emergency medical services (EMS) ambulance treatment. A portion of asthma attacks requiring EMS ambulance treatment may be prevented with improved education and access to care. The aim of this study was to identify areas of the city with high rates of utilization of EMS ambulance for treatment, and the demographics, socio-economic status, and time of day associated with these rates, to better target future interventions to prevent emergencies and reduce cost. A cross-sectional study was conducted on individuals in Houston, TX (USA) requiring ambulance treatment for asthma attacks from 2004 to 2011. 12,155 EMS ambulance-treated asthma attack cases were linked to census tracts. High rate treatment areas were identified with geospatial mapping. Census tract demographic characteristics of these high rate areas were compared with the remainder of the city using logistic regression. The association between case level demographics and the time of day of asthma attack within the high rate area was also assessed with logistic regression. EMS ambulance-treated high rate areas were identified and found to have a utilization incidence rate over six times higher per 100,000 people than the remainder of the city. There is an increased risk of location in this high rate area with a census tract level increase of percent of population: earning less than $10,000 yearly income (RR 1.21, 1.16-1.26), which is black (RR 1.08, 1.07-1.10), which is female (RR 1.34, 1.20-1.49) and have obtained less than a high school degree (RR 1.02, 1.01-1.03). Within the high rate area, case level data indicates an increased risk of requiring an ambulance after normal doctor office hours for men compared with women (RR 1.13, 1.03-1.22), for black compared with Hispanic ethnicity (RR 1.31, 1.08-1.59), or for adults (less than 41 and greater than 60) compared with children. Interventions to prevent

  13. Generation and energy utilization of methane form industrial wastewater

    International Nuclear Information System (INIS)

    Lebek, M.

    2009-01-01

    At the production site of a natural ingredients manufacturer for the food industry was necessary the adjustment of the WWTP to the enlargement of the production and its complement with a pre-treatment. The core of the treatment plan tis an UASB (Upflow Anaerobic Sludge Blanket) reactor where the wastewater is removed under anaerobic conditions. The main advantages of this treatment ar the operation stability and the high methane production. The biogas generated is cleaned before it is used during the production process as an energy resource. (Author)

  14. Utilization of Waste Materials for Microbial Carrier in Wastewater Treatment

    Directory of Open Access Journals (Sweden)

    H. T. Le

    2016-01-01

    Full Text Available This research focused on the ammonium-nitrogen (NH4-N removal from the domestic wastewater using the attached growth reactors. Two types of waste material of corncob (biodegradable material and concrete (nonbiodegradable material were used as the carrier for microorganisms’ attachment. During operation, both reactors achieved absolutely high performance of ammonium removal (up to 99% and total nitrogen removal (up to 95%. The significant advantage of corncob carrier was that the corncob was able to be a source of carbon for biological denitrification, leading to no external carbon requirement for operating the system. However, the corncob caused an increasing turbidity of the effluent. On the other hand, the concrete carrier required the minimal external carbon of 3.5 C/N ratio to reach the good performance. Moreover, a longer period for microorganisms’ adaptation was found in the concrete carrier rather than the corncob carrier. Further, the same physiological and biochemical characteristics of active bacteria were found at the two carriers, which were negative gram, cocci shape, and smooth and white-turbid colony. Due to the effluent quality, the concrete was more appropriate carrier than the corncob for wastewater treatment.

  15. The sustainable utilization of malting industry wastewater biological treatment sludge

    Science.gov (United States)

    Vasilenko, T. A.; Svintsov, A. V.; Chernysh, I. V.

    2018-01-01

    The article deals with the research of using the sludge from malting industry wastewater’s biological treatment and the calcium carbonate slurry as organo-mineral fertilizing additives. The sludge, generated as a result of industrial wastewater biological treatment, is subject to dumping at solid domestic waste landfills, which has a negative impact on the environment, though its properties and composition allow using it as an organic fertilizer. The physical and chemical properties of both wastes have been studied; the recommendations concerning the optimum composition of soil mix, containing the above-mentioned components, have been provided. The phytotoxic effect on the germination capacity and sprouts of cress (Lepidium sativum), barley (Hordéum vulgáre) and oats (Avena sativa) in soil mixes has been determined. The heavy metals and arsenic contents in the sludge does not exceed the allowable level; it is also free of pathogenic flora and helminthes.

  16. Utilization of Gamma Radiation for Disinfecting Domestic Wastewater

    International Nuclear Information System (INIS)

    Aldehmani, K.; Abokhabta, S.; Rahil, E.; Elammari, M.; Aboudeeb, F.

    2004-01-01

    Wastewater treatment by Gamma radiation is an effective, economic and environmentally friendly as the water produced has the specification to be reused for watering trees, gardens, football fields and golf courses instead of using fresh water that can be saved for drinking purposes as we suffer a severe shortage of fresh water. Sewage water samples were brought from Elhadba Elkhadra wastewater treatment plant which is located in the City of Tripoli. Samples were taken from two places: the inlet of the plant and from the stream coming out from the biological treatment, they are taken in sterile plastic bottles to ensure that cross contamination does not take place. Samples were irradiated at Tajura Research Centre with different doses ranged between 0.5 and 2 kGy with a dose rate of 10 Gy/min. These samples were investigated chemically and microbiologically. A study was carried out on the effect of gamma radiation on pathogenic organisms, and the total suspended solids in the raw and treated samples. Results showed that the doses 2.0 kGy and 1.5 kGy were enough to terminate the total microbial count and Enterobacter ease respectively but only a dose of 1.0 kGy was needed to eliminate total coliform, fecal coliform and spore forming bacteria. There were also higher BOD, pH and E.C. values in raw sewage than the sewage that was subjected to biological treatment which gave a good indication for the efficiency of the biological treatment. (authors)

  17. Removal of uranium and priority pollutant metals from Fernald Environmental Management Project wastewater utilizing potassium ferrate

    International Nuclear Information System (INIS)

    Hampshire, Lyle H.; Potts, Michael E.

    1992-01-01

    A side-by-side treatment comparison between calcium hydroxide and TRU/Clear '4', a potassium ferrate based wastewater treatment chemical, was performed in a process wastewater and stormwater treatment facility. Results from the full-scale plant testing demonstrated that potassium ferrate could achieve the same treatment levels as calcium hydroxide while generating 55% less sludge than the calcium hydroxide treatment. The testing also showed that utilization of potassium ferrate would minimize the volume of sludge generated and assist in the reduction of total waste management costs associated with storage, monitoring, transportation, and final disposition of generated sludge. (author)

  18. A soil infiltration system incorporated with sulfur-utilizing autotrophic denitrification (SISSAD) for domestic wastewater treatment.

    Science.gov (United States)

    Kong, Zhe; Feng, Chuanping; Chen, Nan; Tong, Shuang; Zhang, Baogang; Hao, Chunbo; Chen, Kun

    2014-05-01

    To enhance the denitrification performance of soil infiltration, a soil infiltration system incorporated with sulfur-utilizing autotrophic denitrification (SISSAD) for domestic wastewater treatment was developed, and the SISSAD performance was evaluated using synthetic domestic wastewater in this study. The aerobic respiration and nitrification were mainly taken place in the upper aerobic stage (AES), removed 88.44% COD and 89.99% NH4(+)-N. Moreover, autotrophic denitrification occurred in the bottom anaerobic stage (ANS), using the CO2 produced from AES as inorganic carbon source. Results demonstrated that the SISSAD showed a remarkable performance on COD removal efficiency of 95.09%, 84.86% for NO3(-)-N, 95.25% for NH4(+)-N and 93.15% for TP. This research revealed the developed system exhibits a promising application prospect for domestic wastewater in the future. Copyright © 2014 Elsevier Ltd. All rights reserved.

  19. New efficient utility upper bounds for the fully adaptive model of attack trees

    NARCIS (Netherlands)

    Buldas, Ahto; Lenin, Aleksandr

    2013-01-01

    We present a new fully adaptive computational model for attack trees that allows attackers to repeat atomic attacks if they fail and to play on if they are caught and have to pay penalties. The new model allows safer conclusions about the security of real-life systems and is somewhat

  20. NEUTRALIZING WASTEWATER FROM PUBLIC UTILITIES ON RURAL AREAS

    Directory of Open Access Journals (Sweden)

    Piotr Bugajski

    2015-10-01

    Full Text Available The research aimed at determining a potential use of domestic sewage treatment plants based on activated sludge for the disposal of wastes drained from schools in rural areas. Selected pollutant indicators, such as: BOD5, COD, total suspended solids, total nitrogen and phosphates were the basis for determining the composition of raw sewage discharged by public utility objects and the quality of treated sewage considering the days when lessons were taking place at school and days free from classes. The analysis of the results revealed that household sewage treatment plants based on activated sludge may be used for waste disposal from public facilities, such as schools.

  1. Investigating multi-thread utilization as a software defence mechanism against side channel attacks

    CSIR Research Space (South Africa)

    Frieslaar, Ibraheem

    2016-11-01

    Full Text Available out information at critical points in the cryptographic algorithm and confuse the attacker. This research demonstrates it is capable of outperforming the known countermeasure of hiding and shuffling in terms of preventing the secret information from...

  2. A combined model to assess technical and economic consequences of changing conditions and management options for wastewater utilities.

    Science.gov (United States)

    Giessler, Mathias; Tränckner, Jens

    2018-02-01

    The paper presents a simplified model that quantifies economic and technical consequences of changing conditions in wastewater systems on utility level. It has been developed based on data from stakeholders and ministries, collected by a survey that determined resulting effects and adapted measures. The model comprises all substantial cost relevant assets and activities of a typical German wastewater utility. It consists of three modules: i) Sewer for describing the state development of sewer systems, ii) WWTP for process parameter consideration of waste water treatment plants (WWTP) and iii) Cost Accounting for calculation of expenses in the cost categories and resulting charges. Validity and accuracy of this model was verified by using historical data from an exemplary wastewater utility. Calculated process as well as economic parameters shows a high accuracy compared to measured parameters and given expenses. Thus, the model is proposed to support strategic, process oriented decision making on utility level. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. An innovative integrated system utilizing solar energy as power for the treatment of decentralized wastewater.

    Science.gov (United States)

    Han, Changfu; Liu, Junxin; Liang, Hanwen; Guo, Xuesong; Li, Lin

    2013-02-01

    This article reports an innovative integrated system utilizing solar energy as power for decentralized wastewater treatment, which consists of an oxidation ditch with double channels and a photovoltaic (PV) system without a storage battery. Because the system operates without a storage battery, which can reduce the cost of the PV system, the solar radiation intensity affects the amount of power output from the PV system. To ensure that the power output is sufficient in all different weather conditions, the solar radiation intensity of 78 W/m2 with 95% confidence interval was defined as a threshold of power output for the PV system according to the monitoring results in this study, and a step power output mode was used to utilize the solar energy as well as possible. The oxidation ditch driven by the PV system without storage battery ran during the day and stopped at night. Therefore, anaerobic, anoxic and aerobic conditions could periodically appear in the oxidation ditch, which was favorable to nitrogen and phosphate removal from the wastewater. The experimental results showed that the system was efficient, achieving average removal efficiencies of 88% COD, 98% NH4+-N, 70% TN and 83% TP, under the loading rates of 140 mg COD/(g MLSS x day), 32 mg NH4+-N/(g MLSS x day), 44 mg TN/(g MLSS x day) and 5 mg TP/(g MLSS x day).

  4. Removal of basic dye (methylene blue) from wastewaters utilizing beer brewery waste

    International Nuclear Information System (INIS)

    Tsai, W.-T.; Hsu, H.-C.; Su, T.-Y.; Lin, K.-Y.; Lin, C.-M.

    2008-01-01

    In the work, the beer brewery waste has been shown to be a low-cost adsorbent for the removal of basic dye from the aqueous solution as compared to its precursor (i.e., diatomite) based on its physical and chemical characterizations including surface area, pore volume, scanning electron microscopy (SEM), and non-mineral elemental analyses. The pore properties of this waste were significantly larger than those of its raw material, reflecting that the trapped organic matrices contained in the waste probably provided additional adsorption sites and/or adsorption area. The results of preliminary adsorption kinetics showed that the diatomite waste could be directly used as a potential adsorbent for removal of methylene blue on the basis of its adsorption-biosorption mechanisms. The adsorption parameters thus obtained from the pseudo-second-order model were in accordance with their pore properties. From the results of adsorption isotherm at 298 K and the applicability examinations in treating industrial wastewater containing basic dye, it was further found that the adsorption capacities of diatomite waste were superior to those of diatomite, which were also in good agreement with their corresponding physical properties. From the results mentioned above, it is feasible to utilize the food-processing waste for removing dye from the industrial dying wastewater

  5. Removal of basic dye (methylene blue) from wastewaters utilizing beer brewery waste.

    Science.gov (United States)

    Tsai, Wen-Tien; Hsu, Hsin-Chieh; Su, Ting-Yi; Lin, Keng-Yu; Lin, Chien-Ming

    2008-06-15

    In the work, the beer brewery waste has been shown to be a low-cost adsorbent for the removal of basic dye from the aqueous solution as compared to its precursor (i.e., diatomite) based on its physical and chemical characterizations including surface area, pore volume, scanning electron microscopy (SEM), and non-mineral elemental analyses. The pore properties of this waste were significantly larger than those of its raw material, reflecting that the trapped organic matrices contained in the waste probably provided additional adsorption sites and/or adsorption area. The results of preliminary adsorption kinetics showed that the diatomite waste could be directly used as a potential adsorbent for removal of methylene blue on the basis of its adsorption-biosorption mechanisms. The adsorption parameters thus obtained from the pseudo-second-order model were in accordance with their pore properties. From the results of adsorption isotherm at 298 K and the applicability examinations in treating industrial wastewater containing basic dye, it was further found that the adsorption capacities of diatomite waste were superior to those of diatomite, which were also in good agreement with their corresponding physical properties. From the results mentioned above, it is feasible to utilize the food-processing waste for removing dye from the industrial dying wastewater.

  6. Removal of basic dye (methylene blue) from wastewaters utilizing beer brewery waste

    Energy Technology Data Exchange (ETDEWEB)

    Tsai, W.-T. [Graduate Institute of Bioresources, National Pingtung University of Science and Technology, Pingtung 912, Taiwan (China)], E-mail: wttsai@mail.npust.edu.tw; Hsu, H.-C.; Su, T.-Y.; Lin, K.-Y.; Lin, C.-M. [Department of Environmental Engineering and Science, Chia Nan University of Pharmacy and Science, Tainan 717, Taiwan (China)

    2008-06-15

    In the work, the beer brewery waste has been shown to be a low-cost adsorbent for the removal of basic dye from the aqueous solution as compared to its precursor (i.e., diatomite) based on its physical and chemical characterizations including surface area, pore volume, scanning electron microscopy (SEM), and non-mineral elemental analyses. The pore properties of this waste were significantly larger than those of its raw material, reflecting that the trapped organic matrices contained in the waste probably provided additional adsorption sites and/or adsorption area. The results of preliminary adsorption kinetics showed that the diatomite waste could be directly used as a potential adsorbent for removal of methylene blue on the basis of its adsorption-biosorption mechanisms. The adsorption parameters thus obtained from the pseudo-second-order model were in accordance with their pore properties. From the results of adsorption isotherm at 298 K and the applicability examinations in treating industrial wastewater containing basic dye, it was further found that the adsorption capacities of diatomite waste were superior to those of diatomite, which were also in good agreement with their corresponding physical properties. From the results mentioned above, it is feasible to utilize the food-processing waste for removing dye from the industrial dying wastewater.

  7. Utilization of Shochu distillery wastewater for production of polyunsaturated fatty acids and xanthophylls using thraustochytrid.

    Science.gov (United States)

    Yamasaki, Takashi; Aki, Tsunehiro; Shinozaki, Masami; Taguchi, Masahiro; Kawamoto, Seiji; Ono, Kazuhisa

    2006-10-01

    The industrial production of barley shochu, a distilled alcoholic beverage, results in distillery waste that is currently incinerated or disposed of in landfills, causing environmental pollution. The supernatant of distillery waste contains organic matter such as proteins ( approximately 2.5%) and amino acids ( approximately 0.2%). This study demonstrates that the utilization of distillery wastewater as a sole nitrogen source enables a marine thraustochytrid, Schizochytrium sp. strain KH105, to propagate and accumulate valuable lipids including docosahexaenoic acid (DHA) and astaxanthin. Under optimized culture conditions, the highest DHA and astaxanthin yields were obtained at 3.4 g/l and 7.7 mg/l, respectively, after 4 or 5 d of cultivation in a 3-l jar fermentor. The chemical oxygen demand of the wastewater was reduced by 35%. About 67% of crude protein content and 85% of total free amino acid content also decreased in the culture supernatant. The thraustochytrid therefore serves to upgrade the distillery by-product to one containing value-added lipids for functional foods as well as to regulate the environmental contamination.

  8. The Effects of Operational and Environmental Variables on Efficiency of Danish Water and Wastewater Utilities

    Directory of Open Access Journals (Sweden)

    Andrea Guerrini

    2015-06-01

    Full Text Available Efficiency improvement is one of three patterns a public utility should follow in order to get funds for investments realization. The other two are recourse to bank loans or to private equity and tariff increase. Efficiency can be improved, for example, by growth and vertical integration and may be conditioned by environmental variables, such as customer and output density. Prior studies into the effects of these variables on the efficiency of water utilities do not agree on certain points (e.g., scale and economies of scope and rarely consider others (e.g., density economies. This article aims to contribute to the literature by analysing the efficiency of water utilities in Denmark, observing the effects of operational and environmental variables. The method is based on two-stage Data Envelopment Analysis (DEA applied to 101 water utilities. We found that the efficiency of the water sector was not affected by the observed variables, whereas that of wastewater was improved by smaller firm size, vertical integration strategy, and higher population density.

  9. Optimal number of energy generators for biogas utilization in wastewater treatment facility

    International Nuclear Information System (INIS)

    Tsagarakis, Konstantinos P.

    2007-01-01

    A technoeconomic analysis has been undertaken considering the optimum number of energy producing generators using biogas coming from anaerobic digestion. Inputs for this analysis originate from available data on the first generator for energy production from biogas, installed in Greece at the wastewater treatment facility of Iraklio city. The data spans a period of 5.5 years of operation. It is concluded that the cost per kWh produced is 0.0876 Euro /kWh if one generator is used covering 15.9% of the facility's needs. If two generators are used, more biogas is utilized contributing 32.6% of the facility's needs at a marginal production cost of 0.0886 Euro /kWh. Similar estimations have been made for scenarios involving up to six generators. In contrast, the marginal cost of conventionally produced energy is 0.1383-0.2483 Euro /kWh

  10. Barriers to Innovation in Urban Wastewater Utilities: Attitudes of Managers in California.

    Science.gov (United States)

    Kiparsky, Michael; Thompson, Barton H; Binz, Christian; Sedlak, David L; Tummers, Lars; Truffer, Bernhard

    2016-06-01

    In many regions of the world, urban water systems will need to transition into fundamentally different forms to address current stressors and meet impending challenges-faster innovation will need to be part of these transitions. To assess the innovation deficit in urban water organizations and to identify means for supporting innovation, we surveyed wastewater utility managers in California. Our results reveal insights about the attitudes towards innovation among decision makers, and how perceptions at the level of individual managers might create disincentives for experimentation. Although managers reported feeling relatively unhindered organizationally, they also spend less time on innovation than they feel they should. The most frequently reported barriers to innovation included cost and financing; risk and risk aversion; and regulatory compliance. Considering these results in the context of prior research on innovation systems, we conclude that collective action may be required to address underinvestment in innovation.

  11. Caffeine in Boston Harbor past and present, assessing its utility as a tracer of wastewater contamination in an urban estuary

    Science.gov (United States)

    Sites throughout Boston Harbor were analyzed for caffeine to assess its utility as a tracer in identifying sources of sanitary wastewater. Caffeine ranged from 15 ng/L in the outer harbor to a high of 185 ng/L in the inner harbor. Inner harbor concentrations were a result of comb...

  12. Estimation of Viable Biomass In Wastewater And Activated Sludge By Determination of ATP, Oxygen Utilization Rate And FDA Hydrolysis

    DEFF Research Database (Denmark)

    Jørgensen, Poul-Erik; Eriksen, T.; Jensen, B.K.

    1992-01-01

    ATP content, oxygen utilization rate (OUR) and fluorescein diacetate (FDA) hydrolysis were tested for the ability to express the amount of viable biomass in wastewater and activated sludge. The relationship between biomass and these activity parameters was established in growth cultures made...... with biomass, while FDA hydrolysis in the sludge failed to show any such correlation. Conversion factors of 3 mg ATP/g dw, 300 mg O2/h g dw and 0.4 A/h (mg dw/ml) for ATP, OUR and FDA methods, respectively, were calculated. When the methods were applied for in situ determinations in four different wastewater...... plants, it was found that ATP content and respiration rate estimated viable biomass to range from 81 to 293 mg dw/g SS for raw wastewater and from 67 to 187 mg dw/g SS for activated sludge with a rather weak correlation between ATP and respiration measurements. The FDA hydrolysis estimated viable biomass...

  13. Utilizing Slurry and Carwash Wastewater as Fresh Water Replacement in Concrete Properties

    Directory of Open Access Journals (Sweden)

    Shahidan Shahiron

    2017-01-01

    Full Text Available The high demand for concrete production generates wastewater which causes environmental problems. However, if wastewater is able to be recycled as part of engineering construction materials, many benefits can be reaped. Unfortunately, the use of wastewater in manufacturing concrete is not common. Therefore, this research aims to identify the influence of using slurry water and car wash wastewater on concrete properties, focusing particularly on its mechanical properties. The basic characteristics of wastewater were studied according to USEPA method while the properties of concrete with wastewater were compared according to ASTM C1602 and BS EN 1008 standards. In this paper, the compressive strength, modulus of elasticity and tensile strength were examined in order to determine the mechanical properties of concrete. The wastewater was replaced in the concrete mix from 0% up to 40%. The results indicated that the characteristics of wastewater complied with the BS and ASTM standards. In addition, the results also recommended that the concrete mixture with 20% of wastewater has given the highest compressive strength and modulus of elasticity.

  14. Utilization of wastewater on seed germination and physioogical parameters of rice (Oryza sativa L.)

    Science.gov (United States)

    Huy, V.; Iwai, C. B.

    2018-03-01

    Due to increasing world population and demand, fresh water availability is becoming a limited resource. Reusing wastewater for agriculture has received attention since it contains nutrients, which are beneficial for growing crops. Even though wastewater can be used as the nutrient source for the plant, the toxicity of wastewater can still be a cause for concern and investigation. The main objective of this paper was to assess the effect of different sources of wastewater on the germination of Jasmine rice (KDML105), White rice (Phatum Thani 1), and Sticky rice (RD6) under laboratory conditions. Petri dish cultures were used with various concentrations (0, 50, and 100%) of wastewater collected from swine farm, aquaculture activity, and domestic. Seed germination, root length, shoot length, seed vigor index, fresh weight and dry weight were measured after each experiment. The results have shown that domestic wastewater and aquaculture activity wastewater did not decrease performance of Jasmine rice (KDML105), White rice (Phatum thani 1), and Sticky rice (RD6) while the germination of Jasmine rice (KDML105), White rice (Phatum thani 1), and Sticky rice (RD6) decreased when irrigated with swine farm wastewater. Therefore, using domestic and aquaculture activity wastewater for irrigation are suitable for growth of these crop.

  15. A GIS based national assessment of algal bio-oil production potential through flue gas and wastewater co-utilization

    International Nuclear Information System (INIS)

    Orfield, Nolan D.; Keoleian, Gregory A.; Love, Nancy G.

    2014-01-01

    The high theoretical productivity of microalgae makes it a promising energy crop, but economically viable large-scale production facilities have yet to emerge. Coupling algae cultivation ponds with flue gas emissions from power utilities to provide carbon dioxide and municipal wastewater to provide nutrients has been recommended as a solution. This flue gas and wastewater co-utilization (FWC) strategy not only reduces the upstream impacts and costs associated with providing inputs, but also provides a credit for wastewater treatment, a service currently required to reduce production costs to a viable level. This study provides the first national assessment of the potential for producing algal bio-oil in the United States using FWC. Spatial-temporal algae growth was simulated using solar radiation and temperature data to calculate the average annual algae yield for any location, which significantly impacts feasibility. The results of this model were integrated into a geospatial analysis which establishes the economically viable bio-oil production potential of FWC by accounting for the relative abundance of the input resources and their proximity. At most, 1.7 billion liters of bio-oil could be produced annually in a manner economically competitive with crude oil prices of $80 per barrel. The amount of nutrients in wastewater limits yields to 20.5 L of bio-oil per capita annually, and climatic constraints further reduce this potential by nearly 60%. Carbon dioxide constraints play a negligible role. Although the bio-oil production potential of FWC is relatively small, it does provide an opportunity to increase national biofuel output while providing a needed service. - Highlights: • Spatial-temporal algae growth was simulated using historical climate data. • A geospatial overlay analysis was used to assess national production potential. • Nutrient availability in wastewater is most limiting. • At most, 1.7 billion liters of algal biofuel per year could be

  16. Assessment of wastewater treatment plant effluent on fish reproduction utilizing the adverse outcome pathway conceptual framework

    Science.gov (United States)

    Wastewater treatment plant (WWTP) effluents are a known contributor of chemical mixture inputs into the environment. Whole effluent testing guidelines were developed to screen these complex mixtures for acute toxicity. However, efficient and cost-effective approaches for screenin...

  17. Utilization of Paper Sludge Wastes for Treatment of Wastewater from Food Processing Industries

    Directory of Open Access Journals (Sweden)

    Tohru Suzuki

    2012-12-01

    Full Text Available The food processing industries usually produced large amount of wastewater containing fine and small particles. It takes long time for complete settlement of the fine and small particles in the wastewater. The coagulation method appears to become one of the useful treatments. New inorganic coagulant named “Agoclean‒P” has been developed from paper sludge ash. The treatment by coagulation and flocculation were carried out for the wastewater from three different food processing industries namely soup, tofu, and natto. “Hi‒Biah‒System”, which is an in‒situ solidification system, was used for the continuous treatment of wastewater. The parameters for the water quality were pH, five‒day biochemical oxygen demand (BOD5, chemical oxygen demand (COD, total suspended solids (TSS, total nitrogen (TN and total phosphorus (TP. These parameters after the treatment became much lower values relative to those obtained before the treatment.

  18. Utilization of brewery wastewater for culturing yeast cells for use in river water remediation.

    Science.gov (United States)

    Chang, Su-Yun; Sun, Jing-Mei; Song, Shu-Qiang; Sun, Bao-Sheng

    2012-01-01

    Successful in situ bio-augmentation of contaminated river water involves reducing the cost of the bio-agent. In this study, brewery wastewater was used to culture yeast cells for degrading the COD(Cr) from a contaminated river. The results showed that 15 g/L of yeast cells could be achieved after being cultured in the autoclaved brewery wastewater with 5 mL/L of saccharified starch and 9 g/L of corn steep liquor. The COD(Cr) removal efficiency was increased from 22% to 33% when the cells were cultured using the mentioned method. Based on the market price of materials used in this method, the cost of the medium for remediating 1 m3 of river water was 0.0076 US dollars. If the additional cost of field implementation is included, the total cost is less than 0.016 US dollars for treating 1 m3 of river water. The final cost was dependent on the size of remediation: the larger the scale, the lower the cost. By this method, the nutrient in the brewery wastewater was reused, the cost of brewery wastewater treatment was saved and the cost of the remediation using bio-augmentation was reduced. Hence, it is suggested that using brewery wastewater to culture a bio-agent for bio-augmentation is a cost-effective method.

  19. Benchmarking the scientific output of industrial wastewater research in Arab world by utilizing bibliometric techniques.

    Science.gov (United States)

    Zyoud, Shaher H; Al-Rawajfeh, Aiman E; Shaheen, Hafez Q; Fuchs-Hanusch, Daniela

    2016-05-01

    Rapid population growth, worsening of the climate, and severity of freshwater scarcity are global challenges. In Arab world countries, where water resources are becoming increasingly scarce, the recycling of industrial wastewater could improve the efficiency of freshwater use. The benchmarking of scientific output of industrial wastewater research in the Arab world is an initiative that could support in shaping up and improving future research activities. This study assesses the scientific output of industrial wastewater research in the Arab world. A total of 2032 documents related to industrial wastewater were retrieved from 152 journals indexed in the Scopus databases; this represents 3.6 % of the global research output. The h-index of the retrieved documents was 70. The total number of citations, at the time of data analysis, was 34,296 with an average citation of 16.88 per document. Egypt, with a total publications of 655 (32.2 %), was ranked the first among the Arab countries followed by Saudi Arabia 300 (14.7 %) and Tunisia 297 (14.6 %). Egypt also had the highest h-index, assumed with Saudi Arabia, the first place in collaboration with other countries. Seven hundred fifteen (35.2 %) documents with 66 countries in Arab/non-Arab country collaborations were identified. Arab researchers collaborated mostly with researchers from France 239 (11.7 %), followed by the USA 127 (6.2 %). The top active journal was Desalination 126 (6.2 %), and the most productive institution was the National Research Center, Egypt 169 (8.3 %), followed by the King Abdul-Aziz University, Saudi Arabia 75 (3.7 %). Environmental Science was the most prevalent field of interest 930 (45.8 %). Despite the promising indicators, there is a need to close the gap in research between the Arab world and the other nations. Optimizing the investments and developing regional experiences are key factors to promote the scientific research.

  20. The effect of hydraulic retention time in onsite wastewater treatment and removal of pharmaceuticals, hormones and phenolic utility substances.

    Science.gov (United States)

    Ejhed, H; Fång, J; Hansen, K; Graae, L; Rahmberg, M; Magnér, J; Dorgeloh, E; Plaza, G

    2018-03-15

    Micropollutants such as pharmaceuticals, hormones and phenolic utility chemicals in sewage water are considered to be an emerging problem because of increased use and observed adverse effects in the environment. The study provides knowledge on the removal efficiency of micropollutants with a range of physical and chemical properties in three commercially available onsite wastewater treatment facilities (OWTFs), tested on influent wastewater collected from 2500 person equivalents in Bildchen, Germany. A longer hydraulic retention time would in theory be expected to have a positive effect, and this study presents results for three different OWTFs in full-scale comparable tests under natural conditions. A range of 24 different pharmaceuticals, five phenols and three hormones were analyzed. Flow-proportional consecutive sampling was performed in order to determine the removal efficiency. Twenty-eight substances were detected in the effluent wastewater out of 32 substances included. Average effluent concentrations of Simvastatin, Estrone, Estradiol and Ethinylestradiol were above the indicative critical-effect concentration of pharmacological effect on fish in all facilities. Average effluent concentrations of both Diclofenac and Estradiol were higher than the Environmental Quality Standards applied in Sweden (190-240 times and 9-35 times respectively). The removal efficiency of micropollutants was high for substances with high logK ow , which enhance the adsorption and removal with sludge. Low removal was observed for substances with low logK ow and acidic characteristics, and for substances with stabilizing elements of the chemical structure. Facilities that use activated sludge processes removed hormones more efficiently than facilities using trickling filter treatment technique. Moreover, longer hydraulic retention time increased the removal of pharmaceuticals, hormones, turbidity and total nitrogen. Removal of Caffeine, Ibuprofen, Estrone, Naproxen and Estradiol

  1. Integrative approach for utilization of olive mill wastewater and lebna's whey for ethanol production

    Energy Technology Data Exchange (ETDEWEB)

    Ibrahim, M A; Hayek, B O; Al-Hmoud, N; Al-Gogazeh, L

    2009-09-15

    The industry of olive oil extraction in Jordan involves an intensive consumption of water and generates large quantities of olive mill wastewater (OMW). This wastewater has a high pollution risk with biological oxygen demand (BOD). The organic fraction of OMW includes sugars, tannins, polyphenols, polyalcohols, pectins and lipids. The presence of remarkable amounts of aromatic compounds in OMW is responsible for its phytotoxic and antimicrobial effects. The environmental problems and potential hazards caused by OMW had led olive oil producing countries to limit their discharge and to propose and develop new technologies for OMW treatments, such as physicochemical and biological treatments. In the present investigation lebna's whey a local byproduct of widely consumed local yogurt was used with OMW for ethanol production. The obtained results showed that the proteins of lebna's whey can remove substantial amounts of aromatic compounds present in OMW. This was reflected on the reduction of the intensity of black color of OMW and removal of 37% polyphenols. Moreover, the production of ethanol was ascertained in fermentation media composed of whey and in presence of various concentrations of OMW up to 20% OMW. The obtained results showed the possibility to develop a process for improvement and enhancement of ethanol production from whey and olive oil waste in mixed yeast cultures. (au)

  2. Utilization of AMD sludges from the anthracite region of Pennsylvania for removal of phosphorus from wastewater

    Science.gov (United States)

    Sibrell, P.L.; Cravotta, C.A.; Lehman, W.G.; Reichert, W.

    2010-01-01

    Excess phosphorus (P) inputs from human sewage, animal feeding operations, and nonpoint source discharges to the environment have resulted in the eutrophication of sensitive receiving bodies of water such as the Great Lakes and Chesapeake Bay. Phosphorus loads in wastewater discharged from such sources can be decreased by conventional treatment with iron and aluminum salts but these chemical reagents are expensive or impractical for many applications. Acid mine drainage (AMD) sludges are an inexpensive source of iron and aluminum hydrous oxides that could offer an attractive alternative to chemical reagent dosing for the removal of P from local wastewater. Previous investigations have focused on AMD sludges generated in the bituminous coal region of western Pennsylvania, and confirmed that some of those sludges are good sorbents for P over a wide range of operating conditions. In this study, we sampled sludges produced by AMD treatment at six different sites in the anthracite region of Pennsylvania for potential use as P sequestration sorbents. Sludge samples were dried, characterized, and then tested for P removal from water. In addition, the concentrations of acid-extractable metals and other impurities were investigated. Test results revealed that sludges from four of the sites showed good P sorption and were unlikely to add contaminants to treated water. These results indicate that AMD sludges could be beneficially used to sequester P from the environment, while at the same time decreasing the expense of sludge disposal.

  3. The utilization of waste by-products for removing silicate from mineral processing wastewater via chemical precipitation.

    Science.gov (United States)

    Kang, Jianhua; Sun, Wei; Hu, Yuehua; Gao, Zhiyong; Liu, Runqing; Zhang, Qingpeng; Liu, Hang; Meng, Xiangsong

    2017-11-15

    This study investigates an environmentally friendly technology that utilizes waste by-products (waste acid and waste alkali liquids) to treat mineral processing wastewater. Chemical precipitation is used to remove silicate from scheelite (CaWO 4 ) cleaning flotation wastewater and the waste by-products are used as a substitute for calcium chloride (CaCl 2 ). A series of laboratory experiments is conducted to explain the removal of silicate and the characterization and formation mechanism of calcium silicate. The results show that silicate removal reaches 90% when the Ca:Si molar ratio exceeds 1.0. The X-ray diffraction (XRD) results confirm the characterization and formation of calcium silicate. The pH is the key factor for silicate removal, and the formation of polysilicic acid with a reduction of pH can effectively improve the silicate removal and reduce the usage of calcium. The economic analysis shows that the treatment costs with waste acid (0.63 $/m 3 ) and waste alkali (1.54 $/m 3 ) are lower than that of calcium chloride (2.38 $/m 3 ). The efficient removal of silicate is confirmed by industrial testing at a plant. The results show that silicate removal reaches 85% in the recycled water from tailings dam. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Assessment of sulfide production risk in soil during the infiltration of domestic wastewater treated by a sulfur-utilizing denitrification process.

    Science.gov (United States)

    Ghorbel, L; Coudert, L; Gilbert, Y; Mercier, G; Blais, J F

    2016-10-01

    This study aimed to determine the potential of sulfide generation during infiltration through soil of domestic wastewater treated by a sulfur-utilizing denitrification process. Three types of soil with different permeability rates (K s = 0.028, 0.0013, and 0.00015 cm/s) were investigated to evaluate the potential risk of sulfur generation during the infiltration of domestic wastewater treated by a sulfur-utilizing denitrification system. These soils were thoroughly characterized and tested to assess their capacity to be used as drainages for wastewaters. Experiments were conducted under two operating modes (saturated and unsaturated). Sulfate, sulfide, and chemical oxygen demand (COD) levels were determined over a period of 100 days. Despite the high concentration of sulfates (200 mg/L) under anaerobic conditions (ORP = -297 mV), no significant amount of sulfide was generated in the aqueous (soil permeability did not have a noticeable effect on the infiltration of domestic wastewater treated by a sulfur-utilizing denitrification system due to low contents of organic matter (i.e., dissolved organic carbon, DOC). The autotrophic denitrification process used to treat the domestic wastewater allowed the reduction of the concentration of biochemical oxygen demand (BOD5) below 5 mg/L, of DOC below 7 mg/L, and of COD below 100 mg/L.

  5. Towards a benchmarking tool for minimizing wastewater utility greenhouse gas footprints.

    Science.gov (United States)

    Guo, L; Porro, J; Sharma, K R; Amerlinck, Y; Benedetti, L; Nopens, I; Shaw, A; Van Hulle, S W H; Yuan, Z; Vanrolleghem, P A

    2012-01-01

    A benchmark simulation model, which includes a wastewater treatment plant (WWTP)-wide model and a rising main sewer model, is proposed for testing mitigation strategies to reduce the system's greenhouse gas (GHG) emissions. The sewer model was run to predict methane emissions, and its output was used as the WWTP model input. An activated sludge model for GHG (ASMG) was used to describe nitrous oxide (N(2)O) generation and release in activated sludge process. N(2)O production through both heterotrophic and autotrophic pathways was included. Other GHG emissions were estimated using empirical relationships. Different scenarios were evaluated comparing GHG emissions, effluent quality and energy consumption. Aeration control played a clear role in N(2)O emissions, through concentrations and distributions of dissolved oxygen (DO) along the length of the bioreactor. The average value of N(2)O emission under dynamic influent cannot be simulated by a steady-state model subjected to a similar influent quality, stressing the importance of dynamic simulation and control. As the GHG models have yet to be validated, these results carry a degree of uncertainty; however, they fulfilled the objective of this study, i.e. to demonstrate the potential of a dynamic system-wide modelling and benchmarking approach for balancing water quality, operational costs and GHG emissions.

  6. Utilization of the high energy electrons beams generated in accelerator for treatment of drinking water and wastewater

    International Nuclear Information System (INIS)

    Oliveira Sampa, M.H. de; Borrely, S.I.; Morita, D.M.

    1991-01-01

    Samples of drinking water and wastewater were irradiated using high energy electron beam with doses from 0.37kGy to 100kGy. Preliminary data show the removal of about 100% of trihalomethanes (THM) in drinking water (concentration from 2.7μg/l to 45μg/l, 90% of the color of the Public Owned Wastewater Treatment Plant effluent and 87% of oil and grease of the cutting fluid wastewater. (author)

  7. Using EPA Tools and Data Services to Inform Changes to Design Storm Definitions for Wastewater Utilities based on Climate Model Projections

    Science.gov (United States)

    Tryby, M.; Fries, J. S.; Baranowski, C.

    2014-12-01

    Extreme precipitation events can cause significant impacts to drinking water and wastewater utilities, including facility damage, water quality impacts, service interruptions and potential risks to human health and the environment due to localized flooding and combined sewer overflows (CSOs). These impacts will become more pronounced with the projected increases in frequency and intensity of extreme precipitation events due to climate change. To model the impacts of extreme precipitation events, wastewater utilities often develop Intensity, Duration, and Frequency (IDF) rainfall curves and "design storms" for use in the U.S. Environmental Protection Agency's (EPA) Storm Water Management Model (SWMM). Wastewater utilities use SWMM for planning, analysis, and facility design related to stormwater runoff, combined and sanitary sewers, and other drainage systems in urban and non-urban areas. SWMM tracks (1) the quantity and quality of runoff made within each sub-catchment; and (2) the flow rate, flow depth, and quality of water in each pipe and channel during a simulation period made up of multiple time steps. In its current format, EPA SWMM does not consider climate change projection data. Climate change may affect the relationship between intensity, duration, and frequency described by past rainfall events. Therefore, EPA is integrating climate projection data available in the Climate Resilience Evaluation and Awareness Tool (CREAT) into SWMM. CREAT is a climate risk assessment tool for utilities that provides downscaled climate change projection data for changes in the amount of rainfall in a 24-hour period for various extreme precipitation events (e.g., from 5-year to 100-year storm events). Incorporating climate change projections into SWMM will provide wastewater utilities with more comprehensive data they can use in planning for future storm events, thereby reducing the impacts to the utility and customers served from flooding and stormwater issues.

  8. Scope for utilizing gamma radiation for microbiological control of sewage waste-water in India

    International Nuclear Information System (INIS)

    Lewis, N.F.

    1975-01-01

    Conventional methods, including the activated sludge process, the trickling filter process and oxidation pond process, of treating sewage waste in India, do not adequately ensure safe utilization of the secondary effluent for land irrigation purposes. Preliminary findings indicate that gamma radiation in the range of 0.1-0.3 Mrad effectively destroys pathogens in the secondary effluent, thereby making available very large quantities of water for land irrigation and industrial purposes. (author)

  9. Enrichment of bio-oil after hydrothermal liquefaction (HTL) of microalgae C. vulgaris grown in wastewater: Bio-char and post HTL wastewater utilization studies.

    Science.gov (United States)

    Arun, Jayaseelan; Varshini, Padmanabhan; Prithvinath, P Kamath; Priyadarshini, Venkataramani; Gopinath, Kannappan Panchamoorthy

    2018-08-01

    In this study, bio-oil was produced through hydrothermal liquefaction (HTL) of C. vulgaris biomass cultivated in wastewater and was enriched into transportation fuels. Bio-oil yield was 29.37% wt at 300 °C, 60 min, at 15 g/200 mL biomass loading rate with 3% wt nano ZnO catalyst loading. Applying catalyst reduced oxygen and nitrogen content in bio-oil and increased its calorific value (19.6 ± 0.8 MJ/Kg). Bio-oil was enriched through liquid-liquid extraction (LLE) and higher yield was obtained at 30 °C for dichloromethane solvent (18.2% wt). Compounds of enriched oil were within the petro-diesel range (C 8 -C 21 ). Bio-char after HTL process was activated and used as adsorbent in wastewater treatment process to remove organic pollutants (COD, NO 3 , NH 3 and PO 4 ). Treated wastewater can be supplied as growth medium for microalgae cultivation in further experiments. Nearly 3-4 times the nanocatalyst can be reused in the HTL process. Copyright © 2018 Elsevier Ltd. All rights reserved.

  10. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  11. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  12. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  13. Integrative approach for utilization of olive mill wastewater and lebna's whey for ethanol production

    Energy Technology Data Exchange (ETDEWEB)

    Ibrahim, M.A.; Hayek, B.O.; Al-Hmoud, N.; Al-Gogazeh, L.

    2009-09-15

    The industry of olive oil extraction in Jordan involves an intensive consumption of water and generates large quantities of olive mill wastewater (OMW). This wastewater has a high pollution risk with biological oxygen demand (BOD). The organic fraction of OMW includes sugars, tannins, polyphenols, polyalcohols, pectins and lipids. The presence of remarkable amounts of aromatic compounds in OMW is responsible for its phytotoxic and antimicrobial effects. The environmental problems and potential hazards caused by OMW had led olive oil producing countries to limit their discharge and to propose and develop new technologies for OMW treatments, such as physicochemical and biological treatments. In the present investigation lebna's whey a local byproduct of widely consumed local yogurt was used with OMW for ethanol production. The obtained results showed that the proteins of lebna's whey can remove substantial amounts of aromatic compounds present in OMW. This was reflected on the reduction of the intensity of black color of OMW and removal of 37% polyphenols. Moreover, the production of ethanol was ascertained in fermentation media composed of whey and in presence of various concentrations of OMW up to 20% OMW. The obtained results showed the possibility to develop a process for improvement and enhancement of ethanol production from whey and olive oil waste in mixed yeast cultures. (au)

  14. Wastewater Outfalls

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — Outfalls which discharge wastewater from wastewater treatment facilities with individual NPDES permits. It does not include NPDES general permits.

  15. Chlorella vulgaris cultivation in sludge extracts from 2,4,6-TCP wastewater treatment for toxicity removal and utilization.

    Science.gov (United States)

    Wang, Lu; Chen, Xiurong; Wang, Hualin; Zhang, Yuying; Tang, Qingjie; Li, Jiahui

    2017-02-01

    Chlorella vulgaris was cultivated in different proportions of activated sludge extracts, which was from the treatment of the synthetic wastewater containing 2,4,6-trichlorophenol (2,4,6-TCP). The nutrients, total nitrogen (TN) and total phosphorus (TP), were removed over 45% and 90%, respectively. The maximum reduction amount of ecotoxicity and total organic carbon (TOC) occurred in the 100% sludge group on the 8th day (68%; 86.2 mg L -1 ). The variations of Excitation-emission matrix spectra (EEMs) and TOC indicated that extracellular organic matters (EOM) produced by algae led to TOC increase in the medium. The cell density was close to each other for groups with sludge extract proportion below 50%; sludge extracts (below 75% addition) had a stimulating effect on the accumulation of chlorophyll-a in per unit algal cell. Superoxide dismutase (SOD) variation demonstrated that C. vulgaris response positively to sludge extracts addition. Lipid content in C. vulgaris was up to its maximum value on the 8th day. Considering the performance on nutrients removal, toxicity reduction and algal growth, the optimal cultivation period for C. vulgaris before harvesting was around 8 days with sludge extracts proportion below 50%. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. Wastewater utilization for poly-β-hydroxybutyrate production by the cyanobacterium Aulosira fertilissima in a recirculatory aquaculture system.

    Science.gov (United States)

    Samantaray, Shilalipi; Nayak, Jitendra Kumar; Mallick, Nirupama

    2011-12-01

    Intensive aquaculture releases large quantities of nutrients into aquatic bodies, which can lead to eutrophication. The objective of this study was the development of a biological recirculatory wastewater treatment system with a diazotrophic cyanobacterium, Aulosira fertilissima, and simultaneous production of valuable product in the form of poly-β-hydroxybutyrate (PHB). To investigate this possible synergy, batch scale tests were conducted under a recirculatory aquaculture system in fiber-reinforced plastic tanks enhanced by several manageable parameters (e.g., sedimentation, inoculum size, depth, turbulence, and light intensity), an adequate combination of which showed better productivity. The dissolved-oxygen level increased in the range of 3.2 to 6.9 mg liter⁻¹ during the culture period. Nutrients such as ammonia, nitrite, and phosphate decreased to as low as zero within 15 days of incubation, indicating the system's bioremediation capability while yielding valuable cyanobacterial biomass for PHB production. Maximum PHB accumulation in A. fertilissima was found in sedimented fish pond discharge at 20-cm culture depth with stirring and an initial inoculum size of 80 mg dry cell weight (dcw) liter⁻¹. Under optimized conditions, the PHB yield was boosted to 92, 89, and 80 g m⁻², respectively for the summer, rainy, and winter seasons. Extrapolation of the result showed that a hectare of A. fertilissima cultivation in fish pond discharge would give an annual harvest of ∼17 tons dry biomass, consisting of 14 tons of PHB with material properties comparable to those of the bacterial polymer, with simultaneous treatment of 32,640 m³ water discharge.

  17. Wastewater Utilization for Poly-β-Hydroxybutyrate Production by the Cyanobacterium Aulosira fertilissima in a Recirculatory Aquaculture System▿

    Science.gov (United States)

    Samantaray, Shilalipi; Nayak, Jitendra Kumar; Mallick, Nirupama

    2011-01-01

    Intensive aquaculture releases large quantities of nutrients into aquatic bodies, which can lead to eutrophication. The objective of this study was the development of a biological recirculatory wastewater treatment system with a diazotrophic cyanobacterium, Aulosira fertilissima, and simultaneous production of valuable product in the form of poly-β-hydroxybutyrate (PHB). To investigate this possible synergy, batch scale tests were conducted under a recirculatory aquaculture system in fiber-reinforced plastic tanks enhanced by several manageable parameters (e.g., sedimentation, inoculum size, depth, turbulence, and light intensity), an adequate combination of which showed better productivity. The dissolved-oxygen level increased in the range of 3.2 to 6.9 mg liter−1 during the culture period. Nutrients such as ammonia, nitrite, and phosphate decreased to as low as zero within 15 days of incubation, indicating the system's bioremediation capability while yielding valuable cyanobacterial biomass for PHB production. Maximum PHB accumulation in A. fertilissima was found in sedimented fish pond discharge at 20-cm culture depth with stirring and an initial inoculum size of 80 mg dry cell weight (dcw) liter−1. Under optimized conditions, the PHB yield was boosted to 92, 89, and 80 g m−2, respectively for the summer, rainy, and winter seasons. Extrapolation of the result showed that a hectare of A. fertilissima cultivation in fish pond discharge would give an annual harvest of ∼17 tons dry biomass, consisting of 14 tons of PHB with material properties comparable to those of the bacterial polymer, with simultaneous treatment of 32,640 m3 water discharge. PMID:21984242

  18. Wastewater Treatment

    Science.gov (United States)

    ... day before releasing it back to the environment. Treatment plants reduce pollutants in wastewater to a level nature can handle. Wastewater is used water. It includes substances such as human waste, food ...

  19. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  20. Utilization of municipal wastewater for cooling in thermoelectric power plants: Evaluation of the combined cost of makeup water treatment and increased condenser fouling

    Energy Technology Data Exchange (ETDEWEB)

    Walker, Michael E. [Illinois Inst. of Technology, Chicago, IL (United States). Dept. of Chemical and Biological Engineering; Theregowda, Ranjani B. [Carnegie Mellon Univ., Pittsburgh, PA (United States). Dept of Civil and Mechanical Engineering; Safari, Iman [Illinois Inst. of Technology, Chicago, IL (United States). Dept. of Chemical and Biological Engineering; Abbasian, Javad [Illinois Inst. of Technology, Chicago, IL (United States). Dept. of Chemical and Biological Engineering; Arastoopour, Hamid [Illinois Inst. of Technology, Chicago, IL (United States). Dept. of Chemical and Biological Engineering; Dzombak, David A. [Carnegie Mellon Univ., Pittsburgh, PA (United States). Dept of Civil and Mechanical Engineering; Hsieh, Ming-Kai [Tamkang Univ., Taipei (Taiwan). Waer Resources Management and Policy Research Center; Miller, David C. [National Energy Technology Lab. (NETL), Morgantown, WV (United States)

    2013-10-01

    A methodology is presented to calculate the total combined cost (TCC) of water sourcing, water treatment and condenser fouling in the recirculating cooling systems of thermoelectric power plants. The methodology is employed to evaluate the economic viability of using treated municipal wastewater (MWW) to replace the use of freshwater as makeup water to power plant cooling systems. Cost analyses are presented for a reference power plant and five different tertiary treatment scenarios to reduce the scaling tendencies of MWW. Results indicate that a 550 MW sub-critical coal fired power plant with a makeup water requirement of 29.3 ML/day has a TCC of $3.0 - 3.2 million/yr associated with the use of treated MWW for cooling. (All costs USD 2009). This translates to a freshwater conservation cost of $0.29/kL, which is considerably lower than that of dry air cooling technology, $1.5/kL, as well as the 2020 conservation cost target set by the U.S. Department of Energy, $0.74/kL. Results also show that if the available price of freshwater exceeds that of secondary-treated MWW by more than $0.13-0.14/kL, it can be economically advantageous to purchase secondary MWW and treat it for utilization in the recirculating cooling system of a thermoelectric power plant.

  1. Biodegradation and reversible inhibitory impact of sulfamethoxazole on the utilization of volatile fatty acids during anaerobic treatment of pharmaceutical industry wastewater

    International Nuclear Information System (INIS)

    Cetecioglu, Zeynep; Ince, Bahar; Gros, Meritxell; Rodriguez-Mozaz, Sara; Barceló, Damia; Ince, Orhan; Orhon, Derin

    2015-01-01

    This study evaluated the chronic impact and biodegradability of sulfamethoxazole under anaerobic conditions. For this purpose, a lab-scale anaerobic sequencing batch reactor was operated in a sequence of different phases with gradually increasing sulfamethoxazole doses of 1 to 45 mg/L. Conventional parameters, such as COD, VFA, and methane generation, were monitored with corresponding antimicrobial concentrations in the reactor and the methanogenic activity of the sludge. The results revealed that anaerobic treatment was suitable for pharmaceutical industry wastewater with concentrations of up to 40 mg/L of sulfamethoxazole. Higher levels exerted toxic effects on the microbial community under anaerobic conditions, causing the inhibition of substrate/COD utilization and biogas generation and leading to a total collapse of the reactor. The adverse long-term impact was quite variable for fermentative bacteria and methanogenic achaea fractions of the microbial community based on changes inflicted on the composition of the residual organic substrate and mRNA expression of the key enzymes. - Highlights: • Chronic impact of sulfamethoxazole was lethal at 45 mg/L on the microbial community. • Sulfamethoxazole was highly biodegradable under anaerobic conditions. • While the COD removal stopped, the sorption of sulfamethoxazole into the sludge increased. • Sulfamethoxazole has a reversible inhibitory effect on acetoclastic methanogens

  2. Biodegradation and reversible inhibitory impact of sulfamethoxazole on the utilization of volatile fatty acids during anaerobic treatment of pharmaceutical industry wastewater

    Energy Technology Data Exchange (ETDEWEB)

    Cetecioglu, Zeynep, E-mail: cetecioglu@itu.edu.tr [Istanbul Technical University, Environmental Engineering Department, 34469 Maslak, Istanbul (Turkey); Catalan Institute for Water Research (ICRA), Emili Grahit 101, 17003 Girona (Spain); Ince, Bahar [Bogazici University, Institute of Environmental Sciences, Rumelihisarustu - Bebek, 34342 Istanbul (Turkey); Gros, Meritxell; Rodriguez-Mozaz, Sara; Barceló, Damia [Catalan Institute for Water Research (ICRA), Emili Grahit 101, 17003 Girona (Spain); Ince, Orhan; Orhon, Derin [Istanbul Technical University, Environmental Engineering Department, 34469 Maslak, Istanbul (Turkey)

    2015-12-01

    This study evaluated the chronic impact and biodegradability of sulfamethoxazole under anaerobic conditions. For this purpose, a lab-scale anaerobic sequencing batch reactor was operated in a sequence of different phases with gradually increasing sulfamethoxazole doses of 1 to 45 mg/L. Conventional parameters, such as COD, VFA, and methane generation, were monitored with corresponding antimicrobial concentrations in the reactor and the methanogenic activity of the sludge. The results revealed that anaerobic treatment was suitable for pharmaceutical industry wastewater with concentrations of up to 40 mg/L of sulfamethoxazole. Higher levels exerted toxic effects on the microbial community under anaerobic conditions, causing the inhibition of substrate/COD utilization and biogas generation and leading to a total collapse of the reactor. The adverse long-term impact was quite variable for fermentative bacteria and methanogenic achaea fractions of the microbial community based on changes inflicted on the composition of the residual organic substrate and mRNA expression of the key enzymes. - Highlights: • Chronic impact of sulfamethoxazole was lethal at 45 mg/L on the microbial community. • Sulfamethoxazole was highly biodegradable under anaerobic conditions. • While the COD removal stopped, the sorption of sulfamethoxazole into the sludge increased. • Sulfamethoxazole has a reversible inhibitory effect on acetoclastic methanogens.

  3. Gas attack

    Energy Technology Data Exchange (ETDEWEB)

    North, D.

    1977-08-01

    Consumersfirst Ltd. is reacting to deregulation with a massive advertising campaign. The gas utility is owned by Consumers Gas Energy Inc., and is struggling to hold onto its 35 per cent share of Ontario`s two million residential natural gas buyers. An industry analyst pointed out that deregulation could mean that Consumers` Gas has much to lose: customers, market share, control of the assets and control of the process. The Ontario Energy Board (OEB) however, had specified that Consumersfirst is not to proceed with paperwork to sign up new customers until the OEB issues a draft code-of-conduct that would prevent cross-subsidizing between regulated franchise holders. This has now been done, and several heavyweights such as Calgary-based Suncor Energy Inc., Union Gas of Chatham, Ontario, and the US-based Enron Corp. of Houston, have started campaigns to sign up potential consumers. It is predicted that brand loyalty will be a factor, but in the end, like long distance telephone rates, it will all come down to pricing, and a winning formula is not easy to find.

  4. Simulation model of the F/A-18 high angle-of-attack research vehicle utilized for the design of advanced control laws

    Science.gov (United States)

    Strickland, Mark E.; Bundick, W. Thomas; Messina, Michael D.; Hoffler, Keith D.; Carzoo, Susan W.; Yeager, Jessie C.; Beissner, Fred L., Jr.

    1996-01-01

    The 'f18harv' six degree-of-freedom nonlinear batch simulation used to support research in advanced control laws and flight dynamics issues as part of NASA's High Alpha Technology Program is described in this report. This simulation models an F/A-18 airplane modified to incorporate a multi-axis thrust-vectoring system for augmented pitch and yaw control power and actuated forebody strakes for enhanced aerodynamic yaw control power. The modified configuration is known as the High Alpha Research Vehicle (HARV). The 'f18harv' simulation was an outgrowth of the 'f18bas' simulation which modeled the basic F/A-18 with a preliminary version of a thrust-vectoring system designed for the HARV. The preliminary version consisted of two thrust-vectoring vanes per engine nozzle compared with the three vanes per engine actually employed on the F/A-18 HARV. The modeled flight envelope is extensive in that the aerodynamic database covers an angle-of-attack range of -10 degrees to +90 degrees, sideslip range of -20 degrees to +20 degrees, a Mach Number range between 0.0 and 2.0, and an altitude range between 0 and 60,000 feet.

  5. Design of a pilot plant to study wastewater treatability. Utilization to nitrification-denitrification treatment of urban wastewater; Diseno de una plant pilot para estudios de tratabilidad de aguas residuales. Aplicacion a la nitrificacion/desnitrificaciond e aguas urbanas

    Energy Technology Data Exchange (ETDEWEB)

    Otal, E.; Vilches, L. F.; Pineda, D.; Garcia, A.; Fernandez-Pereira, C.

    2002-07-01

    The conventional design and the operation of secondary treatment of urban wastewater treatment plants presents different problems such as bulking foaming, the removal of nutrients as nitrogen and phosphorus, and the excess of sludge. to prevent these problems the use of selectors was initially proposed to selects the floc-formers bacteria against the filamentous microorganisms. In addition, these configurations removed nitrogen by the nitrification-denitrification mechanism and some of them removed both nitrogen and phosphors. In the last years, new systems have been developed to remove nitrogen, reducing the consumption of oxygen and the production of sludge by the use of different microorganisms, and by modifying environmental and operational conditions. To study the treatment urban wastewater in conditions similar to those existing in wastewater treatment plants and to improve the design and operational parameters of a large scale wastewater treatment plant, a versatile pilot plant has been designed. The main components of the plant are described in this paper. (Author) 18 refs.

  6. Effect of industrial wastewater ontotal protein and the peroxidase ...

    African Journals Online (AJOL)

    STORAGESEVER

    2009-10-19

    Oct 19, 2009 ... undergo degradation during wastewater treatment. As these chemicals ... environmental factors, hormonal stimuli and by microbial attack (Nover and ... sowed in plastic pots (10 x 20 cm) containing a mixture of 1:2 perlite-peat.

  7. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  8. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  9. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  10. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  11. Advanced wastewater treatment system (SEADS)

    International Nuclear Information System (INIS)

    Dunn, J.

    2002-01-01

    'Full text:' This presentation will describe the nature, scope, and findings of a third-party evaluation of a wastewater treatment technology identified as the Advanced Wastewater Treatment System Inc.'s Superior Extended Aerobic Digester System (SEADS). SEADS is an advanced miniaturized wastewater treatment plant that can meet advanced wastewater treatment standards for effluent public reuse. SEADS goes beyond primary and secondary treatment operations to reduce nutrients such as nitrogen and phosphorus, which are typically found in excessive quantities in traditional wastewater treatment effluent. The objective of this evaluation will be to verify the performance and reliability of the SEADS to treat wastewater from a variety of sources, including domestic wastewater and commercial industrial wastewater. SEADS utilizes remote telemetry equipment to achieve added reliability and reduces monitoring costs as compared to many package wastewater treatment plants. The evaluation process will be overseen and coordinated by the Environmental Technology Evaluation Center (EvTEC), a program of the Civil Engineering Research Foundation (CERF), the research and technology transfer arm of the American Society of Civil Engineers (ASCE). EvTEC is a pilot program evaluating innovative environmental technologies under the US Environmental Protection Agency's (USEPA) Environmental Technology Verification (ETV) Program. Among other performance issues, the SEADS technology evaluation will address its ability to treat low flows-from remote individual and clustered housing applications, and individual commercial applications in lieu of a main station conventional wastewater treatment plant. The unneeded reliance on particular soil types for percolation and the improved effluent water quality over septic systems alone look to make these types of package treatment plants a viable option for rural communities, small farms, and other low-flow remote settings. Added benefits to be examined

  12. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  13. Wastewater Districts

    Data.gov (United States)

    Vermont Center for Geographic Information — The Wastewater districts layer is part of a larger dataset that contains administrative boundaries for Vermont's Agency of Natural Resources. The dataset includes...

  14. Wastewater reuse

    OpenAIRE

    Milan R. Radosavljević; Vanja M. Šušteršič

    2013-01-01

    Water scarcity and water pollution are some of the crucial issues that must be addressed within local and global perspectives. One of the ways to reduce the impact of water scarcity  and to minimizine water pollution is to expand water and wastewater reuse. The local conditions including regulations, institutions, financial mechanisms, availability of local technology and stakeholder participation have a great influence on the decisions for wastewater reuse. The increasing awareness of food s...

  15. Water and Wastewater Rate Hikes Outpace CPI

    Energy Technology Data Exchange (ETDEWEB)

    Stratton, Hannah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fuchs, Heidi [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Chen, Yuting [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Dunham, Camilla [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Williams, Alison [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2017-08-31

    Water and wastewater treatment and delivery is the most capital-intensive of all utility services. Historically underpriced, water and wastewater rates have exhibited unprecedented growth in the past fifteen years. Steep annual increases in water and wastewater rates that outpace the Consumer Price Index (CPI) have increasingly become the norm across the United States. In this paper, we analyze water and wastewater rates across U.S. census regions between 2000 and 2014. We also examine some of the driving factors behind these rate increases, including drought, water source, required infrastructure investment, population patterns, and conservation effects. Our results demonstrate that water and wastewater prices have consistently increased and have outstripped CPI throughout the study period nationwide, as well as within each census region. Further, evaluation of the current and upcoming challenges facing water and wastewater utilities suggests that sharp rate increases are likely to continue in the foreseeable future.

  16. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  17. Organic contaminant removal efficiency of sodium bentonite/clay (BC) mixtures in high permeability regions utilizing reclaimed wastewater: A meso-scale study

    Science.gov (United States)

    Xiao, Yang; Li, Yunkai; Ning, Zigong; Li, Pengxiang; Yang, Peiling; Liu, Chengcheng; Liu, Zhongwei; Xu, Feipeng; Hynds, Paul Dylan

    2018-03-01

    Wastewater reclamation now represents an effective measure for sustainable water resource management in arid regions, however wastewater components (organic micropollutants) may potentially impact local ecological and/or human health. Previous studies have shown that sodium bentonite/natural clay (BC) mixes may be used to effectively reduce riverbed infiltration in regions characterized by excessively high hydraulic conductivity. Accordingly, the current study sought to investigate the contaminant removal efficiency (Re) of several BC mass ratios in simulated dry riverbeds. Results indicate that the measured Re of NH4+-N, CODcr and BOD5 increased in concurrence with an increasing sodium bentonite ratio, up to a maximum Re of 97.4% (NH4+-N), 55.2% (CODcr), and 51.5% (BOD5). The primary contaminant removal site was shown to be the infiltration-reducing (BC) layer, accounting for approximately 40%, 60%, and 70% of NH4+-N, CODcr and BOD5 removal, respectively. Conversely, the removal efficiency of NO3-N was found to be low (managing recharge of non-potable aquifers with reclaimed wastewater.

  18. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  19. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  20. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  1. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  2. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  3. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  4. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  5. Generation and energy utilization of methane form industrial wastewater; Produccion y aprovechamiento energetico de metano a partir de agua residual industrial

    Energy Technology Data Exchange (ETDEWEB)

    Lebek, M.

    2009-07-01

    At the production site of a natural ingredients manufacturer for the food industry was necessary the adjustment of the WWTP to the enlargement of the production and its complement with a pre-treatment. The core of the treatment plan tis an UASB (Upflow Anaerobic Sludge Blanket) reactor where the wastewater is removed under anaerobic conditions. The main advantages of this treatment ar the operation stability and the high methane production. The biogas generated is cleaned before it is used during the production process as an energy resource. (Author)

  6. Wastewater reuse

    Directory of Open Access Journals (Sweden)

    Milan R. Radosavljević

    2013-12-01

    Full Text Available Water scarcity and water pollution are some of the crucial issues that must be addressed within local and global perspectives. One of the ways to reduce the impact of water scarcity  and to minimizine water pollution is to expand water and wastewater reuse. The local conditions including regulations, institutions, financial mechanisms, availability of local technology and stakeholder participation have a great influence on the decisions for wastewater reuse. The increasing awareness of food safety and the influence of the countries which import food are influencing policy makers and agriculturists to improve the standards of wastewater reuse in agriculture. The environmental awareness of consumers has been putting pressure on the producers (industries to opt for environmentally sound technologies including those which conserve water and reduce the level of pollution. It may be observed that we have to move forwards to implement strategies and plans for wastewater reuse. However, their success and sustainability will depend on political will, public awareness and active support from national and international agencies to create favorable    environment for the promotion of environmentally sustainable technologies. Wastewater treatment has a long history, especially in agriculture, but also in industry and households. Poor quality of wastewater can pose a significant risk to the health of farmers and users of agricultural products. The World Health Organization (WHO is working on a project for the reuse of wastewater in agriculture. To reduce effects of human activities to the minimum, it is necessary to provide such technical and technological solutions that would on the one hand ensure complying with  the existing regulations and legislation, and on the other hand provide economically viable systems as seen through investments and operating costs. The use of wastewater The practice of using wastewater varies from country to country. Its

  7. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  8. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  9. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  10. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  11. Utilization of struvite recovered from high-strength ammonium-containing simulated wastewater as slow-release fertilizer and fire-retardant barrier.

    Science.gov (United States)

    Yetilmezsoy, Kaan; Kocak, Emel; Akbin, Havva Melda; Özçimen, Didem

    2018-06-28

    Sustainable uses of the struvite (magnesium ammonium phosphate hexahydrate, MgNH 4 PO 4 ·6H 2 O, MAP) recovered from the synthetic wastewater, as a high-quality slow-release fertilizer for the growth of nine medicinal plants and a fire-retardant barrier on the flammability of cotton fabric and wooden plate, were explored in this study. The previous experimental results demonstrated that under the optimal conditions, about 98.7% of [Formula: see text] (initial [Formula: see text] = 1000 mg/L) could be effectively and successfully recovered from simulated wastewater in the form of MAP precipitate. Rates of increase in total fresh weights, total dry weights, and fresh heights of plants grown in soil fertilized with the struvite were determined as 67%, 52%, and 12% for valerian; 121%, 75%, and 18% for cucumber; 421%, 260%, and 47% for dill; 314%, 318%, and 27% for coriander; 432%, 566%, and 30% for tomato; 285%, 683%, and 26% for parsley; 200%, 225%, and 9% for basil; 857%, 656%, and 92% for rocket; and 146%, 115%, and 28% for cress, respectively, compared to the control pots. The microstructure, elemental composition, surface area, thermal behaviour, and functional groups of the grown crystals were characterized using SEM, EDS, BET, TGA-DTG-DSC, and FTIR analyses, respectively. Flammability tests and thermal analyses concluded that the dried and crumbled/implanted form of struvite used as a fire-retardant barrier demonstrated a remarkable flame-resistant behaviour for both cotton fabric and wooden plate. Findings of this experimental study clearly corroborated the versatility of struvite as non-polluting and environmentally friendly clean product for the sustainable usage in different fields.

  12. Green Systems for Wastewater Treatment

    Science.gov (United States)

    Environmental Science and Technology, 1975

    1975-01-01

    Plants found in marshlands and wetlands in many parts of the world may play an increasing part in a very new, yet very old approach to treatment of water and wastewater--the application of biological methods. Biological water pollution control methods being utilized around the world are examined. (BT)

  13. Cooperative Electronic Attack using Unmanned Air Vehicles

    National Research Council Canada - National Science Library

    Mears, Mark J

    2006-01-01

    ... that are salient in the context of cooperative control. The utility of electronic attack is described in the context of integrated air defense systems that rely on RADAR sites that act as a network to gather information about potential airborne threats...

  14. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  15. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  16. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  17. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  18. Wastewater treatment

    Directory of Open Access Journals (Sweden)

    Ranđel N. Kitanović

    2013-10-01

    Full Text Available Quality of life on Earth in the future will largely depend on the amount of safe water. As the most fundamental source of life, water is relentlessly consumed and polluted. To halt this trend, many countries are taking extensive measures and investing substantial resources in order to stop the contamination of water and return at least tolerably good water quality to nature. The goal of water purification is to obtain clean water with the sewage sludge as a by-product. Clean water is returned to nature, and further treatment of sludge may be subject to other procedures. The conclusion of this paper is simple. The procedure with purified water is easily achievable, purified water is discharged into rivers, lakes and seas, but the problem of further treatment of sludge remains. This paper presents the basic methods of wastewater treatment and procedures for processing the products from contaminated water. The paper can serve as a basis for further elaboration. Water Pollution In order to ensure normal life of living creatures, the water in which they live or the water they use must have a natural chemical composition and natural features. When, as a result of human activities, the chemical composition of water and the ratio of its chemical elements significantly change, we say that water is polluted. When the pollutants come from industrial plants, we are talking about industrial wastewater, and when they come from households and urban areas, we are talking about municipal wastewater. Both contain a huge amount of pollutants that eventually end up in rivers. Then, thousands of defenseless birds, fish and other animals suffer, and environmental consequences become immeasurable. In addition, the waste fed to the water often ends up in the bodies of marine animals, so they can return to us as food. Thermal water pollution also has multiple effects on the changes in the wildlife composition of aquatic ecosystems. Polluted water can be purified by

  19. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  20. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  1. Magnetic solid phase extraction of gemfibrozil from human serum and pharmaceutical wastewater samples utilizing a β-cyclodextrin grafted graphene oxide-magnetite nano-hybrid.

    Science.gov (United States)

    Abdolmohammad-Zadeh, Hossein; Talleb, Zeynab

    2015-03-01

    A magnetic solid phase extraction method based on β-cyclodextrin (β-CD) grafted graphene oxide (GO)/magnetite (Fe3O4) nano-hybrid as an innovative adsorbent was developed for the separation and pre-concentration of gemfibrozil prior to its determination by spectrofluorometry. The as-prepared β-CD/GO/Fe3O4 nano-hybrid possesses the magnetism property of Fe3O4 nano-particles that makes it easily manipulated by an external magnetic field. On the other hand, the surface modification of GO by β-CD leads to selective separation of the target analyte from sample matrices. The structure and morphology of the synthesized adsorbent were characterized using powder X-ray diffraction, Fourier transform infrared spectroscopy, and field emission scanning electron microscopy. The experimental factors affecting the extraction/pre-concentration and determination of the analyte were investigated and optimized. Under the optimized experimental conditions, the calibration graph was linear in the range between 10 and 5000 pg mL(-1) with a correlation coefficient of 0.9989. The limit of detection and enrichment factor for gemfibrozil were 3 pg mL(-1) and 100, respectively. The maximum sorption capacity of the adsorbent for gemfibrozil was 49.8 mg g(-1). The method was successfully applied to monitoring gemfibrozil in human serum and pharmaceutical wastewaters samples with recoveries in the range of 96.0-104.0% for the spiked samples. Copyright © 2014 Elsevier B.V. All rights reserved.

  2. Utilization of reverse osmosis (RO) for reuse of MBR-treated wastewater in irrigation-preliminary tests and quality analysis of product water.

    Science.gov (United States)

    Bunani, Samuel; Yörükoğlu, Eren; Sert, Gökhan; Kabay, Nalan; Yüksel, Ümran; Yüksel, Mithat; Egemen, Özdemir; Pek, Taylan Özgür

    2018-02-01

    Membrane bioreactor (MBR) effluent collected from a wastewater treatment plant installed at an industrial zone was used for reverse osmosis (RO) membrane tests in the laboratory. For this, two different GE Osmonics RO membranes (AK-BWRO and AD-SWRO) were employed. The results showed that AK-brackish water reverse osmosis (AK-BWRO) and AD-seawater reverse osmosis (AD-SWRO) membranes have almost similar rejection performances regarding analyzed parameters such as conductivity, salinity, color, chemical oxygen demand (COD), and total organic carbon (TOC). On the other hand, these membranes behaved quite differently considering their permeate water flux at the same applied pressure of 10 bar. AD-SWRO membrane was also tested at 20 bar. The results revealed that AD-SWRO membrane had almost the same rejections either at 10 or at 20 bar of applied pressure. Compared with irrigation water standards, AK-BWRO and AD-SWRO gave an effluent with low salinity value and sodium adsorption ratio (SAR) which makes it unsuitable for irrigation due to the infiltration problems risi0ng from unbalanced values of salinity and SAR. Combination of MBR effluent and RO effluent at respective proportions of 0.3:0.7 and 0.4:0.6 for AK-BWRO and AD-SWRO, respectively, are the optimum mixing ratios to overcome the infiltration hazard problem. Choice of less-sensitive crops to chloride and sodium ions is another strategy to overcome all hazards which may arise from above suggested mixing proportions.

  3. An efficient attack identification and risk prediction algorithm for ...

    African Journals Online (AJOL)

    The social media is highly utilized cloud for storing huge amount of data. ... However, the adversarial scenario did not design properly to maintain the privacy of the ... Information Retrieval, Security Evaluation, Efficient Attack Identification and ...

  4. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  5. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  6. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  7. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  8. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  9. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  10. Utilizing solar energy for the purification of olive mill wastewater using a pilot-scale photocatalytic reactor after coagulation-flocculation.

    Science.gov (United States)

    Michael, I; Panagi, A; Ioannou, L A; Frontistis, Z; Fatta-Kassinos, D

    2014-09-01

    This study investigated the application of a solar-driven advanced oxidation process (solar Fenton) combined with previous coagulation/flocculation, for the treatment of olive mill wastewater (OMW) at a pilot scale. Pre-treatment by coagulation/flocculation using FeSO4·7H2O (6.67 g L(-1)) as the coagulant, and an anionic polyelectrolyte (FLOCAN 23, 0.287 g L(-1)) as the flocculant, was performed to remove the solid content of the OMW. The solar Fenton experiments were carried out in a compound parabolic collector pilot plant, in the presence of varying doses of H2O2 and Fe(2+). The optimization of the oxidation process, using reagents at low concentrations ([Fe(2+)] = 0.08 g L(-1); [H2O2] = 1 g L(-1)), led to a high COD removal (87%), while the polyphenolic fraction, which is responsible for the biorecalcitrant and/or toxic properties of OMW, was eliminated. A kinetic study using a modified pseudo first-order kinetic model was performed in order to determine the reaction rate constants. This work evidences also the potential use of the solar Fenton process at the inherent pH of the OMW, yielding only a slightly lower COD removal (81%) compared to that obtained under acidic conditions. Moreover, the results demonstrated the capacity of the applied advanced process to reduce the initial OMW toxicity against the examined plant species (Sorghum saccharatum, Lepidium sativum, Sinapis alba), and the water flea Daphnia magna. The OMW treated samples displayed a varying toxicity profile for each type of organism and plant examined in this study, a fact that can potentially be attributed to the varying oxidation products formed during the process applied. Finally, the overall cost of solar Fenton oxidation for the treatment of 50 m(3) of OMW per day was estimated to be 2.11 € m(-3). Copyright © 2014 Elsevier Ltd. All rights reserved.

  11. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  12. Water and Sewage Utilities Sector (NAICS 2213)

    Science.gov (United States)

    Environmental regulation information for water utilities, including drinking and wastewater treatment facilities. Includes links to NESHAP for POTW, compliance information, and information about pretreatment programs.

  13. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  14. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  15. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  16. A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

    OpenAIRE

    Li Qiang; Yang Ze-Ming; Liu Bao-Xu; Jiang Zheng-Wei

    2016-01-01

    With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain a...

  17. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  18. Agricultural use of treated municipal wastewaters preserving environmental sustainability

    OpenAIRE

    Pietro Rubino; Maurizia Catalano; Antonio Lonigro

    2007-01-01

    In this paper the utility of the treated municipal wastewaters in agriculture, analyzing the chemical, physical and microbiological characteristics and their pollution indicators evaluation are being illustrated. Some methods employed for treating wastewaters are examined, as well as instructions and rules actually in force in different countries of the world, for evaluating the legislative hygienic and sanitary and agronomic problems connected with the treated wastewaters use, are being coll...

  19. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  20. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  1. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  2. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  3. Characterisation of wastewater for modelling of wastewater ...

    African Journals Online (AJOL)

    Bio-process modelling is increasingly used in design, modification and troubleshooting of wastewater treatment plants (WWTPs). Characterisation of the influent wastewater to a WWTP is an important part of developing such a model. The characterisation required for modelling is more detailed than that routinely employed ...

  4. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  5. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  6. Behavioral Modeling of WSN MAC Layer Security Attacks: A Sequential UML Approach

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    is the vulnerability to security attacks/threats. The performance and behavior of a WSN are vastly affected by such attacks. In order to be able to better address the vulnerabilities of WSNs in terms of security, it is important to understand the behavior of the attacks. This paper addresses the behavioral modeling...... of medium access control (MAC) security attacks in WSNs. The MAC layer is responsible for energy consumption, delay and channel utilization of the network and attacks on this layer can introduce significant degradation of the individual sensor nodes due to energy drain and in performance due to delays....... The behavioral modeling of attacks will be beneficial for designing efficient and secure MAC layer protocols. The security attacks are modeled using a sequential diagram approach of Unified Modeling Language (UML). Further, a new attack definition, specific to hybrid MAC mechanisms, is proposed....

  7. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  8. Review of Hosein Aabad Sugar Factory (HASF) Wastewater and ...

    African Journals Online (AJOL)

    MICHAEL HORSFALL

    evaluate the quality and quantity of wastewater of the said factory and to estimate the pollution ... appropriate for artificial recharge use, discharge in rivers and lakes or utilization in agriculture ..... These problems have a negative impact on.

  9. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  10. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  11. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  12. Suggestion of a Framework to Analyze Failure Modes and Effect of Cyber Attacks in NPP

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Chan Young; Seong, Poong Hyun [KAIST, Daejeon (Korea, Republic of)

    2016-05-15

    The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans.

  13. Suggestion of a Framework to Analyze Failure Modes and Effect of Cyber Attacks in NPP

    International Nuclear Information System (INIS)

    Lee, Chan Young; Seong, Poong Hyun

    2016-01-01

    The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans

  14. Nitrification in Saline Industrial Wastewater

    NARCIS (Netherlands)

    Moussa, M.S.

    2004-01-01

    Biological nitrogen removal is widely and successfully applied for municipal wastewater. However, these experiences are not directly applicable to industrial wastewater, due to its specific composition. High salt levels in many industrial wastewaters affect nitrification negatively and improved

  15. VTAC: virtual terrain assisted impact assessment for cyber attacks

    Science.gov (United States)

    Argauer, Brian J.; Yang, Shanchieh J.

    2008-03-01

    Overwhelming intrusion alerts have made timely response to network security breaches a difficult task. Correlating alerts to produce a higher level view of intrusion state of a network, thus, becomes an essential element in network defense. This work proposes to analyze correlated or grouped alerts and determine their 'impact' to services and users of the network. A network is modeled as 'virtual terrain' where cyber attacks maneuver. Overlaying correlated attack tracks on virtual terrain exhibits the vulnerabilities exploited by each track and the relationships between them and different network entities. The proposed impact assessment algorithm utilizes the graph-based virtual terrain model and combines assessments of damages caused by the attacks. The combined impact scores allow to identify severely damaged network services and affected users. Several scenarios are examined to demonstrate the uses of the proposed Virtual Terrain Assisted Impact Assessment for Cyber Attacks (VTAC).

  16. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  17. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  18. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  19. Wastewater Industrial Contributors

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — Industrial contributors to municipal wastewater treatment facilities in Iowa for the National Pollutant Discharge Elimination System (NPDES) program.

  20. Separation of Tritium from Wastewater

    International Nuclear Information System (INIS)

    JEPPSON, D.W.

    2000-01-01

    A proprietary tritium loading bed developed by Molecular Separations, Inc (MSI) has been shown to selectively load tritiated water as waters of hydration at near ambient temperatures. Tests conducted with a 126 (micro)C 1 tritium/liter water standard mixture showed reductions to 25 (micro)C 1 /L utilizing two, 2-meter long columns in series. Demonstration tests with Hanford Site wastewater samples indicate an approximate tritium concentration reduction from 0.3 (micro)C 1 /L to 0.07 (micro)C 1 /L for a series of two, 2-meter long stationary column beds Further reduction to less than 0.02 (micro)C 1 /L, the current drinking water maximum contaminant level (MCL), is projected with additional bed media in series. Tritium can be removed from the loaded beds with a modest temperature increase and the beds can be reused Results of initial tests are presented and a moving bed process for treating large quantities of wastewaters is proposed. The moving bed separation process appears promising to treat existing large quantities of wastewater at various US Department of Energy (DOE) sites. The enriched tritium stream can be grouted for waste disposition. The separations system has also been shown to reduce tritium concentrations in nuclear reactor cooling water to levels that allow reuse. Energy requirements to reconstitute the loading beds and waste disposal costs for this process appear modest

  1. Wastewater Characteristics, Treatment and Disposal

    OpenAIRE

    Von Sperling, Marcos

    2007-01-01

    "Wastewater Characteristics, Treatment and Disposal is the first volume in the series Biological Wastewater Treatment, presenting an integrated view of water quality and wastewater treatment. The book covers the following topics: wastewater characteristics (flow and major constituents) impact of wastewater discharges to rivers and lakes overview of wastewater treatment systems complementary items in planning studies. This book, with its clear and practical approach, lays the foundations f...

  2. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  3. Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Katarzyna Mazur

    2016-01-01

    Full Text Available The growing popularity of wireless sensor networks increases the risk of security attacks. One of the most common and dangerous types of attack that takes place these days in any electronic society is a distributed denial of service attack. Due to the resource constraint nature of mobile sensors, DDoS attacks have become a major threat to its stability. In this paper, we established a model of a structural health monitoring network, being disturbed by one of the most common types of DDoS attacks, the flooding attack. Through a set of simulations, we explore the scope of flood-based DDoS attack problem, assessing the performance and the lifetime of the network under the attack condition. To conduct our research, we utilized the Quality of Protection Modeling Language. With the proposed approach, it was possible to examine numerous network configurations, parameters, attack options, and scenarios. The results of the carefully performed multilevel analysis allowed us to identify a new kind of DDoS attack, the delayed distributed denial of service, by the authors, referred to as DDDoS attack. Multilevel approach to DDoS attack analysis confirmed that, examining endangered environments, it is significant to take into account many characteristics at once, just to not overlook any important aspect.

  4. Wastewater and sludge management and research in Oman: An overview.

    Science.gov (United States)

    Jaffar Abdul Khaliq, Suaad; Ahmed, Mushtaque; Al-Wardy, Malik; Al-Busaidi, Ahmed; Choudri, B S

    2017-03-01

    It is well recognized that management of wastewater and sludge is a critical environmental issue in many countries. Wastewater treatment and sludge production take place under different technical, economic, and social contexts, thus requiring different approaches and involving different solutions. In most cases, a regular and environmentally safe wastewater treatment and associated sludge management requires the development of realistic and enforceable regulations, as well as treatment systems appropriate to local circumstances. The main objective of this paper is to provide useful information about the current wastewater and sludge treatment, management, regulations, and research in Oman. Based on the review and discussion, the wastewater treatment and sludge management in Oman has been evolving over the years. Further, the land application of sewage sludge should encourage revision of existing standards, regulations, and policies for the management and beneficial use of sewage sludge in Oman. Wastewater treatment and sludge management in Oman have been evolving over the years. Sludge utilization has been a challenge due to its association with human waste. Therefore, composting of sewage sludge is the best option in agriculture activities. Sludge and wastewater utilization can add up positively in the economic aspects of the country in terms of creating jobs and improving annual income rate. The number of research projects done on wastewater reuse and other ongoing ones related to the land application of sewage sludge should encourage revision of existing standards, regulations, and policies for the management and beneficial use of sewage sludge in Oman.

  5. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  6. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  7. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  8. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... Major changes in your life, such as a divorce or the addition of a baby Smoking or ... quality of life. Complications that panic attacks may cause or be linked to include: Development of specific ...

  9. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  10. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  11. What Is a Heart Attack?

    Science.gov (United States)

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  12. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  13. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  14. Spatial Characteristics and Driving Factors of Provincial Wastewater Discharge in China.

    Science.gov (United States)

    Chen, Kunlun; Liu, Xiaoqiong; Ding, Lei; Huang, Gengzhi; Li, Zhigang

    2016-12-09

    Based on the increasing pressure on the water environment, this study aims to clarify the overall status of wastewater discharge in China, including the spatio-temporal distribution characteristics of wastewater discharge and its driving factors, so as to provide reference for developing "emission reduction" strategies in China and discuss regional sustainable development and resources environment policies. We utilized the Exploratory Spatial Data Analysis (ESDA) method to analyze the characteristics of the spatio-temporal distribution of the total wastewater discharge among 31 provinces in China from 2002 to 2013. Then, we discussed about the driving factors, affected the wastewater discharge through the Logarithmic Mean Divisia Index (LMDI) method and classified those driving factors. Results indicate that: (1) the total wastewater discharge steadily increased, based on the social economic development, with an average growth rate of 5.3% per year; the domestic wastewater discharge is the main source of total wastewater discharge, and the amount of domestic wastewater discharge is larger than the industrial wastewater discharge. There are many spatial differences of wastewater discharge among provinces via the ESDA method. For example, provinces with high wastewater discharge are mainly the developed coastal provinces such as Jiangsu Province and Guangdong Province. Provinces and their surrounding areas with low wastewater discharge are mainly the undeveloped ones in Northwest China; (2) The dominant factors affecting wastewater discharge are the economy and technological advance; The secondary one is the efficiency of resource utilization, which brings about the unstable effect; population plays a less important role in wastewater discharge. The dominant driving factors affecting wastewater discharge among 31 provinces are divided into three types, including two-factor dominant type, three-factor leading type and four-factor antagonistic type. In addition, the

  15. Characteristics of grey wastewater

    DEFF Research Database (Denmark)

    Eriksson, Eva; Auffarth, Karina Pipaluk Solvejg; Henze, Mogens

    2002-01-01

    The composition of grey wastewater depends on sources and installations from where the water is drawn, e.g. kitchen, bathroom or laundry. The chemical compounds present originate from household chemicals, cooking, washing and the piping. In general grey wastewater contains lower levels of organic...

  16. Ciprofloxacin oxidation by UV-C activated peroxymonosulfate in wastewater

    Energy Technology Data Exchange (ETDEWEB)

    Mahdi-Ahmed, Moussa; Chiron, Serge, E-mail: Serge.Chiron@msem.univ-montp2.fr

    2014-01-30

    Highlights: • UV/PMS more efficient than UV/H{sub 2}O{sub 2} for ciprofloxacin removal in wastewater. • PMS decomposition into sulfate radical was activated by bicarbonate ions. • CIP degradation pathways elucidation support sulfate radical attacks as a main route. • Sulfate radical generation allows for CIP antibacterial activity elimination. -- Abstract: This work aimed at demonstrating the advantages to use sulfate radical anion for eliminating ciprofloxacin residues from treated domestic wastewater by comparing three UV-254 nm based advanced oxidation processes: UV/persulfate (PDS), UV/peroxymonosulfate (PMS) and UV/H{sub 2}O{sub 2}. In distilled water, the order of efficiency was UV/PDS > UV/PMS > UV/H{sub 2}O{sub 2} while in wastewater, the most efficient process was UV/PMS followed by UV/PDS and UV/H{sub 2}O{sub 2} mainly because PMS decomposition into sulfate radical anion was activated by bicarbonate ions. CIP was fully degraded in wastewater at pH 7 in 60 min for a [PMS]/[CIP] molar ratio of 20. Nine transformation products were identified by liquid chromatography–high resolution-mass spectrometry allowing for the establishment of degradation pathways in the UV/PMS system. Sulfate radical anion attacks prompted transformations at the piperazinyl ring through a one electron oxidation mechanism as a major pathway while hydroxyl radical attacks were mainly responsible for quinolone moiety transformations as a minor pathway. Sulfate radical anion generation has made UV/PMS a kinetically effective process in removing ciprofloxacin from wastewater with the elimination of ciprofloxacin antibacterial activity.

  17. Ciprofloxacin oxidation by UV-C activated peroxymonosulfate in wastewater

    International Nuclear Information System (INIS)

    Mahdi-Ahmed, Moussa; Chiron, Serge

    2014-01-01

    Highlights: • UV/PMS more efficient than UV/H 2 O 2 for ciprofloxacin removal in wastewater. • PMS decomposition into sulfate radical was activated by bicarbonate ions. • CIP degradation pathways elucidation support sulfate radical attacks as a main route. • Sulfate radical generation allows for CIP antibacterial activity elimination. -- Abstract: This work aimed at demonstrating the advantages to use sulfate radical anion for eliminating ciprofloxacin residues from treated domestic wastewater by comparing three UV-254 nm based advanced oxidation processes: UV/persulfate (PDS), UV/peroxymonosulfate (PMS) and UV/H 2 O 2 . In distilled water, the order of efficiency was UV/PDS > UV/PMS > UV/H 2 O 2 while in wastewater, the most efficient process was UV/PMS followed by UV/PDS and UV/H 2 O 2 mainly because PMS decomposition into sulfate radical anion was activated by bicarbonate ions. CIP was fully degraded in wastewater at pH 7 in 60 min for a [PMS]/[CIP] molar ratio of 20. Nine transformation products were identified by liquid chromatography–high resolution-mass spectrometry allowing for the establishment of degradation pathways in the UV/PMS system. Sulfate radical anion attacks prompted transformations at the piperazinyl ring through a one electron oxidation mechanism as a major pathway while hydroxyl radical attacks were mainly responsible for quinolone moiety transformations as a minor pathway. Sulfate radical anion generation has made UV/PMS a kinetically effective process in removing ciprofloxacin from wastewater with the elimination of ciprofloxacin antibacterial activity

  18. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    Energy Technology Data Exchange (ETDEWEB)

    Lee, In Hyo; Kang, Hyun Gook [KAIST, Daejeon (Korea, Republic of); Son, Han Seong [Joonbu University, Geumsan (Korea, Republic of)

    2016-05-15

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans.

  19. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    International Nuclear Information System (INIS)

    Lee, In Hyo; Kang, Hyun Gook; Son, Han Seong

    2016-01-01

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans

  20. Hardening Logic Encryption against Key Extraction Attacks with Circuit Camouflage

    Science.gov (United States)

    2017-03-01

    camouflage; obfuscation; SAT; key extraction; reverse engineering ; security; trusted electronics Introduction Integrated Circuit (IC) designs are... Circuit camouflage is hardware obfuscation technology that prevents reverse engineering of a fabricated device by utilizing a relatively small...obfuscated with circuit camouflage technology, this type of attack becomes much more difficult because a reverse engineer cannot extract a gate- level

  1. Vulnerability of water supply systems to cyber-physical attacks

    Science.gov (United States)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  2. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  3. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  4. Energy Efficiency Strategies for Municipal Wastewater Treatment Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Daw, J.; Hallett, K.; DeWolfe, J.; Venner, I.

    2012-01-01

    Water and wastewater systems are significant energy consumers with an estimated 3%-4% of total U.S. electricity consumption used for the movement and treatment of water and wastewater. Water-energy issues are of growing importance in the context of water shortages, higher energy and material costs, and a changing climate. In this economic environment, it is in the best interest for utilities to find efficiencies, both in water and energy use. Performing energy audits at water and wastewater treatment facilities is one way community energy managers can identify opportunities to save money, energy, and water. In this paper the importance of energy use in wastewater facilities is illustrated by a case study of a process energy audit performed for Crested Butte, Colorado's wastewater treatment plant. The energy audit identified opportunities for significant energy savings by looking at power intensive unit processes such as influent pumping, aeration, ultraviolet disinfection, and solids handling. This case study presents best practices that can be readily adopted by facility managers in their pursuit of energy and financial savings in water and wastewater treatment. This paper is intended to improve community energy managers understanding of the role that the water and wastewater sector plays in a community's total energy consumption. The energy efficiency strategies described provide information on energy savings opportunities, which can be used as a basis for discussing energy management goals with water and wastewater treatment facility managers.

  5. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  6. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  7. Wastewater from monosodium glutamate industry as a low cost fertilizer source for corn (Zea mays L.)

    International Nuclear Information System (INIS)

    Singh, Satnam; Rekha, P.D.; Arun, A.B.; Huang, Y.-M.; Shen, F.-T.; Young, Chiu-Chung

    2011-01-01

    Nitrogen rich wastewater from monosodium glutamate industry (MSG) and paper-mill wastewater were used in this study as low cost fertilizers for growing corn, a common fuel crop. Detailed characterization of the wastewaters and toxicity testes were conducted to assure the safety of these wastewaters. In a greenhouse pot experiment, effects of these wastewaters on corn growth and biomass yield along with the soil properties were evaluated. MSG-wastewater was applied at three rates i.e., zero, 5 m 3 ha -1 and 7.5 m 3 ha -1 and paper-mill wastewater was applied at and zero, 3.5 m 3 ha -1 and 5 m 3 ha -1 in a complete randomized blocks design experiment. Significant increase in the corn biomass yield was observed in all the wastewater treatments compared to the Control. Both these wastewaters did not show any adverse effects on plant. N-use efficiency from the MSG-wastewater was comparable to urea-N application. This study emphasizes on sustainable practices for energy crop production by utilizing wastewaters as fertilizer sources. Hence, we report for the first time that the MSG-wastewater can be used for growing corn as a low cost green practice without adverse affects on the soil properties. -- Highlights: → MSG-wastewater acidity neutralization with highly alkaline paper-mill effluent is sustainable practice. → Growing fuel crops using wastewaters comprises multiple benefits on plant, soil, and environment. → Organic rich wastewaters improve SOC. → Co-application of MSG and paper-mill wastewaters stimulates humification.

  8. Dairy wastewater treatment

    African Journals Online (AJOL)

    STORAGESEVER

    2009-08-04

    Aug 4, 2009 ... treatment processes to treat dairy wastewater such as activated sludge system .... Gas chromatograph. (Perkin Elmer, Auto system XL), equipped with thermal conductivity ..... Enzymatic hydrolysis of molasses. Bioresour. Tech.

  9. Wastewater Treatment Facilities

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — Individual permits for municipal, industrial, and semi-public wastewater treatment facilities in Iowa for the National Pollutant Discharge Elimination System (NPDES)...

  10. Recycling phosphorus from wastewater

    DEFF Research Database (Denmark)

    Lemming, Camilla Kjærulff

    wastewater-derived products, and to relate this to the availability from other P-containing waste products and mineral P fertiliser. This included aspects of development over time and soil accumulation, as well as effects of soil pH and the spatial distribution in soil. The P sources applied in this PhD work...... reserves. Wastewater represents the largest urban flow of P in waste. Hence, knowledge about plant P availability of products from the wastewater treatment system, and also comparison to other waste P sources and mineral P is essential to obtain an efficient recycling and to prioritise between different P...... recycling options. The work of this PhD focused on the plant P availability of sewage sludge, a P-rich residue from wastewater treatment which is commonly applied to agricultural soil in Denmark. The overall objective of the PhD work was to evaluate the plant availability of P in sewage sludge and other...

  11. Wastewater Treatment Plants

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — The actual treatment areas for municipal, industrial, and semi-public wastewater treatment facilities in Iowa for the National Pollutant Discharge Elimination System...

  12. Wastewater heat recovery apparatus

    Science.gov (United States)

    Kronberg, J.W.

    1992-09-01

    A heat recovery system is described with a heat exchanger and a mixing valve. A drain trap includes a heat exchanger with an inner coiled tube, baffle plate, wastewater inlet, wastewater outlet, cold water inlet, and preheated water outlet. Wastewater enters the drain trap through the wastewater inlet, is slowed and spread by the baffle plate, and passes downward to the wastewater outlet. Cold water enters the inner tube through the cold water inlet and flows generally upward, taking on heat from the wastewater. This preheated water is fed to the mixing valve, which includes a flexible yoke to which are attached an adjustable steel rod, two stationary zinc rods, and a pivoting arm. The free end of the arm forms a pad which rests against a valve seat. The rods and pivoting arm expand or contract as the temperature of the incoming preheated water changes. The zinc rods expand more than the steel rod, flexing the yoke and rotating the pivoting arm. The pad moves towards the valve seat as the temperature of the preheated water rises, and away as the temperature falls, admitting a variable amount of hot water to maintain a nearly constant average process water temperature. 6 figs.

  13. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  14. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  15. Hydrogen attack evaluation of boiler tube using ultrasonic wave

    International Nuclear Information System (INIS)

    Won, Soon Ho; Hyun, Yang Ki; Lee, Jong O; Cho, Kyung Shik; Lee, Jae Do

    2001-01-01

    The presence of hydrogen in industrial plants is a source of damage. Hydrogen attack is one such form of degradation and often causing large tube ruptures that necessitate an immediate shutdown. Hydrogen attack may reduce the fracture toughness as well as the strength of steels. This reduction is caused partially by the presence of cavities and microcracks at the grain boundaries. In the past several techniques have been used with limited results. This paper describes the application of an ultrasonic velocity, attenuation and backscatter techniques for detecting the presence of hydrogen damage in utility boiler tubes. Ultrasonic tests showed a decrease in wave velocity and an increase in attenuation. Such results demonstrate the potential for ultrasonic nondestructive testing to quantify damage. Based on this study, recommendations are that both velocity and attenuation be used to detect hydrogen attack in steels.

  16. Thermochemical Wastewater Valorization via Enhanced Microbial Toxicity Tolerance

    Energy Technology Data Exchange (ETDEWEB)

    Beckham, Gregg T [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Thelhawadigedara, Lahiru Niroshan Jayakody [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Johnson, Christopher W [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Pleitner, Brenna P [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Cleveland, Nicholas S [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Michener, William E [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Olstad-Thompson, Jessica L [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Vardon, Derek R [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Whitham, Jason M. [Oak Ridge National Laboratory; Giannone, Richard J. [Oak Ridge National Laboratory; Klingeman, Dawn M. [Oak Ridge National Laboratory; Brown, Robert C. [Iowa State University; Brown, Steven D. [Oak Ridge National Laboratory; LanzaTech, Inc.; Hettich, Robert L. [Oak Ridge National Laboratory; Guss, Adam M. [Oak Ridge National Laboratory

    2018-04-17

    Thermochemical (TC) biomass conversion processes such as pyrolysis and liquefaction generate considerable amounts of wastewater, which often contains highly toxic compounds that are incredibly challenging to convert via standard wastewater treatment approaches such as anaerobic digestion. These streams represent a cost for TC biorefineries, and a potential valorization opportunity, if effective conversion methods are developed. The primary challenge hindering microbial conversion of TC wastewater is toxicity. In this study, we employ a robust bacterium, Pseudomonas putida, with TC wastewater streams to demonstrate that aldehydes are the most inhibitory compounds in these streams. Proteomics, transcriptomics, and fluorescence-based immunoassays of P. putida grown in a representative wastewater stream indicate that stress results from protein damage, which we hypothesize is a primary toxicity mechanism. Constitutive overexpression of the chaperone genes, groEL, groES, and clpB, in a genome-reduced P. putida strain improves the tolerance towards multiple TC wastewater samples up to 200-fold. Moreover, the concentration ranges of TC wastewater are industrially relevant for further bioprocess development for all wastewater streams examined here, representing different TC process configurations. Furthermore, we demonstrate proof-of-concept polyhydroxyalkanoate production from the usable carbon in an exemplary TC wastewater stream. Overall, this study demonstrates that protein quality control machinery and repair mechanisms can enable substantial gains in microbial tolerance to highly toxic substrates, including heterogeneous waste streams. When coupled to other metabolic engineering advances such as expanded substrate utilization and enhanced product accumulation, this study generally enables new strategies for biological conversion of highly-toxic, organic-rich wastewater via engineered aerobic monocultures or designer consortia.

  17. Research Note on the Energy Infrastructure Attack Database (EIAD

    Directory of Open Access Journals (Sweden)

    Jennifer Giroux

    2013-12-01

    Full Text Available The January 2013 attack on the In Amenas natural gas facility drew international attention. However this attack is part of a portrait of energy infrastructure targeting by non-state actors that spans the globe. Data drawn from the Energy Infrastructure Attack Database (EIAD shows that in the last decade there were, on average, nearly 400 annual attacks carried out by armed non-state actors on energy infrastructure worldwide, a figure that was well under 200 prior to 1999. This data reveals a global picture whereby violent non-state actors target energy infrastructures to air grievances, communicate to governments, impact state economic interests, or capture revenue in the form of hijacking, kidnapping ransoms, theft. And, for politically motivated groups, such as those engaged in insurgencies, attacking industry assets garners media coverage serving as a facilitator for international attention. This research note will introduce EIAD and position its utility within various research areas where the targeting of energy infrastructure, or more broadly energy infrastructure vulnerability, has been addressed, either directly or indirectly. We also provide a snapshot of the initial analysis of the data between 1980-2011, noting specific temporal and spatial trends, and then conclude with a brief discussion on the contribution of EIAD, highlighting future research trajectories. 

  18. Solutions to microplastic pollution - Removal of microplastics from wastewater effluent with advanced wastewater treatment technologies.

    Science.gov (United States)

    Talvitie, Julia; Mikola, Anna; Koistinen, Arto; Setälä, Outi

    2017-10-15

    Conventional wastewater treatment with primary and secondary treatment processes efficiently remove microplastics (MPs) from the wastewater. Despite the efficient removal, final effluents can act as entrance route of MPs, given the large volumes constantly discharged into the aquatic environments. This study investigated the removal of MPs from effluent in four different municipal wastewater treatment plants utilizing different advanced final-stage treatment technologies. The study included membrane bioreactor treating primary effluent and different tertiary treatment technologies (discfilter, rapid sand filtration and dissolved air flotation) treating secondary effluent. The MBR removed 99.9% of MPs during the treatment (from 6.9 to 0.005 MP L -1 ), rapid sand filter 97% (from 0.7 to 0.02 MP L -1 ), dissolved air flotation 95% (from 2.0 to 0.1 MP L -1 ) and discfilter 40-98.5% (from 0.5 - 2.0 to 0.03-0.3 MP L -1 ) of the MPs during the treatment. Our study shows that with advanced final-stage wastewater treatment technologies WWTPs can substantially reduce the MP pollution discharged from wastewater treatment plants into the aquatic environments. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  20. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  1. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  2. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  3. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  4. Treatment Of Wastewater For Reuse With Mobile Electron Beam Plant

    International Nuclear Information System (INIS)

    Han, B.; Kim, J.K.; Kim, Y.R.; Zommer, N.

    2012-01-01

    The use of alternative disinfectants to chlorine for the wastewater treatment has received increasing attention in recent years to treat either liquid or solids streams within wastewater treatment plants for pathogens and trace organics (TOrCs). Although several technologies have come to the forefront as an alternative to chlorine (e.g., ultraviolet [UV] and hydrogen peroxide), the majority of these technologies are chemically based, with the exception of UV. An attractive physical disinfection approach is by electron beam (EB) irradiation. EB treatment of wastewater leads to their purification from various pollutants. It is caused by the decomposition of pollutants as a result of their reactions with highly reactive species formed from water radiolysis: hydrated electron, OH free radical and H atom [Pikaev (1986)]. Sometimes methods such as EB with biological treatment, adsorption and others improve the effect of EB treatment of the wastewater purification. In the process of EB treatment of wastewater there are utilized chemical transformations of pollutants induced by ionizing radiation. At sufficiently high absorbed doses these transformations can result in complete decomposition (removal) of the substance. Under real conditions, i.e., at rather high content of pollutants in a wastewater and economically acceptable doses, partial decomposition of pollutant takes place as well as transformations of pollutant molecules that result in improving subsequent purification stages, efficiency of the process being notably influenced by irradiation conditions and wastewater composition [Woods and Pikaev (1994)]. (author)

  5. Treatment Of Wastewater For Reuse With Mobile Electron Beam Plant

    Energy Technology Data Exchange (ETDEWEB)

    Han, B.; Kim, J. K.; Kim, Y. R. [EB TECH Co., Ltd., Daejeon (Korea, Republic of); Zommer, N. [Pele Inc., Milpitas Californaa (United States)

    2012-07-01

    The use of alternative disinfectants to chlorine for the wastewater treatment has received increasing attention in recent years to treat either liquid or solids streams within wastewater treatment plants for pathogens and trace organics (TOrCs). Although several technologies have come to the forefront as an alternative to chlorine (e.g., ultraviolet [UV] and hydrogen peroxide), the majority of these technologies are chemically based, with the exception of UV. An attractive physical disinfection approach is by electron beam (EB) irradiation. EB treatment of wastewater leads to their purification from various pollutants. It is caused by the decomposition of pollutants as a result of their reactions with highly reactive species formed from water radiolysis: hydrated electron, OH free radical and H atom [Pikaev (1986)]. Sometimes methods such as EB with biological treatment, adsorption and others improve the effect of EB treatment of the wastewater purification. In the process of EB treatment of wastewater there are utilized chemical transformations of pollutants induced by ionizing radiation. At sufficiently high absorbed doses these transformations can result in complete decomposition (removal) of the substance. Under real conditions, i.e., at rather high content of pollutants in a wastewater and economically acceptable doses, partial decomposition of pollutant takes place as well as transformations of pollutant molecules that result in improving subsequent purification stages, efficiency of the process being notably influenced by irradiation conditions and wastewater composition [Woods and Pikaev (1994)]. (author)

  6. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  7. Basic Principles of Wastewater Treatment

    OpenAIRE

    Von Sperling, Marcos

    2007-01-01

    "Basic Principles of Wastewater Treatment is the second volume in the series Biological Wastewater Treatment, and focusses on the unit operations and processes associated with biological wastewater treatment. The major topics covered are: microbiology and ecology of wastewater treatment reaction kinetics and reactor hydraulics conversion of organic and inorganic matter sedimentation aeration The theory presented in this volume forms the basis upon which the other books...

  8. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  9. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  10. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  11. Microalgal biofilms for wastewater treatment

    NARCIS (Netherlands)

    Boelee, N.C.

    2013-01-01

    The objective of this thesis was to explore the possibilities of using microalgal biofilms for the treatment of municipal wastewater, with a focus on the post-treatment of municipal wastewater effluent. The potential of microalgal biofilms for wastewater treatment was first investigated using a

  12. Problems with textile wastewater discharge

    International Nuclear Information System (INIS)

    Rantala, Pentti

    1987-01-01

    The general character of textile industry wastewaters is briefly discussed. General guidelines and practice in Finland when discharging textile industry wastewaters to municipal sewer systems is described. A survey revealed that most municipalities experience some problems due to textile industry wastewaters. Pretreatment is not always practiced and in some cases pretreatment is not operated efficiently. (author)

  13. Resilience of LTE networks against smart jamming attacks

    KAUST Repository

    Aziz, Farhan M.

    2014-12-08

    Commercial LTE networks are being studied for mission-critical applications, such as public safety and smart grid communications. In this paper, LTE networks are shown vulnerable to Denial-of-Service (DOS) and loss of service attacks from smart jammers, who may employ simple narrowband jamming techniques to attack without any need to hack the network or its users. We modeled the utilities of jamming and anti-jamming actions played by the jammer and the network under the framework of single-shot and repeated Bayesian games. In a single-shot game formulation the only Nash Equilibria (NE) are pure strategy equilibria at which network utility is severely compromised. We propose a repeated-game learning and strategy algorithm for the network that outperforms single-shot games by a significant margin. Furthermore, all of our proposed actions and algorithms can be implemented with current technology.

  14. Resilience of LTE networks against smart jamming attacks: Wideband model

    KAUST Repository

    Aziz, Farhan M.

    2015-12-03

    LTE/LTE-A networks have been successfully providing advanced broadband services to millions of users worldwide. Lately, it has been suggested to use LTE networks for mission-critical applications like public safety, smart grid and military communications. We have previously shown that LTE networks are vulnerable to Denial-of-Service (DOS) and loss of service attacks from smart jammers. In this paper, we extend our previous work on resilience of LTE networks to wideband multipath fading channel, SINR estimation in frequency domain and computation of utilities based on observable parameters under the framework of single-shot and repeated games with asymmetric information. In a single-shot game formulation, network utility is severely compromised at its solutions, i.e. at the Nash Equilibria (NE). We propose evolved repeated-game strategy algorithms to combat smart jamming attacks that can be implemented in existing deployments using current technology. © 2015 IEEE.

  15. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  16. LCA of Wastewater Treatment

    DEFF Research Database (Denmark)

    Larsen, Henrik Fred

    2018-01-01

    of LCA studies addressing wastewater treatment have from the very first published cases, been on energy and resource consumption. In recent time, the use of characterisation has increased and besides global warming potential, especially eutrophication is in focus. Even the toxicity-related impact......The main purpose of wastewater treatment is to protect humans against waterborne diseases and to safeguard aquatic bio-resources like fish. The dominating environmental concerns within this domain are indeed still potential aquatic eutrophication/oxygen depletion due to nutrient/organic matter...

  17. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  18. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  19. Wastewater treatment by nanofiltration membranes

    Science.gov (United States)

    Mulyanti, R.; Susanto, H.

    2018-03-01

    Lower energy consumption compared to reverse osmosis (RO) and higher rejection compared to ultrafiltration make nanofiltration (NF) membrane get more and more attention for wastewater treatment. NF has become a promising technology not only for treating wastewater but also for reusing water from wastewater. This paper presents various application of NF for wastewater treatments. The factors affecting the performance of NF membranes including operating conditions, feed characteristics and membrane characteristics were discussed. In addition, fouling as a severe problem during NF application is also presented. Further, future prospects and challenges of NF for wastewater treatments are explained.

  20. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  1. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  2. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  3. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  4. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  5. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  6. Aftermath of bustamante attack on genomic beacon service.

    Science.gov (United States)

    Aziz, Md Momin Al; Ghasemi, Reza; Waliullah, Md; Mohammed, Noman

    2017-07-26

    With the enormous need for federated eco-system for holding global genomic and clinical data, Global Alliance for Genomic and Health (GA4GH) has created an international website called beacon service which allows a researcher to find out whether a specific dataset can be utilized to his or her research beforehand. This simple webservice is quite useful as it allows queries like whether a certain position of a target chromosome has a specific nucleotide. However, the increased integration of individuals genomic data into clinical practice and research raised serious privacy concern. Though the answer of such queries are yes or no in Bacon network, it results in serious privacy implication as demonstrated in a recent work from Shringarpure and Bustamante. In their attack model, the authors demonstrated that with a limited number of queries, presence of an individual in any dataset can be determined. We propose two lightweight algorithms (based on randomized response) which captures the efficacy while preserving the privacy of the participants in a genomic beacon service. We also elaborate the strength and weakness of the attack by explaining some of their statistical and mathematical models using real world genomic database. We extend their experimental simulations for different adversarial assumptions and parameters. We experimentally evaluated the solutions on the original attack model with different parameters for better understanding of the privacy and utility tradeoffs provided by these two methods. Also, the statistical analysis further elaborates the different aspects of the prior attack which leads to a better risk management for the participants in a beacon service. The differentially private and lightweight solutions discussed here will make the attack much difficult to succeed while maintaining the fundamental motivation of beacon database network.

  7. Opportunities for Automated Demand Response in California Wastewater Treatment Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Aghajanzadeh, Arian [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Wray, Craig [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); McKane, Aimee [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2015-08-30

    Previous research over a period of six years has identified wastewater treatment facilities as good candidates for demand response (DR), automated demand response (Auto-­DR), and Energy Efficiency (EE) measures. This report summarizes that work, including the characteristics of wastewater treatment facilities, the nature of the wastewater stream, energy used and demand, as well as details of the wastewater treatment process. It also discusses control systems and automated demand response opportunities. Furthermore, this report summarizes the DR potential of three wastewater treatment facilities. In particular, Lawrence Berkeley National Laboratory (LBNL) has collected data at these facilities from control systems, submetered process equipment, utility electricity demand records, and governmental weather stations. The collected data were then used to generate a summary of wastewater power demand, factors affecting that demand, and demand response capabilities. These case studies show that facilities that have implemented energy efficiency measures and that have centralized control systems are well suited to shed or shift electrical loads in response to financial incentives, utility bill savings, and/or opportunities to enhance reliability of service. In summary, municipal wastewater treatment energy demand in California is large, and energy-­intensive equipment offers significant potential for automated demand response. In particular, large load reductions were achieved by targeting effluent pumps and centrifuges. One of the limiting factors to implementing demand response is the reaction of effluent turbidity to reduced aeration at an earlier stage of the process. Another limiting factor is that cogeneration capabilities of municipal facilities, including existing power purchase agreements and utility receptiveness to purchasing electricity from cogeneration facilities, limit a facility’s potential to participate in other DR activities.

  8. Paper 1: Wastewater characterisation

    African Journals Online (AJOL)

    drinie

    1998). Research is directed on quantifying the C, N and P fractions in the secondary ... and prefermented wastewater, applicable for a basic in-line APT and other prefermenter ... representative composite samples, and from these samples the ... Constituents in true solution (dissolved) (particle size < 1 nm);. • not visible by ...

  9. Techniques of Wastewater Treatment

    Indian Academy of Sciences (India)

    organisms: These are small plants as well as animals and they are some of the most difficult ... It is measured by the oxygen consumption of a pre-inoculated sample at 20-250C in .... Organic wastewater components may be oxidised all the way to CO2.

  10. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  11. Attack-Resistant Trust Metrics

    Science.gov (United States)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  12. Dielectric Barrier Discharge Plasma-Induced Photocatalysis and Ozonation for the Treatment of Wastewater

    International Nuclear Information System (INIS)

    Sun, Mok Young; Jin-Oh, Jo; Heon-Ju, Lee

    2008-01-01

    The physicochemical processes of dielectric barrier discharge (DBD) such as in-situ formation of chemically active species and emission of ultraviolet (UV)/visible light were utilized for the treatment of a simulated wastewater formed with Acid Red 4 as the model organic contaminant. The chemically active species (mostly ozone) produced in the DBD reactor were well distributed in the wastewater using a porous gas diffuser, thereby increasing the gas-liquid contact area. For the purpose of making the best use of the light emission, a titanium oxide-based photocatalyst was incorporated in the wastewater treating system. The experimental parameters chosen were the voltage applied to the DBD reactor, the initial pH of the wastewater, and the concentration of hydrogen peroxide added to the wastewater. The results have clearly shown that the present system capable of degrading organic contaminants in two ways (photocatalysis and ozonation) may be a promising wastewater treatment technology.

  13. Dielectric Barrier Discharge Plasma-Induced Photocatalysis and Ozonation for the Treatment of Wastewater

    Science.gov (United States)

    Mok, Young Sun; Jo, Jin-Oh; Lee, Heon-Ju

    2008-02-01

    The physicochemical processes of dielectric barrier discharge (DBD) such as in-situ formation of chemically active species and emission of ultraviolet (UV)/visible light were utilized for the treatment of a simulated wastewater formed with Acid Red 4 as the model organic contaminant. The chemically active species (mostly ozone) produced in the DBD reactor were well distributed in the wastewater using a porous gas diffuser, thereby increasing the gas-liquid contact area. For the purpose of making the best use of the light emission, a titanium oxide-based photocatalyst was incorporated in the wastewater treating system. The experimental parameters chosen were the voltage applied to the DBD reactor, the initial pH of the wastewater, and the concentration of hydrogen peroxide added to the wastewater. The results have clearly shown that the present system capable of degrading organic contaminants in two ways (photocatalysis and ozonation) may be a promising wastewater treatment technology.

  14. Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis

    Directory of Open Access Journals (Sweden)

    Tongguang Ni

    2013-01-01

    Full Text Available Distributed denial of service (DDoS attacks are one of the major threats to the current Internet, and application-layer DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. Consequently, neither intrusion detection systems (IDS nor victim server can detect malicious packets. In this paper, a novel approach to detect application-layer DDoS attack is proposed based on entropy of HTTP GET requests per source IP address (HRPI. By approximating the adaptive autoregressive (AAR model, the HRPI time series is transformed into a multidimensional vector series. Then, a trained support vector machine (SVM classifier is applied to identify the attacks. The experiments with several databases are performed and results show that this approach can detect application-layer DDoS attacks effectively.

  15. A Weak Value Based QKD Protocol Robust Against Detector Attacks

    Science.gov (United States)

    Troupe, James

    2015-03-01

    We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.

  16. The Tokyo subway sarin attack-lessons learned

    International Nuclear Information System (INIS)

    Okumura, T.; Hisaoka, T.; Yamada, A.; Naito, T.; Isonuma, H.; Okumura, S.; Miura, K.; Sakurada, M.; Maekawa, H.; Ishimatsu, S.; Takasu, N.; Suzuki, K.

    2005-01-01

    The sarin gas attack in the Tokyo subway system is reviewed from a clinical toxicology perspective. Based on the lessons learned from this attack, the following areas should be addressed on a global scale. First, an adequate supply of protective equipment is required, including level B protective equipment with a pressure demand breathing apparatus. In addition, a system should be established that enables a possible cause to be determined based on symptoms, physical findings, general laboratory tests, and a simple qualitative analysis for poisonous substances. If an antidote is needed, the system should enable it to be administered to the victims as quickly as possible. Preparation for a large-scale chemical attack by terrorists requires the prior establishment of a detailed decontamination plan that utilizes not only mass decontamination facilities but also public facilities in the area. A system should be established for summarizing, evaluating, and disseminating information on poisonous substances. Finally, a large-scale scientific investigation of the Tokyo sarin attack should be conducted to examine its long-term and subclinical effects and the effects of exposure to asymptomatic low levels of sarin

  17. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  18. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  19. Energy positive domestic wastewater treatment: the roles of anaerobic and phototrophic technologies

    KAUST Repository

    Shoener, B. D.; Bradley, I. M.; Cusick, R. D.; Guest, J. S.

    2014-01-01

    The negative energy balance of wastewater treatment could be reversed if anaerobic technologies were implemented for organic carbon oxidation and phototrophic technologies were utilized for nutrient recovery. To characterize the potential for energy

  20. Phytoremediation of Nitrogen as Green Chemistry for Wastewater Treatment System

    Directory of Open Access Journals (Sweden)

    Lennevey Kinidi

    2017-01-01

    Full Text Available It is noteworthy that ammoniacal nitrogen contamination in wastewater has reportedly posed a great threat to the environment. Although there are several conventional technologies being employed to remediate ammoniacal nitrogen contamination in wastewater, they are not sustainable and cost-effective. Along this line, the present study aims to highlight the significance of green chemistry characteristics of phytoremediation in nitrogen for wastewater treatment. Notably, ammoniacal nitrogen can be found in many types of sources and it brings harmful effects to the environment. Hence, the present study also reviews the phytoremediation of nitrogen and describes its green chemistry characteristics. Additionally, the different types of wastewater contaminants and their effects on phytoremediation and the phytoremediation consideration in wastewater treatment application and sustainable waste management of harvested aquatic macrophytes were reviewed. Finally, the present study explicates the future perspectives of phytoremediation. Based on the reviews, it can be concluded that green chemistry characteristics of phytoremediation in nitrogen have proved that it is sustainable and cost-effective in relation to other existing ammoniacal nitrogen remediation technologies. Therefore, it can be deduced that a cheaper and more environmental friendly ammoniacal nitrogen technology can be achieved with the utilization of phytoremediation in wastewater treatment.

  1. Disposal of olive mill wastewater with DC arc plasma method.

    Science.gov (United States)

    Ibrahimoglu, Beycan; Yilmazoglu, M Zeki

    2018-07-01

    Olive mill wastewater is an industrial waste, generated as a byproduct of olive oil production process and generally contains components such as organic matter, suspended solids, oil, and grease. Although various methods have been developed to achieve the disposal of this industrial wastewater, due to the low cost, the most common disposal application is the passive storage in the lagoons. The main objective of this study is to reduce pollution parameters in olive mill wastewater and draw water to discharge limits by using plasma technology. Plasma-assisted disposal of olive mill wastewater method could be an alternative disposal technique when considering potential utilization of treated water in agricultural areas and economic value of flammable plasma gas which is the byproduct of disposal process. According to the experimental results, the rates of COD (chemical oxygen demand) and BOD (biological oxygen demand) of olive mill wastewater are decreased by 94.42% and 95.37%, respectively. The dissolved oxygen amount is increased from 0.36 to 6.97 mg/l. In addition, plasma gas with high H 2 content and treated water that can be used in agricultural areas for irrigation are obtained from non-dischargeable wastewater. Copyright © 2018 Elsevier Ltd. All rights reserved.

  2. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

    Science.gov (United States)

    Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y

    2016-04-01

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures. © 2015 Society for Risk Analysis.

  3. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  4. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  5. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  6. Attack methodology Analysis: SQL Injection Attacks and Their Applicability to Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston

    2005-09-01

    Database applications have become a core component in control systems and their associated record keeping utilities. Traditional security models attempt to secure systems by isolating core software components and concentrating security efforts against threats specific to those computers or software components. Database security within control systems follows these models by using generally independent systems that rely on one another for proper functionality. The high level of reliance between the two systems creates an expanded threat surface. To understand the scope of a threat surface, all segments of the control system, with an emphasis on entry points, must be examined. The communication link between data and decision layers is the primary attack surface for SQL injection. This paper facilitates understanding what SQL injection is and why it is a significant threat to control system environments.

  7. Expected utility without utility

    OpenAIRE

    Castagnoli, E.; Licalzi, M.

    1996-01-01

    This paper advances an interpretation of Von Neumann–Morgenstern’s expected utility model for preferences over lotteries which does not require the notion of a cardinal utility over prizes and can be phrased entirely in the language of probability. According to it, the expected utility of a lottery can be read as the probability that this lottery outperforms another given independent lottery. The implications of this interpretation for some topics and models in decision theory are considered....

  8. Agricultural use of treated municipal wastewaters preserving environmental sustainability

    Directory of Open Access Journals (Sweden)

    Antonio Lonigro

    2007-07-01

    Full Text Available In this paper the utility of the treated municipal wastewaters in agriculture, analyzing the chemical, physical and microbiological characteristics and their pollution indicators evaluation are being illustrated. Some methods employed for treating wastewaters are examined, as well as instructions and rules actually in force in different countries of the world, for evaluating the legislative hygienic and sanitary and agronomic problems connected with the treated wastewaters use, are being collected and compared. Successively, in order to provide useful indications for the use of treated municipal wastewaters, results of long-term field researches, carried out in Puglia, regarding two types of waters (treated municipal wastewater and conventional water and two irrigation methods (drip and capillary sub-irrigation on vegetable crops grown in succession, are being reported. For each crop cycle, chemical physical and microbiological analyses have been performed on irrigation water, soil and crop samples. The results evidenced that although irrigating with waters having high colimetric values, higher than those indicated by law and with two different irrigation methods, never soil and marketable yield pollutions have been observed. Moreover, the probability to take infection and/or disease for ingestion of fruits coming from crops irrigated with treated wastewaters, calculated by Beta-Poisson method, resulted negligible and equal to 1 person for 100 millions of exposed people. Concentrations of heavy metals in soil and crops were lesser than those admissible by law. The free chlorine, coming from disinfection, found in the wastewaters used for watering, in some cases caused toxicity effects, which determined significant yield decreases. Therefore, municipal wastewaters, if well treated, can be used for irrigation representing a valid alternative to the conventional ones.

  9. A study on the treatment of industrial wastewater containing heavy metals

    International Nuclear Information System (INIS)

    Yoon, Myoung Hwan; Jang, In Soon; Park, Jang Jin; Choi, Chang Shik; Lee, Yoon Hwan; Shin, Jin Myoung

    1993-06-01

    It is essential to treat heavy metals contained in industrial wastewater safely and economically for the protection of the environment. An effective method of separating heavy metals using acornic acid for the first time in the world must be utilized for wastewater treatment. One of the merits of this method lies in its cheap treatment cost. Furthermore, the secondary contamination, which occurs often when chemical purifiers are used, could be minimized. Another advantage of utilizing the acornic acid is that various kinds of heavy metals contained in industrial wastewater can be purified at once. The final purpose of this project is to commercialize the method by 1994. (Auther)

  10. Active Detection for Exposing Intelligent Attacks in Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Weerakkody, Sean [Carnegie Mellon Univ., Pittsburgh, PA (United States); Ozel, Omur [Carnegie Mellon Univ., Pittsburgh, PA (United States); Griffioen, Paul [Carnegie Mellon Univ., Pittsburgh, PA (United States); Sinopoli, Bruno [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2017-07-01

    In this paper, we consider approaches for detecting integrity attacks carried out by intelligent and resourceful adversaries in control systems. Passive detection techniques are often incorporated to identify malicious behavior. Here, the defender utilizes finely-tuned algorithms to process information and make a binary decision, whether the system is healthy or under attack. We demonstrate that passive detection can be ineffective against adversaries with model knowledge and access to a set of input/output channels. We then propose active detection as a tool to detect attacks. In active detection, the defender leverages degrees of freedom he has in the system to detect the adversary. Specifically, the defender will introduce a physical secret kept hidden from the adversary, which can be utilized to authenticate the dynamics. In this regard, we carefully review two approaches for active detection: physical watermarking at the control input, and a moving target approach for generating system dynamics. We examine practical considerations for implementing these technologies and discuss future research directions.

  11. Integrated control of the wastewater system – potentials and barriers

    DEFF Research Database (Denmark)

    Mollerup, Ane Loft; Grum, Morten; Muschalla, Dirk

    2013-01-01

    Applying integrated control to a sewer system and wastewater treatment plant often leads to additional benefits for both systems when compared to controlling them independently. However, barriers such as a lack of incentive for utilities to put this type of control in place mean that in practice...

  12. Bio-treatment of phosphate from synthetic wastewater using ...

    African Journals Online (AJOL)

    In this study, the efficient phosphate utilizing isolates were used to remove phosphate from synthetic phosphate wastewater was tested using batch scale process. Hence the objective of the present study was to examine the efficiency of bacterial species individually for the removal of phosphate from synthetic phosphate ...

  13. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  14. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  15. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  16. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  17. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  18. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  19. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  20. Wastewater Treatment in Greenland

    DEFF Research Database (Denmark)

    Gunnarsdottir, Ragnhildur

    treatment in these regions. However, designing, constructing and operating wastewater collection systems in the Arctic is challenging because of e.g. permafrost conditions, hard rock surfaces, freezing, limited quantity of water and high costs of electricity, fuel and transportation, as well as a settlement...... or water saving toilets. This opens up for co-treatment of organic waste fractions. Freezing and thawing has also been recognised as being a cost-effective wastewater treatment method in cold regions. Thus it was chosen to concentrate on the effect of the mentioned processes, namely freezing, anaerobic...... spreading of nutrients, diseases and potential pollution issues. Due to the above mentioned challenges alternative treatment methods are needed, especially in small and remotely located communities. Decentralized solutions are well suited for Greenland. Ideal solutions should reduce the need for expensive...

  1. Identification of wastewater processes

    DEFF Research Database (Denmark)

    Carstensen, Niels Jacob

    The introduction of on-line sensors for monitoring of nutrient salts concentrations on wastewater treatment plants with nutrient removal, opens a wide new area of modelling wastewater processes. The subject of this thesis is the formulation of operational dynamic models based on time series...... of ammonia, nitrate, and phosphate concentrations, which are measured in the aeration tanks of the biological nutrient removal system. The alternatign operation modes of the BIO-DENITRO and BIO-DENIPHO processes are of particular interest. Time series models of the hydraulic and biological processes are very......-known theory of the processes with the significant effects found in data. These models are called grey box models, and they contain rate expressions for the processes of influent load of nutrients, transport of nutrients between the aeration tanks, hydrolysis and growth of biomass, nitrification...

  2. Biodenitrification of industrial wastewater

    International Nuclear Information System (INIS)

    Donaldson, T.L.; Walker, J.F. Jr.; Helfrich, M.V.

    1987-01-01

    The Feed Materials Production Center (FMPC), a US Department of Energy facility at Fernald, Ohio, is constructing a fluidized-bed biodenitrification plant based on pilot work conducted at the Oak Ridge National Laboratory (ORNL) in the late 1970s and early 1980s. This plant is designed to treat approximately 600 to 800 L/min of wastewater having a nitrate concentration as high as 10 g/L. The effluent is to contain less than 0.1 g/L of nitrate. Since this new facility is an extrapolation of the ORNL work to significantly larger scale equipment and to actual rather than synthetic wastewater, design verification studies have been performed to reduce uncertainties in the scaleup. The results of these studies are summarized in this report. 7 refs., 1 fig

  3. Parasitological Contamination of Wastewater Irrigated and Raw ...

    African Journals Online (AJOL)

    Tadesse

    Occurrence of infective stages of intestinal parasites on wastewater- irrigated vegetables ..... reported the health hazards of agricultural reuse of untreated wastewater through detection of .... State of knowledge in land treatment of wastewater.

  4. Microplastic in Danish wastewater

    DEFF Research Database (Denmark)

    The objectives of the present study were to evaluate the role of Danish wastewater treatment plants (WWTPs) in the emission of microplastic to the environment in terms of amounts and types of plastic polymers emitted and if possible, to evaluate which sources these plastic polymers could originate...... investigations (Fourier Transformed Infrared Spectroscopy imaging applying a Focal Plane Array). This method allows both determination of the microplastic concentrations in the samples and identification of the type of plastic polymer of each microplastic particle....

  5. PFP Wastewater Sampling Facility

    International Nuclear Information System (INIS)

    Hirzel, D.R.

    1995-01-01

    This test report documents the results obtained while conducting operational testing of the sampling equipment in the 225-WC building, the PFP Wastewater Sampling Facility. The Wastewater Sampling Facility houses equipment to sample and monitor the PFP's liquid effluents before discharging the stream to the 200 Area Treated Effluent Disposal Facility (TEDF). The majority of the streams are not radioactive and discharges from the PFP Heating, Ventilation, and Air Conditioning (HVAC). The streams that might be contaminated are processed through the Low Level Waste Treatment Facility (LLWTF) before discharging to TEDF. The sampling equipment consists of two flow-proportional composite samplers, an ultrasonic flowmeter, pH and conductivity monitors, chart recorder, and associated relays and current isolators to interconnect the equipment to allow proper operation. Data signals from the monitors are received in the 234-5Z Shift Office which contains a chart recorder and alarm annunciator panel. The data signals are also duplicated and sent to the TEDF control room through the Local Control Unit (LCU). Performing the OTP has verified the operability of the PFP wastewater sampling system. This Operability Test Report documents the acceptance of the sampling system for use

  6. Higher Order Differential Attack on 6-Round MISTY1

    Science.gov (United States)

    Tsunoo, Yukiyasu; Saito, Teruo; Nakashima, Hiroki; Shigeri, Maki

    MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it has been recommended for Japanese e-Government ciphers by the CRYPTREC project. This paper reports a previously unknown higher order differential characteristic of 4-round MISTY1 with the FL functions. It also shows that a higher order differential attack that utilizes this newly discovered characteristic is successful against 6-round MISTY1 with the FL functions. This attack can recover a partial subkey with a data complexity of 253.7 and a computational complexity of 264.4, which is better than any previous cryptanalysis of MISTY1.

  7. Detecting Attacks in CyberManufacturing Systems: Additive Manufacturing Example

    Directory of Open Access Journals (Sweden)

    Wu Mingtao

    2017-01-01

    Full Text Available CyberManufacturing System is a vision for future manufacturing where physical components are fully integrated with computational processes in a connected environment. However, realizing the vision requires that its security be adequately ensured. This paper presents a vision-based system to detect intentional attacks on additive manufacturing processes, utilizing machine learning techniques. Particularly, additive manufacturing systems have unique vulnerabilities to malicious attacks, which can result in defective infills but without affecting the exterior. In order to detect such infill defects, the research uses simulated 3D printing process images as well as actual 3D printing process images to compare accuracies of machine learning algorithms in classifying, clustering and detecting anomalies on different types of infills. Three algorithms - (i random forest, (ii k nearest neighbor, and (iii anomaly detection - have been adopted in the research and shown to be effective in detecting such defects.

  8. Extra-capacity versus protection for supply networks under attack

    International Nuclear Information System (INIS)

    Bricha, Naji; Nourelfath, Mustapha

    2014-01-01

    This article develops a game-theoretical model to deal with the protection of facilities, in the context of the capacitated fixed-charge location and capacity acquisition problem. A set of investment alternatives is available for direct protection of facilities. Furthermore, extra-capacity of neighbouring functional facilities can be used after attacks to avoid the backlog of demands and backorders. The proposed model considers a non-cooperative two-period game between the players, and an algorithm is presented to determine the equilibrium solution and the optimal defender strategy under capacity constraints. A method is developed to evaluate the utilities of the defender and the attacker. The benefit of the proposed approach is illustrated using a numerical example. The defence strategy of our model is compared to other strategies, and the obtained results clearly indicate the superiority of our model in finding the best trade-off between direct protection investment and extra-capacity deployment

  9. Condition Assessment Technologies for Drinking Water and Wastewater Pipelines: State-of-the-Art Literature and Practice Review

    OpenAIRE

    Thuruthy, Nisha

    2012-01-01

    Aging and deteriorating drinking water and wastewater pipelines have become a major problem in the United States, warranting significant federal attention and regulation. Many utilities have begun or improved programs to manage the renewal of their water and wastewater pipes and are proactively managing their pipeline assets rather than reactively fixing them. However, the extensive size of drinking water and wastewater systems and the severity of the deterioration problem are such that it ...

  10. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  11. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  12. A quantitative method to evaluate microbial electrolysis cell effectiveness for energy recovery and wastewater treatment

    KAUST Repository

    Ivanov, Ivan

    2013-10-01

    Microbial electrolysis cells (MECs) are potential candidates for sustainable wastewater treatment as they allow for recovery of the energy input by producing valuable chemicals such as hydrogen gas. Evaluating the effectiveness of MEC treatment for different wastewaters requires new approaches to quantify performance, and the establishment of specific procedures and parameters to characterize the outcome of fed-batch treatability tests. It is shown here that Coulombic efficiency can be used to directly calculate energy consumption relative to wastewater treatment in terms of COD removal, and that the average current, not maximum current, is a better metric to evaluate the rate of the bioelectrochemical reactions. The utility of these methods was demonstrated using simulated current profiles and actual wastewater tests. Industrial and domestic wastewaters were evaluated using small volume MECs, and different inoculation strategies. The energy needed for treatment was 2.17kWhkgCOD-1 for industrial wastewater and 2.59kWhkgCOD-1 for domestic wastewater. When these wastewaters were combined in equal amounts, the energy required was reduced to 0.63kWhkgCOD-1. Acclimation of the MEC to domestic wastewater, prior to tests with industrial wastewaters, was the easiest and most direct method to optimize MEC performance for industrial wastewater treatment. A pre-acclimated MEC accomplished the same removal (1847 ± 53 mg L-1) as reactor acclimated to only the industrial wastewater (1839 ± 57 mg L-1), but treatment was achieved in significantly less time (70 h versus 238 h). © 2013, Hydrogen Energy Publications, LLC. Published by Elsevier Ltd. All rights reserved.

  13. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  14. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  15. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  16. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  17. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  18. A Dynamic Programming Model for Internal Attack Detection in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiong Shi

    2017-01-01

    Full Text Available Internal attack is a crucial security problem of WSN (wireless sensor network. In this paper, we focus on the internal attack detection which is an important way to locate attacks. We propose a state transition model, based on the continuous time Markov chain (CTMC, to study the behaviors of the sensors in a WSN under internal attack. Then we conduct the internal attack detection model as the epidemiological model. In this model, we explore the detection rate as the rate of a compromised state transition to a response state. By using the Bellman equation, the utility for the state transitions of a sensor can be written in standard forms of dynamic programming. It reveals a natural way to find the optimal detection rate that is by maximizing the total utility of the compromised state of the node (the sum of current utility and future utility. In particular, we encapsulate the current state, survivability, availability, and energy consumption of the WSN into an information set. We conduct extensive experiments and the results show the effectiveness of our solutions.

  19. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  20. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  1. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  2. Resource Guide to Effective Utility Management and Lean

    Science.gov (United States)

    Water and wastewater utilities are critical to the environmental, economic, and social well being of our nation’s communities, as they work to ensure that the public continues to enjoy the benefits of clean and safe water.

  3. A wastewater game-changer

    International Nuclear Information System (INIS)

    Collins, Richard

    2014-01-01

    Full text: Anaerobic ammonium oxidation is a biotechnology that could slash energy use, chemical inputs and greenhouse emissions in wastewater treatment. The Australian water sector is slowly tuning in to one of the world's most promising wastewater and trade waste treatment technologies, anammox. SA Water, Queensland United Utilities and Veolia Water are each at different stages of trials of ''anaerobic ammonium oxidation'' to replace activated sludge in removing nitrogen. It relies on special anammox bacteria, which were first identified in 1999 and have been heavily researched ever since. The bacteria short circuit the normal nitrification/denitrification process and oxidise ammonia (NH_3) to nitrogen (N_2) under anaerobic conditions, promising deep cuts in energy demand, chemical use, fugitive greenhouse emissions and waterway impacts. Most local utilities have taken a look at it, but WME is aware of only three that have proceeded to trial stage. Veolia Water is keeping the trial it is supporting with its ANITA Mox technology under wraps for now, but municipal client manager Voon Chin said the technology has been proven for numerous applications overseas, including sludge dewatering effluent (SDE). QUU is in now stepping up from bench-scale tests to a full pilot at its Luggage Point sewage treatment plant (STP). It is currently enriching anammox cultures in 200-litre drums onsite to speed up the painstaking conditioning process when the plant gets up and running shortly in a 40-foot shipping container. But the most advanced are SA Water and Degremont through their Allwater joint venture, which runs Adelaide's water and sewerage network. It has wrapped up Australia's first pilot project, a 4m"3 plant treating SDE at the Bolivar STP. An Allwater spokesperson told WME in a statement that the pilot was a success and they are now assessing full- scale options. A paper to Enviro 2012anticipated a full-scale plant at Bolivar would create operational savings of $650

  4. Wastewater treatment models

    DEFF Research Database (Denmark)

    Gernaey, Krist; Sin, Gürkan

    2011-01-01

    description of biological phosphorus removal, physicalchemical processes, hydraulics and settling tanks. For attached growth systems, biofilm models have progressed from analytical steady-state models to more complex 2D/3D dynamic numerical models. Plant-wide modeling is set to advance further the practice......The state-of-the-art level reached in modeling wastewater treatment plants (WWTPs) is reported. For suspended growth systems, WWTP models have evolved from simple description of biological removal of organic carbon and nitrogen in aeration tanks (ASM1 in 1987) to more advanced levels including...

  5. Wastewater Treatment Models

    DEFF Research Database (Denmark)

    Gernaey, Krist; Sin, Gürkan

    2008-01-01

    description of biological phosphorus removal, physical–chemical processes, hydraulics, and settling tanks. For attached growth systems, biofilm models have progressed from analytical steady-state models to more complex 2-D/3-D dynamic numerical models. Plant-wide modeling is set to advance further......The state-of-the-art level reached in modeling wastewater treatment plants (WWTPs) is reported. For suspended growth systems, WWTP models have evolved from simple description of biological removal of organic carbon and nitrogen in aeration tanks (ASM1 in 1987) to more advanced levels including...

  6. Caffeine in an Urbanized Estuary: Past and Present Influence of Wastewater Effluents in Boston Harbor, MA, USA

    Science.gov (United States)

    Caffeine has been identified by previous research as a potential tracer of sanitary wastewater. To further assess the utility of caffeine as a tracer of wastewater sources, samples from 25 sites throughout Boston Harbor were collected and analyzed for caffeine by LC-MS/MS. Caff...

  7. Viability of increasing the tariff of freshwater for irrigation as a tool to stimulate wastewater reuse in the MENA region

    NARCIS (Netherlands)

    Abu-Madi, M.; Al-Sa'ed, R.; Braadbaart, O.D.; Alaerts, G.

    2008-01-01

    Despite water scarcity and high agricultural water demand in the Middle East and North Africa region, substantial proportions of treated wastewater are discharged into the environment and seas without proper utilization. All countries of the region, low pricing of reclaimed wastewater is a common

  8. Disinfection of wastewaters: high-energy electron vs gamma irradiation

    Energy Technology Data Exchange (ETDEWEB)

    Farooq, S [King Fahd Univ. of Petroleum and Minerals, Dhahran (Saudi Arabia). Dept. of Civil Engineering; Kurucz, C N; Waite, T D [Miami Univ., Coral Gables, FL (United States); Cooper, W J [Florida International Univ., Miami, FL (United States). Drinking Water Research Center

    1993-07-01

    A study was undertaken to examine the sensitivity of a wastewater population of coliphage, total coliforms and total flora present in raw sewage and secondary effluent after irradiating with similar doses delivered by a high-energy electron beam and [gamma]-radiation. The electron beam study was conducted on a large scale at the Virginia Key Wastewater Treatment Plant, Miami, Florida. The facility is equipped with a 1.5 MeV, 50 mA electron accelerator, with a wastewater flow rate of 8ls[sup -1]. Concurrent [gamma]-radiation studies were conducted at laboratory scale using a 5000 Ci, [sup 60]Co [gamma]-source. Three logs reduction of all three test organisms were observed at an electron beam dose of 500 krads, while at least four logs reduction were observed at the same dose utilizing the [gamma]'source. (Author).

  9. Stripping of organic compounds from wastewater as an auxiliary fuel of regenerative thermal oxidizer

    International Nuclear Information System (INIS)

    Chang, Meng-Wen; Chern, Jia-Ming

    2009-01-01

    Organic solvents with different volatilities are widely used in various processes and generate air and water pollution problems. In the cleaning processes of electronics industries, most volatile organic compounds (VOCs) are vented to air pollution control devices while most non-volatile organic solvents dissolve in the cleaning water and become the major sources of COD in wastewater. Discharging a high-COD wastewater stream to wastewater treatment facility often disturbs the treatment performance. A pretreatment of the high-COD wastewater is therefore highly desirable. This study used a packed-bed stripping tower in combination with a regenerative thermal oxidizer to remove the COD in the wastewater from a printed circuit board manufacturing process and to utilize the stripped organic compounds as the auxiliary fuel of the RTO. The experimental results showed that up to 45% of the COD could be removed and 66% of the RTO fuel could be saved by the combined treatment system.

  10. Decomposition of colored wastewater for recycling water by gamma-ray irradiation

    International Nuclear Information System (INIS)

    Tanabe, Hiroko; Sekiguchi, Masayuki; Sawai, Teruko

    1995-01-01

    Utilization of advanced treated water from wastewater treatment plants for the restoration of waterway is in progress to improve the waterside environment. However, the colored wastewater containing molasses pigments, melanoidins, is not decolorized by activated sludge process, and the water can not be applied for recycling water. We have studied the radiation treatment for decolorization of wastewater discharged from baker's yeast factory. The decolorization after decomposition of colored biorefractory organic substances in wastewater, enhancement in biodegradability and effective decrease in values of COD were observed after gammaray irradiation. Although the decrease in values of COD was observed, however chromaticity was not improved after the combined treatment of wastewater by radiation together with activated sludge. The result suggests that it is necessary to find the optimum conditions for stimulation of sludge in the combined treatment. (author)

  11. Advanced unambiguous state discrimination attack and countermeasure strategy in a practical B92 QKD system

    Science.gov (United States)

    Ko, Heasin; Choi, Byung-Seok; Choe, Joong-Seon; Youn, Chun Ju

    2018-01-01

    Even though unconditional security of B92 quantum key distribution (QKD) system is based on the assumption of perfect positive-operator-valued measures, practical B92 systems only utilize two projective measurements. Unfortunately, such implementation may degrade the security of the B92 QKD system due to Eve's potential attack exploiting the imperfection of system. In this paper, we propose an advanced attack strategy with an unambiguous state discrimination (USD) measurement which makes practical B92 QKD systems insecure even under a lossless channel. In addition, we propose an effective countermeasure against the advanced USD attack model by monitoring double-click events. We further address a fundamental approach to make the B92 QKD system tolerable to attack strategies with USD measurements using a multi-qubit scheme.

  12. Content modification attacks on consensus seeking multi-agent system with double-integrator dynamics

    Science.gov (United States)

    Dong, Yimeng; Gupta, Nirupam; Chopra, Nikhil

    2016-11-01

    In this paper, vulnerability of a distributed consensus seeking multi-agent system (MAS) with double-integrator dynamics against edge-bound content modification cyber attacks is studied. In particular, we define a specific edge-bound content modification cyber attack called malignant content modification attack (MCoMA), which results in unbounded growth of an appropriately defined group disagreement vector. Properties of MCoMA are utilized to design detection and mitigation algorithms so as to impart resilience in the considered MAS against MCoMA. Additionally, the proposed detection mechanism is extended to detect the general edge-bound content modification attacks (not just MCoMA). Finally, the efficacies of the proposed results are illustrated through numerical simulations.

  13. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  14. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  15. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  16. Acid Pretreatment of Sago Wastewater for Biohydrogen Production

    Science.gov (United States)

    Illi Mohamad Puad, Noor; Rahim, Nurainin Farhan Abd; Suhaida Azmi, Azlin

    2018-03-01

    Biohydrogen has been recognized to be one of the future renewable energy sources and has the potential in solving the greenhouse effects. In this study, Enterobacter aerogenes (E. aerogenes) was used as the biohydrogen producer via dark fermentation process using sago wastewater as the substrate. However, pretreatment of sago wastewater is required since it consists of complex sugars that cannot be utilized directly by the bacteria. This study aimed to use acid pretreatment method to produce high amount of glucose from sago wastewater. Three different types of acid: sulfuric acid (H2SO4); hydrochloric acid (HCl) and nitric acid (HNO3) were screened for the best acid in producing a maximum amount of glucose. H2SO4 gave the highest amount of glucose which was 9.406 g/L. Design of experiment was done using Face-centred Central Composite Design (FCCCD) tool under Response Surface Methodology (RSM) in Design Expert 9 software. The maximum glucose (9.138 g/L) was recorded using 1 M H2SO4 at 100 °C for 60 min. A batch dark fermentation using E. aerogenes was carried out and it was found that pretreated sago wastewater gave a higher hydrogen concentration (1700 ppm) compared to the raw wastewater (410 ppm).

  17. Neutralization of wastewater from nitrite passivation

    International Nuclear Information System (INIS)

    Pawlowski, L.; Mientki, B.; Wasag, H.

    1982-01-01

    A method for neutralization of wastewater formed in nitrite passivation has been presented. The method consists of introducing urea into wastewater and acidifying it with sulphuric acid. Wastewater is neutralized with lime. After clarification, wastewater can be drained outside the plant

  18. Sustainable management of leakage from wastewater pipelines.

    Science.gov (United States)

    DeSilva, D; Burn, S; Tjandraatmadja, G; Moglia, M; Davis, P; Wolf, L; Held, I; Vollertsen, J; Williams, W; Hafskjold, L

    2005-01-01

    Wastewater pipeline leakage is an emerging concern in Europe, especially with regards to the potential effect of leaking effluent on groundwater contamination and the effects infiltration has on the management of sewer reticulation systems. This paper describes efforts by Australia, in association with several European partners, towards the development of decision support tools to prioritize proactive rehabilitation of wastewater pipe networks to account for leakage. In the fundamental models for the decision support system, leakage is viewed as a function of pipeline system deterioration. The models rely on soil type identification across the service area to determine the aggressiveness of the pipe environment and for division of the area into zones based on pipe properties and operational conditions. By understanding the interaction between pipe materials, operating conditions, and the pipe environment in the mechanisms leading to pipe deterioration, the models allow the prediction of leakage rates in different zones across a network. The decision support system utilizes these models to predict the condition of pipes in individual zones, and to optimize the utilization of rehabilitation resources by targeting the areas with the highest leakage rates.

  19. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  20. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  1. Energy-neutral sustainable nutrient recovery incorporated with the wastewater purification process in an enlarged microbial nutrient recovery cell

    Science.gov (United States)

    Sun, Dongya; Gao, Yifan; Hou, Dianxun; Zuo, Kuichang; Chen, Xi; Liang, Peng; Zhang, Xiaoyuan; Ren, Zhiyong Jason; Huang, Xia

    2018-04-01

    Recovery of nutrient resources from the wastewater is now an inevitable strategy to maintain the supply of both nutrient and water for our huge population. While the intensive energy consumption in conventional nutrient recovery technologies still remained as the bottleneck towards the sustainable nutrient recycle. This study proposed an enlarged microbial nutrient recovery cell (EMNRC) which was powered by the energy contained in wastewater and achieved multi-cycle nutrient recovery incorporated with in situ wastewater treatment. With the optimal recovery solution of 3 g/L NaCl and the optimal volume ratio of wastewater to recovery solution of 10:1, >89% of phosphorus and >62% of ammonium nitrogen were recovered into struvite. An extremely low water input ratio of water. It was proved the EMNRC system was a promising technology which could utilize the chemical energy contained in wastewater itself and energy-neutrally recover nutrient during the continuous wastewater purification process.

  2. YET ANOTHER ATTACK ON WAGES AND CONDITIONS.

    Science.gov (United States)

    McCarthy, Andrew

    2016-10-01

    An unobjectionable-sounding title obscures the real intent of the latest in a series of Bills which the federal Coalition government is attempting to legislate in its ongoing attempts to undermine employee wages and conditions and attack unions.

  3. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  4. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  5. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  6. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  7. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  8. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  9. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication...

  10. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  11. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  12. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  13. Factors affecting reuse of wastewater

    Energy Technology Data Exchange (ETDEWEB)

    Haraszti, L

    1981-01-01

    Changing the quality of circulating water, raising the effectiveness of sedimentation, examples of biological treatment of wastewater are presented. The necessity of continuing the studies on biological treatment of wastewater is demonstrated. It is considered useful to define the importance of KhPK and BP5 in each case. During biological treatment in ponds, to define the relation BPK5:N:P, research on conditions for nutrient removal must be done. To do this, as well as decrease the significance of KhPK, a mathematical model for defining the effectiveness of biological treatment of wastewater and consequently their reuse must be developed.

  14. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  15. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  16. Protecting mobile agents from external replay attacks

    OpenAIRE

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles, Sergi; Borrell Viader, Joan

    2014-01-01

    Peer-reviewed This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solut...

  17. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  18. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  19. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  20. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  1. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  2. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  3. Engineered nanoparticles in wastewater and wastewater sludge - Evidence and impacts

    International Nuclear Information System (INIS)

    Brar, Satinder K.; Verma, Mausam; Tyagi, R.D.; Surampalli, R.Y.

    2010-01-01

    Nanotechnology has widespread application in agricultural, environmental and industrial sectors ranging from fabrication of molecular assemblies to microbial array chips. Despite the booming application of nanotechnology, there have been serious implications which are coming into light in the recent years within different environmental compartments, namely air, water and soil and its likely impact on the human health. Health and environmental effects of common metals and materials are well-known, however, when the metals and materials take the form of nanoparticles - consequential hazards based on shape and size are yet to be explored. The nanoparticles released from different nanomaterials used in our household and industrial commodities find their way through waste disposal routes into the wastewater treatment facilities and end up in wastewater sludge. Further escape of these nanoparticles into the effluent will contaminate the aquatic and soil environment. Hence, an understanding of the presence, behavior and impact of these nanoparticles in wastewater and wastewater sludge is necessary and timely. Despite the lack of sufficient literature, the present review attempts to link various compartmentalization aspects of the nanoparticles, their physical properties and toxicity in wastewater and wastewater sludge through simile drawn from other environmental streams.

  4. Wastewater treatment by flotation

    Directory of Open Access Journals (Sweden)

    F.P. Puget

    2000-12-01

    Full Text Available This work deals with the performance analysis of a separation set-up characterized by the ejector-hydrocyclone association, applied in the treatment of a synthetic dairy wastewater effluent. The results obtained were compared with the results from a flotation column (cylindrical body of a hydrocyclone operated both batch and continuously. As far as the experimental set-up studied in this work and the operating conditions imposed to the process, it is possible to reach a 25% decrease in the total effluent chemical oxygen demand (COD. This corresponds approximately to 60% of the COD of the material in suspension. The best results are obtained for ratios air flow rate-feed flow rate (Qair/Q L greater then 0.15 and for ratios underflow rate-overflow rate (Qu/Qo lower than 1.0.

  5. Modelling of wastewater systems

    DEFF Research Database (Denmark)

    Bechmann, Henrik

    to analyze and quantify the effect of the Aeration Tank Settling (ATS) operating mode, which is used during rain events. Furthermore, the model is used to propose a control algorithm for the phase lengths during ATS operation. The models are mainly formulated as state space model in continuous time......In this thesis, models of pollution fluxes in the inlet to 2 Danish wastewater treatment plants (WWTPs) as well as of suspended solids (SS) concentrations in the aeration tanks of an alternating WWTP and in the effluent from the aeration tanks are developed. The latter model is furthermore used...... at modelling the fluxes in terms of the multiple correlation coefficient R2. The model of the SS concentrations in the aeration tanks of an alternating WWTP as well as in the effluent from the aeration tanks is a mass balance model based on measurements of SS in one aeration tank and in the common outlet...

  6. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  7. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  8. A review on wastewater disinfection

    OpenAIRE

    Mohammad Mehdi Amin; Hassan Hashemi; Amir Mohammadi Bovini; Yung Tse Hung

    2013-01-01

    Changes in regulations and development of new technologies have affected the selection of alternative for treated wastewater disinfection. Disinfection is the last barrier of wastewater reclamation process to protect ecosystem safety and human health. Driving forces include water scarcity and drinking water supply, irrigation, rapid industrialization, using reclaimed water, source protection, overpopulation, and environmental protection. The safe operation of water reuse depends on effluent d...

  9. Opportunities and Challenges for Water and Wastewater Industries to Provide Exchangeable Services

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, Bethany [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hunsberger, Randolph [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2015-11-13

    Water and wastewater treatment plants and distribution systems use significant amounts of energy, around 2 - 4% of the total electricity used in the US, and their energy use is projected to increase as populations increase and regulations become more stringent. Water and wastewater systems have largely been disconnected from the electric utilities' efforts to improve energy efficiency and provide energy efficiency and provide grid services, likely because their core mission is to provide clean water and treated wastewater. Energy efficiency has slowly crept into the water and wastewater industry as the economic benefit has become more apparent, but there is still potential for significant improvement. Some of the larger, more progressive water utilities are starting to consider providing grid services; however, it remains a foreign concept to many. This report explores intrinsic mechanisms by which the water and wastewater industries can provide exchangeable services, the benefit to the parties involved, and the barriers to implementation. It also highlights relevant case studies and next steps. Although opportunities for increasing process efficiencies are certainly available, this report focuses on the exchangeable services that water and wastewater loads can provide to help maintain grid reliability, keep overall costs down, and increase the penetration of distributed renewables on the electric grid. These services have potential to provide water utilities additional value streams, using existing equipment with modest or negligible upgrade cost.

  10. Efficacies of Various Anaerobic Starter Seeds for Biogas Production from Different Types of Wastewater

    Directory of Open Access Journals (Sweden)

    Pawinee Chaiprasert

    2017-01-01

    Full Text Available Various anaerobic starter seeds from different sources were investigated for their efficacies in treatment of different types of wastewater. Six combinations of starter seeds and wastewaters were selected out of 25 combination batch experiments and operated in semicontinuous reactors. It was noticed that the efficacies of various anaerobic starter seeds for biogas production from different types of wastewater in terms of reactor performance and stability were depended on wastewater characteristics and F/M ratio affecting microbial community and their microbial activities. However, exogenous starter seed can be used across different types of wastewater with or without acclimatization. Four reactors reached the targeted OLR of 2 kg COD/m3·d with high performance and stability except for concentrated rubber wastewater (RBw, even using high active starter seeds of cassava starch (CSs and palm oil (POs. The toxic compounds in RBw such as ammonia and sulfate might also adversely affect methanogenic activity in CSsRBw and POsRBw reactors. DGGE analysis showed that propionate utilizers, Smithella propionica strain LYP and Syntrophus sp., were detected in all samples. For Archaea domain, methylotrophic, hydrogenotrophic, and acetoclastic methanogens were also detected. Syntrophic relationships were assumed between propionate utilizers and methanogens as acetate/H2 producers and utilizers, respectively.

  11. Anti-spoofing for display and print attacks on palmprint verification systems

    Science.gov (United States)

    Kanhangad, Vivek; Bhilare, Shruti; Garg, Pragalbh; Singh, Pranjalya; Chaudhari, Narendra

    2015-05-01

    A number of approaches for personal authentication using palmprint features have been proposed in the literature, majority of which focus on improving the matching performance. However, of late, preventing potential attacks on biometric systems has become a major concern as more and more biometric systems get deployed for wide range of applications. Among various types of attacks, sensor level attack, commonly known as spoof attack, has emerged as the most common attack due to simplicity in its execution. In this paper, we present an approach for detection of display and print based spoof attacks on palmprint verifcation systems. The approach is based on the analysis of acquired hand images for estimating surface re ectance. First and higher order statistical features computed from the distributions of pixel intensities and sub-band wavelet coeefficients form the feature set. A trained binary classifier utilizes the discriminating information to determine if the acquired image is of real hand or a fake one. Experiments are performed on a publicly available hand image dataset, containing 1300 images corresponding to 230 subjects. Experimental results show that the real hand biometrics samples can be substituted by the fake digital or print copies with an alarming spoof acceptance rate as high as 79.8%. Experimental results also show that the proposed spoof detection approach is very effective for discriminating between real and fake palmprint images. The proposed approach consistently achieves over 99% average 10-fold cross validation classification accuracy in our experiments.

  12. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  13. Synergistic effects of irradiation of waste-water

    International Nuclear Information System (INIS)

    Woodbridge, D.D.

    1975-01-01

    Water is an absolute necessity for all forms of animal and plant life. As man's requirements for water increase, the need for better methods of purification also increase. Technology has been slow to develop new methods of water treatment for the direct utilization of waste-water. Many new construction projects are at a standstill because waste-water treatment methods have not been developed to handle adequately the ever-increasing flow of sewage. Theoretical considerations of the use of high-level radiation in the treatment of waste-water have failed to consider the effects of the hydrated electron, and the potential of the possible synergistic effects of combining chlorine, oxygen and irradiation. An extensive testing programme at the University Center for Pollution Research of the Florida Institute of Technology over the past four years has shown that irradiation of waste-water samples immersed in an aqueous environment provide bacterial kill and reduction in organic pollution far greater than that obtained from theoretical considerations of G values and earlier experiments where the waste samples were not immersed in an aqueous environment. These testing programmes have investigated the synergistic effects of combining oxygen and irradiation. Each of these combined treatments resulted in an increased bacterial kill factor. Tests on Staphylococcus aureus bacteria and faecal streptococcus bacteria indicate that the synergistic effects observed for faecal coliform bacteria also apply to the pathogenic bacteria. A statistical analysis of the data obtained shows the relationships between the various effects on the bacteria. A definite shielding factor from the turbidity of the waste-water has been shown to exist. Synergistic effects have been shown to offset significantly the shielding effects. Optimization of these synergistic effects can greatly increase the effectiveness of irradiation in the treatment of waste-water. (author)

  14. Supported graphene oxide hollow fibre membrane for oily wastewater treatment

    Science.gov (United States)

    Othman, Nur Hidayati; Alias, Nur Hashimah; Shahruddin, Munawar Zaman; Hussein, Siti Nurliyana Che Mohamed; Dollah, Aqilah

    2017-12-01

    Oil and gas industry deals with a large amount of undesirable discharges of liquid, solid, and gaseous wastes and the amounts can considerably change during the production phases. Oilfield wastewater or produced water is known to constitute various organic and inorganic components. Discharging the produced water can pollute surface and underground water and therefore the necessity to treat this oily wastewater is an inevitable challenge. The current technologies for the treatment of this metastable oil-in-water are not really effective and very pricey. As a result, there is a great interest from many parties around the world in finding cost-effective technologies. In recent years, membrane processes have been utilized for oily wastewater treatment. In these work, a graphene oxide membrane supported on a highly porous Al2O3 hollow fibre was prepared using vacuum assisted technique and its performance in treating oily wastewater was investigated. Graphene oxide (GO) was prepared using a modified Hummer's method and further characterized using XRD, FTIR, TGA and SEM. The results showed that the GO was successfully synthesized. The GO membrane was deposited on alumina hollow fibre substrates. The membrane performance was then investigated using dead-end filtration setup with synthetic oily wastewater as a feed. The effects of operating times on rejection rate and permeate flux were investigated. The experimental results showed that the oil rejections were over 90%. It was concluded that the supported GO membrane developed in this study may be considered feasible in treating oily wastewater. Detail study on the effects of transmembrane pressure, oil concentration, pH and fouling should be carried out in the future

  15. Pareto utility

    NARCIS (Netherlands)

    Ikefuji, M.; Laeven, R.J.A.; Magnus, J.R.; Muris, C.H.M.

    2013-01-01

    In searching for an appropriate utility function in the expected utility framework, we formulate four properties that we want the utility function to satisfy. We conduct a search for such a function, and we identify Pareto utility as a function satisfying all four desired properties. Pareto utility

  16. Identifying Risk of Future Asthma Attacks Using UK Medical Record Data: A Respiratory Effectiveness Group Initiative.

    Science.gov (United States)

    Blakey, John D; Price, David B; Pizzichini, Emilio; Popov, Todor A; Dimitrov, Borislav D; Postma, Dirkje S; Josephs, Lynn K; Kaplan, Alan; Papi, Alberto; Kerkhof, Marjan; Hillyer, Elizabeth V; Chisholm, Alison; Thomas, Mike

    Asthma attacks are common, serious, and costly. Individual factors associated with attacks, such as poor symptom control, are not robust predictors. We investigated whether the rich data available in UK electronic medical records could identify patients at risk of recurrent attacks. We analyzed anonymized, longitudinal medical records of 118,981 patients with actively treated asthma (ages 12-80 years) and 3 or more years of data. Potential risk factors during 1 baseline year were evaluated using univariable (simple) logistic regression for outcomes of 2 or more and 4 or more attacks during the following 2-year period. Predictors with significant univariable association (P attacks included baseline-year markers of attacks (acute oral corticosteroid courses, emergency visits), more frequent reliever use and health care utilization, worse lung function, current smoking, blood eosinophilia, rhinitis, nasal polyps, eczema, gastroesophageal reflux disease, obesity, older age, and being female. The number of oral corticosteroid courses had the strongest association. The final cross-validated models incorporated 19 and 16 risk factors for 2 or more and 4 or more attacks over 2 years, respectively, with areas under the curve of 0.785 (95% CI, 0.780-0.789) and 0.867 (95% CI, 0.860-0.873), respectively. Routinely collected data could be used proactively via automated searches to identify individuals at risk of recurrent asthma attacks. Further research is needed to assess the impact of such knowledge on clinical prognosis. Copyright © 2016 American Academy of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.

  17. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  18. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  19. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  20. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  1. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  2. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  3. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  4. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  5. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  6. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  7. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  8. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  9. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  10. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  11. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property...

  12. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  13. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  14. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  15. Removal of Arsenic from Wastewaters by Airlift Electrocoagulation: Part 3: Copper Smelter Wastewater Treatment

    DEFF Research Database (Denmark)

    Hansen, H.K.; Ottosen, Lisbeth M.

    2010-01-01

    The arsenic content in wastewater is of major concern for copper smelters. A typical complex wastewater treatment is needed with a combination of chemical and physical processes. Electrocoagulation (EC) has shown its potential for arsenic removal due to the formation of ferric hydroxide-arsenate ...... threshold value for wastewater discharge could rapidly be reached when the conventional method did not clean the wastewater sufficiently....

  16. Water brief-WDM & wastewater reuse

    International Development Research Centre (IDRC) Digital Library (Canada)

    aalfouns

    Wastewater Reuse for Water Demand Management in the Middle East and ... Among the substantial WDM tools in MENA is the use of wastewater to reduce the pressure on scarce freshwater .... recycled water to irrigate crops with associated ...

  17. Management and Planning for Small Community Wastewater

    Science.gov (United States)

    Operators Small Systems Management and Planning for Small Community Wastewater The NESC has provided of Clean Water Agencies (NACWA) Achieving Environmental Excellence: An Environmental Management Agencies, The Office of Wastewater Management at EPA, in cooperation with the Global Environment and

  18. Properties of Concrete Mixes with Carwash Wastewater

    Directory of Open Access Journals (Sweden)

    Shahidan Shahiron

    2017-01-01

    Full Text Available The rapid growth of the car wash industry today results in the need for wastewater reclamation. Thus, this paper aims to investigate the effect of using car wash wastewater on concrete properties in terms of mechanical properties. The basic characteristics of wastewater were investigated according to USEPA (Method 150.1 & 3 00.0 while the mechanical properties of concrete with car wash wastewater were compared according to ASTM C1602 and BS EN 1008 standards. In this research, the compressive strength, modulus of elasticity and tensile strength were studied. The percentages of wastewater replaced in the concrete mix ranged from 0% up to 40%. In addition, the results also suggest that the concrete with 20% car wash wastewater achieved the highest compressive strength and modulus of elasticity compared to other compositions of wastewater. Moreover, the results also recommended that concrete mixed with car wash wastewater has better compressive strength compared to conventional concrete.

  19. SEM analysis of particle size during conventional treatment of CMP process wastewater

    International Nuclear Information System (INIS)

    Roth, Gary A.; Neu-Baker, Nicole M.; Brenner, Sara A.

    2015-01-01

    Engineered nanomaterials (ENMs) are currently employed by many industries and have different physical and chemical properties from their bulk counterparts that may confer different toxicity. Nanoparticles used or generated in semiconductor manufacturing have the potential to enter the municipal waste stream via wastewater and their ultimate fate in the ecosystem is currently unknown. This study investigates the fate of ENMs used in chemical mechanical planarization (CMP), a polishing process repeatedly utilized in semiconductor manufacturing. Wastewater sampling was conducted throughout the wastewater treatment (WWT) process at the fabrication plant's on-site wastewater treatment facility. The goal of this study was to assess whether the WWT processes resulted in size-dependent filtration of particles in the nanoscale regime by analyzing samples using scanning electron microscopy (SEM). Statistical analysis demonstrated no significant differences in particle size between sampling points, indicating low or no selectivity of WWT methods for nanoparticles based on size. All nanoparticles appeared to be of similar morphology (near-spherical), with a high variability in particle size. EDX verified nanoparticles composition of silicon- and/or aluminum-oxide. Nanoparticle sizing data compared between sampling points, including the final sampling point before discharge from the facility, suggested that nanoparticles could be released to the municipal waste stream from industrial sources. - Highlights: • The discrete treatments of a semiconductor wastewater treatment system were examined. • A sampling scheme and method for analyzing nanoparticles in wastewater was devised. • The wastewater treatment process studied is not size-selective for nanoparticles

  20. Precious Metals Recovery from Electroplating Wastewater: A Review

    Science.gov (United States)

    Azmi, A. A.; Jai, J.; Zamanhuri, N. A.; Yahya, A.

    2018-05-01

    Metal bearing electroplating wastewater posts great health and environmental concerns, but could also provide opportunities for precious and valuable metal recovery, which can make the treatment process more cost-effective and sustainable. Current conventional electroplating wastewater treatment and metal recovery methods include chemical precipitation, coagulation and flocculation, ion exchange, membrane filtration, adsorption, electrochemical treatment and photocatalysis. However, these physico-chemical methods have several disadvantages such as high initial capital cost, high operational cost due to expensive chemical reagents and electricity supply, generation of metal complexes sludge which requires further treatment, ineffective in diluted and/or concentrated wastewater, low precious metal selectivity, and slow recovery process. On the other hand, metal bio-reduction assisted by bioactive phytochemical compounds extracted from plants and plant parts is a new found technology explored by several researchers in recent years aiming to recover precious and valuable metals from secondary sources mainly industrial wastewater by utilizing low-cost and eco-friendly biomaterials as reagents. Extract of plants contains polyphenolic compounds which have great antioxidant properties and reducing capacities, able to reduce metal ions into zerovalent metal atoms and stabilize the metal particles formed. This green bio-recovery method has a value added in their end products since the metals are recovered in nano-sized particles which are more valuable and have high commercial demand in other fields ranging from electrochemistry to medicine.

  1. Phenol Removal from Industrial Wastewater by HRP Enzyme

    Directory of Open Access Journals (Sweden)

    Iran Alemzadeh

    2009-01-01

    Full Text Available In this research, horseradish peroxidase for phenol removal was utilized. First, the process was studied at the laboratory scale using a synthetic phenol solution (1-10 mM. Results showed that horseradish peroxidase (HRP could effectively remove phenolic compounds from wastewater and that the catalytic capability of the enzyme was maintained for a wide range of pH, temperature, and aromatic concentration levels. The performance conditions were optimized for at lease 95% and 100% removal of phenolic compounds for both actual and synthetic wastewaters under high and low phenol concentrations (1 and 10 mM. The phenolic wastewater used was an olive mill effluent with a phenol concentration of 1221 mg/L (13 mM and a pH value of 3.5. At the end of the reaction, the phenolic compounds changed to insoluble polymers and precipitated. Each enzyme/wastewater system was optimized for the following chemical dosages: hydrogen peroxide, enzyme, polyethylene glycol (PEG, and buffer. Furthermore, the reaction time to achieve at least 95% phenol removal was determined. According to the results, COD and BOD reduced to 58% and 78%, respectively. Experimental results showed an increase in H2O2 concentration beyond the optimum dose resulting from enzyme inactivation, thus reducing the phenol removal efficiency. On the other hand, increasing the enzyme, PEG, and/or reaction time beyond the optimum values resulted in only a marginal increase in removal efficiency.

  2. Kinetic coefficients for the biological treatment of tannery wastewater

    International Nuclear Information System (INIS)

    Haydar, S.

    2008-01-01

    Determination of kinetic coefficients for a particular wastewater is imperative for the rational design of biological treatment-facilities. The present study was undertaken with the objective of finding out kinetic coefficients for tannery wastewater. A bench-scale model of aerated lagoon, consisting of an aeration tank and final clarifier, was use to conduct the studies. The model was operated continuously for 96 days, by varying the detention times from 3 to 9 days. Influent for the aerated lagoon was settled tannery wastewater. Biochemical oxygen demand (BOD) of the influent and effluent and the mixed-liquor suspended solids (MLSS) of aeration tank were determined at various detention-times so as to generate data for kinetic coefficients. The kinetic coefficients k, Ks, Y and Ed were found to be 3.125 day/sup -1/, 488 mg/L, 0.64 and 0.035 day/sup -1/ respectively. Overall rate-constant of BOD, removal 'K' was also determined and was found to be 1.43 day/sup -1/. Kinetic coefficients were determined, at mean reactor-temperature of 30.2 degree C. These coefficients may be utilized for the design of biological-treatment facilities for tannery wastewater. (author)

  3. Advanced oxidation-based treatment of furniture industry wastewater.

    Science.gov (United States)

    Tichonovas, Martynas; Krugly, Edvinas; Grybauskas, Arturas; Jankūnaitė, Dalia; Račys, Viktoras; Martuzevičius, Dainius

    2017-07-16

    The paper presents a study on the treatment of the furniture industry wastewater in a bench scale advanced oxidation reactor. The researched technology utilized a simultaneous application of ozone, ultraviolet radiation and surface-immobilized TiO 2 nanoparticle catalyst. Various combinations of processes were tested, including photolysis, photocatalysis, ozonation, catalytic ozonation, photolytic ozonation and photocatalytic ozonation were tested against the efficiency of degradation. The efficiency of the processes was primarily characterized by the total organic carbon (TOC) analysis, indicating the remaining organic material in the wastewater after the treatment, while the toxicity changes in wastewater were researched by Daphnia magna toxicity tests. Photocatalytic ozonation was confirmed as the most effective combination of processes (99.3% of TOC reduction during 180 min of treatment), also being the most energy efficient (4.49-7.83 MJ/g). Photocatalytic ozonation and photolytic ozonation remained efficient across a wide range of pH (3-9), but the pH was an important factor in photocatalysis. The toxicity of wastewater depended on the duration of the treatment: half treated water was highly toxic, while fully treated water did not possess any toxicity. Our results indicate that photocatalytic ozonation has a high potential for the upscaling and application in industrial settings.

  4. Utilization of fungi for biotreatment of raw wastewaters | Coulibaly ...

    African Journals Online (AJOL)

    However, the detoxification rates seem to be dependent on media and culture conditions. The postreatement by anaerobic bioprocesses of effluents that have been pretreated with fungi can lead to higher biogas than the original effluents. In addition to the degradation of organic pollutants, fungi produce added-value ...

  5. Estimation of EuroQol 5-Dimensions health status utility values in hereditary angioedema

    DEFF Research Database (Denmark)

    Aygören-Pürsün, Emel; Bygum, Anette; Beusterien, Kathleen

    2016-01-01

    OBJECTIVE: To estimate health status utility (preference) weights for hereditary angioedema (HAE) during an attack and between attacks using data from the Hereditary Angioedema Burden of Illness Study in Europe (HAE-BOIS-Europe) survey. Utility measures quantitatively describe the net impact of a...

  6. Wastewater Treatment Energy Recovery Potential For Adaptation To Global Change: An Integrated Assessment

    Science.gov (United States)

    Breach, Patrick A.; Simonovic, Slobodan P.

    2018-04-01

    Approximately 20% of wastewaters globally do not receive treatment, whereas wastewater discharges are projected to increase, thereby leading to excessive water quality degradation of surface waters on a global scale. Increased treatment could help alleviate water quality issues by constructing more treatment plants; however, in many areas there exist economic constraints. Energy recovery methods including the utilization of biogas and incineration of biosolids generated during the treatment process may help to alleviate treatment costs. This study explores the potential for investments in energy recovery from wastewater to increase treatment levels and thus improve surface water quality. This was done by examining the relationships between nutrient over-enrichment, wastewater treatment, and energy recovery at a global scale using system dynamics simulation as part of the ANEMI integrated assessment model. The results show that a significant amount of energy can be recovered from wastewater, which helps to alleviate some of the costs of treatment. It was found that wastewater treatment levels could be increased by 34%, helping to offset the higher nutrient loading from a growing population with access to improved sanitation. The production of renewable natural gas from biogas was found to have the potential to prolong the depletion of natural gas resources used to produce electricity and heat. It is recommended that agricultural nutrient discharges be better managed to help reduce nutrient over-enrichment on global scale. To increase the utility of the simulation, a finer spatial scale should be used to consider regional treatment, economic, and water quality characteristics.

  7. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  8. Understanding farmers' preferences for wastewater reuse ...

    African Journals Online (AJOL)

    Wastewater has emerged as an alternative source of water. Since the agricultural sector remains the largest water user world-wide, it is the main potential user of treated wastewater. However, while there are trade-offs in using wastewater, it may be the only option in water scarce regions. South Africa has included water ...

  9. ELECTRICITY GENERATION FROM SWINE WASTEWATER USING MICROBIAL FUEL CELL

    Directory of Open Access Journals (Sweden)

    Chimezie Jason Ogugbue

    2015-11-01

    Full Text Available Electricity generation from swine wastewater using microbial fuel cell (MFC was investigated. Swine wastewater was collected into dual-chambered (aerobic and anaerobic fuel cell. The maximum power output using copper and carbon electrodes were 250.54 and 52.33 µW, while 10.0 and 5.0 cm salt bridge length between the cathode and anode were 279.50 and 355.26 µW, respectively. Potassium permanganate and ordinal water gave a maximum power output of 1287.8 and 13 9.18 µW. MFCs utilize microbial communities to degrade organic materials found within wastewater and converted stored chemical energy to electrical energy in a single step. The initial bacterial and fungal counts were 7.4×106 and 1.1×103 CFU ml-1. Bacterial counts steadily increased with time to 1.40×107 CFU ml-1 while fungal count declined to 4.4×106 CFU ml-1 after day 60. The declined in microbial counts may be attributed to the time necessary for acclimatization of microbes to the anode. The genera identified were Bacillus, Citrobacter, Pseudomonas, Lactobacillus, Escherichia coli, Aspergillus and Rhizopus. These microbes acted as primary and secondary utilizers, utilizing carbon and other organics of the wastewater. Chemical parameters indicated that the biochemical oxygen demand ranged from 91.4–23.2 mg/L, giving 75% while the chemical oxygen demand ranged from 243.1–235.2 mg/L, representing 3.3%. Although, the metabolic activities of microbes were responsible for the observed degradation, leading to electricity, the overall power output depended on the distance between the anode and cathode compartment, types of electrode materials and mediators and oxygen reaction at the cathode.

  10. Quantum leap for treating wastewaters

    International Nuclear Information System (INIS)

    Wallace, Paula

    2012-01-01

    Full text: For many Australian food manufacturers there is increasing pressure from government agencies to reach higher standards of wastewater treatment for environmental discharge. In fact, throughout the western wolrd industrual water users are facing a similar challenge. One of the big problems is ageing pipe networks, particularly sewage pipes. Also, industrial wastewaters with high sugar-nutrient loads can cause serious damage to pipelines. This is because fermentation occurs within the wastewater, eroding and degrading the pipes, causing numerous cracks and fractures. This in turn leads to water ingress, which puts a strain on treatment plants because of the higher volume of water, especially in wet weather. Food manufacturing produces large volumes of mostly biodegradable liquid and solid waste. Wastewaters released from food manufacturing can be 'muddy', with high concentrations of suspended solids, fats, oils and grease (FOGs), and, usually, nutrients such as nitrogen. The issue for many food manufacturers is that existing wastewater treatment systems are unable to reduce the nutrient load in the biological treatment stage to a level allowing acceptable discharge. In addition, most rely on large tanks housing bacteria that are submerged in water and aerated. Aeration is energy-hungry and can create a 'sludge-cake' on top of the water, which is difficult to treat. Most existing technologies also use filters, but they foul easily and require ongoing maintenance. According to BioGill chief executive John West, the BioGill technology is groundbreaking and radically different from conventional bioreactors because the 'gills' are not submerged. Instead, the gills, composed of Nano-Ceramic Membrane sheets arranged vertically in pairs, are suspended in the air, above ground, with wastewater travelling down between them. “Fungi and bacteria, known as biomass, grow on the membranes in direct contact with the air, eating nutrients much faster than other systems

  11. Automatic Regulation of Wastewater Discharge

    Directory of Open Access Journals (Sweden)

    Bolea Yolanda

    2017-01-01

    Full Text Available Wastewater plants, mainly with secondary treatments, discharge polluted water to environment that cannot be used in any human activity. When those dumps are in the sea it is expected that most of the biological pollutants die or almost disappear before water reaches human range. This natural withdrawal of bacteria, viruses and other pathogens is due to some conditions such as the salt water of the sea and the sun effect, and the dumps areas are calculated taking into account these conditions. However, under certain meteorological phenomena water arrives to the coast without the full disappearance of pollutant elements. In Mediterranean Sea there are some periods of adverse climatic conditions that pollute the coast near the wastewater dumping. In this paper, authors present an automatic control that prevents such pollution episodes using two mathematical models, one for the pollutant transportation and the other for the pollutant removal in wastewater spills.

  12. Sequential and Parallel Attack Tree Modelling

    NARCIS (Netherlands)

    Arnold, Florian; Guck, Dennis; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Koornneef, Floor; van Gulijk, Coen

    The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many studies have been conducted to understand and model the behaviour of a potential attacker, the detection of crucial

  13. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  14. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  15. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  16. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  17. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  18. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  19. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  20. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  1. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  2. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    offer no security. With over 17,430 such geographically separated military sites across the United States, these fatal shootings by a Kuwaiti- born ...increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant

  3. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND... issues of public importance, an attack is made upon the honesty, character, integrity, or like personal qualities of an identified person or group, the cable television system operator shall, within a reasonable...

  4. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    ..., and to obtain the maximum disruptive effect over the services. The proposed method uses a top-down approach, starting on the service level and ending on the different network elements that can be identified in the end as the targets for the attack.

  5. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  6. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...

  7. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  8. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  9. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  10. Robustness of Dengue Complex Network under Targeted versus Random Attack

    Directory of Open Access Journals (Sweden)

    Hafiz Abid Mahmood Malik

    2017-01-01

    Full Text Available Dengue virus infection is one of those epidemic diseases that require much consideration in order to save the humankind from its unsafe impacts. According to the World Health Organization (WHO, 3.6 billion individuals are at risk because of the dengue virus sickness. Researchers are striving to comprehend the dengue threat. This study is a little commitment to those endeavors. To observe the robustness of the dengue network, we uprooted the links between nodes randomly and targeted by utilizing different centrality measures. The outcomes demonstrated that 5% targeted attack is equivalent to the result of 65% random assault, which showed the topology of this complex network validated a scale-free network instead of random network. Four centrality measures (Degree, Closeness, Betweenness, and Eigenvector have been ascertained to look for focal hubs. It has been observed through the results in this study that robustness of a node and links depends on topology of the network. The dengue epidemic network presented robust behaviour under random attack, and this network turned out to be more vulnerable when the hubs of higher degree have higher probability to fail. Moreover, representation of this network has been projected, and hub removal impact has been shown on the real map of Gombak (Malaysia.

  11. Briquette fuel production from wastewater sludge of beer industry and biodiesel production wastes

    Science.gov (United States)

    Nusong, P.; Puajindanetr, S.

    2018-04-01

    The production of industrial wastes is increasing each year. Current methods of waste disposal are severely impacting the environment. Utilization of industrial wastes as an alternative material for fuel is gaining interest due to its environmental friendliness. Thus, the objective of this research was to study the optimum condition for fuel briquettes produced from wastewater sludge of the beer industry and biodiesel production wastes. This research is divided into two parts. Part I will study the effects of carbonization of brewery wastewater sludge for high fixed carbon. Part II will study the ratio between brewery wastewater sludge and bleaching earth for its high heating value. The results show that the maximum fixed carbon of 10.01% by weight was obtained at a temperature of 350 °C for 30 minutes. The appropriate ratio of brewery wastewater sludge and bleaching earth by weight was 95:5. This condition provided the highest heating value of approximately 3548.10 kcal/kg.

  12. A Performance Measurement Tool Leading Wastewater Treatment Plants toward Economic Efficiency and Sustainability

    Directory of Open Access Journals (Sweden)

    Andrea Guerrini

    2016-11-01

    Full Text Available Wastewater treatment is an important link in the water cycle that allows for water sanitation and reuse, facilitates energy generation, and allows for the recovery of products from waste. The scientific community has paid significant attention to wastewater treatment, especially from a technical point of view. Extensive literature is available on new technologies, processes, and materials to improve wastewater treatment. However, scant studies have been conducted in the management field focusing on the development of a performance measurement tool that supports plant managers. The current article addresses this literature gap, developing a reporting tool that integrates technical and cost measures and implements it in a large wastewater utility. The tool successfully identifies cause and effect linkages among key plant performance drivers and supports management in finding activities with poor performance and allows them to delay non-relevant measures of control.

  13. Security strategy of powered-off SRAM for resisting physical attack to data remanence

    International Nuclear Information System (INIS)

    Yu Kai; Zou Xuecheng; Yu Guoyi; Wang Weixu

    2009-01-01

    This paper presents a security strategy for resisting a physical attack utilizing data remanence in powered-off static random access memory (SRAM). Based on the mechanism of physical attack to data remanence, the strategy intends to erase data remanence in memory cells once the power supply is removed, which disturbs attackers trying to steal the right information. Novel on-chip secure circuits including secure power supply and erase transistor are integrated into conventional SRAM to realize erase operation. Implemented in 0.25 μm Huahong-NEC CMOS technology, an SRAM exploiting the proposed security strategy shows the erase operation is accomplished within 0.2 μs and data remanence is successfully eliminated. Compared with conventional SRAM, the retentive time of data remanence is reduced by 82% while the operation power consumption only increases by 7%.

  14. Bioremediation of wastewater using microalgae

    Science.gov (United States)

    Chalivendra, Saikumar

    Population expansion and industrial development has deteriorated the quality of freshwater reservoirs around the world and has caused freshwater shortages in certain areas. Discharge of industrial effluents containing toxic heavy metals such as Cd and Cr into the environment have serious impact on human, animal and aquatic life. In order to solve these problems, the present study was focused on evaluating and demonstrating potential of microalgae for bioremediation of wastewater laden with nitrogen (N) in the form of nitrates, phosphorous (P) in the form of phosphates, chromium (Cr (VI)) and cadmium (Cd (II)). After screening several microalgae, Chlorella vulgaris and algae taken from Pleasant Hill Lake were chosen as candidate species for this study. The viability of the process was demonstrated in laboratory bioreactors and various experimental parameters such as contact time, initial metal concentration, algae concentration, pH and temperature that would affect remediation rates were studied. Based on the experimental results, correlations were developed to enable customizing and designing a commercial Algae based Wastewater Treatment System (AWTS). A commercial AWTS system that can be easily customized and is suitable for integration into existing wastewater treatment facilities was developed, and capital cost estimates for system including installation and annual operating costs were determined. The work concludes that algal bioremediation is a viable alternate technology for treating wastewater in an economical and sustainable way when compared to conventional treatment processes. The annual wastewater treatment cost to remove N,P is ~26x lower and to remove Cr, Cd is 7x lower than conventional treatment processes. The cost benefit analysis performed shows that if this technology is implemented at industrial complexes, Air Force freight and other Department of Defense installations with wastewater treatment plants, it could lead to millions of dollars in

  15. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  16. Attacking 22 entries in rugby union: running demands and differences between successful and unsuccessful entries.

    Science.gov (United States)

    Tierney, P; Tobin, D P; Blake, C; Delahunt, E

    2017-12-01

    Global Positioning System (GPS) technology is commonly utilized in team sports, including rugby union. It has been used to describe the average running demands of rugby union. This has afforded an enhanced understanding of the physical fitness requirements for players. However, research in team sports has suggested that training players relative to average demands may underprepare them for certain scenarios within the game. To date, no research has investigated the running demands of attacking 22 entries in rugby union. Additionally, no research has been undertaken to determine whether differences exist in the running intensity of successful and unsuccessful attacking 22 entries in rugby union. The first aim of this study was to describe the running intensity of attacking 22 entries. The second aim of this study was to investigate whether differences exist in the running intensity of successful and unsuccessful attacking 22 entries. Running intensity was measured using meters per minute (m min -1 ) for (a) total distance, (b) running distance, (c) high-speed running distance, and (d) very high-speed running distance. This study provides normative data for the running intensity of attacking 22 entries in rugby union. Forwards achieved greater high-speed running intensity in successful (3.6 m min -1 ) compared to unsuccessful (1.8 m min -1 ) attacking 22 entries. Forwards should try and achieve greater high-speed running intensity in attacking 22 entries to increase the likelihood of successful outcomes during this period of gameplay. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  17. Critical supply network protection against intentional attacks: A game-theoretical model

    International Nuclear Information System (INIS)

    Bricha, Naji; Nourelfath, Mustapha

    2013-01-01

    A crucial issue in today's critical supply chains is how to protect facilities against intentional attacks, since it has become unacceptable to ignore the high impact of low probability disruptions caused by these attacks. This article develops a game-theoretical model to deal with the protection of facilities, in the context of the uncapacitated fixed-charge location problem. Given a set of investment alternatives for protecting the facilities against identified threats, the objective is to select the optimal defence strategy. The attacker is considered as a player who tries to maximise the expected damage while weighing against the attacks expenditures. The conflict on facilities vulnerability is modelled using the concept of contest. The vulnerability of a facility is defined by its destruction probability. Contest success functions determine the vulnerability of each facility dependent on the relative investments of the defender and the attacker on each facility, and on the characteristics of the contest. A method is developed to evaluate the utilities of the players (i.e., the defender and the attacker). This method evaluates many expected costs, including the cost needed to restore disabled facilities, the backorder cost, and the cost incurred because of the increase in transportation costs after attacks. In fact, when one or several facilities are unavailable, transportation costs will increase since reassigned customers may receive shipments from facilities which are farther away. The model considers a non-cooperative two-period game between the players, and an algorithm is presented to determine the equilibrium solution and the optimal defence strategy. An illustrative example is presented. The approach is compared to other suggested strategies, and some managerial insights are provided in the context of facility location

  18. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  19. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  20. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  1. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  2. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  3. Toxicity of fluoride to microorganisms in biological wastewater treatment systems.

    Science.gov (United States)

    Ochoa-Herrera, Valeria; Banihani, Qais; León, Glendy; Khatri, Chandra; Field, James A; Sierra-Alvarez, Reyes

    2009-07-01

    Fluoride is a common contaminant in a variety of industrial wastewaters. Available information on the potential toxicity of fluoride to microorganisms implicated in biological wastewater treatment is very limited. The objective of this study was to evaluate the inhibitory effect of fluoride towards the main microbial populations responsible for the removal of organic constituents and nutrients in wastewater treatment processes. The results of short-term batch bioassays indicated that the toxicity of sodium fluoride varied widely depending on the microbial population. Anaerobic microorganisms involved in various metabolic steps of anaerobic digestion processes were found to be very sensitive to the presence of fluoride. The concentrations of fluoride causing 50% metabolic inhibition (IC(50)) of propionate- and butyrate-degrading microorganisms as well as mesophilic and thermophilic acetate-utilizing methanogens ranged from 18 to 43 mg/L. Fluoride was also inhibitory to nitrification, albeit at relatively high levels (IC(50)=149 mg/L). Nitrifying bacteria appeared to adapt rapidly to fluoride, and a near complete recovery of their metabolic activity was observed after only 4d of exposure to high fluoride levels (up to 500 mg/L). All other microbial populations evaluated in this study, i.e., glucose fermenters, aerobic glucose-degrading heterotrophs, denitrifying bacteria, and H(2)-utilizing methanogens, tolerated fluoride at very high concentrations (>500 mg/L).

  4. Innovation in radioactive wastewater-stream management. Pt. 1

    International Nuclear Information System (INIS)

    Karameldin, A.

    2002-01-01

    Recently an invention of a system for volume reduction of the wastewater streams present in SDTs has been achieved. This system substantially utilized the air conditioning and ventilation techniques in water transfer from the wastewater to air. This process is promoted by a mutual heating and humidification of a compressed dry air introduced through SDTs (or in another tank). From the probable release of radioactive nuclides point of view, the analysis of the evaporation of waste streams present in SDTs have been indicated that the proposed optimal evaporating temperature is round 75 C. The design curve of the daily volumetric reduction of the wastewater streams versus the necessary volumetric airflow rates at different operating temperature has been achieved. The evaporating temperature varied from 40 C to 95 C with a step of 5 C. The obtained curve illustrates that the required volumetric airflow rate utilized to evaporate one m 3 /day (when maintaining SDTs at the temperature 75 C) is less than 90 m 3 /h. The assessments of the obtained curve have been indicated that this system is feasible and viable, economic and has no secondary waste residuals. Recently, an experimental facility proposed to be constructed to obtain the optimal operating parameters of the system, regarding to the probable emissions of the radioactive nuclides within the permissible release limits. (authors)

  5. Coupling UV irradiation and electrocoagulation for reclamation of urban wastewater

    International Nuclear Information System (INIS)

    Cotillas, Salvador; Llanos, Javier; Miranda, Oscar G.; Díaz-Trujillo, Gerardo C.; Cañizares, Pablo; Rodrigo, Manuel A.

    2014-01-01

    Graphical abstract: - Highlights: • Iron electrodes allow removing turbidity and E. coli in urban wastewaters. • Enmeshment into growing flocs and oxidation are the key disinfection processes. • A synergistic effect of coupling UV and EC is found at low current densities. • Efficiency of UV irradiation is lowered at high current density. - Abstract: This work focuses on coupling electrocoagulation, with iron electrodes, and UV irradiation (photo-electrocoagulation) for the simultaneous removal of turbidity and E. coli from actual treated municipal wastewaters. Results show that single electrocoagulation behaves as a very efficient technology even using low current densities. E. coli is removed not only by the enmeshment of microorganisms into growing flocs, but also by the attack of electrochemically produced chlorine disinfectant species. Coupling UV irradiation to electrocoagulation with iron electrodes improves the process performance in terms of E. coli and turbidity removal. The effect of current density on process performance was evaluated, finding a synergistic interaction of both techniques at low current density (1.44 A m −2 ) but an antagonistic effect at higher values of current density (7.20 A m −2 ). This antagonistic effect is caused by the less efficient transmission of UV irradiation to the bulk solution due to the increase in the concentration of solids

  6. Wastewater Treatment Methods

    Science.gov (United States)

    Smith, Dana; Williams, Fred; Moffatt, Scott

    Alcoa's Point Comfort, Texas industrial facility is a combination of a bauxite refining plant utilizing the Bayer process and an aluminum fluoride production plant. Due to the location's use of dry stack technology for bauxite residue disposal, the pond surface areas for evaporation are minimal compared to the rainfall catchment areas. This results in the periodic need to reduce accumulated volumes of storm water at the Residue Disposal Area (RDA).

  7. A review on wastewater disinfection

    Directory of Open Access Journals (Sweden)

    Mohammad Mehdi Amin

    2013-01-01

    Full Text Available Changes in regulations and development of new technologies have affected the selection of alternative for treated wastewater disinfection. Disinfection is the last barrier of wastewater reclamation process to protect ecosystem safety and human health. Driving forces include water scarcity and drinking water supply, irrigation, rapid industrialization, using reclaimed water, source protection, overpopulation, and environmental protection. The safe operation of water reuse depends on effluent disinfection. Understanding the differences in inactivation mechanisms is critical to identify rate-limiting steps involved in the inactivation process as well as to develop more effective disinfection strategies. Disinfection byproducts discharged from wastewater treatment plants may impair aquatic ecosystems and downstream drinking-water quality. Numerous inorganic and organic micropollutants can undergo reactions with disinfectants. Therefore, to mitigate the adverse effects and also to enhance that efficiency, the use of alternative oxidation/disinfection systems should be evaluated as possible alternative to chlorine. This review gives a summary of the traditional, innovative, and combined disinfection alternatives and also disinfection byproducts for effluent of municipal wastewater treatment plants.

  8. Design in Domestic Wastewater Irrigation

    NARCIS (Netherlands)

    Huibers, F.P.; Raschid-Sally, L.

    2005-01-01

    When looking at the domestic wastewater streams, from freshwater source to destination in an agricultural field, we are confronted with a complexity of issues that need careful attention. Social and economic realities arise, along with technical, biological and institutional issues. Local realities

  9. Imprinted Polymers in Wastewater Treatment

    Energy Technology Data Exchange (ETDEWEB)

    Eastman, Christopher; Goodrich, Scott; Gartner, Isabelle; Mueller, Anja

    2004-03-31

    In wastewater treatment, a method that specifically recognizes a variety of impurities in a flexible manner would be useful for treatment facilities with varying needs. Current purification techniques (i.e. bacteria, oxidation, reduction, precipitation and filtration) are nonspecific and difficult to control in complex mixtures. Heavy metal removal is particularly important in improving the efficiency of wastewater treatment, as they inhibit or even destroy the bacteria used for filtration. Imprinting polymerization is a technique that allows for the efficient removal of specific compounds and has been used in purification of enantiomers. It has potential to be applied in wastewater systems with the impurities acting as the template for the imprinting polymerization. The polymer with the bound impurities intact can then be removed via precipitation. After removal of the impurity the polymer can be reused. Data for the imprinting polymerization of polyacrylates and polyacrylamides for several metal complexes will be presented. Imprinting polymerization in combination with emulsion polymerization to improve the removal of hydrophobic contaminants will be described. Removal efficiencies will be presented and compared with conventional wastewater treatment methods.

  10. Artificial wetland for wastewater treatment

    International Nuclear Information System (INIS)

    Arias I, Carlos A; Brix, Hans

    2003-01-01

    The development of constructed wetland technology for wastewater treatment has gone a long way and from an experimental and unknown empirical method, which was capable of handling wastewater a sound technology was developed. Thanks to research, and the work of many public and private companies that have gather valuable operation information, constructed wetland technology has evolved to be a relievable, versatile and effective way to treat wastewater, run off, handle sludge and even improve environmental quality and provide recreation sites, while maintaining low operation and maintenance costs, and at the same time, producing water of quality that can meet stringent regulations, while being and environmental friendly solution to treat waste-waters. Constructed wetlands can be established in many different ways and its characteristics can differ greatly, according to the user needs, the geographic site and even the climatic conditions of the area. The following article deals with the general characteristics of the technology and the physical and chemical phenomena that govern the pollution reduction with in the different available systems

  11. Fluidization of Dried Wastewater Sludge.

    Czech Academy of Sciences Publication Activity Database

    Hartman, Miloslav; Pohořelý, Michael; Trnka, Otakar

    2007-01-01

    Roč. 178, 3 (2007) , s. 166-172 ISSN 0032-5910 R&D Projects: GA AV ČR(CZ) IAA4072201 Institutional research plan: CEZ:AV0Z40720504 Keywords : fluidization characteristics * multiphase reactors * dried stabilized wastewater sludge Subject RIV: CI - Industrial Chemistry, Chemical Engineering Impact factor: 1.130, year: 2007

  12. Integrated Constructed Wetlands (ICW) for livestock wastewater management.

    Science.gov (United States)

    Harrington, Rory; McInnes, Robert

    2009-11-01

    Social, economic and environmental coherence is sought in the management of livestock wastewater. Wetlands facilitate the biogeochemical processes that exploit livestock wastewater and provide opportunities to achieve such coherence and also to deliver on a range of ecosystem services. The Integrated Constructed Wetland (ICW) concept integrates three inextricably linked objectives: water quantity and quality management, landscape-fit to improve aesthetic site values and enhanced biodiversity. The synergies derived from this explicit integration allow one of the key challenges for livestock management to be addressed. An example utilizing twelve ICW systems from a catchment on the south coast of Ireland demonstrates that over an eight year period mean reduction of total and soluble phosphorus (molybdate reactive phosphorus) exceeded 95% and the mean removal of ammonium-N exceeded 98%. This paper reviews evidence regarding the capacity of ICWs to provide a coherent and sustainable alternative to conventional systems.

  13. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  14. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  15. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  16. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    .... Just as the terrorist attacks of September 11, 2001 defied what many thought possible, cyber attacks could escalate in response to United States and allied retaliatory measures against the terrorists...

  17. Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack

    International Nuclear Information System (INIS)

    Ma Hong-Xin; Bao Wan-Su; Li Hong-Wei; Chou Chun

    2016-01-01

    We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulse-width, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward. (paper)

  18. Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack

    Science.gov (United States)

    Ma, Hong-Xin; Bao, Wan-Su; Li, Hong-Wei; Chou, Chun

    2016-08-01

    We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulse-width, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward. Project supported by the National Basic Research Program of China (Grant No. 2013CB338002) and the National Natural Science Foundation of China (Grant Nos. 11304397 and 61505261).

  19. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  20. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  1. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    Science.gov (United States)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  2. Marine microalgae attack and feed on metazoans

    DEFF Research Database (Denmark)

    Berge, Terje; Poulsen, Louise K.; Moldrup, Morten

    2012-01-01

    Free-living microalgae from the dinoflagellate genus Karlodinium are known to formmassive blooms in eutrophic coastal waters worldwide and are often associated with fish kills. Natural bloom populations, recently shown to consist of the two mixotrophic and toxic species Karlodinium armiger...... and Karlodinium veneficum have caused fast paralysis and mortality of finfish and copepods in the laboratory, and have been associated with reduced metazooplankton biomass in-situ. Here we show that a strain of K. armiger (K-0688) immobilises the common marine copepod Acartia tonsa in a densitydependent manner...... and collectively ingests the grazer to promote its own growth rate. In contrast, four strains of K. veneficum did not attack or affect the motility and survival of the copepods. Copepod immobilisation by the K. armiger strain was fast (within 15min) and caused by attacks of swarming cells, likely through...

  3. Cascade-based attacks on complex networks

    Science.gov (United States)

    Motter, Adilson E.; Lai, Ying-Cheng

    2002-12-01

    We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

  4. Research About Attacks Over Cloud Environment

    Directory of Open Access Journals (Sweden)

    Li Jie

    2017-01-01

    Full Text Available Cloud computing is expected to continue expanding in the next few years and people will start to see some of the following benefits in their real lives. Security of cloud computing environments is the set of control-based technologies and policies absolute to adhere regulatory compliance rules and protect information data applications and infrastructure related with cloud use. In this paper we suggest a model to estimating the cloud computing security and test the services provided to users. The simulator NG-Cloud Next Generation Secure Cloud Storage is used and modified to administer the proposed model. This implementation achieved security functions potential attacks as defined in the proposed model. Finally we also solve some attacks over cloud computing to provide the security and safety of the cloud.

  5. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  6. Blind Data Attack on BGP Routers

    Science.gov (United States)

    2017-03-01

    Second Reader Dr. Cynthia Irvine Chair, Cyber Academic Group iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Transport Communication Protocol (TCP...Postgraduate School. The experience of higher learning at this institution was incredible, and I would whole-heartedly recommend it to any of my peers and...data attack packets to the victim device. Scapy is a Python library that is used to craft and send packets [28]. BGP is supported in Python through

  7. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    cumulative cost of cyber-attacks was more than the combined global black market cost of cocaine, heroin and marijuana. These alarming figures raised...the country to its knees. The Luftwaffe was uncontested in the Battle of Britain until radar’s ability to detect inbound aircraft provided the...manifest information in IGC and provides inbound passenger manifest data to the aerial port of debarkation (APOD) and other receiving activities for

  8. Are blockchains immune to all malicious attacks?

    OpenAIRE

    Xu, Jennifer J.

    2016-01-01

    Background: In recent years, blockchain technology has attracted considerable attention. It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus. As a result, blockchain is believed to resist fraud and hacking. Results: This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable. Conclusions: This study ...

  9. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  10. Pulsed corona discharge for improving treatability of coking wastewater.

    Science.gov (United States)

    Liu, Ming; Preis, Sergei; Kornev, Iakov; Hu, Yun; Wei, Chao-Hai

    2018-02-01

    Coking wastewater (CW) contains toxic and macromolecular substances that inhibit biological treatment. The refractory compounds remaining in biologically treated coking wastewater (BTCW) provide chemical oxygen demand (COD) and color levels that make it unacceptable for reuse or disposal. Gas-phase pulsed corona discharge (PCD) utilizing mostly hydroxyl radicals and ozone as oxidants was applied to both raw coking wastewater (RCW) and BTCW wastewater as a supplemental treatment. The energy efficiency of COD, phenol, thiocyanate and cyanide degradation by PCD was the subject of the research. The cost-effective removal of intermediate oxidation products with addition of lime was also studied. The energy efficiency of oxidation was inversely proportional to the pulse repetition frequency: lower frequency allows more effective utilization of ozone at longer treatment times. Oxidative treatment of RCW showed the removal of phenol and thiocyanate at 800 pulses per second from 611 to 227mg/L and from 348 to 86mg/L, respectively, at 42kWh/m 3 delivered energy, with substantial improvement in the BOD 5 /COD ratio (from 0.14 to 0.43). The COD and color of BTCW were removed by 30% and 93%, respectively, at 20kWh/m 3 , showing energy efficiency for the PCD treatment exceeding that of conventional ozonation by a factor of 3-4. Application of lime appeared to be an effective supplement to the PCD treatment of RCW, degrading COD by about 28% at an energy input of 28kWh/m 3 and the lime dose of 3.0kg/m 3 . The improvement of RCW treatability is attributed to the degradation of toxic substances and fragmentation of macromolecular compounds. Copyright © 2017. Published by Elsevier B.V.

  11. ``Living off the land'': resource efficiency of wetland wastewater treatment

    Science.gov (United States)

    Nelson, M.; Odum, H. T.; Brown, M. T.; Alling, A.

    Bioregenerative life support technologies for space application are advantageous if they can be constructed using locally available materials, and rely on renewable energy resources, lessening the need for launch and resupply of materials. These same characteristics are desirable in the global Earth environment because such technologies are more affordable by developing countries, and are more sustainable long-term since they utilize less non-renewable, imported resources. Subsurface flow wetlands (wastewater gardens™) were developed and evaluated for wastewater recycling along the coast of Yucatan. Emergy evaluations, a measure of the environmental and human economic resource utilization, showed that compared to conventional sewage treatment, wetland wastewater treatment systems use far less imported and purchased materials. Wetland systems are also less energy-dependent, lessening dependence on electrical infrastructure, and require simpler maintenance since the system largely relies on the ecological action of microbes and plants for their efficacy. Detailed emergy evaluations showed that wetland systems use only about 15% the purchased emergy of conventional sewage systems, and that renewable resources contribute 60% of total emergy used (excluding the sewage itself) compared to less than 1% use of renewable resources in the high-tech systems. Applied on a larger scale for development in third world countries, wetland systems would require 1/5 the electrical energy of conventional sewage treatment (package plants), and save 2/3 of total capital and operating expenses over a 20-year timeframe. In addition, there are numerous secondary benefits from wetland systems including fiber/fodder/food from the wetland plants, creation of ecosystems of high biodiversity with animal habitat value, and aesthestic/landscape enhancement of the community. Wetland wastewater treatment is an exemplar of ecological engineering in that it creates an interface ecosystem to handle

  12. Iraqi violence, Saudi attack and further bombings

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2006-03-15

    Iraq moved closer to all-out civil war following an attack on the Imam Ali al-Hadi mosque in Samarra, one of Shi'i Islam's holiest shrines, on 22nd February. In the days that followed, several hundred Iraqis died in inter-communal violence. Attacks on installations close to the Basrah Oil Terminal were reported. Earlier in the month, the main oil storage facility in Kirkuk was bombed, forcing the Northern Oil Company to shut-in the 0.3 mn bpd field. Oil and electricity supplies in southern Iraq were cut by attacks on installations some 40 miles south of Baghdad. Turkey agreed to resume product exports to Iraq after a deal was agreed on repaying Iraqi debts of $1 bn to Turkish suppliers. An official Australian inquiry into illegal payments made under the UN's oil-for-food programme is to investigate allegations involving two Australian-controlled oil firms. (author)

  13. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  14. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  15. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  16. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  17. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  18. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  19. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  20. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  1. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  2. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  3. Regression Nodes: Extending attack trees with data from social sciences

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to

  4. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  5. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  6. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  7. Energy Recovery from Wastewater Treatment Plants in the United States: A Case Study of the Energy-Water Nexus

    OpenAIRE

    Ashlynn S. Stillwell; David C. Hoppock; Michael E. Webber

    2010-01-01

    This manuscript uses data from the U.S. Environmental Protection Agency to analyze the potential for energy recovery from wastewater treatment plants via anaerobic digestion with biogas utilization and biosolids incineration with electricity generation. These energy recovery strategies could help offset the electricity consumption of the wastewater sector and represent possible areas for sustainable energy policy implementation. We estimate that anaerobic digestion could save 628 to 4,940 mil...

  8. Organic contaminants in onsite wastewater treatment systems

    Science.gov (United States)

    Conn, K.E.; Siegrist, R.L.; Barber, L.B.; Brown, G.K.

    2007-01-01

    Wastewater from thirty onsite wastewater treatment systems was sampled during a reconnaissance field study to quantify bulk parameters and the occurrence of organic wastewater contaminants including endocrine disrupting compounds in treatment systems representing a variety of wastewater sources and treatment processes and their receiving environments. Bulk parameters ranged in concentrations representative of the wide variety of wastewater sources (residential vs. non-residential). Organic contaminants such as sterols, surfactant metabolites, antimicrobial agents, stimulants, metal-chelating agents, and other consumer product chemicals, measured by gas chromatography/mass spectrometry were detected frequently in onsite system wastewater. Wastewater composition was unique between source type likely due to differences in source water and chemical usage. Removal efficiencies varied by engineered treatment type and physicochemical properties of the contaminant, resulting in discharge to the soil treatment unit at ecotoxicologically-relevant concentrations. Organic wastewater contaminants were detected less frequently and at lower concentrations in onsite system receiving environments. Understanding the occurrence and fate of organic wastewater contaminants in onsite wastewater treatment systems will aid in minimizing risk to ecological and human health.

  9. Wastewater collection and treatment technologies for semi-urban areas of India: a case study.

    Science.gov (United States)

    Sundaravadivel, M; Vigneswaran, S

    2001-01-01

    Sanitation and wastewater management problems in small and medium towns in India (referred to as "semi-urban areas"--SUAs) are distinctly different from those of large cities or rural villages. There is an apparent lack of choices of appropriate sanitation options for these semi-urban areas, leading them to adopt on-site sanitation technologies. A field study of four such small towns in India was conducted to evaluate the suitability of available low-cost wastewater collection and treatment technologies, in light of their current practice. Based on the field study, this paper suggests a system comprising "combined surface sewers" and "reed-bed channel" for collection and treatment of wastewater for semi-urban areas, that can utilize all the existing infrastructure to effect better sanitation at lower costs. The suggested system involves converting the existing open wastewater collection drains on the road sides, as "decentralized" networks of covered drains with simple structural modifications to collect both wastewater and stormwater; and, converting the large open drains on the outskirts of SUAs that carry wastewater to agricultural fields, as gravel media filled beds planted with local reeds. Cost estimates for the towns studied indicate this system to be over 70% cheaper compared to conventional collection and treatment systems.

  10. Natural treatment system models for wastewater management: a study from Hyderabad, India.

    Science.gov (United States)

    Sonkamble, Sahebrao; Wajihuddin, Md; Jampani, Mahesh; Sarah, S; Somvanshi, V K; Ahmed, Shakeel; Amerasinghe, Priyanie; Boisson, Alexandre

    2018-01-01

    Wastewater generated on a global scale has become a significant source of water resources which necessitates appropriate management strategies. However, the complexities associated with wastewater are lack of economically viable treatment systems, especially in low- and middle-income countries. While many types of treatment systems are needed to serve the various local issues, we propose natural treatment systems (NTS) such as natural wetlands that are eco-friendly, cost-effective, and can be jointly driven by public bodies and communities. In order for it to be part of wastewater management, this study explores the NTS potential for removal of pollutants, cost-effectiveness, and reuse options for the 1.20 million m 3 /day of wastewater generated in Hyderabad, India. The pilot study includes hydro-geophysical characterization of natural wetland to determine pollutant removal efficiency and its effective utilization for treated wastewater in the peri-urban habitat. The results show the removal of organic content (76-78%), nutrients (77-97%), and microbes (99.5-99.9%) from the wetland-treated wastewater and its suitability for agriculture applications. Furthermore, the wetland efficiency integrated with engineered interventions led to the development of NTS models with different application scenarios: (i) constructed wetlands, (ii) minimized community wetlands, and (iii) single outlet system, suitable for urban, peri-urban and rural areas, respectively.

  11. Evaluation of different smoking habits during music festivals through wastewater analysis.

    Science.gov (United States)

    Mackuľak, Tomáš; Grabic, Roman; Gál, Marián; Gál, Miroslav; Birošová, Lucia; Bodík, Igor

    2015-11-01

    Wastewater analysis is a powerful method that can provide useful information about the abuse of legal and illicit drugs. The aim of our study was to determine nicotine consumption during four different music festivals and to find a connection between smoking and preferences for specific music styles using wastewater analysis. The amount of the nicotine metabolite cotinine was monitored in wastewater at the influent of three waste water treatment plants WWTPs in the Czech Republic and Slovakia, where the festivals took place. Urinary bio-markers of nicotine utilization were analyzed by LC-HRMS. More than 80,000 festival participants were monitored during our study from June to September 2014. A significant increase of nicotine consumption was observed in wastewaters during music festivals. The nicotine ingestion level was back-calculated and expressed as mass of pure drug consumed per day and per 1000 inhabitants for selected cities of both countries. The highest differences between typical levels of cotinine in wastewaters and the levels during music festivals were detected in Piešťany: 4 g/L/1000 inhabitants during non-festival days compared to 8 g/L/1000 inhabitants during the Topfest pop-rock festival and 6g/L/1000 inhabitants during the Grape dance festival. No significant increase of the amounts of cotinine in wastewater was recorded for the Country and Folk festivals. Copyright © 2015 Elsevier B.V. All rights reserved.

  12. Evaluation on ecological stability and biodegradation of dyeing wastewater pre-treated by electron beam

    International Nuclear Information System (INIS)

    Lee, M.J.; Park, C.K.; Yoo, D.H.; Lee, J.K.; Lee, B.J.; Han, B.S.; Kim, J.K.; Kim, Y.R.

    2005-01-01

    Biological treatment of dye wastewater pre-treated by electron beam has been performed in order to evaluate the biodegradation and ecological stability of effluent. In the process of electron-beam treatment of wastewater there are utilized chemical transformations of pollutants induced by ionizing radiation. Partial decomposition of pollutant takes place as well as transformations of pollutant molecules that result in improving subsequent purification stages like as biological processing. Dyeing wastewater contains many kind of pollutants which are difficult to be decomposed completely by microorganisms. In this study, biodegradation with dyeing wastewater pre-treated by electron beams was observed. On the other hand, consideration on public acceptance in terms of ecological stability of biological effluent pre-treated by electron beams was given in this study. The results of laboratory investigations on biodegradation and ecological stability of effluent showed that biodegradation of dye wastewater pre-treated by electron beam was enhanced compared to unirradiated one. In the initial stage of biological oxidation regardless of different HRT, dye wastewater pre-treated by electron beam could be oxidized easily compare to without treated one. More number of survived daphnia magna could be observed in the biological effluent pre-treated by electron beam. This means that biological effluent pre-treated by electron beam can be said 'it is safe on the ecological system'

  13. Stabilization of heavy metals in fired clay brick incorporated with wastewater treatment plant sludge: Leaching analysis

    Science.gov (United States)

    Kadir, A. A.; Hassan, M. I. H.; Salim, N. S. A.; Sarani, N. A.; Ahmad, S.; Rahmat, N. A. I.

    2018-04-01

    Wastewater treatment sludge or known as sewage sludge is regarded as the residue and produced by the sedimentation of the suspended solid during treatment at the wastewater treatment plant. As such, this sludge was gained from the separation process of the liquids and solids. This sludge wastes has becomes national issues in recent years due to the increasing amount caused by population and industrialization growth in Malaysia. This research was conducted to fully utilize the sludge that rich in dangerous heavy metals and at the same time act as low cost alternative materials in brick manufacturing. The investigation includes determination of heavy metal concentration and chemical composition of the sludge, physical and mechanical properties. Wastewater treatment sludge samples were collected from wastewater treatment plant located in Johor, Malaysia. X-Ray Fluorescence was conducted to determine the heavy metals concentration of wastewater treatment sludge. Different percentage of sludges which are 0%, 1%, 5%, 10%, and 20%, has been incorporated into fired clay brick. The leachability of heavy metals in fired clay brick that incorporated with sludge were determined by using Toxicity Characteristic Leaching Procedure (TCLP) and Synthetic Precipitation Leachability Procedure (SPLP) that has been analyzed by using Inductively Coupled Plasma Mass Spectrometry (ICP-MS). The results show a possibility to stabilize the heavy metals in fired clay brick incorporated with wastewater treatment sludge. 20% of the sludge incorporated into the brick is the most suitable for building materials as it leached less heavy metals concentration and complying with USEPA standard.

  14. Production of a High Efficiency Microbial Flocculant by Proteus mirabilis TJ-1 Using Compound Organic Wastewater

    Science.gov (United States)

    Zhang, Zhiqiang; Xia, Siqing; Zhang, Jiao

    2010-11-01

    The production of a high efficiency microbial flocculant (MBF) by Proteus mirabilis TJ-1 using compound organic wastewater was investigated. To cut down the cost of the MBF production, several nutritive organic wastewaters were selected to replace glucose and peptone as the carbon source and the nitrogen source in the optimized medium of strain TJ-1, respectively. The compound wastewater of the milk candy and the soybean milk was found to be good carbon source and nitrogen source for this strain to produce MBF. The cost-effective culture medium consists of (per liter): 800 mL wastewater of milk candy, 200 mL wastewater of soybean milk, 0.3 g MgSO4ṡ7 H2O, 5 g K2HPO4, 2 g and KH2PO4, pH 7.0. The economic cost for the MBF production can be cut down over a half by using the developed culture medium. Furthermore, the utilization of the two wastewaters in the preparation of culture medium of strain TJ-1 can not only save their big treatment cost, but also realize their resource reuse.

  15. Comparison of various advanced oxidation processes used in remediation of industrial wastewater laden with recalcitrant pollutants

    Science.gov (United States)

    Krishnan, S.; Rawindran, H.; Sinnathambi, C. M.; Lim, J. W.

    2017-06-01

    Due to the scarcity of water, it has become a necessity to improve the quality of wastewater that is discharged into the environment. Conventional wastewater treatment can be either a physical, chemical, and/or biological processes, or in some cases a combination of these operations. The main purpose of wastewater treatment is to eliminate nutrients, solids, and organic compounds from effluents. Current wastewater treatment technologies are deemed ineffective in the complete removal of pollutants, particularly organic matter. In many cases, these organic compounds are resistant to conventional treatment methods, thus creating the necessity for tertiary treatment. Advanced oxidation process (AOP), constitutes as a promising treatment technology for the management of wastewater. AOPs are characterised by a common chemical feature, where they utilize the highly reactive hydroxyl radicals for achieving complete mineralization of the organic pollutants into carbon dioxide and water. This paper delineates advanced oxidation processes currently used for the remediation of water and wastewater. It also provides the cost estimation of installing and running an AOP system. The costs are separated into three categories: capital, operational, and operating & maintenance.

  16. Evaluation of alternative institutional arrangements in public utilities

    Directory of Open Access Journals (Sweden)

    Ermishina Anna, V.

    2015-06-01

    Full Text Available Since early 2000s a policy of attracting private operators to public utilities, which should help to increase productivity, reduce costs, and as a result, reduce utility prices takes place in Russia. The aim of the study is to identify the relationship between institutional arrangements and pricing for water and wastewater services. Applying statistical and cluster analysis to empirical data on water utilities in 13 largest cities has revealed the differences in the level and dynamics of prices for water and wastewater services in the group of public utilities and public private water utilities. In 2011-2014 the level and growth price rates in the group of public private partnerships were higher than in group of municipal water utilities. Thus, the involvement of private operators has not yet lead to the expected reduction in prices.

  17. Characteristics and Biodegradability of Wastewater Organic Matter in Municipal Wastewater Treatment Plants Collecting Domestic Wastewater and Industrial Discharge

    OpenAIRE

    Yun-Young Choi; Seung-Ryong Baek; Jae-In Kim; Jeong-Woo Choi; Jin Hur; Tae-U Lee; Cheol-Joon Park; Byung Joon Lee

    2017-01-01

    Municipal wastewater treatment plants (WWTPs) in Korea collect and treat not only domestic wastewater, but also discharge from industrial complexes. However, some industrial discharges contain a large amount of non-biodegradable organic matter, which cannot be treated properly in a conventional biological WWTP. This study aimed to investigate the characteristics and biodegradability of the wastewater organic matter contained in the industrial discharges and to examine the fate of the industri...

  18. Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Flach, G. P. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2015-05-12

    Recent Special Analysis modeling of Saltstone Disposal Units consider sulfate attack on concrete and utilize degradation rates estimated from Cementitious Barriers Partnership software simulations. This study provides an independent verification of those simulation results using an alternative analysis method and an independent characterization data source. The sulfate penetration depths estimated herein are similar to the best-estimate values in SRNL-STI-2013-00118 Rev. 2 and well below the nominal values subsequently used to define Saltstone Special Analysis base cases.

  19. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users

    OpenAIRE

    Vladislav D. Veksler; Norbou Buchler; Blaine E. Hoffman; Daniel N. Cassenti; Char Sample; Shridat Sugrim

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision li...

  20. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  1. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  2. Integrated centralized utility services to a chemical complex on Jurong Island, Singapore.

    Science.gov (United States)

    Yan, Y G; Wong, P C Y; Tan, C G; Tang, K F

    2003-01-01

    SUT pioneered centralized utility services for the chemical industry on Jurong Island, which are cost-effective due to economies of scale, reliable due to inter-connection of satellite operations, and customer tailored for special requirements. The utility services range from the supply of steam and water, wastewater treatment, incineration, terminalling, service corridor to fire fighting. Among the services, water management achieves the complete cycle from wastewater treatment to effluent recycling.

  3. Management of textile wastewater for improving growth and yield of field mustard (Brassica campestris L.).

    Science.gov (United States)

    Yaseen, Muhammad; Aziz, Muhammad Zahir; Komal, Aqleema; Naveed, Muhammad

    2017-09-02

    Disposal of industrial wastewater is a current issue of urbanization. However, this problem can be sorted out by using wastewater as an alternate source of irrigation after the addition of some amendment. In this way, the problem of disposal of wastewater not only will be resolved but also scarcity of irrigation water can be kept off in the future. The current research study was performed to evaluate the influence of different concentrations of wastewater along with canal water for enhancing growth and yield of field mustard. Plants were irrigated with different mixtures of canal water and wastewater (75:25, 50:50, 25:75, and 00:100) in addition to canal water as control. The results revealed that application of 50:50% waste and canal water improved plant height, the number of pods plant -1 , pod length, root length, root dry weight, shoot dry weight, 100 grain weight, grain and biomass yield plant -1 , and nitrogen, phosphorus, and potassium concentration in grain and straw up to 16%, 15%, 17%, 29%, 15%, 56%, 25%, 41%, 35%, 20%, 52%, 45%, 20%, 44%, and 42%, respectively, over positive control treatment. While, nutrient uptakes and agronomic efficiency of fertilizers also improved by the application of 50:50% canal and wastewater compared to positive control treatment. Furthermore, the concentration of heavy metals, predominantly Cr, Cu, Cd, and Pb, was reduced in grains by application of 50% canal water and 50% wastewater. The outcomes suggest that wastewater utilization along with canal water mixing might be an effective approach for enhancing growth and yield of field mustard.

  4. Oxidative Mineralization and Characterization of Polyvinyl Alcohol Solutions for Wastewater Treatment

    Energy Technology Data Exchange (ETDEWEB)

    Oji, L.N.

    1999-08-31

    The principal objectives of this study are to identify an appropriate polyvinyl alcohol (PVA) oxidative mineralization technique, perform compatibility and evaporation fate tests for neat and mineralized PVA, and determine potential for PVA chemical interferences which may affect ion exchange utilization for radioactive wastewater processing in the nuclear industry.

  5. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  6. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  7. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  8. Sequential micro and ultrafiltration of distillery wastewater

    Directory of Open Access Journals (Sweden)

    Vasić Vesna M.

    2015-01-01

    Full Text Available Water reuse and recycling, wastewater treatment, drinking water production and environmental protection are the key challenges for the future of our planet. Membrane separation technologies for the removal of all suspended solids and a fraction of dissolved solids from wastewaters, are becoming more and more promising. Also, these processes are playing a major role in wastewater purification systems because of their high potential for recovery of water from many industrial wastewaters. The aim of this work was to evaluate the application of micro and ultrafiltration for distillery wastewater purification in order to produce water suitable for reuse in the bioethanol industry. The results of the analyses of the permeate obtained after micro and ultrafiltration showed that the content of pollutants in distillery wastewater was significantly reduced. The removal efficiency for chemical oxygen demand, dry matter and total nitrogen was 90%, 99.2% and 99.9%, respectively. Suspended solids were completely removed from the stillage.

  9. Effluent from Wastewater Treatment Plants

    DEFF Research Database (Denmark)

    Kristensen, Jannie Munk; Nierychlo, Marta; Albertsen, Mads

    Incoming microorganisms to wastewater treatment plants (WWTPs) are usually considered to be removed in the treatment process. Analyses of the effluent generally show a very high degree of reduction of pathogens supporting this assumption. However, standard techniques for detecting bacteria......-independent 16SrRNA gene amplicon sequencing was applied for the identification and quantification of the microorganisms. In total 84 effluent samples from 14 full-scale Danish wastewater treatment plants were investigated over a period of 3 months. The microbial community composition was investigated by 16S r...... contain pathogenic species. One of these was Arcobacter (Campylobacteraceae) which was found in up to 16% relative abundance. This indicates that Arcobacter, and perhaps other pathogenic genera, are not being removed efficiently in full-scale plants and may pose a potential health safety problem. Further...

  10. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  11. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  12. A social choice-based methodology for treated wastewater reuse in urban and suburban areas.

    Science.gov (United States)

    Mahjouri, Najmeh; Pourmand, Ehsan

    2017-07-01

    Reusing treated wastewater for supplying water demands such as landscape and agricultural irrigation in urban and suburban areas has become a major water supply approach especially in regions struggling with water shortage. Due to limited available treated wastewater to satisfy all water demands, conflicts may arise in allocating treated wastewater to water users. Since there is usually more than one decision maker and more than one criterion to measure the impact of each water allocation scenario, effective tools are needed to combine individual preferences to reach a collective decision. In this paper, a new social choice (SC) method, which can consider some indifference thresholds for decision makers, is proposed for evaluating and ranking treated wastewater and urban runoff allocation scenarios to water users in urban and suburban areas. Some SC methods, namely plurality voting, Borda count, pairwise comparisons, Hare system, dictatorship, and approval voting, are applied for comparing and evaluating the results. Different scenarios are proposed for allocating treated wastewater and urban runoff to landscape irrigation, agricultural lands as well as artificial recharge of aquifer in the Tehran metropolitan Area, Iran. The main stakeholders rank the proposed scenarios based on their utilities using two different approaches. The proposed method suggests ranking of the scenarios based on the stakeholders' utilities and considering the scores they assigned to each scenario. Comparing the results of the proposed method with those of six different SC methods shows that the obtained ranks are mostly in compliance with the social welfare.

  13. Performance of wastewater treatment plants in Jordan and suitability ...

    African Journals Online (AJOL)

    STORAGESEVER

    2008-08-04

    Aug 4, 2008 ... and NH4; therefore it is classified as a strong waste. ... Key words: Wastewater, treatment plants, water reuse, wastewater characteristics, wastewater treatment,. Jordan. ..... MSc. thesis, university of Jordan. Bataineh F, Najjar ...

  14. Sonochemical disinfection of municipal wastewater

    International Nuclear Information System (INIS)

    Antoniadis, Apostolos; Poulios, Ioannis; Nikolakaki, Eleni; Mantzavinos, Dionissios

    2007-01-01

    The application of high intensity, low frequency ultrasound for the disinfection of simulated and septic tank wastewaters is evaluated in this work. Laboratory scale experiments were conducted at 24 and 80 kHz ultrasound frequency with horn-type sonicators capable of operating in continuous and pulsed irradiation modes at nominal ultrasound intensities up to 450 W. For the experiments with simulated wastewaters, Escherichia coli were used as biological indicator of disinfection efficiency, while for the experiments with septic tank wastewaters, the total microbiological load was used. Complete elimination of E. coli could be achieved within 20-30 min of irradiation at 24 kHz and 450 W with the efficiency decreasing with decreasing intensity and frequency. Moreover, continuous irradiation was more effective than intermittent treatment based on a common energy input. Irradiation of the septic tank effluent prior to biological treatment at 24 kHz and 450 W for 30 min resulted in a three-log total microbiological load reduction, and this was nearly equal to the reduction that could be achieved during biological treatment. Bacterial cell elimination upon irradiation was irreversible as no reappearance of the microorganisms occurred after 24 h

  15. Neuroradiological study of transient ischemic attack

    Energy Technology Data Exchange (ETDEWEB)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-08-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 -- 30 days in 19 cases, 1 -- 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.).

  16. Neuroradiological study of transient ischemic attack

    International Nuclear Information System (INIS)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-01-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 ∼ 30 days in 19 cases, 1 ∼ 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.)

  17. Cyber Attacks and Energy Infrastructures: Anticipating Risks

    International Nuclear Information System (INIS)

    Desarnaud, Gabrielle

    2017-01-01

    This study analyses the likelihood of cyber-attacks against European energy infrastructures and their potential consequences, particularly on the electricity grid. It also delivers a comparative analysis of measures taken by different European countries to protect their industries and collaborate within the European Union. The energy sector experiences an unprecedented digital transformation upsetting its activities and business models. Our energy infrastructures, sometimes more than a decade old and designed to remain functional for many years to come, now constantly interact with light digital components. The convergence of the global industrial system with the power of advanced computing and analytics reveals untapped opportunities at every step of the energy value chain. However, the introduction of digital elements in old and unprotected industrial equipment also exposes the energy industry to the cyber risk. One of the most compelling example of the type of threat the industry is facing, is the 2015 cyber-attack on the Ukraine power grid, which deprived about 200 000 people of electricity in the middle of the winter. The number and the level of technical expertise of cyber-attacks rose significantly after the discovery of the Stuxnet worm in the network of Natanz uranium enrichment site in 2010. Energy transition policies and the growing integration of renewable sources of energy will intensify this tendency, if cyber security measures are not part of the design of our future energy infrastructures. Regulators try to catch up and adapt, like in France where the authorities collaborate closely with the energy industry to set up a strict and efficient regulatory framework, and protect critical operators. This approach is adopted elsewhere in Europe, but common measures applicable to the whole European Union are essential to protect strongly interconnected energy infrastructures against a multiform threat that defies frontiers

  18. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.

  19. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...

  20. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey

    2015-01-01

    Polynomial hashing as an instantiation of universal hashing is a widely employed method for the construction of MACs and authenticated encryption (AE) schemes, the ubiquitous GCM being a prominent example. It is also used in recent AE proposals within the CAESAR competition which aim at providing...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  1. Competitive Reactions to Advertising and Promotion Attacks

    OpenAIRE

    Jan-Benedict E. M. Steenkamp; Vincent R. Nijs; Dominique M. Hanssens; Marnik G. Dekimpe

    2005-01-01

    How do competitors react to each other's price-promotion and advertising attacks? What are the reasons for the observed reaction behavior? We answer these questions by performing a large-scale empirical study on the short-run and long-run reactions to promotion and advertising shocks in over 400 consumer product categories over a four-year time span. Our results clearly show that the most predominant form of competitive response is passive in nature. When a reaction does occur, it is usually ...

  2. Treatment of wastewaters from manufactured gas plants

    Energy Technology Data Exchange (ETDEWEB)

    Cocheci, V.; Bogatu, C.; Radovan, C. [Technical University of Timisoara, Timisoara (Romania)

    1995-12-31

    The treatment of wastewaters with high concentrations of organic compounds often represents a difficult problem. In some cases, for the destruction and removal of toxic compounds using processes like biological and chemical oxidation were proposed. Wastewaters from manufactured gas plants contain high concentrations of organic pollutants and ammonia. In this paper a technology for the treatment of these wastewaters is proposed. The experiments were realized with wastewaters from two Romanian manufactured gas plants. The process consists of the following steps: polycondensation-settling-stripping-biological treatment-electrocoagulation-electrochemical oxidation, or chemical oxidation. 6 refs., 4 tabs.

  3. Disinfection of Ebola Virus in Sterilized Municipal Wastewater.

    Directory of Open Access Journals (Sweden)

    Kyle Bibby

    2017-02-01

    Full Text Available Concerns have been raised regarding handling of Ebola virus contaminated wastewater, as well as the adequacy of proposed disinfection approaches. In the current study, we investigate the inactivation of Ebola virus in sterilized domestic wastewater utilizing sodium hypochlorite addition and pH adjustment. No viral inactivation was observed in the one-hour tests without sodium hypochlorite addition or pH adjustment. No virus was recovered after 20 seconds (i.e. 4.2 log10 unit inactivation to detection limit following the addition of 5 and 10 mg L-1 sodium hypochlorite, which resulted in immediate free chlorine residuals of 0.52 and 1.11 mg L-1, respectively. The addition of 1 mg L-1 sodium hypochlorite resulted in an immediate free chlorine residual of 0.16 mg L-1, which inactivated 3.5 log10 units of Ebola virus in 20 seconds. Further inactivation was not evident due to the rapid consumption of the chlorine residual. Elevating the pH to 11.2 was found to significantly increase viral decay over ambient conditions. These results indicate the high susceptibility of the enveloped Ebola virus to disinfection in the presence of free chlorine in municipal wastewater; however, we caution that extension to more complex matrices (e.g. bodily fluids will require additional verification.

  4. Advanced purification of petroleum refinery wastewater by catalytic vacuum distillation.

    Science.gov (United States)

    Yan, Long; Ma, Hongzhu; Wang, Bo; Mao, Wei; Chen, Yashao

    2010-06-15

    In our work, a new process, catalytic vacuum distillation (CVD) was utilized for purification of petroleum refinery wastewater that was characteristic of high chemical oxygen demand (COD) and salinity. Moreover, various common promoters, like FeCl(3), kaolin, H(2)SO(4) and NaOH were investigated to improve the purification efficiency of CVD. Here, the purification efficiency was estimated by COD testing, electrolytic conductivity, UV-vis spectrum, gas chromatography-mass spectrometry (GC-MS) and pH value. The results showed that NaOH promoted CVD displayed higher efficiency in purification of refinery wastewater than other systems, where the pellucid effluents with low salinity and high COD removal efficiency (99%) were obtained after treatment, and the corresponding pH values of effluents varied from 7 to 9. Furthermore, environment estimation was also tested and the results showed that the effluent had no influence on plant growth. Thus, based on satisfied removal efficiency of COD and salinity achieved simultaneously, NaOH promoted CVD process is an effective approach to purify petroleum refinery wastewater. Copyright 2010 Elsevier B.V. All rights reserved.

  5. Process model economics of xanthan production from confectionery industry wastewaters.

    Science.gov (United States)

    Bajić, Bojana Ž; Vučurović, Damjan G; Dodić, Siniša N; Grahovac, Jovana A; Dodić, Jelena M

    2017-12-01

    In this research a process and cost model for a xanthan production facility was developed using process simulation software (SuperPro Designer ® ). This work represents a novelty in the field for two reasons. One is that xanthan gum has been produced from several wastes but never from wastewaters from confectionery industries. The other more important is that the aforementioned software, which in intended exclusively for bioprocesses, is used for generating a base case, i.e. starting point for transferring the technology to industrial scales. Previously acquired experimental knowledge about using confectionery wastewaters from five different factories as substitutes for commercially used cultivation medium have been incorporated into the process model in order to obtain an economic viability of implementing such substrates. A lower initial sugar content in the medium based on wastewater (28.41 g/L) compared to the synthetic medium (30.00 g/L) gave a lower xanthan content at the end of cultivation (23.98 and 26.27 g/L, respectively). Although this resulted in somewhat poorer economic parameters, they were still in the range of being an investment of interest. Also the possibility of utilizing a cheap resource (waste) and reducing pollution that would result from its disposal has a positive effect on the environment. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. Wastewater treatment facilities: Energy efficient improvements and cogeneration

    International Nuclear Information System (INIS)

    Kunkle, R.; Gray, R.; Delzel, D.

    1992-10-01

    The Washington State Energy Office (WSEO) has worked with both the Bonneville Power Administration (BPA) and the US Department of Energy to provide technical and financial assistance to local governments. Based on a recent study conducted by Ecotope for WSEO, local governments spend an estimated $45 million on utility bills statewide. Water and wastewater facilities account for almost a third of this cost. As a result, WSEO decided to focus its efforts on the energy intensive water and wastewater sector. The ultimate goal of this project was to develop mechanisms to incorporate energy efficiency improvements into wastewater treatment facilities in retrofits and during upgrades, remodels, and new construction. Project activities included the following: The review of the existing regulatory environment for treatment system construction, A summary of financing options for efficiency improvements in treatment facilities, A literature review of energy efficiency opportunities in treatment plants, Survey and site visits to characterize existing facilities in Washington State, Estimates of the energy efficiency and cogeneration potential in the sector, and A case study to illustrate the implementation of an efficiency improvement in a treatment facility

  7. Operability test procedure for PFP wastewater sampling facility

    International Nuclear Information System (INIS)

    Hirzel, D.R.

    1995-01-01

    Document provides instructions for performing the Operability Test of the 225-WC Wastewater Sampling Station which monitors the discharge to the Treated Effluent Disposal Facility from the Plutonium Finishing Plant. This Operability Test Procedure (OTP) has been prepared to verify correct configuration and performance of the PFP Wastewater sampling system installed in Building 225-WC located outside the perimeter fence southeast of the Plutonium Finishing Plant (PFP). The objective of this test is to ensure the equipment in the sampling facility operates in a safe and reliable manner. The sampler consists of two Manning Model S-5000 units which are rate controlled by the Milltronics Ultrasonic flowmeter at manhole No.C4 and from a pH measuring system with the sensor in the stream adjacent to the sample point. The intent of the dual sampling system is to utilize one unit to sample continuously at a rate proportional to the wastewater flow rate so that the aggregate tests are related to the overall flow and thereby eliminate isolated analyses. The second unit will only operate during a high or low pH excursion of the stream (hence the need for a pH control). The major items in this OTP include testing of the Manning Sampler System and associated equipment including the pH measuring and control system, the conductivity monitor, and the flow meter

  8. Treatment of Wastewater with High Conductivity by Pulsed Discharge Plasma

    Science.gov (United States)

    Wang, Zhaojun; Jiang, Song; Liu, Kefu

    2014-07-01

    A wastewater treatment system was established by means of pulsed dielectric barrier discharge (DBD). The main advantage of this system is that the wastewater is employed as one of the electrodes for the degradation of rhodamine B, which makes use of the high conductivity and lessenes its negative influence on the discharge process. At the same time, the reactive species like ozone and ultraviolet (UV) light generated by the DBD can be utilized for the treatment of wastewater. The effects of some factors like conductivity, peak pulse voltage, discharge frequency and pH values were investigated. The results show that the combination of these reactive species could enhance the degradation of the dye while the ozone played the most important role in the process. The degradation efficiency was enhanced with the increase of energy supplied. The reduction in the concentration of rhodamine B was much more effective with high solution conductivity; under the highest conductivity condition, the degradation rate could rise to 99%.

  9. Treatment of Wastewater with High Conductivity by Pulsed Discharge Plasma

    International Nuclear Information System (INIS)

    Wang Zhaojun; Jiang Song; Liu Kefu

    2014-01-01

    A wastewater treatment system was established by means of pulsed dielectric barrier discharge (DBD). The main advantage of this system is that the wastewater is employed as one of the electrodes for the degradation of rhodamine B, which makes use of the high conductivity and lessenes its negative influence on the discharge process. At the same time, the reactive species like ozone and ultraviolet (UV) light generated by the DBD can be utilized for the treatment of wastewater. The effects of some factors like conductivity, peak pulse voltage, discharge frequency and pH values were investigated. The results show that the combination of these reactive species could enhance the degradation of the dye while the ozone played the most important role in the process. The degradation efficiency was enhanced with the increase of energy supplied. The reduction in the concentration of rhodamine B was much more effective with high solution conductivity; under the highest conductivity condition, the degradation rate could rise to 99%. (plasma technology)

  10. Energy and air emission implications of a decentralized wastewater system

    International Nuclear Information System (INIS)

    Shehabi, Arman; Stokes, Jennifer R; Horvath, Arpad

    2012-01-01

    Both centralized and decentralized wastewater systems have distinct engineering, financial and societal benefits. This paper presents a framework for analyzing the environmental effects of decentralized wastewater systems and an evaluation of the environmental impacts associated with two currently operating systems in California, one centralized and one decentralized. A comparison of energy use, greenhouse gas emissions and criteria air pollutants from the systems shows that the scale economies of the centralized plant help lower the environmental burden to less than a fifth of that of the decentralized utility for the same volume treated. The energy and emission burdens of the decentralized plant are reduced when accounting for high-yield wastewater reuse if it supplants an energy-intensive water supply like a desalination one. The centralized facility also reduces greenhouse gases by flaring methane generated during the treatment process, while methane is directly emitted from the decentralized system. The results are compelling enough to indicate that the life-cycle environmental impacts of decentralized designs should be carefully evaluated as part of the design process. (letter)

  11. Disinfection of Ebola Virus in Sterilized Municipal Wastewater.

    Science.gov (United States)

    Bibby, Kyle; Fischer, Robert J; Casson, Leonard W; de Carvalho, Nathalia Aquino; Haas, Charles N; Munster, Vincent J

    2017-02-01

    Concerns have been raised regarding handling of Ebola virus contaminated wastewater, as well as the adequacy of proposed disinfection approaches. In the current study, we investigate the inactivation of Ebola virus in sterilized domestic wastewater utilizing sodium hypochlorite addition and pH adjustment. No viral inactivation was observed in the one-hour tests without sodium hypochlorite addition or pH adjustment. No virus was recovered after 20 seconds (i.e. 4.2 log10 unit inactivation to detection limit) following the addition of 5 and 10 mg L-1 sodium hypochlorite, which resulted in immediate free chlorine residuals of 0.52 and 1.11 mg L-1, respectively. The addition of 1 mg L-1 sodium hypochlorite resulted in an immediate free chlorine residual of 0.16 mg L-1, which inactivated 3.5 log10 units of Ebola virus in 20 seconds. Further inactivation was not evident due to the rapid consumption of the chlorine residual. Elevating the pH to 11.2 was found to significantly increase viral decay over ambient conditions. These results indicate the high susceptibility of the enveloped Ebola virus to disinfection in the presence of free chlorine in municipal wastewater; however, we caution that extension to more complex matrices (e.g. bodily fluids) will require additional verification.

  12. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which are utili......To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...

  13. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version.

    Science.gov (United States)

    Babu, M Rajesh; Dian, S Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things.

  14. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version

    Science.gov (United States)

    Babu, M. Rajesh; Dian, S. Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things. PMID:26495430

  15. On Realistically Attacking Tor with Website Fingerprinting

    Directory of Open Access Journals (Sweden)

    Wang Tao

    2016-10-01

    Full Text Available Website fingerprinting allows a local, passive observer monitoring a web-browsing client’s encrypted channel to determine her web activity. Previous attacks have shown that website fingerprinting could be a threat to anonymity networks such as Tor under laboratory conditions. However, there are significant differences between laboratory conditions and realistic conditions. First, in laboratory tests we collect the training data set together with the testing data set, so the training data set is fresh, but an attacker may not be able to maintain a fresh data set. Second, laboratory packet sequences correspond to a single page each, but for realistic packet sequences the split between pages is not obvious. Third, packet sequences may include background noise from other types of web traffic. These differences adversely affect website fingerprinting under realistic conditions. In this paper, we tackle these three problems to bridge the gap between laboratory and realistic conditions for website fingerprinting. We show that we can maintain a fresh training set with minimal resources. We demonstrate several classification-based techniques that allow us to split full packet sequences effectively into sequences corresponding to a single page each. We describe several new algorithms for tackling background noise. With our techniques, we are able to build the first website fingerprinting system that can operate directly on packet sequences collected in the wild.

  16. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  17. Consciousness in non-epileptic attack disorder.

    Science.gov (United States)

    Reuber, Markus; Kurthen, M

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consciousness should not only distinguish between the 'level' and `content' of consciousness but also between 'phenomenal consciousness' (consciousness of states it somehow "feels to be like") and 'access consciousness' (having certain 'higher' cognitive processes at one's disposal). The existing evidence shows that there is a great intra- and interindividual variability of NEA experience. However, in most NEAs phenomenal experience - and, as a precondition for that experience, vigilance or wakefulness - is reduced to a lesser degree than in those epileptic seizures involving impairment of consciousness. In fact, complete loss of "consciousness" is the exception rather than the rule in NEAs. Patients, as well as external observers, may have a tendency to overestimate impairments of consciousness during the seizures.

  18. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  19. Simulation of Attacks for Security in Wireless Sensor Network

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  20. Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc); D. Shumow

    2017-01-01

    textabstractCounter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was introduced by Stevens at CRYPTO 2013 [22] with a hash collision detection algorithm. That is, an algorithm that detects whether a given single message is part of a colliding message

  1. Estimating Utility

    DEFF Research Database (Denmark)

    Arndt, Channing; Simler, Kenneth R.

    2010-01-01

    A fundamental premise of absolute poverty lines is that they represent the same level of utility through time and space. Disturbingly, a series of recent studies in middle- and low-income economies show that even carefully derived poverty lines rarely satisfy this premise. This article proposes a......, with the current approach tending to systematically overestimate (underestimate) poverty in urban (rural) zones.......A fundamental premise of absolute poverty lines is that they represent the same level of utility through time and space. Disturbingly, a series of recent studies in middle- and low-income economies show that even carefully derived poverty lines rarely satisfy this premise. This article proposes...... an information-theoretic approach to estimating cost-of-basic-needs (CBN) poverty lines that are utility consistent. Applications to date illustrate that utility-consistent poverty measurements derived from the proposed approach and those derived from current CBN best practices often differ substantially...

  2. Accelerating Innovation that Enhances Resource Recovery in the Wastewater Sector: Advancing a National Testbed Network.

    Science.gov (United States)

    Mihelcic, James R; Ren, Zhiyong Jason; Cornejo, Pablo K; Fisher, Aaron; Simon, A J; Snyder, Seth W; Zhang, Qiong; Rosso, Diego; Huggins, Tyler M; Cooper, William; Moeller, Jeff; Rose, Bob; Schottel, Brandi L; Turgeon, Jason

    2017-07-18

    This Feature examines significant challenges and opportunities to spur innovation and accelerate adoption of reliable technologies that enhance integrated resource recovery in the wastewater sector through the creation of a national testbed network. The network is a virtual entity that connects appropriate physical testing facilities, and other components needed for a testbed network, with researchers, investors, technology providers, utilities, regulators, and other stakeholders to accelerate the adoption of innovative technologies and processes that are needed for the water resource recovery facility of the future. Here we summarize and extract key issues and developments, to provide a strategy for the wastewater sector to accelerate a path forward that leads to new sustainable water infrastructures.

  3. Evaluation of rapid methods for in-situ characterization of organic contaminant load and biodegradation rates in winery wastewater.

    Science.gov (United States)

    Carvallo, M J; Vargas, I; Vega, A; Pizarro, G; Pizarr, G; Pastén, P

    2007-01-01

    Rapid methods for the in-situ evaluation of the organic load have recently been developed and successfully implemented in municipal wastewater treatment systems. Their direct application to winery wastewater treatment is questionable due to substantial differences between municipal and winery wastewater. We critically evaluate the use of UV-VIS spectrometry, buffer capacity testing (BCT), and respirometry as rapid methods to determine organic load and biodegradation rates of winery wastewater. We tested three types of samples: actual and treated winery wastewater, synthetic winery wastewater, and samples from a biological batch reactor. Not surprisingly, respirometry gave a good estimation of biodegradation rates for substrate of different complexities, whereas UV-VIS and BCT did not provide a quantitative measure of the easily degradable sugars and ethanol, typically the main components of the COD in the influent. However, our results strongly suggest that UV-VIS and BCT can be used to identify and estimate the concentration of complex substrates in the influent and soluble microbial products (SMP) in biological reactors and their effluent. Furthermore, the integration of UV-VIS spectrometry, BCT, and mathematical modeling was able to differentiate between the two components of SMPs: substrate utilization associated products (UAP) and biomass associated products (BAP). Since the effluent COD in biologically treated wastewaters is composed primarily by SMPs, the quantitative information given by these techniques may be used for plant control and optimization.

  4. Report of the 2nd RCM on Radiation Treatment of Wastewater for Reuse with Particular Focus on Wastewaters Containing Organic Pollutants. Working Material

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    Chronic shortages of water in arid and semi-arid regions of the world and environmental policy regulations have stimulated the search for appropriate technologies capable of treating wastewater for reuse or safe discharge. Industrial effluents often carry chemical contaminants such as organics, petrochemicals, pesticides, dyes and heavy metal ions. The standard biological treatment processes commonly used for wastewater treatment are not capable of treating some of these complex organic chemicals that are found in varying quantities in the wastewaters. Another emerging problem is the increasing presence of pharmaceuticals and endocrine disruptor compounds in municipal wastewater entering into the receiving stream, for which new treatment techniques and procedures are needed to remove excreted drugs before releasing the effluent into public waterways or reuse. Radiation-initiated degradation of organics helps to transform various pollutants into less harmful substances or reduced to the levels below the permissible concentrations. Studies in several Member States (MS) have demonstrated the usefulness and efficiency of radiation technology for treatment of different organic pollutants. The lack of comparative data in pilot scale studies using radiation technique (alone or in combination with other methods) has been a major issue in further utilization of this method for wastewater treatment. There is a need to study further the radiation effects, evaluate reliability and cost of treating specific group of organic pollutants in cooperation with other stakeholders who are involved in using other technologies. The Co-ordinated Research Project (CRP) on “Radiation treatment of wastewater for reuse with particular focus on wastewaters containing organic pollutants” has been launched with the objective to study the effectiveness, reliability and economics of radiation processing technology to treat wastewater contaminated with low and high concentration of organic

  5. Report of the 2nd RCM on Radiation Treatment of Wastewater for Reuse with Particular Focus on Wastewaters Containing Organic Pollutants. Working Material

    International Nuclear Information System (INIS)

    2012-01-01

    Chronic shortages of water in arid and semi-arid regions of the world and environmental policy regulations have stimulated the search for appropriate technologies capable of treating wastewater for reuse or safe discharge. Industrial effluents often carry chemical contaminants such as organics, petrochemicals, pesticides, dyes and heavy metal ions. The standard biological treatment processes commonly used for wastewater treatment are not capable of treating some of these complex organic chemicals that are found in varying quantities in the wastewaters. Another emerging problem is the increasing presence of pharmaceuticals and endocrine disruptor compounds in municipal wastewater entering into the receiving stream, for which new treatment techniques and procedures are needed to remove excreted drugs before releasing the effluent into public waterways or reuse. Radiation-initiated degradation of organics helps to transform various pollutants into less harmful substances or reduced to the levels below the permissible concentrations. Studies in several Member States (MS) have demonstrated the usefulness and efficiency of radiation technology for treatment of different organic pollutants. The lack of comparative data in pilot scale studies using radiation technique (alone or in combination with other methods) has been a major issue in further utilization of this method for wastewater treatment. There is a need to study further the radiation effects, evaluate reliability and cost of treating specific group of organic pollutants in cooperation with other stakeholders who are involved in using other technologies. The Co-ordinated Research Project (CRP) on “Radiation treatment of wastewater for reuse with particular focus on wastewaters containing organic pollutants” has been launched with the objective to study the effectiveness, reliability and economics of radiation processing technology to treat wastewater contaminated with low and high concentration of organic

  6. Comprehensive techno-economic analysis of wastewater-based algal biofuel production: A case study.

    Science.gov (United States)

    Xin, Chunhua; Addy, Min M; Zhao, Jinyu; Cheng, Yanling; Cheng, Sibo; Mu, Dongyan; Liu, Yuhuan; Ding, Rijia; Chen, Paul; Ruan, Roger

    2016-07-01

    Combining algae cultivation and wastewater treatment for biofuel production is considered the feasible way for resource utilization. An updated comprehensive techno-economic analysis method that integrates resources availability into techno-economic analysis was employed to evaluate the wastewater-based algal biofuel production with the consideration of wastewater treatment improvement, greenhouse gases emissions, biofuel production costs, and coproduct utilization. An innovative approach consisting of microalgae cultivation on centrate wastewater, microalgae harvest through flocculation, solar drying of biomass, pyrolysis of biomass to bio-oil, and utilization of co-products, was analyzed and shown to yield profound positive results in comparison with others. The estimated break even selling price of biofuel ($2.23/gallon) is very close to the acceptable level. The approach would have better overall benefits and the internal rate of return would increase up to 18.7% if three critical components, namely cultivation, harvest, and downstream conversion could achieve breakthroughs. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  8. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Lou Wei

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  9. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    Science.gov (United States)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  10. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  11. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    Science.gov (United States)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  12. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  13. Secondary wastewater treatment by microalgae isolated from ...

    African Journals Online (AJOL)

    Microalgae play a fundamental role in primary and secondary wastewater treatment. In this work the growth, photosynthetic activity and removal of phosphorus from wastewater effluents by indigenous blue-green algal species, Spirulina and Oscillatoria, isolated from Gaborone oxidation ponds was studied. Oscillatoria and ...

  14. Treatment and recycling of textile wastewaters

    International Nuclear Information System (INIS)

    Ciardelli, G.; Brighetti, G.

    1999-01-01

    The results of an experimental campaign involving the treatment of textile wastewaters for recycle by mean of an absorption resins pilot plant are briefly described. The case study concerned the treatment and reuse of yarns dyeing wastewaters. Results obtained indicate the possibility of an industrial scale implementation of the technique [it

  15. Industrial wastewater treatment with electron beam

    Energy Technology Data Exchange (ETDEWEB)

    Han, Bumsoo; Ko, Jaein; Kim, Jinkyu; Kim, Yuri; Chung, Wooho [Central Research Institute of Samsung Heavy Industries Co., Taejon (Korea)

    2001-03-01

    Global withdrawals of water to satisfy human demands have grown dramatically in this century. Between 1900 and 1945, water consumption increased by over six times, more than double the rate of population growth. This rapid growth in water demand is due to the increasing reliance on irrigation to achieve food security, the growth of industrial uses, and the increasing use per capita for domestic purposes. Given the seriousness of the situation and future risk of crises, there is an urgent need to develop the water-efficient technologies including economical treatment methods of wastewater and polluted water. In the Central Research Institute of Samsung Heavy Industries (SHI), many industrial wastewater including leachate from landfill area, wastewater from papermill, dyeing complex, petrochemical processes, etc. are under investigation with electron beam irradiation. For the study of treating dyeing wastewater combined with conventional facilities, an electron beam pilot plant for treating 1,000m{sup 3}/day of wastewater from 80,000m{sup 3}/day of total dyeing wastewater has constructed and operated in Taegu Dyeing Industrial Complex. A commercial plant for re-circulation of wastewater from Papermill Company is also designed for S-paper Co. in Cheongwon City, and after the successful installation, up to 80% of wastewater could be re-used in paper producing process. (author)

  16. Industrial wastewater treatment with electron beam

    International Nuclear Information System (INIS)

    Han, Bumsoo; Ko, Jaein; Kim, Jinkyu; Kim, Yuri; Chung, Wooho

    2001-01-01

    Global withdrawals of water to satisfy human demands have grown dramatically in this century. Between 1900 and 1945, water consumption increased by over six times, more than double the rate of population growth. This rapid growth in water demand is due to the increasing reliance on irrigation to achieve food security, the growth of industrial uses, and the increasing use per capita for domestic purposes. Given the seriousness of the situation and future risk of crises, there is an urgent need to develop the water-efficient technologies including economical treatment methods of wastewater and polluted water. In the Central Research Institute of Samsung Heavy Industries (SHI), many industrial wastewater including leachate from landfill area, wastewater from papermill, dyeing complex, petrochemical processes, etc. are under investigation with electron beam irradiation. For the study of treating dyeing wastewater combined with conventional facilities, an electron beam pilot plant for treating 1,000m 3 /day of wastewater from 80,000m 3 /day of total dyeing wastewater has constructed and operated in Taegu Dyeing Industrial Complex. A commercial plant for re-circulation of wastewater from Papermill Company is also designed for S-paper Co. in Cheongwon City, and after the successful installation, up to 80% of wastewater could be re-used in paper producing process. (author)

  17. Nutrients requirements in biological industrial wastewater treatment ...

    African Journals Online (AJOL)

    In both these wastewaters nutrients were not added. A simple formula is introduced to calculate nutrient requirements based on removal efficiency and observed biomass yield coefficient. Key Words: Olive mill wastewater; anaerobic treatment; aerobic treatment; sequencing batch reactor; biomass yield; nutrient requirement.

  18. Domestic wastewater treatment using electron accelerator

    International Nuclear Information System (INIS)

    Borrely, Sueli I.

    1995-01-01

    This work aims the application of an industrial electron beam accelerator to disinfect sludge and to remove organic matter existent in the influent and effluent from the Mairipora domestic wastewater treatment plant. The in vitro Co-60 radiosensitivity of the major representative Salmonella species in wastewater from Sao Paulo city was also studied. (author). 66 refs., 19 figs., 12 tabs

  19. Cytogenotoxicity screening of untreated hospital wastewaters using ...

    African Journals Online (AJOL)

    Physico-chemical parameters of the wastewaters were determined in accordance with standard methods. Onions root growth inhibition test was used to assess the toxic status of the wastewaters, while cytogenotoxicity was measured by microscopic investigation of the chromosomal aberrations. Onion bulbs were exposed ...

  20. Options for wastewater management in Harare, Zimbabwe

    NARCIS (Netherlands)

    Nhapi, I.

    2004-01-01

    The sustainable management of wastewater should aim at pollution prevention and reduction first, followed by resource recovery and reuse. This thesis shows that substantial water quality improvements could be achieved through a so-called 3-Step Strategic Approach to wastewater management. This