WorldWideScience

Sample records for attack wastewater utilities

  1. Reducing the Risks. In the aftermath of a terrorist attack, wastewater utilities may have to contend with decontamination water containing chemical, biological, or radiological substances

    Energy Technology Data Exchange (ETDEWEB)

    Warren, Linda P.; Hornback, Chris; Strom, Daniel J.

    2006-08-01

    In the aftermath of a chemical, biological, or radiological (CBR) attack, decontamination of people and infrastructure will be needed. Decontamination inevitably produces wastewater, and wastewater treatment plants (WTPs) need to know how to handle decontamination wastewater. This article describes CBR substances; planning, coordinating, and communicating responses across agencies; planning within a utility; coordination with local emergency managers and first responders; mitigating effects of decontamination wastewater; and mitigating effects on utility personnel. Planning for Decontamination Wastewater: A Guide for Utilities, the document on which this article is based, was developed under a cooperative agreement from the U.S. Environmental Protection Agency by the National Association of Clean Water Agencies (NACWA) and its contractor, CH2MHILL, Inc.

  2. Protecting water and wastewater infrastructure from cyber attacks

    Science.gov (United States)

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  3. Fischer-Tropsch Wastewater Utilization

    Science.gov (United States)

    Shah, Lalit S.

    2003-03-18

    The present invention is generally directed to handling the wastewater, or condensate, from a hydrocarbon synthesis reactor. More particularly, the present invention provides a process wherein the wastewater of a hydrocarbon synthesis reactor, such as a Fischer-Tropsch reactor, is sent to a gasifier and subsequently reacted with steam and oxygen at high temperatures and pressures so as to produce synthesis gas. The wastewater may also be recycled back to a slurry preparation stage, where solid combustible organic materials are pulverized and mixed with process water and the wastewater to form a slurry, after which the slurry fed to a gasifier where it is reacted with steam and oxygen at high temperatures and pressures so as to produce synthesis gas.

  4. BIOTECHNOLOGY OF UTILIZATION OF MUNICIPAL WASTEWATER SEDIMENTS

    Directory of Open Access Journals (Sweden)

    G. N. Nikovskaya

    2014-06-01

    Full Text Available Analysis of information on air-conditioning contaminated with heavy metals sludge municipal wastewater points to the actual ecological and chemical problem and its solution could be implemented within the framework of the biological process involving heterotrophic microorganisms. Information on the spread, toxicity, biochemistry, microbiology, colloidal and chemical properties of sludge sediments of municipal wastewater biological treatment is given in the review. These sediments contain vitamins, amino acids, organic matter, heavy metals (micro- and macroelements. Therefore the most rational approach to sludge wastes utilization is their use as an agricultural fertilizer after partial removal of heavy metals. Hence, the interaction of sludge components with heavy metals, modern methods of their removing from biocolloidal systems and biotechnologies of conversion of sludge wastes into fertilizer based on the enhancing of vital ability of sludge biocenoses are discussed.

  5. Resilience Mitigation Financing for Water and Wastewater Utilities Webinar

    Science.gov (United States)

    The Resilience Mitigation Financing for Water and Wastewater Utilities webinar focuses on tools and financing resources to conduct resilience planning and to mitigate impacts before a disaster strikes.

  6. Asset Management for Water and Wastewater Utilities

    Science.gov (United States)

    Renewing and replacing the nation's public water infrastructure is an ongoing task. Asset management can help a utility maximize the value of its capital as well as its operations and maintenance dollars.

  7. Balance in Training for Latin American Water and Wastewater Utilities

    Science.gov (United States)

    Carefoot, Neil F.

    1977-01-01

    Using a Peru case study, this article examines the problem of training imbalance for water and wastewater operators. Guidelines towards achieving adequate training for all water and wastewater personnel are suggested. (Author/MA)

  8. Estimated Buried Utility Water and Wastewater Lines at Little Bighorn Battlefield National Monument, Montana

    Data.gov (United States)

    National Park Service, Department of the Interior — The water and wastewater lines were compiled from utility lines collected with GPS equipment in the summer of 2003 and then merged with older water line data...

  9. Navajo Tribal Utility Authority Shiprock Wastewater Treatment Facility; Draft NPDES Permit

    Science.gov (United States)

    EPA is proposing to issue a NPDES permit (No. NN0020621) to Navajo Tribal Utility Authority (NTUA) for the Shiprock wastewater treatment facility in San Juan County, New Mexico, within the northeastern portion of the Navajo Nation.

  10. Production of Spirulina sp by utilization of wastewater from the powder type energy drinks

    Science.gov (United States)

    Sumantri, Indro; Priyambada, Ika Bagus

    2015-12-01

    Wastewater of energy drink type of powder produced when the the production equipment required cleaning treatment to produce one taste to others. These equipments washed by water, so that, it produced wastewater. It contains high organic substances and classified as high degradable due to food product. The content of wastewater is high carbon and nitrogen substances. Microalgae is an autotrophic microorganism, live without carbon presence, utilized to digest the substances in wastewater especially for nitrogen substances. Spirulina sp is the type of microalgae selected to utilize the wastewater of energy drink, the selection criteria is the size of Spirulina sp is relatively large and easy to separated from its solution. The experiment conducted by cultivate the seeding microalgae with certain nutrients until the certain volume. The synthetic wastewater obtained from one of energy drink type of powder with commercial brand as Kuku Bima Ener-G, the wastewater concentration selected under the close to the real condition of wastewater as basis of COD measurement (6 sachet/L or COD of 12.480mg/L) and aqueous concentration (1 sachet/L or COD of 2080mg/L). The batch experiments with 1L volume conducted and with variable of percent volume of wastewater added in order to observe the growth of microlagae. The response of the microalgae growth obtained by increasing the optical density of the microalgae solution and continued by calculation for the growth rate of microalgae. The result of the experiments indicated that for the aqueous concentration (1 sachet/L or COD of 2080mg/L) the optimum added of wastewater is 40 % with growrate of 0.55/day while for the concentrated wastewater (6 sachet/L or COD of 12.480mg/L), the optimum condition is 25 % wastewater added with growth rate of 0.43/day.

  11. Utilization of municipal wastewater for cooling in thermoelectric power plants

    Energy Technology Data Exchange (ETDEWEB)

    Safari, Iman [Illinois Inst. of Technology, Chicago, IL (United States); Walker, Michael E. [Illinois Inst. of Technology, Chicago, IL (United States); Hsieh, Ming-Kai [Carnegie Mellon Univ., Pittsburgh, PA (United States); Dzombak, David A. [Carnegie Mellon Univ., Pittsburgh, PA (United States); Liu, Wenshi [Univ. of Pittsburgh, PA (United States); Vidic, Radisav D. [Univ. of Pittsburgh, PA (United States); Miller, David C. [National Energy Technology Lab. (NETL), Morgantown, WV (United States); Abbasian, Javad [Illinois Inst. of Technology, Chicago, IL (United States)

    2013-09-01

    A process simulation model has been developed using Aspen Plus® with the OLI (OLI System, Inc.) water chemistry model to predict water quality in the recirculating cooling loop utilizing secondary- and tertiary-treated municipal wastewater as the source of makeup water. Simulation results were compared with pilot-scale experimental data on makeup water alkalinity, loop pH, and ammonia evaporation. The effects of various parameters including makeup water quality, salt formation, NH3 and CO2 evaporation mass transfer coefficients, heat load, and operating temperatures were investigated. The results indicate that, although the simulation model can capture the general trends in the loop pH, experimental data on the rates of salt precipitation in the system are needed for more accurate prediction of the loop pH. It was also found that stripping of ammonia and carbon dioxide in the cooling tower can influence the cooling loop pH significantly. The effects of the NH3 mass transfer coefficient on cooling loop pH appear to be more significant at lower values (e.g., kNH3 < 4×10-3 m/s) when the makeup water alkalinity is low (e.g., <90 mg/L as CaCO3). The effect of the CO2 mass transfer coefficient was found to be significant only at lower alkalinity values (e.g., kCO2<4×10-6 m/s).

  12. Purification and utilization of garlic processing wastewater in lotus pond wetlands

    Directory of Open Access Journals (Sweden)

    Jun Pang

    2014-10-01

    Full Text Available Based on the experiments of utilization of garlic processing wastewater in a lotus pond, this study demonstrates that lotus pond wetlands have a remarkable ability to remove organic pollutants and decrease chemical oxygen demand (CODCr, biochemical oxygen demand (BOD5, and suspended substances (SS in garlic processing wastewater. Results also show evident effects of lotus roots on absorption of NH3-N. The pH value in a lotus pond with wastewater discharged was relatively stable. The water quality in the lotus pond reached the class II emission standard, according to the Integrated Wastewater Discharge Standard (GB8978-1996, seven days after pretreated garlic processing wastewater had been discharged into the lotus pond. Garlic processing wastewater irrigation does not produce pollution in the pond sediment and has no negative effect on the growth of lotus roots. Due to utilization of garlic processing wastewater, the output of lotus roots increased by 3.0% to 8.3%, and the quality of lotus roots was improved. Therefore, better purification and utilization results can be achieved.

  13. Purification and utilization of garlic processing wastewater in lotus pond wetlands

    Directory of Open Access Journals (Sweden)

    Jun PANG

    2015-10-01

    Full Text Available Based on the experiments of utilization of garlic processing wastewater in a lotus pond, this study demonstrates that lotus pond wetlands have a remarkable ability to remove organic pollutants and decrease chemical oxygen demand (CODCr, biochemical oxygen demand (BOD5, and suspended substances (SS in garlic processing wastewater. Results also show evident effects of lotus roots on absorption of NH3-N. The pH value in a lotus pond with wastewater discharged was relatively stable. The water quality in the lotus pond reached the class Ⅱ emission standard, according to the Integrated Wastewater Discharge Standard (GB8978-1996, seven days after pretreated garlic processing wastewater had been discharged into the lotus pond. Garlic processing wastewater irrigation does not produce pollution in the pond sediment and has no negative effect on the growth of lotus roots. Due to utilization of garlic processing wastewater, the output of lotus roots increased by 3.0% to 8.3%, and the quality of lotus roots was improved. Therefore, better purification and utilization results can be achieved.

  14. The sustainable utilization of malting industry wastewater biological treatment sludge

    Science.gov (United States)

    Vasilenko, T. A.; Svintsov, A. V.; Chernysh, I. V.

    2018-01-01

    The article deals with the research of using the sludge from malting industry wastewater’s biological treatment and the calcium carbonate slurry as organo-mineral fertilizing additives. The sludge, generated as a result of industrial wastewater biological treatment, is subject to dumping at solid domestic waste landfills, which has a negative impact on the environment, though its properties and composition allow using it as an organic fertilizer. The physical and chemical properties of both wastes have been studied; the recommendations concerning the optimum composition of soil mix, containing the above-mentioned components, have been provided. The phytotoxic effect on the germination capacity and sprouts of cress (Lepidium sativum), barley (Hordéum vulgáre) and oats (Avena sativa) in soil mixes has been determined. The heavy metals and arsenic contents in the sludge does not exceed the allowable level; it is also free of pathogenic flora and helminthes.

  15. Economic analysis of municipal wastewater utilization for thermoelectric power production

    Energy Technology Data Exchange (ETDEWEB)

    Safari, I.; Walker, M.; Abbasian, J.; Arastoopour, H.; Hsieh, M-K.; Theregowda, R.; Dzombak, D.; Miller, D.

    2011-01-01

    The thermoelectric power industry in the U.S. uses a large amount of freshwater. The large water demand is increasingly a problem, especially for new power plant development, as availability of freshwater for new uses diminishes in the United States. Reusing non-traditional water sources, such as treated municipal wastewater, provides one option to mitigate freshwater usage in the thermoelectric power industry. The amount of freshwater withdrawal that can be displaced with non-traditional water sources at a particular location requires evaluation of the water management and treatment requirements, considering the quality and abundance of the non-traditional water sources. This paper presents the development of an integrated costing model to assess the impact of degraded water treatment, as well as the implications of increased tube scaling in the main condenser. The model developed herein is used to perform case studies of various treatment, condenser cleaning and condenser configurations to provide insight into the ramifications of degraded water use in the cooling loops of thermoelectric power plants. Further, this paper lays the groundwork for the integration of relationships between degraded water quality, scaling characteristics and volatile emission within a recirculating cooling loop model.

  16. Utilization of secondary-treated wastewater for the production of freshwater microalgae.

    Science.gov (United States)

    Gómez-Serrano, C; Morales-Amaral, M M; Acién, F G; Escudero, R; Fernández-Sevilla, J M; Molina-Grima, E

    2015-08-01

    In this work, we studied the potential use of secondary-treated wastewater as nutrient source in the production of freshwater microalgae strains. Experiments were performed indoors in a semicontinuous mode, at 0.3 day(-1), simulating outdoor conditions. We demonstrated that all the tested strains can be produced by using only secondary-treated wastewater as the nutrient source. The utilization of secondary-treated wastewater imposes nutrient-limiting conditions, with maximal biomass productivity dropping to 0.5 g l(-1) day(-1) and modifies the biochemical composition of the biomass by increasing the amount of lipids and carbohydrates while reducing the biomass protein content. We measured fatty acid content and productivity of up to 25 %d.wt. and 110 mg l(-1) day(-1), respectively. We demonstrated that all the tested strains were capable of completely removing the nitrogen and phosphorus contained in the secondary-treated wastewater, and while the use of this effluent reduced the cells' photosynthetic efficiency, the nitrogen and phosphorus coefficient yield increased. Muriellopsis sp. and S. subpicatus were selected as the most promising strains for outdoor production using secondary-treated wastewater as the culture medium; this was not only because of their high productivity but also their photosynthetic efficiency, of up to 2.5 %, along with nutrient coefficient yields of up to 96 gbiomass gN (-1) and 166 gbiomass gP (-1). Coupling microalgae production processes to tertiary treatment in wastewater treatment plants make it possible to recover nutrients contained in the water and to produce valuable biomass, especially where nutrient removal is required prior to wastewater discharge.

  17. wastewaters

    African Journals Online (AJOL)

    DRINIE

    2003-10-04

    Oct 4, 2003 ... system without affecting the biochemical reactions in the reactor, whereas .... Results of inert COD experiment for the Study A. Time. Reactor 1. Reactor 2. Fed with raw. Fed with filtered wastewater wastewater. (COD, mg·l-1). (COD .... rate limiting process component for heterotrophic growth in the. IIDWTP.

  18. NEUTRALIZING WASTEWATER FROM PUBLIC UTILITIES ON RURAL AREAS

    Directory of Open Access Journals (Sweden)

    Piotr Bugajski

    2015-10-01

    Full Text Available The research aimed at determining a potential use of domestic sewage treatment plants based on activated sludge for the disposal of wastes drained from schools in rural areas. Selected pollutant indicators, such as: BOD5, COD, total suspended solids, total nitrogen and phosphates were the basis for determining the composition of raw sewage discharged by public utility objects and the quality of treated sewage considering the days when lessons were taking place at school and days free from classes. The analysis of the results revealed that household sewage treatment plants based on activated sludge may be used for waste disposal from public facilities, such as schools.

  19. wastewater

    African Journals Online (AJOL)

    Mtui-Combined chemical and biological treatment of recalcitrant industrial effluets. Tzitzi M, Vayenas DV and Lyberatos G 1994 Pretreatment of textile industry wastewater with ozone. Water Sci. Tech. 29(9): 151-160. Walter RH and Sherman RM 1974 Ozonation of lactic acid fermentation effluent. J. Water Poll. Control Fed.

  20. A combined model to assess technical and economic consequences of changing conditions and management options for wastewater utilities.

    Science.gov (United States)

    Giessler, Mathias; Tränckner, Jens

    2018-02-01

    The paper presents a simplified model that quantifies economic and technical consequences of changing conditions in wastewater systems on utility level. It has been developed based on data from stakeholders and ministries, collected by a survey that determined resulting effects and adapted measures. The model comprises all substantial cost relevant assets and activities of a typical German wastewater utility. It consists of three modules: i) Sewer for describing the state development of sewer systems, ii) WWTP for process parameter consideration of waste water treatment plants (WWTP) and iii) Cost Accounting for calculation of expenses in the cost categories and resulting charges. Validity and accuracy of this model was verified by using historical data from an exemplary wastewater utility. Calculated process as well as economic parameters shows a high accuracy compared to measured parameters and given expenses. Thus, the model is proposed to support strategic, process oriented decision making on utility level. Copyright © 2017 Elsevier Ltd. All rights reserved.

  1. An innovative integrated system utilizing solar energy as power for the treatment of decentralized wastewater.

    Science.gov (United States)

    Han, Changfu; Liu, Junxin; Liang, Hanwen; Guo, Xuesong; Li, Lin

    2013-02-01

    This article reports an innovative integrated system utilizing solar energy as power for decentralized wastewater treatment, which consists of an oxidation ditch with double channels and a photovoltaic (PV) system without a storage battery. Because the system operates without a storage battery, which can reduce the cost of the PV system, the solar radiation intensity affects the amount of power output from the PV system. To ensure that the power output is sufficient in all different weather conditions, the solar radiation intensity of 78 W/m2 with 95% confidence interval was defined as a threshold of power output for the PV system according to the monitoring results in this study, and a step power output mode was used to utilize the solar energy as well as possible. The oxidation ditch driven by the PV system without storage battery ran during the day and stopped at night. Therefore, anaerobic, anoxic and aerobic conditions could periodically appear in the oxidation ditch, which was favorable to nitrogen and phosphate removal from the wastewater. The experimental results showed that the system was efficient, achieving average removal efficiencies of 88% COD, 98% NH4+-N, 70% TN and 83% TP, under the loading rates of 140 mg COD/(g MLSS x day), 32 mg NH4+-N/(g MLSS x day), 44 mg TN/(g MLSS x day) and 5 mg TP/(g MLSS x day).

  2. The Effects of Operational and Environmental Variables on Efficiency of Danish Water and Wastewater Utilities

    Directory of Open Access Journals (Sweden)

    Andrea Guerrini

    2015-06-01

    Full Text Available Efficiency improvement is one of three patterns a public utility should follow in order to get funds for investments realization. The other two are recourse to bank loans or to private equity and tariff increase. Efficiency can be improved, for example, by growth and vertical integration and may be conditioned by environmental variables, such as customer and output density. Prior studies into the effects of these variables on the efficiency of water utilities do not agree on certain points (e.g., scale and economies of scope and rarely consider others (e.g., density economies. This article aims to contribute to the literature by analysing the efficiency of water utilities in Denmark, observing the effects of operational and environmental variables. The method is based on two-stage Data Envelopment Analysis (DEA applied to 101 water utilities. We found that the efficiency of the water sector was not affected by the observed variables, whereas that of wastewater was improved by smaller firm size, vertical integration strategy, and higher population density.

  3. Caffeine in Boston Harbor past and present, assessing its utility as a tracer of wastewater contamination in an urban estuary

    Science.gov (United States)

    Sites throughout Boston Harbor were analyzed for caffeine to assess its utility as a tracer in identifying sources of sanitary wastewater. Caffeine ranged from 15 ng/L in the outer harbor to a high of 185 ng/L in the inner harbor. Inner harbor concentrations were a result of comb...

  4. Estimation of Viable Biomass In Wastewater And Activated Sludge By Determination of ATP, Oxygen Utilization Rate And FDA Hydrolysis

    DEFF Research Database (Denmark)

    Jørgensen, Poul-Erik; Eriksen, T.; Jensen, B.K.

    1992-01-01

    ATP content, oxygen utilization rate (OUR) and fluorescein diacetate (FDA) hydrolysis were tested for the ability to express the amount of viable biomass in wastewater and activated sludge. The relationship between biomass and these activity parameters was established in growth cultures made...... with biomass, while FDA hydrolysis in the sludge failed to show any such correlation. Conversion factors of 3 mg ATP/g dw, 300 mg O2/h g dw and 0.4 A/h (mg dw/ml) for ATP, OUR and FDA methods, respectively, were calculated. When the methods were applied for in situ determinations in four different wastewater...... plants, it was found that ATP content and respiration rate estimated viable biomass to range from 81 to 293 mg dw/g SS for raw wastewater and from 67 to 187 mg dw/g SS for activated sludge with a rather weak correlation between ATP and respiration measurements. The FDA hydrolysis estimated viable biomass...

  5. Caffeine in Boston Harbor past and present, assessing its utility as a tracer of wastewater contamination in an urban estuary.

    Science.gov (United States)

    Cantwell, Mark G; Katz, David R; Sullivan, Julia C; Borci, Todd; Chen, Robert F

    2016-07-15

    Sites throughout Boston Harbor were analyzed for caffeine to assess its utility as a tracer in identifying sources of sanitary wastewater. Caffeine ranged from 15ng/L in the outer harbor to a high of 185ng/L in the inner harbor. Inner harbor concentrations were a result of combined sewage overflow (CSO) events as well as illicit discharge of sanitary sewage into municipal storm drains. Comparing current results to data from 1998 to 1999 shows reductions in caffeine levels. Reductions are attributed to termination of effluent discharge to the harbor, declines in the number of CSOs and discharge volume along with efforts to eliminate illicit discharges. Spatial distributions of caffeine identified CSOs as major contemporary sources to the inner harbor. The findings further establish the utility of caffeine as a tracer for sanitary wastewater contamination in urban estuaries and demonstrate the efficacy of pollution reduction strategies undertaken in recent decades in Boston Harbor. Published by Elsevier Ltd.

  6. Acrylic acid removal by acrylic acid utilizing bacteria from acrylonitrile-butadiene-styrene resin manufactured wastewater treatment system.

    Science.gov (United States)

    Wang, C C; Lee, C M

    2006-01-01

    The aim of this study is to isolate the acrylic acid utilizing bacteria from the ABS resin manufactured wastewater treatment system. The bacteria should have the ability to remove acrylic acid and tolerate the acrylonitrile and acrylamide toxicity. The aim is also to understand the performance of isolated pure strain for treating different initial acrylic acid concentrations from synthetic wastewater. The results are: twenty strains were isolated from the ABS resin manufactured wastewater treatment system and twelve of them could utilize 600 mg/l acrylic acid for growth. Seven of twelve strains could tolerate the acrylonitrile and acrylamide toxicity, when the concentration was below 300 mg/l. Bacillus thuringiensis was one of the seven strains and the optimum growth temperature was 32 degrees C. Bacillus thuringiensis could utilize acrylic acid for growth, when the initial acrylic acid concentration was below 1,690.4 mg/l. Besides this, when the initial acrylic acid concentration was below 606.8 mg/l, the acrylic acid removal efficiency exceeded 96.3%. Bacillus thuringiensis could tolerate 295.7 mg/l acrylamide and 198.4 mg/l acrylonitrile toxicity but could not tolerate 297.3 mg/l epsilon-caprolactam.

  7. Assessment of wastewater treatment plant effluent on fish reproduction utilizing the adverse outcome pathway conceptual framework

    Science.gov (United States)

    Wastewater treatment plant (WWTP) effluents are a known contributor of chemical mixture inputs into the environment. Whole effluent testing guidelines were developed to screen these complex mixtures for acute toxicity. However, efficient and cost-effective approaches for screenin...

  8. Utilization of Paper Sludge Wastes for Treatment of Wastewater from Food Processing Industries

    Directory of Open Access Journals (Sweden)

    Tohru Suzuki

    2012-12-01

    Full Text Available The food processing industries usually produced large amount of wastewater containing fine and small particles. It takes long time for complete settlement of the fine and small particles in the wastewater. The coagulation method appears to become one of the useful treatments. New inorganic coagulant named “Agoclean‒P” has been developed from paper sludge ash. The treatment by coagulation and flocculation were carried out for the wastewater from three different food processing industries namely soup, tofu, and natto. “Hi‒Biah‒System”, which is an in‒situ solidification system, was used for the continuous treatment of wastewater. The parameters for the water quality were pH, five‒day biochemical oxygen demand (BOD5, chemical oxygen demand (COD, total suspended solids (TSS, total nitrogen (TN and total phosphorus (TP. These parameters after the treatment became much lower values relative to those obtained before the treatment.

  9. Emergy Analysis for the Sustainable Utilization of Biosolids Generated in a Municipal Wastewater Treatment Plant

    Science.gov (United States)

    This contribution describes the application of an emergy-based methodology for comparing two management alternatives of biosolids produced in a wastewater treatment plant. The current management practice of using biosolids as soil fertilizers was evaluated and compared to another...

  10. Algae-based biofilm productivity utilizing dairy wastewater: effects of temperature and organic carbon concentration

    National Research Council Canada - National Science Library

    Fica, Zachary T; Sims, Ronald C

    2016-01-01

    .... The dairy industry is a significant source of wastewater worldwide that could provide an inexpensive and nutrient rich feedstock for the cultivation of algae biomass for use in downstream processing...

  11. Catalytic ozonation of petroleum refinery wastewater utilizing Mn-Fe-Cu/Al2O 3 catalyst.

    Science.gov (United States)

    Chen, Chunmao; Yoza, Brandon A; Wang, Yandan; Wang, Ping; Li, Qing X; Guo, Shaohui; Yan, Guangxu

    2015-04-01

    There is of great interest to develop an economic and high-efficient catalytic ozonation system (COS) for the treatment of biologically refractory wastewaters. Applications of COS require options of commercially feasible catalysts. Experiments in the present study were designed to prepare and investigate a novel manganese-iron-copper oxide-supported alumina-assisted COS (Mn-Fe-Cu/Al2O3-COS) for the pretreatment of petroleum refinery wastewater. The highly dispersed composite metal oxides on the catalyst surface greatly promoted the performance of catalytic ozonation. Hydroxyl radical mediated oxidation is a dominant reaction in Mn-Fe-Cu/Al2O3-COS. Mn-Fe-Cu/Al2O3-COS enhanced COD removal by 32.7% compared with a single ozonation system and by 8-16% compared with Mn-Fe/Al2O3-COS, Mn-Cu/Al2O3-COS, and Fe-Cu/Al2O3-COS. The O/C and H/C ratios of oxygen-containing polar compounds significantly increased after catalytic ozonation, and the biodegradability of petroleum refinery wastewater was significantly improved. This study illustrates potential applications of Mn-Fe-Cu/Al2O3-COS for pretreatment of biologically refractory wastewaters.

  12. Oil and Grease Removal from Industrial Wastewater Using New Utility Approach

    Directory of Open Access Journals (Sweden)

    H. S. Abd El-Gawad

    2014-01-01

    Full Text Available The present study is an attempt to investigate oil and grease pollution that may pollute fresh water and influence aquatic environment. Then removal of oil and grease from manufacturing wastewater befall essential but common techniques not enough. Enzyme and adsorption units representing major developed new laboratory were selected to assess the water quality and humiliation prospective of oil and grease from wastewater. Several components and environmental variables that were dissolved oxygen, bacteriology measure, flow rate and adsorption material amount studied to assess the removal performance of oil and grease. The results elucidated significant variations among different tests which influenced microbial necessary role of oxidation declining develop biological treatment process reached to 72%. The study stressed out natural material (zeolite that enhanced organic reduction under optimal conditions. These conditions were closer spacing and high length of adsorbing unit that led to increase oil and grease contact period with adsorbent and added to increase performance removal reached to 99%.

  13. Benchmarking the scientific output of industrial wastewater research in Arab world by utilizing bibliometric techniques.

    Science.gov (United States)

    Zyoud, Shaher H; Al-Rawajfeh, Aiman E; Shaheen, Hafez Q; Fuchs-Hanusch, Daniela

    2016-05-01

    Rapid population growth, worsening of the climate, and severity of freshwater scarcity are global challenges. In Arab world countries, where water resources are becoming increasingly scarce, the recycling of industrial wastewater could improve the efficiency of freshwater use. The benchmarking of scientific output of industrial wastewater research in the Arab world is an initiative that could support in shaping up and improving future research activities. This study assesses the scientific output of industrial wastewater research in the Arab world. A total of 2032 documents related to industrial wastewater were retrieved from 152 journals indexed in the Scopus databases; this represents 3.6 % of the global research output. The h-index of the retrieved documents was 70. The total number of citations, at the time of data analysis, was 34,296 with an average citation of 16.88 per document. Egypt, with a total publications of 655 (32.2 %), was ranked the first among the Arab countries followed by Saudi Arabia 300 (14.7 %) and Tunisia 297 (14.6 %). Egypt also had the highest h-index, assumed with Saudi Arabia, the first place in collaboration with other countries. Seven hundred fifteen (35.2 %) documents with 66 countries in Arab/non-Arab country collaborations were identified. Arab researchers collaborated mostly with researchers from France 239 (11.7 %), followed by the USA 127 (6.2 %). The top active journal was Desalination 126 (6.2 %), and the most productive institution was the National Research Center, Egypt 169 (8.3 %), followed by the King Abdul-Aziz University, Saudi Arabia 75 (3.7 %). Environmental Science was the most prevalent field of interest 930 (45.8 %). Despite the promising indicators, there is a need to close the gap in research between the Arab world and the other nations. Optimizing the investments and developing regional experiences are key factors to promote the scientific research.

  14. Cultivation of Nannochloropsis oceanica biomass rich in eicosapentaenoic acid utilizing wastewater as nutrient resource.

    Science.gov (United States)

    Mitra, Madhusree; Shah, Freny; Bharadwaj, S V Vamsi; Patidar, Shailesh Kumar; Mishra, Sandhya

    2016-10-01

    The eicosapentaenoic acid rich marine eustigmatophyte Nannochloropsis oceanica was grown in wastewaters sampled from four different industries (i.e. pesticides industry, pharmaceutical industry, activated sludge treatment plant of municipality sewage and petroleum (oil) industry). Under the wastewater based growth conditions used in this study, the biomass productivity ranged from 21.78±0.87 to 27.78±0.22mgL(-1)d(-1) in relation to freeze dried biomass, while the lipid productivity varied between 5.59±0.02 and 6.81±0.04mgL(-1)d(-1). Although comparatively higher biomass, lipid and EPA productivity was observed in Conway medium, the %EPA content was similarly observed in pesticides industry and municipal effluents. The results highlight the possibility of selectively using wastewater as a growth medium, demonstrating the elevated eicosapentaenoic acid content and biodiesel properties, that complies with the European standards for biodiesel. Copyright © 2016 Elsevier Ltd. All rights reserved.

  15. A control system for ultrasound devices utilized for inactivating E. coli in wastewater.

    Science.gov (United States)

    Ohrdes, H; Ille, I; Twiefel, J; Wallaschek, J; Nogueira, R; Rosenwinkel, K-H

    2018-01-01

    Sonochemical processes applied to wastewater treatment have an influence on the behavior of ultrasonic systems. This is especially due to the load characteristic of the sonochemical process itself and the temperature increase caused by internal damping within the converter. Hence, a controlling device is needed to guarantee the operation in resonance and to keep the vibration amplitude constant. This paper presents a digital control system for the operation of weak to strong damped ultrasonic devices and its application for inactivating Escherichia coli in wastewater. In an experimental investigation, the electric data during a sonochemical process to inactivate E. coli in wastewater is taken into account to analyze the efficacy of the treatment process and the reaction of the vibration system to the process. Frequency response measurements depict that the resonance frequency changes with the sonicated medium and the vibration amplitude decreases with driving current. In addition to a common continuous operation of the system, different pulsed modes are investigated. The experiments prove the common dependencies between inactivation and power level or treatment time. Additionally, it is pointed out that the control of the sonochemical device is of utmost importance to guarantee an efficient treatment of water, because fast process changes, especially in pulsed operation modes, need to be controlled to a steady state as fast as possible. Although a water treatment efficiency increase using pulsed modes was not proved, it is shown, that the performance of the control unit is capable of using different driving modes in water treatment. Copyright © 2017 Elsevier B.V. All rights reserved.

  16. The utilization of waste by-products for removing silicate from mineral processing wastewater via chemical precipitation.

    Science.gov (United States)

    Kang, Jianhua; Sun, Wei; Hu, Yuehua; Gao, Zhiyong; Liu, Runqing; Zhang, Qingpeng; Liu, Hang; Meng, Xiangsong

    2017-11-15

    This study investigates an environmentally friendly technology that utilizes waste by-products (waste acid and waste alkali liquids) to treat mineral processing wastewater. Chemical precipitation is used to remove silicate from scheelite (CaWO4) cleaning flotation wastewater and the waste by-products are used as a substitute for calcium chloride (CaCl2). A series of laboratory experiments is conducted to explain the removal of silicate and the characterization and formation mechanism of calcium silicate. The results show that silicate removal reaches 90% when the Ca:Si molar ratio exceeds 1.0. The X-ray diffraction (XRD) results confirm the characterization and formation of calcium silicate. The pH is the key factor for silicate removal, and the formation of polysilicic acid with a reduction of pH can effectively improve the silicate removal and reduce the usage of calcium. The economic analysis shows that the treatment costs with waste acid (0.63 $/m(3)) and waste alkali (1.54 $/m(3)) are lower than that of calcium chloride (2.38 $/m(3)). The efficient removal of silicate is confirmed by industrial testing at a plant. The results show that silicate removal reaches 85% in the recycled water from tailings dam. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. Health status and health care utilization following collective trauma: a 3-year national study of the 9/11 terrorist attacks in the United States.

    Science.gov (United States)

    Holman, E Alison; Silver, Roxane Cohen

    2011-08-01

    The September 11, 2001 terrorist attacks (9/11) presented a unique opportunity to assess the physical health impact of collective stress in the United States. This study prospectively examined rates of physical ailments and predictors of health care utilization in a U.S. nationally representative sample over three years following the attacks. A sample of adults (N = 2592) completed a survey before 9/11/01 that assessed MD-diagnosed physical and mental health ailments. Follow-up surveys were administered at one (N = 1923), two (N = 1576), and three (N = 1950) years post-9/11 to assess MD-diagnosed physical health ailments (e.g., cardiovascular, endocrine) and health care utilization. Reports of physical ailments increased 18% over three years following 9/11. 9/11-related exposure, lifetime and post-9/11 stress, MD-diagnosed depression/anxiety, smoking status, age, and female gender predicted increased incidence of post-9/11 ailments, after controlling for pre-9/11 health. After adjusting for covariates (demographics, somatization, smoking status, pre-9/11 mental and physical health, lifetime and post-9/11 stress, and degree of 9/11-related exposure), increases in MD-diagnosed cardiovascular, endocrine, gastrointestinal, and hematology-oncology ailments predicted greater utilization of health care services over two years. After the collective stress of 9/11, rates of physical ailments increased and predicted greater health care utilization in a U.S. national sample. Copyright © 2011 Elsevier Ltd. All rights reserved.

  18. Using EPA Tools and Data Services to Inform Changes to Design Storm Definitions for Wastewater Utilities based on Climate Model Projections

    Science.gov (United States)

    Tryby, M.; Fries, J. S.; Baranowski, C.

    2014-12-01

    Extreme precipitation events can cause significant impacts to drinking water and wastewater utilities, including facility damage, water quality impacts, service interruptions and potential risks to human health and the environment due to localized flooding and combined sewer overflows (CSOs). These impacts will become more pronounced with the projected increases in frequency and intensity of extreme precipitation events due to climate change. To model the impacts of extreme precipitation events, wastewater utilities often develop Intensity, Duration, and Frequency (IDF) rainfall curves and "design storms" for use in the U.S. Environmental Protection Agency's (EPA) Storm Water Management Model (SWMM). Wastewater utilities use SWMM for planning, analysis, and facility design related to stormwater runoff, combined and sanitary sewers, and other drainage systems in urban and non-urban areas. SWMM tracks (1) the quantity and quality of runoff made within each sub-catchment; and (2) the flow rate, flow depth, and quality of water in each pipe and channel during a simulation period made up of multiple time steps. In its current format, EPA SWMM does not consider climate change projection data. Climate change may affect the relationship between intensity, duration, and frequency described by past rainfall events. Therefore, EPA is integrating climate projection data available in the Climate Resilience Evaluation and Awareness Tool (CREAT) into SWMM. CREAT is a climate risk assessment tool for utilities that provides downscaled climate change projection data for changes in the amount of rainfall in a 24-hour period for various extreme precipitation events (e.g., from 5-year to 100-year storm events). Incorporating climate change projections into SWMM will provide wastewater utilities with more comprehensive data they can use in planning for future storm events, thereby reducing the impacts to the utility and customers served from flooding and stormwater issues.

  19. Heart Attack

    Science.gov (United States)

    Each year almost 800,000 Americans have a heart attack. A heart attack happens when blood flow to the heart suddenly ... it's important to know the symptoms of a heart attack and call 9-1-1 if you or ...

  20. Manpower Planning for the Wastewater Treatment Workforce of Texas: An Emerging Function. Presented at the Annual Meeting of the Texas Water Utilities Association (58th, College Station, Texas, March, 1976).

    Science.gov (United States)

    Jackson, Tom

    This paper, presented at the 58th annual meeting of the Texas Water Utilities Association, attempts to point out the need for manpower planning for the wastewater treatment workforce of Texas. As reasons for manpower planning, this document discloses estimates of 1400-1500 new jobs, 1300 of which will be in wastewater treatment facilities of 1 MGD…

  1. Determination of emerging contaminants in wastewater utilizing comprehensive two-dimensional gas-chromatography coupled with time-of-flight mass spectrometry.

    Science.gov (United States)

    Prebihalo, Sarah; Brockman, Adrienne; Cochran, Jack; Dorman, Frank L

    2015-11-06

    An analytical method for identification of emerging contaminants of concern, such as pesticides and organohalogens has been developed and utilized for true discovery-based analysis. In order to achieve the level of sensitivity and selectivity necessary for detecting compounds in complex samples, comprehensive gas chromatography coupled with time-of-flight mass spectrometry (GC×GC-TOFMS) was utilized to analyze wastewater samples obtained from the Pennsylvania State University wastewater treatment facility (WWTF). Determination of emerging contaminants through a process of combining samples which represent "normal background" and comparing this to new samples was developed. Results show the presence of halogenated benzotriazoles in wastewater samples as well as soil samples from Pennsylvania State University agricultural fields. The trace levels of chlorinated benzotriazoles observed in the monitoring wells present on the property indicate likely environmental degradation of the chlorinated benzotriazoles. Preliminary investigation of environmental fate of the substituted benzotriazoles indicates their likely degradation into phenol; an Environmental Protection Agency (USEPA) priority pollutant. Copyright © 2015 Elsevier B.V. All rights reserved.

  2. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  3. Treatment of African catfish, Clarias gariepinus wastewater utilizing phytoremediation of microalgae, Chlorella sp. with Aspergillus niger bio-harvesting.

    Science.gov (United States)

    Nasir, Nurfarahana Mohd; Bakar, Nur Syuhada Abu; Lananan, Fathurrahman; Abdul Hamid, Siti Hajar; Lam, Su Shiung; Jusoh, Ahmad

    2015-08-01

    This study focuses on the evaluation of the performance of Chlorella sp. in removing nutrient in aquaculture wastewater and its correlation with the kinetic growth of Chlorella sp. The treatment was applied with various Chlorella sp. inoculation dosage ranging from 0% to 60% (v/v) of wastewater. The optimum inoculation dosage was recorded at 30% (v/v) with effluent concentration of ammonia and orthophosphate recording at 0.012mgL(-1) and 0.647mgL(-1), respectively on Day 11. The optimum dosage for bio-flocculation process was obtained at 30mgL(-1) of Aspergillus niger with a harvesting efficiency of 97%. This type of development of phytoremediation with continuous bio-harvesting could promote the use of sustainable green technology for effective wastewater treatment. Copyright © 2015 Elsevier Ltd. All rights reserved.

  4. Utilization of distillery wastewater for hydrogen production in one-stage and two-stage processes involving photofermentation.

    Science.gov (United States)

    Laurinavichene, Tatyana; Tekucheva, Darya; Laurinavichius, Kestutis; Tsygankov, Anatoly

    2018-03-01

    In this study, distillery wastewater was treated by dark fermentation or photofermentation alone, and by sequential dark and photofermentation processes using anaerobic saccharolytic consortium and purple nonsulfur bacteria. Combination of dark and photofermentation resulted in the maximal H2 yield of 17.6L/L of distillery waste with chemical oxygen demand 40g/L. It is equivalent to 205kJ/L distillery wastewater and corresponds to recovery of approximately 4-8% of energy consumed during ethanol production. Optimal performance of photofermentation was observed at 20% concentration of pre-fermented distillery waste. In photofermentation, the range of the suitable distillery waste concentrations was extended and the H2 yield was improved by choosing the tolerant strain of purple bacteria Rhodobacter sphaeroides B-3059. After two stages, organic acids and sugars were completely consumed that means wastewater treatment concomitant to H2 production. Copyright © 2017 Elsevier Inc. All rights reserved.

  5. Heart Attack

    Science.gov (United States)

    ... pain Fatigue Heart attack Symptoms & causes Diagnosis & treatment Advertisement Mayo Clinic does not endorse companies or products. ... a Job Site Map About This Site Twitter Facebook Google YouTube Pinterest Mayo Clinic is a not- ...

  6. Heart attack

    Science.gov (United States)

    ... heart attack. A stent is a small, metal mesh tube that opens up (expands) inside a coronary ... e228. PMID: 25260718 www.ncbi.nlm.nih.gov/pubmed/25260718 . Anderson JL. ST segment elevation acute myocardial ...

  7. Formation of shaped barium sulfate-dye hybrids: waste dye utilization for eco-friendly treatment of wastewater.

    Science.gov (United States)

    Gao, Hong-Wen; Lin, Jing; Li, Wei-Ying; Hu, Zhang-Jun; Zhang, Ya-Lei

    2010-01-01

    Owing to the present complexity and difficulty of concentrated dye wastewater treatment, this work aimed to synthesize a reproducible waste-sorbing material for the treatment of wastewater by forming the dye-conjugating complex hybrid. The inorganic/organic hybridization was applied to prepare the objective material by immobilizing waster dye-Mordant blue 9 (MB) with barium sulfate (BaSO4). The composition and pattern of the formed material were determined by spectrometry and characterized by SEM and XRD, and their formation process was clarified. The adsorption of cationic dye-basic blue BO (BB) and copper ion was investigated. The hybrid of MB alone into growing BaSO4 formed the pineapple-like particles while that of the MB/BB-conjugating complex was the rhombus material. The adsorption of BB on the MB-BaSO4 hybrid was probably attributed to ion-pair equilibrium and that of Cu2+ may result from the complexation. The treatment of dye and heavy metal wastewaters indicated that the MB hybrid material removed 99.8% BB and 97% Cu2+ and the dye-conjugating hybrid with growing BaSO4 100% MB, 99.5% BB, and 44% Cu2+. The waste MB-BaSO4 hybrid material is efficient to treat cationic dye and Cu2+ wastewater. The dye-conjugating hybridization method is the first to be advanced for in situ wastewater treatment, and it showed a combined effect for the removal of both organic dyes and heavy metals.

  8. About Heart Attacks

    Science.gov (United States)

    ... Artery Disease Venous Thromboembolism Aortic Aneurysm More About Heart Attacks Updated:Jan 27,2017 A heart attack is ... coronary artery damage leads to a heart attack . Heart Attack Questions and Answers What is a heart attack? ...

  9. Chemistry Wastewater Treatment of El-Oued City (South-East of Algeria) by Utilization of Typha Latifolia

    OpenAIRE

    Zeghdi Saad; Bebba Ahmed Abdelhafid; Laouini Salah Eddine

    2016-01-01

    The objective of this study is to show the potential of Typha latifolia in the Purification performance of wastewater in the region of El Oued (southeast of Algeria). The pilot scale consists of two beds of plastics, filled with gravel and sand. One was planted saplings Typha latifolia at 36 stems/m2, the second was not planted serves as a control (witness). The results show good yields for suspended solids and organic pollution, removal rates are 96,76% for (SS) 89,92% for the Chemical Oxyge...

  10. Integrative approach for utilization of olive mill wastewater and lebna's whey for ethanol production

    Energy Technology Data Exchange (ETDEWEB)

    Ibrahim, M.A.; Hayek, B.O.; Al-Hmoud, N.; Al-Gogazeh, L.

    2009-09-15

    The industry of olive oil extraction in Jordan involves an intensive consumption of water and generates large quantities of olive mill wastewater (OMW). This wastewater has a high pollution risk with biological oxygen demand (BOD). The organic fraction of OMW includes sugars, tannins, polyphenols, polyalcohols, pectins and lipids. The presence of remarkable amounts of aromatic compounds in OMW is responsible for its phytotoxic and antimicrobial effects. The environmental problems and potential hazards caused by OMW had led olive oil producing countries to limit their discharge and to propose and develop new technologies for OMW treatments, such as physicochemical and biological treatments. In the present investigation lebna's whey a local byproduct of widely consumed local yogurt was used with OMW for ethanol production. The obtained results showed that the proteins of lebna's whey can remove substantial amounts of aromatic compounds present in OMW. This was reflected on the reduction of the intensity of black color of OMW and removal of 37% polyphenols. Moreover, the production of ethanol was ascertained in fermentation media composed of whey and in presence of various concentrations of OMW up to 20% OMW. The obtained results showed the possibility to develop a process for improvement and enhancement of ethanol production from whey and olive oil waste in mixed yeast cultures. (au)

  11. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ). ?Spear Phishing? refers to targeted social engineering-type email attacks (Jagatic, 2007). ?Physical? refers to manual methods to gain access, for example physically removing the hard drive or breaking the access door to enter a secure server room... the size and utility of the target. The "Target" class is the physical device or entity targeted by an attack. The "Vulnerability" class describes a target vulnerability used by the attacker. The "Phase" class represents an attack model that subdivides...

  12. Cost-utility analysis of Ruconest® (conestat alfa) compared to Berinert® P (human C1 esterase inhibitor) in the treatment of acute, life-threatening angioedema attacks in patients with hereditary angioedema

    Science.gov (United States)

    Holko, Przemysław; Paszulewicz, Anna

    2013-01-01

    Introduction Administration of human C1 esterase inhibitor (Berinert® P) from target import is the most widespread treatment strategy for patients with hereditary angioedema (HAE). However, a therapeutic health program including Ruconest® (conestat alfa) could shorten a patient's expectancy for a life-saving treatment. Aim To evaluate the cost-utility of Ruconest® (conestat alfa) financed from public funds within the newly introduced therapeutic health program compared with Berinert® P (human C1 esterase inhibitor) in the treatment of acute angioedema attacks in adults with HAE. Material and methods The cost-utility analysis from the Polish healthcare payer's perspective was performed for 1 year (2012). The costs and health outcomes were simulated for three pairs of eligible HAE patient groups (active treatment and corresponding placebo). The incremental costs of each intervention compared with placebo were listed together (direct or indirect comparisons between options were impossible due to limited clinical data available). Results The incremental cost-utility ratios (ICURs) for the evaluated interventions compared with placebo were as follows: EUR 15,226 per QALY (Ruconest®) and EUR 27,786 per QALY (Berinert® P). The probability of cost-utility (ICUR < EUR 24,279 per QALY) assessed for Ruconest® administered in the case of acute angioedema attack was 61% and 41% for Berinert® P. Conclusions The administration of Ruconest® in acute life-threatening angioedema attacks is economically justified from the Polish healthcare payer's perspective, results in lower costs and is characterized by higher cost-utility probability compared with Berinert® P. PMID:24278067

  13. Wastewater Outfalls

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — Outfalls which discharge wastewater from wastewater treatment facilities with individual NPDES permits. It does not include NPDES general permits.

  14. Utilization of lipid extracted algal biomass and sugar factory wastewater for algal growth and lipid enhancement of Ettlia sp.

    Science.gov (United States)

    Moon, Myounghoon; Kim, Chul Woong; Farooq, Wasif; Suh, William I; Shrivastav, Anupama; Park, Min S; Mishra, Sanjiv K; Yang, Ji-Won

    2014-07-01

    The present study assessed the use of hydrolysate of lipid extracted algal biomass (LEA) combined with the sugar factory wastewater (SFW) as a low cost nutrient and a carbon source, respectively for microalgal cultivation. Microalgal strain Ettlia sp. was both mixotrophically and heterotrophically cultivated using various amounts of hydrolysate and SFW. The culture which was grown in medium containing 50% LEA hydrolysate showed highest growth, achieving 5.26 ± 0.14 gL(-1) after 12 days of cultivation. The addition of SFW increased the lipid productivity substantially from 5.8 to 95.5 mg L(-1)d(-1) when the culture medium was fortified with 20% SFW. Gas chromatography analysis indicated a noticeable increase of 20% in C16 and C18 fraction in FAME distribution under above condition. Therefore, it can be concluded that the combination of LEA hydrolysate and sugar factory waste water can be a powerful growth medium for economical algal cultivation. Copyright © 2014 Elsevier Ltd. All rights reserved.

  15. Chlorella vulgaris cultivation in sludge extracts from 2,4,6-TCP wastewater treatment for toxicity removal and utilization.

    Science.gov (United States)

    Wang, Lu; Chen, Xiurong; Wang, Hualin; Zhang, Yuying; Tang, Qingjie; Li, Jiahui

    2017-02-01

    Chlorella vulgaris was cultivated in different proportions of activated sludge extracts, which was from the treatment of the synthetic wastewater containing 2,4,6-trichlorophenol (2,4,6-TCP). The nutrients, total nitrogen (TN) and total phosphorus (TP), were removed over 45% and 90%, respectively. The maximum reduction amount of ecotoxicity and total organic carbon (TOC) occurred in the 100% sludge group on the 8th day (68%; 86.2 mg L-1). The variations of Excitation-emission matrix spectra (EEMs) and TOC indicated that extracellular organic matters (EOM) produced by algae led to TOC increase in the medium. The cell density was close to each other for groups with sludge extract proportion below 50%; sludge extracts (below 75% addition) had a stimulating effect on the accumulation of chlorophyll-a in per unit algal cell. Superoxide dismutase (SOD) variation demonstrated that C. vulgaris response positively to sludge extracts addition. Lipid content in C. vulgaris was up to its maximum value on the 8th day. Considering the performance on nutrients removal, toxicity reduction and algal growth, the optimal cultivation period for C. vulgaris before harvesting was around 8 days with sludge extracts proportion below 50%. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. Utilization of wastewater originated from naturally fermented virgin coconut oil manufacturing process for bioextract production: physico-chemical and microbial evolution.

    Science.gov (United States)

    Tripetchkul, Sudarut; Kusuwanwichid, Sasithorn; Koonsrisuk, Songpon; Akeprathumchai, Saengchai

    2010-08-01

    Production of virgin coconut oil via natural fermentation has led to large amount of wastes being generated, i.e., coconut pulp and wastewater containing coconut crème. Objective of this study is to gain more insight into the feasibility of utilization of such wastes as raw materials together with several types of wastes such as fish waste and/or pineapple peel for bioextract production. Chemical, physico-chemical and biological changes including phytotoxicity of the fermented mixture were closely monitored. Physical observation suggested that fermentation of bioextract obtained with fish waste appeared to be complete within the first month of fermentation while bioextract obtained using pineapple waste seemed to be complete after 8 months post-fermentation. Fermentation broth is of blackish color with alcoholic as well as acidic odour with no gas bubble and/or yeast film present on top of the surface. During the whole fermentation interval, several attributes of both bioextracts, e.g., pH, chemical oxygen demand (COD) and organic acids, were statistically different. Further, the total bacteria and lactic acid bacteria present in pineapple bioextract were statistically higher than those of the fish bioextract (ppineapple bioextracts, respectively. In addition, qualities of both bioextracts conformed well with those specified by the Thai standard for liquid biofertilizer after 1 month fermentation. Results further showed that wastewater derived from virgin coconut oil manufacturing process could effectively be employed together with other types of wastes such as fish waste and pineapple peel for bioextract production. However, for the best bioextract quality, fermentation should be carefully planned since over fermentation led to bioextract of low qualities. Copyright 2010 Elsevier Ltd. All rights reserved.

  17. Utilization of municipal wastewater for cooling in thermoelectric power plants: Evaluation of the combined cost of makeup water treatment and increased condenser fouling

    Energy Technology Data Exchange (ETDEWEB)

    Walker, Michael E. [Illinois Inst. of Technology, Chicago, IL (United States). Dept. of Chemical and Biological Engineering; Theregowda, Ranjani B. [Carnegie Mellon Univ., Pittsburgh, PA (United States). Dept of Civil and Mechanical Engineering; Safari, Iman [Illinois Inst. of Technology, Chicago, IL (United States). Dept. of Chemical and Biological Engineering; Abbasian, Javad [Illinois Inst. of Technology, Chicago, IL (United States). Dept. of Chemical and Biological Engineering; Arastoopour, Hamid [Illinois Inst. of Technology, Chicago, IL (United States). Dept. of Chemical and Biological Engineering; Dzombak, David A. [Carnegie Mellon Univ., Pittsburgh, PA (United States). Dept of Civil and Mechanical Engineering; Hsieh, Ming-Kai [Tamkang Univ., Taipei (Taiwan). Waer Resources Management and Policy Research Center; Miller, David C. [National Energy Technology Lab. (NETL), Morgantown, WV (United States)

    2013-10-01

    A methodology is presented to calculate the total combined cost (TCC) of water sourcing, water treatment and condenser fouling in the recirculating cooling systems of thermoelectric power plants. The methodology is employed to evaluate the economic viability of using treated municipal wastewater (MWW) to replace the use of freshwater as makeup water to power plant cooling systems. Cost analyses are presented for a reference power plant and five different tertiary treatment scenarios to reduce the scaling tendencies of MWW. Results indicate that a 550 MW sub-critical coal fired power plant with a makeup water requirement of 29.3 ML/day has a TCC of $3.0 - 3.2 million/yr associated with the use of treated MWW for cooling. (All costs USD 2009). This translates to a freshwater conservation cost of $0.29/kL, which is considerably lower than that of dry air cooling technology, $1.5/kL, as well as the 2020 conservation cost target set by the U.S. Department of Energy, $0.74/kL. Results also show that if the available price of freshwater exceeds that of secondary-treated MWW by more than $0.13-0.14/kL, it can be economically advantageous to purchase secondary MWW and treat it for utilization in the recirculating cooling system of a thermoelectric power plant.

  18. Attacking Time

    Science.gov (United States)

    2015-06-01

    report represents the collective work of a talented group of graduate students at Dartmouth College. Within the strategic framework , much of the...the read-only store. This has the effect of expunging root-kits, bots , or other malware. Additionally, the hypervisor strives to utilize all...camouflage has been demonstrated by disguising a Microsoft Exchange 2008 server running on Windows Server 2008 RC2 to appear as a Sendmail 8.6.9 server

  19. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  20. Social engineering attack framework

    CSIR Research Space (South Africa)

    Mouton, F

    2014-07-01

    Full Text Available link. A social engineering attack targets this weakness by; using various manipulation techniques in order to elicit sensitive; information. The field of social engineering is still in its infancy; stages with regards to formal definitions and attack...

  1. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  2. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  3. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an artery for a short time. The only difference between a stroke ...

  4. Wastewater Treatment

    Science.gov (United States)

    ... and arsenic can have acute and chronic toxic effects on species. other substances such as some pharmaceutical and personal care products, primarily entering the environment in wastewater effluents, may also pose threats to human health, aquatic life and wildlife. Wastewater treatment The major ...

  5. Wastewater Treatment in Greenland

    DEFF Research Database (Denmark)

    Gunnarsdottir, Ragnhildur

    collection systems, and be more economically and environmentally sustainable than traditional wastewater collection and treatment systems. Possible alternative wastewater treatment methods for Greenlandic communities are dry composting or anaerobic digestion of excreta, collected at household level using dry...... treatment, even by utilizing waste heat from the waste incinerators. For the seweraged parts of the towns it might be most beneficial to maintain the flush toilet solutions, while introducing a treatment step prior to discharging to the recipient, such as simple mechanical treatment which might even...... treatment in these regions. However, designing, constructing and operating wastewater collection systems in the Arctic is challenging because of e.g. permafrost conditions, hard rock surfaces, freezing, limited quantity of water and high costs of electricity, fuel and transportation, as well as a settlement...

  6. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  7. Wastewater Districts

    Data.gov (United States)

    Vermont Center for Geographic Information — The Wastewater districts layer is part of a larger dataset that contains administrative boundaries for Vermont's Agency of Natural Resources. The dataset includes...

  8. Wastewater Treatment.

    Science.gov (United States)

    Zoltek, J., Jr.; Melear, E. L.

    1978-01-01

    Presents the 1978 literature review of wastewater treatment. This review covers: (1) process application; (2) coagulation and solids separation; (3) adsorption; (4) ion exchange; (5) membrane processes; and (6) oxidation processes. A list of 123 references is also presented. (HM)

  9. Wastewater reuse

    OpenAIRE

    Milan R. Radosavljević; Vanja M. Šušteršič

    2013-01-01

    Water scarcity and water pollution are some of the crucial issues that must be addressed within local and global perspectives. One of the ways to reduce the impact of water scarcity  and to minimizine water pollution is to expand water and wastewater reuse. The local conditions including regulations, institutions, financial mechanisms, availability of local technology and stakeholder participation have a great influence on the decisions for wastewater reuse. The increasing awareness of food s...

  10. Water and Wastewater Rate Hikes Outpace CPI

    Energy Technology Data Exchange (ETDEWEB)

    Stratton, Hannah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fuchs, Heidi [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Chen, Yuting [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Dunham, Camilla [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Williams, Alison [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2017-08-31

    Water and wastewater treatment and delivery is the most capital-intensive of all utility services. Historically underpriced, water and wastewater rates have exhibited unprecedented growth in the past fifteen years. Steep annual increases in water and wastewater rates that outpace the Consumer Price Index (CPI) have increasingly become the norm across the United States. In this paper, we analyze water and wastewater rates across U.S. census regions between 2000 and 2014. We also examine some of the driving factors behind these rate increases, including drought, water source, required infrastructure investment, population patterns, and conservation effects. Our results demonstrate that water and wastewater prices have consistently increased and have outstripped CPI throughout the study period nationwide, as well as within each census region. Further, evaluation of the current and upcoming challenges facing water and wastewater utilities suggests that sharp rate increases are likely to continue in the foreseeable future.

  11. Nocturnal panic attacks

    OpenAIRE

    Lopes Fabiana L.; Nardi Antonio E.; Nascimento Isabella; Valença Alexandre M.; Zin Walter A

    2002-01-01

    The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sle...

  12. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  13. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  14. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  15. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  16. Heart attack - discharge

    Science.gov (United States)

    ... attack Heart bypass surgery Heart bypass surgery - minimally invasive Heart pacemaker High blood cholesterol levels High blood pressure Implantable cardioverter-defibrillator Smoking - tips on how to ...

  17. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2017, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  18. Efficient Techniques to Detect the Various Attacks in Ad-Hoc Network

    OpenAIRE

    Rakesh Kumar Sahu; Dr. Narendra S. Chaudhari

    2012-01-01

    This paper is mainly focused on Denial of Service (DoS) attack, where a server or a node cannot give service to the other nodes as it is under an attack. There are various attacks in the Ad hoc network but our paper is mainly focused on two types of DoS attacks viz SYN-Flooding and Worm-Hole attacks. How we can detect any one of attacks is addressed in this paper. We have discussed the CPU and memory utilization during the attack. We have given two separate algorithms for each attack and a...

  19. Anaerobic Digestion of Wastewater: Effects of Inoculants and Nutrient Management on Biomethane Production and Treatment

    OpenAIRE

    Peterson, Jason

    2017-01-01

    Due to population expiation and the increased awareness of the impact on the environment by wastewater treatment, improved wastewater treatment systems are needed to treat municipal and agricultural wastewater. Treating wastewater with oxygen decreases carbon compounds at the expense of energy to move carbon and oxygen to be in contact with each other. Anaerobic digestion of wastewater can reduce the cost by utilizing microbes to treat high amounts of carbon in wastewater without the need for...

  20. Generation and energy utilization of methane form industrial wastewater; Produccion y aprovechamiento energetico de metano a partir de agua residual industrial

    Energy Technology Data Exchange (ETDEWEB)

    Lebek, M.

    2009-07-01

    At the production site of a natural ingredients manufacturer for the food industry was necessary the adjustment of the WWTP to the enlargement of the production and its complement with a pre-treatment. The core of the treatment plan tis an UASB (Upflow Anaerobic Sludge Blanket) reactor where the wastewater is removed under anaerobic conditions. The main advantages of this treatment ar the operation stability and the high methane production. The biogas generated is cleaned before it is used during the production process as an energy resource. (Author)

  1. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses such

  2. Transient Ischemic Attack

    Medline Plus

    Full Text Available Transient Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an artery for a short time. The only ... TIA is that with TIA the blockage is transient (temporary). TIA symptoms occur rapidly and last a ...

  3. Protecting complex infrastructures against multiple strategic attackers

    Science.gov (United States)

    Hausken, Kjell

    2011-01-01

    Infrastructures are analysed subject to defence by a strategic defender and attack by multiple strategic attackers. A framework is developed where each agent determines how much to invest in defending versus attacking each of multiple targets. A target can have economic, human and symbolic values, which generally vary across agents. Investment expenditure functions for each agent can be linear in the investment effort, concave, convex, logistic, can increase incrementally, or can be subject to budget constraints. Contest success functions (e.g., ratio and difference forms) determine the probability of a successful attack on each target, dependent on the relative investments of the defender and attackers on each target, and on characteristics of the contest. Targets can be in parallel, in series, interlinked, interdependent or independent. The defender minimises the expected damage plus the defence expenditures. Each attacker maximises the expected damage minus the attack expenditures. The number of free choice variables equals the number of agents times the number of targets, or lower if there are budget constraints. Each agent is interested in how his investments vary across the targets, and the impact on his utilities. Alternative optimisation programmes are discussed, together with repeated games, dynamic games and incomplete information. An example is provided for illustration.

  4. Mathematical Attacks on RSA Cryptosystem

    OpenAIRE

    Imad K. Salah; Abdullah Darwish; Saleh Oqeili

    2006-01-01

    In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA) cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  5. Wastewater reuse

    Directory of Open Access Journals (Sweden)

    Milan R. Radosavljević

    2013-12-01

    Full Text Available Water scarcity and water pollution are some of the crucial issues that must be addressed within local and global perspectives. One of the ways to reduce the impact of water scarcity  and to minimizine water pollution is to expand water and wastewater reuse. The local conditions including regulations, institutions, financial mechanisms, availability of local technology and stakeholder participation have a great influence on the decisions for wastewater reuse. The increasing awareness of food safety and the influence of the countries which import food are influencing policy makers and agriculturists to improve the standards of wastewater reuse in agriculture. The environmental awareness of consumers has been putting pressure on the producers (industries to opt for environmentally sound technologies including those which conserve water and reduce the level of pollution. It may be observed that we have to move forwards to implement strategies and plans for wastewater reuse. However, their success and sustainability will depend on political will, public awareness and active support from national and international agencies to create favorable    environment for the promotion of environmentally sustainable technologies. Wastewater treatment has a long history, especially in agriculture, but also in industry and households. Poor quality of wastewater can pose a significant risk to the health of farmers and users of agricultural products. The World Health Organization (WHO is working on a project for the reuse of wastewater in agriculture. To reduce effects of human activities to the minimum, it is necessary to provide such technical and technological solutions that would on the one hand ensure complying with  the existing regulations and legislation, and on the other hand provide economically viable systems as seen through investments and operating costs. The use of wastewater The practice of using wastewater varies from country to country. Its

  6. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  7. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  8. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  9. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  10. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  11. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  12. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  13. Facial Dog Attack Injuries

    OpenAIRE

    Lin, Wei; Patil, Pavan Manohar

    2013-01-01

    The exposed position of the face makes it vulnerable to dog bite injuries. This fact combined with the short stature of children makes them a high-risk group for such attacks. In contrast to wounds inflicted by assaults and accidents, dog bite wounds are deep puncture type wounds compounded by the presence of pathologic bacteria from the saliva of the attacking dog. This, combined with the presence of crushed, devitalized tissue makes these wounds highly susceptible to infection. Key to succe...

  14. Launch under attack

    Energy Technology Data Exchange (ETDEWEB)

    Steinbruner, J.

    1984-01-01

    The strategy of launch under attack calls for launching nuclear weapons on warning that attacking weapons are on their way. The political pressures for adopting this strategy are symptomatic of an increasing instability in the nuclear balance. The author describes a Brookings Institute model, which indicates that the problems of decentralized control and precise timing could lead to failures in retargeting procedures. The major concern is that the strategy imposes powerful incentives for preemption as the most promising means of conducting nuclear war.

  15. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks that are c......The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio......-technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....

  16. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  17. Cooperating attackers in neural cryptography

    Science.gov (United States)

    Shacham, Lanir N.; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the “majority-flipping attacker,” does not decay with the parameters of the model. This attacker’s outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  18. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  19. Utilization of reverse osmosis (RO) for reuse of MBR-treated wastewater in irrigation-preliminary tests and quality analysis of product water.

    Science.gov (United States)

    Bunani, Samuel; Yörükoğlu, Eren; Sert, Gökhan; Kabay, Nalan; Yüksel, Ümran; Yüksel, Mithat; Egemen, Özdemir; Pek, Taylan Özgür

    2015-02-19

    Membrane bioreactor (MBR) effluent collected from a wastewater treatment plant installed at an industrial zone was used for reverse osmosis (RO) membrane tests in the laboratory. For this, two different GE Osmonics RO membranes (AK-BWRO and AD-SWRO) were employed. The results showed that AK-brackish water reverse osmosis (AK-BWRO) and AD-seawater reverse osmosis (AD-SWRO) membranes have almost similar rejection performances regarding analyzed parameters such as conductivity, salinity, color, chemical oxygen demand (COD), and total organic carbon (TOC). On the other hand, these membranes behaved quite differently considering their permeate water flux at the same applied pressure of 10 bar. AD-SWRO membrane was also tested at 20 bar. The results revealed that AD-SWRO membrane had almost the same rejections either at 10 or at 20 bar of applied pressure. Compared with irrigation water standards, AK-BWRO and AD-SWRO gave an effluent with low salinity value and sodium adsorption ratio (SAR) which makes it unsuitable for irrigation due to the infiltration problems risi0ng from unbalanced values of salinity and SAR. Combination of MBR effluent and RO effluent at respective proportions of 0.3:0.7 and 0.4:0.6 for AK-BWRO and AD-SWRO, respectively, are the optimum mixing ratios to overcome the infiltration hazard problem. Choice of less-sensitive crops to chloride and sodium ions is another strategy to overcome all hazards which may arise from above suggested mixing proportions.

  20. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  1. Algae cultivation for wastewater reclamation

    OpenAIRE

    Grobler, Gerbrand

    2013-01-01

    The possibility of using algae to clean wastewater has recently gotten attention because wastewater is becoming a bigger problem all over the world. Many scientist and engi-neers are researching better ways to utilize the high potential of algae to clean these waters. By experimenting with algae we try to explore the potential of growing algae on a mechanical system called “algae turf scrubber” or “ATS” to absorb the excess nutrients for the production of biomass. By knowing the amount of...

  2. Wastewater treatment

    Directory of Open Access Journals (Sweden)

    Ranđel N. Kitanović

    2013-10-01

    Full Text Available Quality of life on Earth in the future will largely depend on the amount of safe water. As the most fundamental source of life, water is relentlessly consumed and polluted. To halt this trend, many countries are taking extensive measures and investing substantial resources in order to stop the contamination of water and return at least tolerably good water quality to nature. The goal of water purification is to obtain clean water with the sewage sludge as a by-product. Clean water is returned to nature, and further treatment of sludge may be subject to other procedures. The conclusion of this paper is simple. The procedure with purified water is easily achievable, purified water is discharged into rivers, lakes and seas, but the problem of further treatment of sludge remains. This paper presents the basic methods of wastewater treatment and procedures for processing the products from contaminated water. The paper can serve as a basis for further elaboration. Water Pollution In order to ensure normal life of living creatures, the water in which they live or the water they use must have a natural chemical composition and natural features. When, as a result of human activities, the chemical composition of water and the ratio of its chemical elements significantly change, we say that water is polluted. When the pollutants come from industrial plants, we are talking about industrial wastewater, and when they come from households and urban areas, we are talking about municipal wastewater. Both contain a huge amount of pollutants that eventually end up in rivers. Then, thousands of defenseless birds, fish and other animals suffer, and environmental consequences become immeasurable. In addition, the waste fed to the water often ends up in the bodies of marine animals, so they can return to us as food. Thermal water pollution also has multiple effects on the changes in the wildlife composition of aquatic ecosystems. Polluted water can be purified by

  3. Utilizing solar energy for the purification of olive mill wastewater using a pilot-scale photocatalytic reactor after coagulation-flocculation.

    Science.gov (United States)

    Michael, I; Panagi, A; Ioannou, L A; Frontistis, Z; Fatta-Kassinos, D

    2014-09-01

    This study investigated the application of a solar-driven advanced oxidation process (solar Fenton) combined with previous coagulation/flocculation, for the treatment of olive mill wastewater (OMW) at a pilot scale. Pre-treatment by coagulation/flocculation using FeSO4·7H2O (6.67 g L(-1)) as the coagulant, and an anionic polyelectrolyte (FLOCAN 23, 0.287 g L(-1)) as the flocculant, was performed to remove the solid content of the OMW. The solar Fenton experiments were carried out in a compound parabolic collector pilot plant, in the presence of varying doses of H2O2 and Fe(2+). The optimization of the oxidation process, using reagents at low concentrations ([Fe(2+)] = 0.08 g L(-1); [H2O2] = 1 g L(-1)), led to a high COD removal (87%), while the polyphenolic fraction, which is responsible for the biorecalcitrant and/or toxic properties of OMW, was eliminated. A kinetic study using a modified pseudo first-order kinetic model was performed in order to determine the reaction rate constants. This work evidences also the potential use of the solar Fenton process at the inherent pH of the OMW, yielding only a slightly lower COD removal (81%) compared to that obtained under acidic conditions. Moreover, the results demonstrated the capacity of the applied advanced process to reduce the initial OMW toxicity against the examined plant species (Sorghum saccharatum, Lepidium sativum, Sinapis alba), and the water flea Daphnia magna. The OMW treated samples displayed a varying toxicity profile for each type of organism and plant examined in this study, a fact that can potentially be attributed to the varying oxidation products formed during the process applied. Finally, the overall cost of solar Fenton oxidation for the treatment of 50 m(3) of OMW per day was estimated to be 2.11 € m(-3). Copyright © 2014 Elsevier Ltd. All rights reserved.

  4. A novel resource utilization of the calcium-based semi-dry flue gas desulfurization ash: As a reductant to remove chromium and vanadium from vanadium industrial wastewater.

    Science.gov (United States)

    Fang, Dean; Liao, Xiang; Zhang, Xuefei; Teng, Aijun; Xue, Xiangxin

    2018-01-15

    A novel resource utilization of the calcium-based semi-dry flue gas desulfurization ash is investigated. In the present study, the semi-dry desulfurization ash is used as a reductant for chromium and vanadium removal by chemical reduction precipitation, the byproduct gypsum and chromium-contained sludge are obtained. Besides, the effects of main operational parameters (reaction pH, desulfurization ash dosage and reaction time) on the heavy metal removal are investigated, and the main reaction mechanism for this treatment technology is also proposed. Under the optimal conditions, the residual concentrations of Cr(VI), total Cr and V are 0.163mg/L, 0.395mg/L and 0.155mg/L, respectively. Additionally, byproduct gypsum and chromium-contained sludge are characterized using X-ray diffraction (XRD), fourier transform infrared spectroscopy (FT-IR), scanning electron microscope-energy dispersive spectrometer (SEM-EDS) and thermogravimetry differential scanning calorimetry (TG-DSC), respectively. Finally, the resource utilization methods of the byproduct gypsum and chromium-contained sludge from this technology are also submitted. The byproduct gypsum can be utilized to produce hemihydrate calcium sulfate whisker, and the roasted heavy metal precipitation can be used as a primary chromium raw material (Cr2O3 content is about 83%). Copyright © 2017 Elsevier B.V. All rights reserved.

  5. Discussion on Wastewater Treatment Process of Coal Chemical Industry

    Science.gov (United States)

    Zhao, Dongyan; Lun, Weijie; Wei, Junjie

    2017-12-01

    Coal chemical wastewater has such characteristics as high concentration of oil, ammonia nitrogen and COD. In this paper, treatment process of coal chemical industry is described mainly, such as pretreatment process, biochemical treatment process and polishing process. Through the recovery of phenol and ammonia and the treatment of wastewater from abroad, the new technology of wastewater treatment in coal chemical industry was expounded. Finally, The development of coal chemical wastewater treatment technology is prospected, and the pretreatment technology is emphasized. According to the diversification and utilization of water, zero discharge of coal chemical wastewater will be fulfilled.

  6. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  7. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  8. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... smolder — that can be destructive. If you think counseling would help your family deal with your heart attack more ... your lifestyle habits through exercise training, education and counseling to ... or with the help of your doctor, nurse, dietitian or other healthcare ...

  9. Fatal crocodile attack.

    Science.gov (United States)

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out. Copyright © 2013 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  10. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  11. BIRD ATTACK OCULAR INJURIES.

    Science.gov (United States)

    Tabatabaei, Seyed Ali; Soleimani, Mohammad; Behrouz, Mahmoud Jabbarvand

    2017-03-29

    To report 30 patients with bird attack-related eye injuries. This study was performed among patients coming to Farabi Eye Hospital, Tehran, Iran, from 2010 to 2015 with a history of bird attack causing eye injury. The inclusion criteria were a history of bird attack by pecking causing eye injury and having treatment and follow-up record for at least 6 months after treatment. The primary eye examinations included a full ophthalmic examination including evaluation of uncorrected visual acuity and best-corrected visual acuity (BCVA), anterior segment slit lamp biomicroscopy, and photography. For all patients with penetrating injury, primary repair was undertaken. Thirty patients (10 females and 20 males) with a mean age of 23.3 ± 18.5 years entered the study. The most common zone of injury was zone 1 (P < 0.001), and lensectomy was not needed in majority of patients (P < 0.001). The most common bird causing the injury was mynah (P < 0.001). Those patients with baseline BCVA of less than 20/200 or those with endophthalmitis had statistically worse final BCVA after treatment. Patients attacked by mynah bird had significantly better pretreatment uncorrected visual acuity and BCVA. The most common bird causing the eye injury among the sample of patients from Iran was mynah, which differs with previous studies indicating the rooster attack as the most common cause of eye injury. The authors also found that the most common zone of injury was zone 1, and the presence of endophthalmitis and lower baseline BCVA were significant risk factors for worse visual outcomes.

  12. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  13. Interactions within wastewater systems

    NARCIS (Netherlands)

    Langeveld, J.G.

    2004-01-01

    Wastewater systems consist of sewer systems and wastewater treatment works. As the performance of a wastewater treatment plant is affected by the characteristics, i.e. operation and design, of the contributing sewer systems, knowledge of the interactions between sewers and wastewater treatment works

  14. Life After a Heart Attack

    Science.gov (United States)

    ... been stable for a few weeks. Anxiety and Depression After a Heart Attack After a heart attack, ... 2009, this project provided six awards at five academic institutions to identify genetic connections to heart, lung, ...

  15. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart.

  16. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  17. Cultivation of Nannochloropsis salina in municipal wastewater or digester centrate.

    Science.gov (United States)

    Dong, Bingfeng; Ho, Nam; Ogden, Kimberly L; Arnold, Robert G

    2014-05-01

    Meaningful use of biofuels for transportation depends on utilization of water from non-traditional, non-potable resources. Here it is hypothesized that (i) reclaimed wastewater or nutrient-rich side streams derived from municipal wastewater treatment are suitable for that purpose and (ii) use of those waters for algal growth can promote water quality through nutrient management. Experiments showed that metals levels in municipal wastewaters are unlikely to inhibit algal growth and lipid production, at least by metals tolerant microalgae like Nannochloropsis salina. Cells grew without inhibition in treated municipal wastewater or centrate derived from wastewater treatment at additions up to 75 percent v/v in their normal growth medium minus nitrogen and phosphorus. Although wastewater provides a suitable nutrient source for algal growth, not enough municipal wastewater is available to support a meaningful biofuels industry without efficient water recycling and nutrient recovery/reuse from spent algae. Copyright © 2014 Elsevier Inc. All rights reserved.

  18. Replacement Attack: A New Zero Text Watermarking Attack

    Science.gov (United States)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  19. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  20. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  1. Integrated control of the wastewater system – potentials and barriers

    DEFF Research Database (Denmark)

    Mollerup, Ane Loft; Grum, Morten; Muschalla, Dirk

    2013-01-01

    Applying integrated control to a sewer system and wastewater treatment plant often leads to additional benefits for both systems when compared to controlling them independently. However, barriers such as a lack of incentive for utilities to put this type of control in place mean that in practice...... integrated control of wastewater systems is rarely seen. Ane Loft Mollerup, Morten Grum, Dirk Muschalla, Edwin van Velzen, Peter Vanrolleghem, Peter Steen Mikkelsen and Gurkan Sin outline the benefits of integrated control of wastewater systems....

  2. Shuttle Wastewater Solution Characterization

    Science.gov (United States)

    Adam, Niklas; Pham, Chau

    2011-01-01

    During the 31st shuttle mission to the International Space Station, STS-129, there was a clogging event in the shuttle wastewater tank. A routine wastewater dump was performed during the mission and before the dump was completed, degraded flow was observed. In order to complete the wastewater dump, flow had to be rerouted around the dump filter. As a result, a basic chemical and microbial investigation was performed to understand the shuttle wastewater system and perform mitigation tasks to prevent another blockage. Testing continued on the remaining shuttle flights wastewater and wastewater tank cleaning solutions. The results of the analyses and the effect of the mitigation steps are detailed in this paper.

  3. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  4. Can You Recognize a Heart Attack? Quiz

    Science.gov (United States)

    ... Peripheral Artery Disease Venous Thromboembolism Aortic Aneurysm More Can You Recognize a Heart Attack? Updated:Sep 16, ... a Heart Attack Heart Attack Symptoms in Women “Can you recognize a heart attack?” Quiz • Understand Your ...

  5. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  6. Metal Removal in Wastewater

    OpenAIRE

    Sanchez Roldan, Laura

    2014-01-01

    The aim of this work was to study Copper removal capacity of different algae species and their mixtures from the municipal wastewater. This project was implemented in the greenhouse in the laboratories of Tampere University of Applied Sciences and the wastewater used was the one from the Tampere municipal wastewater treatment plant. Five algae species and three mixtures of them were tested for their Copper removal potential in wastewater in one batch test run. The most efficient algae mixture...

  7. Energy-saving wastewater treatment systems : formulation of cost functions

    OpenAIRE

    Nogueira, R.; Ferreira, I.; Janknecht, P; Rodríguez, Juan José; de Oliveira, Pedro; A. G. Brito

    2007-01-01

    Natural interactions between water, soil, atmosphere, plants and microorganisms include physical, chemical and biological processes with decontaminating capacities. Natural or energy-saving wastewater treatment systems utilize these processes and thereby enable a sustainable management in the field of wastewater treatment, offering low investment and operation costs, little or no energy consumption, little and low-skill labor requirements, good landscape integration and excellent ...

  8. Characterisation of wastewater for modelling of wastewater ...

    African Journals Online (AJOL)

    Bio-process modelling is increasingly used in design, modification and troubleshooting of wastewater treatment plants. (WWTPs). Characterisation of the influent wastewater to a WWTP is an important part of developing such a model. The characterisation required for modelling is more detailed than that routinely employed ...

  9. Characterisation of wastewater for modelling of wastewater ...

    African Journals Online (AJOL)

    Bio-process modelling is increasingly used in design, modification and troubleshooting of wastewater treatment plants (WWTPs). Characterisation of the influent wastewater to a WWTP is an important part of developing such a model. The characterisation required for modelling is more detailed than that routinely employed ...

  10. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  11. Tracing Technique for Blaster Attack

    OpenAIRE

    S., Siti Rahayu; Y., Robiah; S., Shahrin; A., Faizal M.; M, Mohd Zaki; R, Irda

    2009-01-01

    Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log...

  12. Attacks on RFID Identification Systems

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-09-01

    Full Text Available This article is about attacks on RFID systems. Currently antivirus developers are not developing systems that protect from viruses that could exist on RFID tags. Such viruses are considered as not existing because the RFID tag memory is very small. Unfortunately such viruses exist. This article is concerned to such viruses and attacks that hackers could do using such viruses. Based on this article methods to prevent RFID-viruses attacks could be developed.

  13. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  14. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  15. Attacker profiling in quantitative security assessment based on attack trees

    NARCIS (Netherlands)

    Lenin, Aleksandr; Willemson, Jan; Sari, Dyan Permata

    2014-01-01

    We present the results of research of limiting adversarial budget in attack games, and, in particular, in the failure-free attack tree models presented by Buldas-Stepanenko in 2012 and improved in 2013 by Buldas and Lenin. In the previously presented models attacker’s budget was assumed to be

  16. The potential of dairy wastewater for denitrification

    Directory of Open Access Journals (Sweden)

    Tibela Landeka Dragičević

    2010-09-01

    Full Text Available In this work the potential of dairy wastewater for denitrification process by means of a microbial culture of nitrificants and denitrificants was investigated. The aim of this work was to remove nitrate by using organic compounds from the dairy wastewater as an electron donors. The minimal ratio of COD/NO3-N of 10 (COD-chemical oxygen demand/NO3-N-nitrate nitrogen was required to achieve complete reduction of NO3-N. The microbial culture of nitrificants and denitrificants, that was previously adapted on the dairy wastewater, carried out nitrate reduction with a different substrate utilization rate. The denitrification rate of 5.75 mg NO3-N/Lh was achieved at the beginning of denitrification when the microbial culture utilizes readily biodegradable COD. Further degradation occurred with the denitrification rate of 1.7 mg NO3-N/Lh.

  17. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  18. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... and Conditions and Privacy Policy Go Red For Women® presents: View our first-ever short film (opens in new window) by Elizabeth Banks and share with the women you love. Heart Attack • Home • About Heart Attacks ...

  19. [Heart-attack in pregnancy].

    Science.gov (United States)

    Výtisková, T; Suchá, D; Fučíková, Z

    To describe hear-attack on crystal meth addicted pregnant woman. Case report. Acute heart-attack during pregnancy means unexpected obstetric complication. The consequences could be fatal for the mother and the fetus. Although good delivery management and treatment could reduce morbidity and mortality to a minimum.

  20. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  1. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  2. Suggestion of a Framework to Analyze Failure Modes and Effect of Cyber Attacks in NPP

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Chan Young; Seong, Poong Hyun [KAIST, Daejeon (Korea, Republic of)

    2016-05-15

    The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans.

  3. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  4. Allergens might trigger migraine attacks.

    Science.gov (United States)

    Bektas, Hesna; Karabulut, Hayriye; Doganay, Beyza; Acar, Baran

    2017-03-01

    Migraine is a common primary headache disorder. The mechanisms underlying the onset of a migraine attack are not completely understood. Environmental changes and a number of other factors could induce migraine attacks. The aim of this study was to investigate the relationship between the frequency of migraine attacks and allergens. Migraine patients without aura, and healthy individuals similar in age and gender without a history of headache and allergy were prospectively included in the study. The duration of migraine, the frequency of migraine attacks, the medication history, and the symptoms during attacks were questioned. Migraine disability assessment score (MIDAS) and visual analog scale (VAS) scores were obtained. Allergen extracts including dust, fungi, insect, animal epithelium, pollens, and food allergens were applied for allergy tests. 49 migraine patients and 49 healthy individuals were enrolled in the study. There was no significant difference in terms of age and gender. The median migraine disease duration, the number of attacks in a month, and the duration of attacks were, respectively, 5.5 years (1-44), 4 (1-10) day/month, and 24 (4-72) h. The mean MIDAS grade was 2.45 ± 0.14 (1-4), and mean VAS score was 7.89 ± 0.27 (4-10). The positivity of allergy tests was 55.1 % (27/49) in the migraine group and 32.7 % (16/49) in the control group (p < 0.05). The allergy tests were positive for house dust, red birch, hazel tree, olive tree, nettle, and wheat. The frequency of migraine attacks was higher in allergy-test-positive patients than in negative ones in the migraine group (p = 0.001). The migraine patients who had frequent attacks should be examined for allergies.

  5. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  6. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  7. Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Katarzyna Mazur

    2016-01-01

    Full Text Available The growing popularity of wireless sensor networks increases the risk of security attacks. One of the most common and dangerous types of attack that takes place these days in any electronic society is a distributed denial of service attack. Due to the resource constraint nature of mobile sensors, DDoS attacks have become a major threat to its stability. In this paper, we established a model of a structural health monitoring network, being disturbed by one of the most common types of DDoS attacks, the flooding attack. Through a set of simulations, we explore the scope of flood-based DDoS attack problem, assessing the performance and the lifetime of the network under the attack condition. To conduct our research, we utilized the Quality of Protection Modeling Language. With the proposed approach, it was possible to examine numerous network configurations, parameters, attack options, and scenarios. The results of the carefully performed multilevel analysis allowed us to identify a new kind of DDoS attack, the delayed distributed denial of service, by the authors, referred to as DDDoS attack. Multilevel approach to DDoS attack analysis confirmed that, examining endangered environments, it is significant to take into account many characteristics at once, just to not overlook any important aspect.

  8. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  9. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    -prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... interesting quantitative problems, that can be solved through an encoding into Satisfiability Modulo Theories. The flexibility and effectiveness of the approach is demonstrated on the study of a national-scale authentication system, whose attack tree is computed thanks to a Java implementation...

  10. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  11. Some legal challenges posed by remote attack

    National Research Council Canada - National Science Library

    William Boothby

    2012-01-01

      Abstract Attacking from a distance is nothing new, but with the advent of certain new technologies, attacks can be undertaken in which the attacker remains very remote from the scene where force will be employed...

  12. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available and is only able to cater for social engineering attacks that use bidirectional communication. Previous research discovered that social engineering attacks can be classified into three different categories, namely attacks that utilise bidirectional...

  13. Small Wastewater Systems Research

    Science.gov (United States)

    Small communities face barriers to building and maintaining effective wastewater treatment services, challenges include financial/economic limitations, lack of managerial training and geographic isolation/remoteness.

  14. Wastewater Industrial Contributors

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — Industrial contributors to municipal wastewater treatment facilities in Iowa for the National Pollutant Discharge Elimination System (NPDES) program.

  15. Wastewater and sludge management and research in Oman: An overview.

    Science.gov (United States)

    Jaffar Abdul Khaliq, Suaad; Ahmed, Mushtaque; Al-Wardy, Malik; Al-Busaidi, Ahmed; Choudri, B S

    2017-03-01

    It is well recognized that management of wastewater and sludge is a critical environmental issue in many countries. Wastewater treatment and sludge production take place under different technical, economic, and social contexts, thus requiring different approaches and involving different solutions. In most cases, a regular and environmentally safe wastewater treatment and associated sludge management requires the development of realistic and enforceable regulations, as well as treatment systems appropriate to local circumstances. The main objective of this paper is to provide useful information about the current wastewater and sludge treatment, management, regulations, and research in Oman. Based on the review and discussion, the wastewater treatment and sludge management in Oman has been evolving over the years. Further, the land application of sewage sludge should encourage revision of existing standards, regulations, and policies for the management and beneficial use of sewage sludge in Oman. Wastewater treatment and sludge management in Oman have been evolving over the years. Sludge utilization has been a challenge due to its association with human waste. Therefore, composting of sewage sludge is the best option in agriculture activities. Sludge and wastewater utilization can add up positively in the economic aspects of the country in terms of creating jobs and improving annual income rate. The number of research projects done on wastewater reuse and other ongoing ones related to the land application of sewage sludge should encourage revision of existing standards, regulations, and policies for the management and beneficial use of sewage sludge in Oman.

  16. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  17. What Causes a Heart Attack?

    Science.gov (United States)

    ... heart attack at age 36, it stopped her "dead in her tracks." Jennifer reminds us how heart disease takes too many of our moms, sisters, and friends from us every day. The more we share our stories, the faster ...

  18. What Is a Heart Attack?

    Science.gov (United States)

    ... blood pressure and excess protein in the urine. Preeclampsia is linked to an increased lifetime risk of heart disease, including CHD, heart attack, heart failure , and high blood pressure. Screening and Prevention Lowering your risk factors for coronary heart disease ...

  19. CAS, interdiction, and attack helicopters

    OpenAIRE

    Groenke, Andrew S.

    2005-01-01

    Within days of a major failed strike by attack helicopters during Operation Iraqi Freedom (OIF) analysts were questioning the value of such platforms on the modern battlefield. As OIF moved from combat to stability operations, helicopter losses from enemy action actually increased seemingly strengthening the argument of those who see the helicopter as unsuitable to some combat operations. Attack helicopter operations have diverged into two distinct categories, interdiction and close air sup...

  20. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  1. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    Energy Technology Data Exchange (ETDEWEB)

    Lee, In Hyo; Kang, Hyun Gook [KAIST, Daejeon (Korea, Republic of); Son, Han Seong [Joonbu University, Geumsan (Korea, Republic of)

    2016-05-15

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans.

  2. Vulnerability of water supply systems to cyber-physical attacks

    Science.gov (United States)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  3. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of attacks, means that an attack could be mitigated accordingly. The authors extend a previous, initial taxonomy of computer network attacks which forms the basis of a proposed network attack ontology in this paper. The objective of this ontology...

  4. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  5. Time-dependent analysis of attacks

    NARCIS (Netherlands)

    Arnold, Florian; Hermanns, H.; Pulungan, Reza; Stoelinga, Mariëlle Ida Antoinette

    The success of a security attack crucially depends on time: the more time available to the attacker, the higher the probability of a successful attack; when given enough time, any system can be compromised. Insight in time-dependent behaviors of attacks and the evolution of the attacker’s success as

  6. RESIST SRP AGAINST WORMHOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Marjan Kuchaki Rafsanjani

    2013-06-01

    Full Text Available Ad-hoc networks refer to temporary or interim networks which form for special purposes. Actually they are wireless networks with mobile nodes. These networks use no network assisting element for path routing and in these networks available nodes are responsible for path routing. Therefore when malicious nodes want to find a way to interfere with the path routing then the existence of a secure route protocol (SRP can prevent the interference. SRP protocol is one of the secure algorithms of path routing protocol but it is notresistant against wormhole attack. Wormhole attack is considered as a subtle attack in which two malicious nodes make a short connection in network's topology through private or implicit connection and represent two non neighbor nodes as neighbors and prevent the correctoperation of path routing protocol by using this method. One of the methods of preventing wormhole attack is by using packet leashes. We try to decrease the wormhole attack occurrence in this routing protocol by a kind of packet leashes called temporal leashes. We alsowill minimize problems resulting from using temporal leashes by different methods and modifications in its structure.

  7. Network robustness under large-scale attacks

    CERN Document Server

    Zhou, Qing; Liu, Ruifang; Cui, Shuguang

    2014-01-01

    Network Robustness under Large-Scale Attacks provides the analysis of network robustness under attacks, with a focus on large-scale correlated physical attacks. The book begins with a thorough overview of the latest research and techniques to analyze the network responses to different types of attacks over various network topologies and connection models. It then introduces a new large-scale physical attack model coined as area attack, under which a new network robustness measure is introduced and applied to study the network responses. With this book, readers will learn the necessary tools to evaluate how a complex network responds to random and possibly correlated attacks.

  8. Energy Efficiency Strategies for Municipal Wastewater Treatment Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Daw, J.; Hallett, K.; DeWolfe, J.; Venner, I.

    2012-01-01

    Water and wastewater systems are significant energy consumers with an estimated 3%-4% of total U.S. electricity consumption used for the movement and treatment of water and wastewater. Water-energy issues are of growing importance in the context of water shortages, higher energy and material costs, and a changing climate. In this economic environment, it is in the best interest for utilities to find efficiencies, both in water and energy use. Performing energy audits at water and wastewater treatment facilities is one way community energy managers can identify opportunities to save money, energy, and water. In this paper the importance of energy use in wastewater facilities is illustrated by a case study of a process energy audit performed for Crested Butte, Colorado's wastewater treatment plant. The energy audit identified opportunities for significant energy savings by looking at power intensive unit processes such as influent pumping, aeration, ultraviolet disinfection, and solids handling. This case study presents best practices that can be readily adopted by facility managers in their pursuit of energy and financial savings in water and wastewater treatment. This paper is intended to improve community energy managers understanding of the role that the water and wastewater sector plays in a community's total energy consumption. The energy efficiency strategies described provide information on energy savings opportunities, which can be used as a basis for discussing energy management goals with water and wastewater treatment facility managers.

  9. Removal of human pathogenic viruses in a down-flow hanging sponge (DHS) reactor treating municipal wastewater and health risks associated with utilization of the effluent for agricultural irrigation.

    Science.gov (United States)

    Kobayashi, Naohiro; Oshiki, Mamoru; Ito, Toshihiro; Segawa, Takahiro; Hatamoto, Masashi; Kato, Tsuyoshi; Yamaguchi, Takashi; Kubota, Kengo; Takahashi, Masanobu; Iguchi, Akinori; Tagawa, Tadashi; Okubo, Tsutomu; Uemura, Shigeki; Harada, Hideki; Motoyama, Toshiki; Araki, Nobuo; Sano, Daisuke

    2017-03-01

    A down-flow hanging sponge (DHS) reactor has been developed as a cost-effective wastewater treatment system that is adaptable to local conditions in low-income countries. A pilot-scale DHS reactor previously demonstrated stable reduction efficiencies for chemical oxygen demand (COD) and ammonium nitrogen over a year at ambient temperature, but the pathogen reduction efficiency of the DHS reactor has yet to be investigated. In the present study, the reduction efficiency of a pilot-scale DHS reactor fed with municipal wastewater was investigated for 10 types of human pathogenic viruses (norovirus GI, GII and GIV, aichivirus, astrovirus, enterovirus, hepatitis A and E viruses, rotavirus, and sapovirus). DHS influent and effluent were collected weekly or biweekly for 337 days, and concentrations of viral genomes were determined by microfluidic quantitative PCR. Aichivirus, norovirus GI and GII, enterovirus, and sapovirus were frequently detected in DHS influent, and the log10 reduction (LR) of these viruses ranged from 1.5 to 3.7. The LR values for aichivirus and norovirus GII were also calculated using a Bayesian estimation model, and the average LR (±standard deviation) values for aichivirus and norovirus GII were estimated to be 1.4 (±1.5) and 1.8 (±2.5), respectively. Quantitative microbial risk assessment was conducted to calculate a threshold reduction level for norovirus GII that would be required for the use of DHS effluent for agricultural irrigation, and it was found that LRs of 2.6 and 3.7 for norovirus GII in the DHS effluent were required in order to not exceed the tolerable burden of disease at 10-4 and 10-6 disability-adjusted life years loss per person per year, respectively, for 95% of the exposed population during wastewater reuse for irrigation. Copyright © 2016 Elsevier Ltd. All rights reserved.

  10. Characteristics of grey wastewater

    DEFF Research Database (Denmark)

    Eriksson, Eva; Auffarth, Karina Pipaluk Solvejg; Henze, Mogens

    2002-01-01

    The composition of grey wastewater depends on sources and installations from where the water is drawn, e.g. kitchen, bathroom or laundry. The chemical compounds present originate from household chemicals, cooking, washing and the piping. In general grey wastewater contains lower levels of organic...... matter and nutrients compared to ordinary wastewater, since urine, faeces and toilet paper are not included. The levels of heavy metals are however in the same concentration range. The information regarding the content of xenobiotic organic compounds (XOCs) is limited. From this study, 900 different XOCs...

  11. Situational panic attacks in social anxiety disorder.

    Science.gov (United States)

    Potter, Carrie M; Wong, Judy; Heimberg, Richard G; Blanco, Carlos; Liu, Shang-Min; Wang, Shuai; Schneier, Franklin R

    2014-01-01

    Panic attacks (PAs) are common in many psychiatric disorders other than panic disorder, especially social anxiety disorder (SAD). PAs have been associated with increased severity, comorbidity, and impairment in many disorders; therefore, PAs can now be used as a descriptive specifier across all DSM-5 disorders. However, the clinical implications of PAs in SAD remain unclear. The aim of the present investigation was to examine demographic and clinical characteristics associated with SAD-related situational panic attacks in a large, representative epidemiological sample of individuals with SAD (N=1138). We compared individuals with SAD who did and did not endorse situational PAs in terms of demographic factors, fear/avoidance of social situations, distress, impairment, and diagnostic comorbidity. Being male, black, Asian, or over 65 years old was associated with a decreased likelihood of experiencing situational PAs, whereas being unemployed was associated with an increased likelihood. Individuals with situational PAs also exhibited greater fear and avoidance of social situations, impairment, coping-oriented substance use, treatment utilization, and concurrent and longitudinal psychiatric comorbidity. Consistent with most epidemiologic studies, the information collected relied on self-report, and not all participants were available for both waves of assessment. The present findings suggest that SAD-related situational PAs are associated with more severe and complex presentations of SAD. Implications for the assessment and treatment of SAD, as well as for the use of PAs as a descriptive specifier for SAD, are discussed. Copyright © 2014 Elsevier B.V. All rights reserved.

  12. Angle-of-attack estimation for analysis of CAT encounters

    Science.gov (United States)

    Bach, R. E., Jr.; Parks, E. K.

    1985-01-01

    Recent studies of clear-air turbulence (CAT) encounters involving wide-body airliners have been based upon flight-path wind estimates made by analyzing digital flight-data-recorder (DFDR) records and radar records. Such estimates require a time history of the aircraft angle of attack, a record that is not usually included in the DFDR measurement set. This paper describes a method for reconstructing angle of attack that utilizes available flight record and aircraft-specific information associated with an aerodynamic model of the lift coefficient. Results from two wide-body incidents in which vane measurements of angle of attack were recorded show good agreement between measured and calculated time histories. This research has been performed in cooperation with the National Transportation Safety Board to provide a better understanding of the CAT phenomenon.

  13. Role of wastewater irrigation in mosquito breeding in south Punjab, Pakistan

    DEFF Research Database (Denmark)

    Mukhtar, Muhammad; Herrel, Nathaly; Amerasinghe, Felix P

    2003-01-01

    ) and Cx. quinquefasciatus (Bancroftian filariasis, West Nile fever) in the wastewater system indicated that such habitats could contribute to vector-borne disease risks for human communities that are dependent upon wastewater use for their livelihoods. Wastewater disposal and irrigation systems provide......Mosquito breeding within the wastewater irrigation system around the town of Haroonabad in the southern Punjab, Pakistan, was studied from July to September 2000 as part of a wider study of the costs and benefits of wastewater use in agriculture. The objective of this study was to assess the vector-borne...... human disease risks associated with mosquito species utilizing wastewater for breeding. Mosquito larvae were collected on a fortnightly basis from components of the wastewater disposal system and irrigated sites. In total, 133 samples were collected, about equally divided between agricultural sites...

  14. Semi-continuous production of high-activity pectinases by immobilized Rhizopus oryzae using tobacco wastewater as substrate and their utilization in the hydrolysis of pectin-containing lignocellulosic biomass at high solid content.

    Science.gov (United States)

    Zheng, Yu-Xi; Wang, Yuan-Liang; Pan, Jun; Zhang, Jian-Rong; Dai, Ya; Chen, Kun-Yan

    2017-10-01

    In this study, highly reactive endo- and exo-polygalacturonases (PGs) were produced from the tobacco industry wastewater using immobilized Rhizopus oryzae. Compared with free cells, immobilized cells increased enzyme activity 2.8-fold and reduced production time to 24h by shake-flask production. Moreover, the immobilized cells enabled the semi-continuous production of enzymes through repeated-batch mode for seven consecutive cycles in a scale-up bioreactor. During the first five cycles, the average endo-PG and exo-PG activities reached 307.5 and 242.6U/ml, respectively. The addition of crude enzyme for the hydrolysis of pectin-containing lignocellulosic biomass under high-gravity conditions increased glucose release 4.2-fold (115.4 vs. 29.0g/L), compared with hydrolysis using cellulase alone. This process achieves the efficient production of pectin-degrading enzymes, provides a cost-effective method for tobacco wastewater treatment, and offers the possibility to obtain fermentable sugars with high-titer from pectin-containing lignocellulosic biomass, which has important potential for the commercial production of bio-fuels. Copyright © 2017 Elsevier Ltd. All rights reserved.

  15. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  16. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst 24...

  17. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on major American networks the first 24 hours...

  18. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...

  19. TENORM: Wastewater Treatment Residuals

    Science.gov (United States)

    Water and wastes which have been discharged into municipal sewers are treated at wastewater treatment plants. These may contain trace amounts of both man-made and naturally occurring radionuclides which can accumulate in the treatment plant and residuals.

  20. Wastewater Treatment Facilities

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — Individual permits for municipal, industrial, and semi-public wastewater treatment facilities in Iowa for the National Pollutant Discharge Elimination System (NPDES)...

  1. Wastewater Treatment Plants

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — The actual treatment areas for municipal, industrial, and semi-public wastewater treatment facilities in Iowa for the National Pollutant Discharge Elimination System...

  2. Microalgae and wastewater treatment

    OpenAIRE

    Abdel-Raouf, N.; Al-Homaidan, A.A.; Ibraheem, I.B.M.

    2012-01-01

    Organic and inorganic substances which were released into the environment as a result of domestic, agricultural and industrial water activities lead to organic and inorganic pollution. The normal primary and secondary treatment processes of these wastewaters have been introduced in a growing number of places, in order to eliminate the easily settled materials and to oxidize the organic material present in wastewater. The final result is a clear, apparently clean effluent which is discharged i...

  3. Trojan Horse Attacking Strategy on Quantum Cryptography

    Science.gov (United States)

    Zeng, Guihua

    2003-08-01

    Trojan horse attacking strategy on quantum cryptography is investigated, three aspects are involved. First, the mechanism for the Trojan horse attacking strategy on quantum cryptography as well as classic cryptography is studied. Then the fragility of the quantum cryptographic algorithm employing EPR pairs as key against the Trojan horse attacking strategy is analyzed. To prevent the Trojan horse attacking strategy, an improvement scheme which makes use of non-orthogonal entangled states is proposed, results show the improvement scheme is robust to the Trojan horse attacking strategy without reducing the security on other kinds of attacking strategies.

  4. Adaptive Timer-Based Countermeasures against TCP SYN Flood Attacks

    Science.gov (United States)

    Tanabe, Masao; Akaike, Hirofumi; Aida, Masaki; Murata, Masayuki; Imase, Makoto

    As a result of the rapid development of the Internet in recent years, network security has become an urgent issue. Distributed denial of service (DDoS) attacks are one of the most serious security issues. In particular, 60 percent of the DDoS attacks found on the Internet are TCP attacks, including SYN flood attacks. In this paper, we propose adaptive timer-based countermeasures against SYN flood attacks. Our proposal utilizes the concept of soft-state protocols that are widely used for resource management on the Internet. In order to avoid deadlock, a server releases resources using a time-out mechanism without any explicit requests from its clients. If we change the value of the timer in accordance with the network conditions, we can add more flexibility to the soft-state protocols. The timer is used to manage the resources assigned to half-open connections in a TCP 3-way handshake mechanism, and its value is determined adaptively according to the network conditions. In addition, we report our simulation results to show the effectiveness of our approach.

  5. Research Note on the Energy Infrastructure Attack Database (EIAD

    Directory of Open Access Journals (Sweden)

    Jennifer Giroux

    2013-12-01

    Full Text Available The January 2013 attack on the In Amenas natural gas facility drew international attention. However this attack is part of a portrait of energy infrastructure targeting by non-state actors that spans the globe. Data drawn from the Energy Infrastructure Attack Database (EIAD shows that in the last decade there were, on average, nearly 400 annual attacks carried out by armed non-state actors on energy infrastructure worldwide, a figure that was well under 200 prior to 1999. This data reveals a global picture whereby violent non-state actors target energy infrastructures to air grievances, communicate to governments, impact state economic interests, or capture revenue in the form of hijacking, kidnapping ransoms, theft. And, for politically motivated groups, such as those engaged in insurgencies, attacking industry assets garners media coverage serving as a facilitator for international attention. This research note will introduce EIAD and position its utility within various research areas where the targeting of energy infrastructure, or more broadly energy infrastructure vulnerability, has been addressed, either directly or indirectly. We also provide a snapshot of the initial analysis of the data between 1980-2011, noting specific temporal and spatial trends, and then conclude with a brief discussion on the contribution of EIAD, highlighting future research trajectories. 

  6. Satellite detection of wastewater diversion plumes in Southern California

    Science.gov (United States)

    Gierach, Michelle M.; Holt, Benjamin; Trinh, Rebecca; Jack Pan, B.; Rains, Christine

    2017-02-01

    Multi-sensor satellite observations proved useful in detecting surfacing wastewater plumes during the 2006 Hyperion Treatment Plant (HTP) and 2012 Orange County Sanitation District (OCSD) wastewater diversion events in Southern California. Satellite sensors were capable of detecting biophysical signatures associated with the wastewater, compared to ambient ocean waters, enabling monitoring of environmental impacts over a greater spatial extent than in situ sampling alone. Thermal satellite sensors measured decreased sea surface temperatures (SSTs) associated with the surfacing plumes. Ocean color satellite sensors did not measure a distinguishable biological response in terms of chlorophyll-a (chl-a) concentrations during the short lived, three-day long, 2006 HTP diversion. A period of decreased chl-a concentration was observed during the three-week long 2012 OCSD diversion, likely in association with enhanced chlorination of the discharged wastewater that suppressed the phytoplankton response and/or significant uptake by heterotrophic bacteria. Synthetic aperture radar (SAR) satellite data were able to identify and track the 2006 HTP wastewater plume through changes in surface roughness related to the oily components of the treated surfacing wastewater. Overall, it was found that chl-a and SST values must have differences of at least 1 mg m-3 and 0.5 °C, respectively, in comparison with adjacent waters for wastewater plumes and their biophysical impact to be detectable from satellite. For a wastewater plume to be identifiable in SAR imagery, wind speeds must range between ∼3 and 8 m s-1. The findings of this study illustrate the benefit of utilizing multiple satellite sensors to monitor the rapidly changing environmental response to surfacing wastewater plumes, and can help inform future wastewater diversions in coastal areas.

  7. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    by distributing a large amount of private goods to the selectorate—the cronies—can be termed kleptocracies . Many govern- ments do indeed resemble...where the high-private goods kleptocracy is a good model. Furthermore, while not an example of crony attack to affect policy change (as opposed to...information about those nearest to the leader. The relationships part is only the start. Kleptocracies , like orga- nized crime leaders, are clever

  8. Biohydrogen production from industrial wastewaters.

    Science.gov (United States)

    Moreno-Andrade, Iván; Moreno, Gloria; Kumar, Gopalakrishnan; Buitrón, Germán

    2015-01-01

    The feasibility of producing hydrogen from various industrial wastes, such as vinasses (sugar and tequila industries), and raw and physicochemical-treated wastewater from the plastic industry and toilet aircraft wastewater, was evaluated. The results showed that the tequila vinasses presented the maximum hydrogen generation potential, followed by the raw plastic industry wastewater, aircraft wastewater, and physicochemical-treated wastewater from the plastic industry and sugar vinasses, respectively. The hydrogen production from the aircraft wastewater was increased by the adaptation of the microorganisms in the anaerobic sequencing batch reactor.

  9. Timing Is Everything with Heart Attacks

    Science.gov (United States)

    ... and certain time periods. The study was published online recently in the American Heart Journal . Previous research has suggested that highly stressful events, such as earthquakes and World Cup soccer games, may trigger heart attacks. Stress-related heart attacks ...

  10. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  11. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... help prevent your first heart attack. Heart-Healthy Lifestyle Changes A heart-healthy lifestyle can help prevent ... to flow to the heart muscle. Heart-Healthy Lifestyle Changes Treatment for a heart attack usually includes ...

  12. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available link. A social engineering attack targets this weakness by using various manipulation techniques to elicit sensitive information. The field of social engineering is still in its early stages with regard to formal definitions, attack frameworks...

  13. Being active after a heart attack (image)

    Science.gov (United States)

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  14. Elimination of a Second-Law-Attack, and All Cable-Resistance-Based Attacks, in the Kirchhoff-Law-Johnson-Noise (KLJN Secure Key Exchange System

    Directory of Open Access Journals (Sweden)

    Laszlo B. Kish

    2014-10-01

    Full Text Available We introduce the so far most efficient attack against the Kirchhoff-law-Johnson-noise (KLJN secure key exchange system. This attack utilizes the lack of exact thermal equilibrium in practical applications and is based on cable resistance losses and the fact that the Second Law of Thermodynamics cannot provide full security when such losses are present. The new attack does not challenge the unconditional security of the KLJN scheme, but it puts more stringent demands on the security/privacy enhancing protocol than for any earlier attack. In this paper we present a simple defense protocol to fully eliminate this new attack by increasing the noise-temperature at the side of the smaller resistance value over the noise-temperature at the side with the greater resistance. It is shown that this simple protocol totally removes Eve’s information not only for the new attack but also for the old Bergou-Scheuer-Yariv attack. The presently most efficient attacks against the KLJN scheme are thereby completely nullified.

  15. Intermittent hypoendorphinaemia in migraine attack.

    Science.gov (United States)

    Baldi, E; Salmon, S; Anselmi, B; Spillantini, M G; Cappelli, G; Brocchi, A; Sicuteri, F

    1982-06-01

    Beta-endorphin (RIA method, previous chromatographic extraction) was evaluated in plasma of migraine sufferers in free periods and during attacks. Decreased levels of the endogenous opioid peptide were found in plasma sampled during the attacks but not in free periods. Even chronic headache sufferers exhibited significantly lowered levels of beta-endorphin, when compared with control subjects with a negative personal and family history of head pains. The mechanism of the hypoendorphinaemia is unknown: lowered levels of the neuropeptide, which controls nociception, vegetative functions and hedonia, could be important in a syndrome such as migraine, characterized by pain, dysautonomia and anhedonia. The impairment of monoaminergic synapses ("empty neuron" condition) constantly present in sufferers from serious headaches, could be due to the fact that opioid neuropeptides, because of a receptoral or metabolic impairment, poorly modulate the respective monoaminergic neurons, resulting in imbalance of synaptic neurotransmission.

  16. Network Attack Reference Data Set

    Science.gov (United States)

    2004-12-01

    fingerprinting tools include QueSO [10] (literally translates to “what OS”) and nmap [11], however there are a number of additional tools available for...Network Attack Reference Data Set J. McKenna and J. Treurniet Defence R&D Canada √ Ottawa TECHNICAL...collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources

  17. Joint Direct Attack Munition (JDAM)

    Science.gov (United States)

    2015-12-01

    Selected Acquisition Report (SAR) RCS: DD-A&T(Q&A)823-503 Joint Direct Attack Munition (JDAM) As of FY 2017 President’s Budget Defense Acquisition...Mission and Description 6 Executive Summary 7 Threshold Breaches 8 Schedule 9 Performance 12 Track to Budget 14 Cost and Funding...15 Low Rate Initial Production 26 Foreign Military Sales 27 Nuclear Costs 29 Unit Cost 30 Cost Variance 33 Contracts 36

  18. Dual Stage SQL Injection Attacks

    OpenAIRE

    Eve, Martin Paul

    2009-01-01

    I came across quite an interesting SQL Injection scenario today. The software in which the vulnerability resides will remain anonymous until fixed, but an abstracted version of the scenario can safely be outlined below.\\ud \\ud The objective of the software is to restrict user accounts to certain IP addresses when accessing a bulletin board. This shows how this can be bypassed using a dual-stage SQL injection attack.

  19. New Multi-step Worm Attack Model

    OpenAIRE

    Robiah, Y.; Rahayu, S. Siti; Shahrin, S.; Faizal, M. A.; Zaki, M. Mohd; Marliza, R.

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. Fo...

  20. Terror attacks influence driving behavior in Israel

    Science.gov (United States)

    Stecklov, Guy; Goldstein, Joshua R.

    2004-01-01

    Terror attacks in Israel produce a temporary lull in light accidents followed by a 35% spike in fatal accidents on Israeli roads 3 days after the attack. Our results are based on time-series analysis of Israeli traffic flows, accidents, and terror attacks from January 2001 through June 2002. Whereas prior studies have focused on subjective reports of posttraumatic stress, our study shows a population-level behavioral response to violent terror attacks. PMID:15448203

  1. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  2. Distance hijacking attacks on distance bounding protocols

    OpenAIRE

    Cremers, Cas; Rasmussen, Kasper Bonne; Čapkun, Srdjan

    2011-01-01

    Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance Fraud, Mafia Fraud, and Terrorist Fraud. We define a fourth main type of attacks on distance bounding protocols, called Distance Hijacking attacks. We show that many proposed distance bounding protocols are vulnerable to these attacks, and we propose solutions to make these protocols resilient to Distance Hijacking. Additionally, we generalize Distance Hijacking to Location Hijacking, to which ...

  3. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  4. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  5. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  6. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes...

  7. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting of issues of public importance, an attack is made upon the honesty, character, integrity, or like personal... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612...

  8. Resilience of LTE networks against smart jamming attacks

    KAUST Repository

    Aziz, Farhan M.

    2014-12-08

    Commercial LTE networks are being studied for mission-critical applications, such as public safety and smart grid communications. In this paper, LTE networks are shown vulnerable to Denial-of-Service (DOS) and loss of service attacks from smart jammers, who may employ simple narrowband jamming techniques to attack without any need to hack the network or its users. We modeled the utilities of jamming and anti-jamming actions played by the jammer and the network under the framework of single-shot and repeated Bayesian games. In a single-shot game formulation the only Nash Equilibria (NE) are pure strategy equilibria at which network utility is severely compromised. We propose a repeated-game learning and strategy algorithm for the network that outperforms single-shot games by a significant margin. Furthermore, all of our proposed actions and algorithms can be implemented with current technology.

  9. Resilience of LTE networks against smart jamming attacks: Wideband model

    KAUST Repository

    Aziz, Farhan M.

    2015-12-03

    LTE/LTE-A networks have been successfully providing advanced broadband services to millions of users worldwide. Lately, it has been suggested to use LTE networks for mission-critical applications like public safety, smart grid and military communications. We have previously shown that LTE networks are vulnerable to Denial-of-Service (DOS) and loss of service attacks from smart jammers. In this paper, we extend our previous work on resilience of LTE networks to wideband multipath fading channel, SINR estimation in frequency domain and computation of utilities based on observable parameters under the framework of single-shot and repeated games with asymmetric information. In a single-shot game formulation, network utility is severely compromised at its solutions, i.e. at the Nash Equilibria (NE). We propose evolved repeated-game strategy algorithms to combat smart jamming attacks that can be implemented in existing deployments using current technology. © 2015 IEEE.

  10. Somatic panic-attack equivalents in a community sample of Rwandan widows who survived the 1994 genocide.

    Science.gov (United States)

    Hagengimana, Athanase; Hinton, Devon; Bird, Bruce; Pollack, Mark; Pitman, Roger K

    2003-01-25

    The present study is the first to attempt to determine rates of panic attacks, especially 'somatically focused' panic attacks, panic disorder, symptoms of post-traumatic stress disorder (PTSD), and depression levels in a population of Rwandans traumatized by the 1994 genocide. The following measures were utilized: the Rwandan Panic-Disorder Survey (RPDS); the Beck Depression Inventory (BDI); the Harvard Trauma Questionnaire (HTQ); and the PTSD Checklist (PCL). Forty of 100 Rwandan widows suffered somatically focused panic attacks during the previous 4 weeks. Thirty-five (87%) of those having panic attacks suffered panic disorder, making the rate of panic disorder for the entire sample 35%. Rwandan widows with panic attacks had greater psychopathology on all measures. Somatically focused panic-attack subtypes seem to constitute a key response to trauma in the Rwandan population. Future studies of traumatized non-Western populations should carefully assess not only somatoform disorder but also somatically focused panic attacks.

  11. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  12. Microalgal biofilms for wastewater treatment

    NARCIS (Netherlands)

    Boelee, N.C.

    2013-01-01

    The objective of this thesis was to explore the possibilities of using microalgal biofilms for the treatment of municipal wastewater, with a focus on the post-treatment of municipal wastewater effluent. The potential of microalgal biofilms for wastewater treatment was first investigated using a

  13. Xenobiotic organic compounds in wastewater

    DEFF Research Database (Denmark)

    Eriksson, Eva; Baun, Anders; Henze, Mogens

    2002-01-01

    Information regarding the contents of xenobiotic organic compounds (XOCs) in wastewater is limited, but it has been shown that at least 900 different compounds / compound groups could potentially be present in grey wastewater. Analyses of Danish grey wastewater revealed the presence of several hu...... aquatic toxicity were present and that data for environmental fate could only be retrieved for about half of the compounds....

  14. LCA of Wastewater Treatment

    DEFF Research Database (Denmark)

    Larsen, Henrik Fred

    2018-01-01

    The main purpose of wastewater treatment is to protect humans against waterborne diseases and to safeguard aquatic bio-resources like fish. The dominating environmental concerns within this domain are indeed still potential aquatic eutrophication/oxygen depletion due to nutrient/organic matter...... emissions and potential health impacts due to spreading of pathogens. Anyway, the use of treatment for micro-pollutants is increasing and a paradigm shift is ongoing — wastewater is more and more considered as a resource of, e.g. energy, nutrients and even polymers, in the innovations going on. The focus...... of LCA studies addressing wastewater treatment have from the very first published cases, been on energy and resource consumption. In recent time, the use of characterisation has increased and besides global warming potential, especially eutrophication is in focus. Even the toxicity-related impact...

  15. Wastewater Treatment Models

    DEFF Research Database (Denmark)

    Gernaey, Krist; Sin, Gürkan

    2008-01-01

    The state-of-the-art level reached in modeling wastewater treatment plants (WWTPs) is reported. For suspended growth systems, WWTP models have evolved from simple description of biological removal of organic carbon and nitrogen in aeration tanks (ASM1 in 1987) to more advanced levels including...... the practice of WWTP modeling by linking the wastewater treatment line with the sludge handling line in one modeling platform. Application of WWTP models is currently rather time consuming and thus expensive due to the high model complexity, and requires a great deal of process knowledge and modeling expertise...

  16. Wastewater treatment models

    DEFF Research Database (Denmark)

    Gernaey, Krist; Sin, Gürkan

    2011-01-01

    The state-of-the-art level reached in modeling wastewater treatment plants (WWTPs) is reported. For suspended growth systems, WWTP models have evolved from simple description of biological removal of organic carbon and nitrogen in aeration tanks (ASM1 in 1987) to more advanced levels including...... of WWTP modeling by linking the wastewater treatment line with the sludge handling line in one modeling platform. Application of WWTP models is currently rather time consuming and thus expensive due to the high model complexity, and requires a great deal of process knowledge and modeling expertise...

  17. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  18. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  19. Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis

    Directory of Open Access Journals (Sweden)

    Tongguang Ni

    2013-01-01

    Full Text Available Distributed denial of service (DDoS attacks are one of the major threats to the current Internet, and application-layer DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. Consequently, neither intrusion detection systems (IDS nor victim server can detect malicious packets. In this paper, a novel approach to detect application-layer DDoS attack is proposed based on entropy of HTTP GET requests per source IP address (HRPI. By approximating the adaptive autoregressive (AAR model, the HRPI time series is transformed into a multidimensional vector series. Then, a trained support vector machine (SVM classifier is applied to identify the attacks. The experiments with several databases are performed and results show that this approach can detect application-layer DDoS attacks effectively.

  20. Biokinetic study for SRC-I wastewater

    Energy Technology Data Exchange (ETDEWEB)

    1984-06-01

    Biooxidation is an important part of the overall wastewater treatment system for the proposed SRC-I Demonstration Plant in Newman, Kentucky. After the completion of a Baseline Design for the plant in April 1982, various refinements were evaluated. One of these was the inclusion of a process for phenol recovery from four sour-water streams. As part of this evaluation, an extensive laboratory treatability study was conducted on wastewaters both with and without this phenol recovery step. The purpose of the study was to compare the results of different treatment schemes on different wastewaters and did not include the development of the kinetic coefficients that govern the biooxidation process. Additional treatability testing documented herein, has been performed to establish the kinetic coefficients for biooxidation of the SRC-I wastewaters. This will provide a rational basis for any subsequent changes in design. The wastewater feed used in this study was process recycle water from the Fort Lewis, Washington, pilot plant. Prior to biooxidation, it was pretreated by solvent extraction for removal of phenolics and by steam stripping for removal of ammonia and hydrogen sulfide. Two, 2-stage bench scale bioreactors were operated for approximately eight months, during which time they were stabilized at various steady-state conditions. Kinetic coefficients were evaluated according to the Lawrence and McCarty model, based on BOD, COD, and TOC. Nitrification, oxygen utilization, and solids settling velocities were also studied. The results showed that BOD is a poor basis for the model mainly because almost all BOD/sub 5/ was removed at all steady-state conditions. Also, the model was more accurate for steady-state conditions of lower solids retention times. The bulk of both organic and ammonia reductions occurred in the first stage reactors.

  1. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  2. Coronary Artery Dissection: Not Just a Heart Attack

    Science.gov (United States)

    ... Aneurysm More Coronary Artery Dissection: Not Just a Heart Attack Updated:Oct 4,2016 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  3. Opportunities for Automated Demand Response in California Wastewater Treatment Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Aghajanzadeh, Arian [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Wray, Craig [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); McKane, Aimee [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2015-08-30

    Previous research over a period of six years has identified wastewater treatment facilities as good candidates for demand response (DR), automated demand response (Auto-­DR), and Energy Efficiency (EE) measures. This report summarizes that work, including the characteristics of wastewater treatment facilities, the nature of the wastewater stream, energy used and demand, as well as details of the wastewater treatment process. It also discusses control systems and automated demand response opportunities. Furthermore, this report summarizes the DR potential of three wastewater treatment facilities. In particular, Lawrence Berkeley National Laboratory (LBNL) has collected data at these facilities from control systems, submetered process equipment, utility electricity demand records, and governmental weather stations. The collected data were then used to generate a summary of wastewater power demand, factors affecting that demand, and demand response capabilities. These case studies show that facilities that have implemented energy efficiency measures and that have centralized control systems are well suited to shed or shift electrical loads in response to financial incentives, utility bill savings, and/or opportunities to enhance reliability of service. In summary, municipal wastewater treatment energy demand in California is large, and energy-­intensive equipment offers significant potential for automated demand response. In particular, large load reductions were achieved by targeting effluent pumps and centrifuges. One of the limiting factors to implementing demand response is the reaction of effluent turbidity to reduced aeration at an earlier stage of the process. Another limiting factor is that cogeneration capabilities of municipal facilities, including existing power purchase agreements and utility receptiveness to purchasing electricity from cogeneration facilities, limit a facility’s potential to participate in other DR activities.

  4. Dielectric Barrier Discharge Plasma-Induced Photocatalysis and Ozonation for the Treatment of Wastewater

    Science.gov (United States)

    Mok, Young Sun; Jo, Jin-Oh; Lee, Heon-Ju

    2008-02-01

    The physicochemical processes of dielectric barrier discharge (DBD) such as in-situ formation of chemically active species and emission of ultraviolet (UV)/visible light were utilized for the treatment of a simulated wastewater formed with Acid Red 4 as the model organic contaminant. The chemically active species (mostly ozone) produced in the DBD reactor were well distributed in the wastewater using a porous gas diffuser, thereby increasing the gas-liquid contact area. For the purpose of making the best use of the light emission, a titanium oxide-based photocatalyst was incorporated in the wastewater treating system. The experimental parameters chosen were the voltage applied to the DBD reactor, the initial pH of the wastewater, and the concentration of hydrogen peroxide added to the wastewater. The results have clearly shown that the present system capable of degrading organic contaminants in two ways (photocatalysis and ozonation) may be a promising wastewater treatment technology.

  5. The Tokyo subway sarin attack--lessons learned.

    Science.gov (United States)

    Okumura, T; Hisaoka, T; Yamada, A; Naito, T; Isonuma, H; Okumura, S; Miura, K; Sakurada, M; Maekawa, H; Ishimatsu, S; Takasu, N; Suzuki, K

    2005-09-01

    The sarin gas attack in the Tokyo subway system is reviewed from a clinical toxicology perspective. Based on the lessons learned from this attack, the following areas should be addressed on a global scale. First, an adequate supply of protective equipment is required, including level B protective equipment with a pressure demand breathing apparatus. In addition, a system should be established that enables a possible cause to be determined based on symptoms, physical findings, general laboratory tests, and a simple qualitative analysis for poisonous substances. If an antidote is needed, the system should enable it to be administered to the victims as quickly as possible. Preparation for a large-scale chemical attack by terrorists requires the prior establishment of a detailed decontamination plan that utilizes not only mass decontamination facilities but also public facilities in the area. A system should be established for summarizing, evaluating, and disseminating information on poisonous substances. Finally, a large-scale scientific investigation of the Tokyo sarin attack should be conducted to examine its long-term and subclinical effects and the effects of exposure to asymptomatic low levels of sarin.

  6. Techniques of Wastewater Treatment

    Indian Academy of Sciences (India)

    In the first part of this article, we have learned about the need and importance of wastewater treatment and conven- tional methods of treatment. Currently the need is to develop low power consuming and yet effective techniques to handle complex wastes. As a result, new and advanced techniques are being studied and in ...

  7. Techniques of Wastewater Treatment

    Indian Academy of Sciences (India)

    Techniques of Wastewater Treatment. 1. Introduction to Effluent Treatment and Industrial Methods. Amol A Kulkarni, Mugdha Deshpande and A B Pandit. Amol A Kulkarni is a PhD student from the Chemi- cal Engineering division in UDCT and is working on the characterization of non-linear dynamics in chemical reactors.

  8. Paper 1: Wastewater characterisation

    African Journals Online (AJOL)

    drinie

    The impact of wastewater prefermentation cannot be evaluated in isolation, based only on the local prefermenter biodegradable organic matter production rate, as represented by the volatile fatty acids concentration increase across the prefermenter. The nutrients ratio changes and solids removal variations from the raw to ...

  9. Vietnam Urban Wastewater Review

    OpenAIRE

    World Bank

    2013-01-01

    Vietnam is facing the challenge of trying to keep pace with increasing environmental pollution associated with rapid urbanization, especially in the larger cities. Over the past 20 years, the Government of Vietnam has made considerable effort to develop urban sanitation policies, legislations and regulations, and to invest in urban sanitation including wastewater treatment systems. This st...

  10. Microalgae and wastewater treatment

    Science.gov (United States)

    Abdel-Raouf, N.; Al-Homaidan, A.A.; Ibraheem, I.B.M.

    2012-01-01

    Organic and inorganic substances which were released into the environment as a result of domestic, agricultural and industrial water activities lead to organic and inorganic pollution. The normal primary and secondary treatment processes of these wastewaters have been introduced in a growing number of places, in order to eliminate the easily settled materials and to oxidize the organic material present in wastewater. The final result is a clear, apparently clean effluent which is discharged into natural water bodies. This secondary effluent is, however, loaded with inorganic nitrogen and phosphorus and causes eutrophication and more long-term problems because of refractory organics and heavy metals that are discharged. Microalgae culture offers an interesting step for wastewater treatments, because they provide a tertiary biotreatment coupled with the production of potentially valuable biomass, which can be used for several purposes. Microalgae cultures offer an elegant solution to tertiary and quandary treatments due to the ability of microalgae to use inorganic nitrogen and phosphorus for their growth. And also, for their capacity to remove heavy metals, as well as some toxic organic compounds, therefore, it does not lead to secondary pollution. In the current review we will highlight on the role of micro-algae in the treatment of wastewater. PMID:24936135

  11. Knowledge and Attitude of Iranian Red Crescent Society Volunteers in Dealing with Chemical Attacks.

    Science.gov (United States)

    Nadjafi, Maryam; Hamzeh Pour, Siavash

    2017-04-01

    To evaluate the knowledge, attitude, and preparedness of Mahabad Red Crescent Society volunteers in dealing with chemical attacks. This prospective cross-sectional study was conducted on 120 Red Crescent Society volunteers in Mahabad City, Iran, during 2014-2015.The knowledge of the volunteers was evaluated and rated using a questionnaire as poor, moderate, and good. Also, the attitude of the volunteers towards the chemical attacks and their preparedness were rated as appropriate and inappropriate using a questionnaire. Data were analyzed using the SPSS software version 21. From a total of 120 volunteers, 62.5% were males. The mean age of the volunteers was 32.0 ± 8.2 years. None of the volunteers had adequate knowledge regarding management of the consequences of chemical terrorist attacks. Only 10 volunteers (8.3%) had appropriate attitude and 7 (5.8%) stated their preparedness for being sent to the crisis zone. Also, 116 volunteers (96.7%) declared that Mahabad Red Crescent Society has an inappropriate level of preparedness to encounter chemical terrorism attacks and release of chemical agents related to petrochemical industrial chlorine resources into the water and wastewater. The findings of the present study show poor knowledge and inappropriate attitude of Mahabad Red Crescent Society volunteers, and rescuers in encountering probable chemical attacks and industrial accidents. Furthermore, the Red Crescent Society had an inappropriate level of preparedness in the field of chemical terrorism from the viewpoint of the studied volunteers.

  12. Shoulder injuries from attacking motion

    Science.gov (United States)

    Yanagi, Shigeru; Nishimura, Tetsu; Itoh, Masaru; Wada, Yuhei; Watanabe, Naoki

    1997-03-01

    Sports injuries have bothered professional players. Although many medical doctors try to treat injured players, to prevent sports injuries is more important. Hence, it is required to clear a kinematic mechanism of the sport injuries. A shoulder of volleyball attacker or baseball pitcher is often inured by playing motion. The injuries are mainly caused at the end of long head tendon, which is located in the upper side of scapula. Generally, a muscle and tendon have enough strength against tensile force, however, it seems that they are sometimes defeated by the lateral force. It is imagined that the effect of the lateral force has a possibility of injuring the tendon. If we find the influence of the lateral force on the injured portion, the mechanism of injuries must be cleared. In our research, volleyball attacking motion is taken by high speed video cameras. We analyze the motion as links system and obtain an acceleration of an arm and a shoulder from video image data. The generated force at a shoulder joint is calculated and resolved into the lateral and longitudinal forces. Our final goal is to discuss a possibility that the lateral force causes the injuries.

  13. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

    Science.gov (United States)

    Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y

    2016-04-01

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures. © 2015 Society for Risk Analysis.

  14. Attack methodology Analysis: SQL Injection Attacks and Their Applicability to Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston

    2005-09-01

    Database applications have become a core component in control systems and their associated record keeping utilities. Traditional security models attempt to secure systems by isolating core software components and concentrating security efforts against threats specific to those computers or software components. Database security within control systems follows these models by using generally independent systems that rely on one another for proper functionality. The high level of reliance between the two systems creates an expanded threat surface. To understand the scope of a threat surface, all segments of the control system, with an emphasis on entry points, must be examined. The communication link between data and decision layers is the primary attack surface for SQL injection. This paper facilitates understanding what SQL injection is and why it is a significant threat to control system environments.

  15. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  16. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  17. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  18. Active Detection for Exposing Intelligent Attacks in Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Weerakkody, Sean [Carnegie Mellon Univ., Pittsburgh, PA (United States); Ozel, Omur [Carnegie Mellon Univ., Pittsburgh, PA (United States); Griffioen, Paul [Carnegie Mellon Univ., Pittsburgh, PA (United States); Sinopoli, Bruno [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2017-07-01

    In this paper, we consider approaches for detecting integrity attacks carried out by intelligent and resourceful adversaries in control systems. Passive detection techniques are often incorporated to identify malicious behavior. Here, the defender utilizes finely-tuned algorithms to process information and make a binary decision, whether the system is healthy or under attack. We demonstrate that passive detection can be ineffective against adversaries with model knowledge and access to a set of input/output channels. We then propose active detection as a tool to detect attacks. In active detection, the defender leverages degrees of freedom he has in the system to detect the adversary. Specifically, the defender will introduce a physical secret kept hidden from the adversary, which can be utilized to authenticate the dynamics. In this regard, we carefully review two approaches for active detection: physical watermarking at the control input, and a moving target approach for generating system dynamics. We examine practical considerations for implementing these technologies and discuss future research directions.

  19. Phytoremediation of Nitrogen as Green Chemistry for Wastewater Treatment System

    Directory of Open Access Journals (Sweden)

    Lennevey Kinidi

    2017-01-01

    Full Text Available It is noteworthy that ammoniacal nitrogen contamination in wastewater has reportedly posed a great threat to the environment. Although there are several conventional technologies being employed to remediate ammoniacal nitrogen contamination in wastewater, they are not sustainable and cost-effective. Along this line, the present study aims to highlight the significance of green chemistry characteristics of phytoremediation in nitrogen for wastewater treatment. Notably, ammoniacal nitrogen can be found in many types of sources and it brings harmful effects to the environment. Hence, the present study also reviews the phytoremediation of nitrogen and describes its green chemistry characteristics. Additionally, the different types of wastewater contaminants and their effects on phytoremediation and the phytoremediation consideration in wastewater treatment application and sustainable waste management of harvested aquatic macrophytes were reviewed. Finally, the present study explicates the future perspectives of phytoremediation. Based on the reviews, it can be concluded that green chemistry characteristics of phytoremediation in nitrogen have proved that it is sustainable and cost-effective in relation to other existing ammoniacal nitrogen remediation technologies. Therefore, it can be deduced that a cheaper and more environmental friendly ammoniacal nitrogen technology can be achieved with the utilization of phytoremediation in wastewater treatment.

  20. Distance hijacking attacks on distance bounding protocols

    OpenAIRE

    Cremers, Cas; Rasmussen, Kasper Bonne; Čapkun, Srdjan

    2011-01-01

    Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance Fraud, Mafia Fraud, and Terrorist Fraud. We define and analyze a fourth main type of attack on distance bounding protocols, called Distance Hijacking. We show that many proposed distance bounding protocols are vulnerable to this type of attack, and we propose solutions to make these protocols resilient to Distance Hijacking. We further show that verifying distance bounding protocols using exist...

  1. Snow fall and heart attacks.

    Science.gov (United States)

    Persinger, M A; Ballance, S E; Moland, M

    1993-03-01

    Total numbers of daily hospital admissions for cardiac emergencies were obtained from 3 hospitals within the Sudbury Basin in Canada for November through March for each of 4 consecutive years (1983-1986). Major diagnostic categories were also differentiated. No statistically significant correlations were found between the amount of snowfall during the day of or the days before or after admissions for the major categories of cardiac emergency. Specific analyses, conducted to reveal possible recondite associations between extreme or cumulative snowfalls and the most extreme days of cardiac emergencies, indicated a chance association. We conclude that the occurrence of heart attacks is independent of snowfall but that, when they occur, they are attributed to shoveling if there has been a recent major snow storm.

  2. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  3. Sustainable Urban Water and Wastewater Services: The TRUST Approach

    Science.gov (United States)

    The TRUST (Transitions to the Urban Water Services of Tomorrow) Project is a research program funded by the European Union Seventh Framework Programme. The overall objective of TRUST is to help water and wastewater authorities and utilities across Europe to formulate and impleme...

  4. Bio-treatment of phosphate from synthetic wastewater using ...

    African Journals Online (AJOL)

    In this study, the efficient phosphate utilizing isolates were used to remove phosphate from synthetic phosphate wastewater was tested using batch scale process. Hence the objective of the present study was to examine the efficiency of bacterial species individually for the removal of phosphate from synthetic phosphate ...

  5. Wastewater Treatment: A Pilot Plant on the Move

    Science.gov (United States)

    Environmental Science and Technology, 1974

    1974-01-01

    Reports that there are currently three companies that own mobile physical-chemical wastewater treatment vans that investigate such parameters as chemical coagulation, sedimentation, sand filtration and carbon adsorption. Information is provided regarding the potential of utilizing this type of facility and rental agreements. (MLB)

  6. Electrochemical wastewater treatment directly powered by photovoltaic panels: electrooxidation of a dye-containing wastewater.

    Science.gov (United States)

    Valero, David; Ortiz, Juan M; Expósito, Eduardo; Montiel, Vicente; Aldaz, Antonio

    2010-07-01

    Electrochemical technologies have proved to be useful for the treatment of wastewater, but to enhance their green characteristics it seems interesting to use a green electric energy such as that provided by photovoltaic (PV) cells, which are actually under active research to decrease the economic cost of solar kW. The aim of this work is to demonstrate the feasibility and utility of using an electrooxidation system directly powered by a photovoltaic array for the treatment of a wastewater. The experimental system used was an industrial electrochemical filter press reactor and a 40-module PV array. The influence on the degradation of a dye-containing solution (Remazol RB 133) of different experimental parameters such as the PV array and electrochemical reactor configurations has been studied. It has been demonstrated that the electrical configuration of the PV array has a strong influence on the optimal use of the electric energy generated. The optimum PV array configuration changes with the intensity of the solar irradiation, the conductivity of the solution, and the concentration of pollutant in the wastewater. A useful and effective methodology to adjust the EO-PV system operation conditions to the wastewater treatment is proposed.

  7. Agricultural use of treated municipal wastewaters preserving environmental sustainability

    Directory of Open Access Journals (Sweden)

    Pietro Rubino

    2007-07-01

    Full Text Available In this paper the utility of the treated municipal wastewaters in agriculture, analyzing the chemical, physical and microbiological characteristics and their pollution indicators evaluation are being illustrated. Some methods employed for treating wastewaters are examined, as well as instructions and rules actually in force in different countries of the world, for evaluating the legislative hygienic and sanitary and agronomic problems connected with the treated wastewaters use, are being collected and compared. Successively, in order to provide useful indications for the use of treated municipal wastewaters, results of long-term field researches, carried out in Puglia, regarding two types of waters (treated municipal wastewater and conventional water and two irrigation methods (drip and capillary sub-irrigation on vegetable crops grown in succession, are being reported. For each crop cycle, chemical physical and microbiological analyses have been performed on irrigation water, soil and crop samples. The results evidenced that although irrigating with waters having high colimetric values, higher than those indicated by law and with two different irrigation methods, never soil and marketable yield pollutions have been observed. Moreover, the probability to take infection and/or disease for ingestion of fruits coming from crops irrigated with treated wastewaters, calculated by Beta-Poisson method, resulted negligible and equal to 1 person for 100 millions of exposed people. Concentrations of heavy metals in soil and crops were lesser than those admissible by law. The free chlorine, coming from disinfection, found in the wastewaters used for watering, in some cases caused toxicity effects, which determined significant yield decreases. Therefore, municipal wastewaters, if well treated, can be used for irrigation representing a valid alternative to the conventional ones.

  8. Detecting Attacks in CyberManufacturing Systems: Additive Manufacturing Example

    Directory of Open Access Journals (Sweden)

    Wu Mingtao

    2017-01-01

    Full Text Available CyberManufacturing System is a vision for future manufacturing where physical components are fully integrated with computational processes in a connected environment. However, realizing the vision requires that its security be adequately ensured. This paper presents a vision-based system to detect intentional attacks on additive manufacturing processes, utilizing machine learning techniques. Particularly, additive manufacturing systems have unique vulnerabilities to malicious attacks, which can result in defective infills but without affecting the exterior. In order to detect such infill defects, the research uses simulated 3D printing process images as well as actual 3D printing process images to compare accuracies of machine learning algorithms in classifying, clustering and detecting anomalies on different types of infills. Three algorithms - (i random forest, (ii k nearest neighbor, and (iii anomaly detection - have been adopted in the research and shown to be effective in detecting such defects.

  9. Recycling phosphorus from wastewater

    DEFF Research Database (Denmark)

    Lemming, Camilla Kjærulff

    from a longterm field experiment were included in combination with 33P isotope techniques. In particular sewage sludges, but also sewage sludge incineration ashes, from different wastewater treatment plants varied substantially in P availability. The variation between different sludges could be partly......, localised applications of sewage sludge and sewage sludge ashes cannot be recommended. Methodological considerations included an evaluation of the WEP (water extractable P) method used in most of the experiments to describe P availability after application to soil, was evaluated. This suggested...... included anaerobically digested and dewatered sewage sludges from six different wastewater treatment plants, thermally dried sewage sludge, four sewage sludge incineration ashes, thermochemically treated sewage sludge ash, struvite, two rejectwater evaporation products, composted household waste, cattle...

  10. Resource Guide to Effective Utility Management and Lean

    Science.gov (United States)

    Water and wastewater utilities are critical to the environmental, economic, and social well being of our nation’s communities, as they work to ensure that the public continues to enjoy the benefits of clean and safe water.

  11. NPDES Permit for Shoshone Utility Organization in Wyoming

    Science.gov (United States)

    Under NPDES permit WY-0044580, the Shoshone Utility Organization is authorized to discharge from its wastewater treatment facility located in Fremont County, Wyoming to an unnamed irrigation drainage ditch tributary to the South Fork of the Little Wind R.

  12. Wastewater treatment with algae

    Energy Technology Data Exchange (ETDEWEB)

    Wong Yukshan [Hong Kong Univ. of Science and Technology, Kowloon (China). Research Centre; Tam, N.F.Y. [eds.] [City Univ. of Hong Kong, Kowloon (China). Dept. of Biology and Chemistry

    1998-05-01

    Immobilized algal technology for wastewater treatment purposes. Removal of copper by free and immobilized microalga, Chlorella vulgaris. Biosorption of heavy metals by microalgae in batch and continuous systems. Microalgal removal of organic and inorganic metal species from aqueous solution. Bioaccumulation and biotransformation of arsenic, antimony and bismuth compounds by freshwater algae. Metal ion binding by biomass derived from nonliving algae, lichens, water hyacinth root and spagnum moss. Metal resistance and accumulation in cyanobacteria. (orig.)

  13. Cued Panic Attacks in Body Dysmorphic Disorder

    Science.gov (United States)

    Phillips, Katharine A.; Menard, William; Bjornsson, Andri S.

    2013-01-01

    Background Body dysmorphic disorder (BDD) is a common and often severe disorder. Clinical observations suggest that panic attacks triggered by BDD symptoms may be common. However, to our knowledge, no study has examined such panic attacks in BDD. We investigated the prevalence, clinical features, and correlates of BDD-triggered panic attacks in individuals with this disorder. Methods Panic attacks and other variables were assessed using reliable and valid measures in 76 individuals with lifetime DSM-IV BDD. Results 28.9% (95% CI, 18.5%–39.4%) of participants reported lifetime panic attacks triggered by BDD symptoms. The most common triggers of such attacks were feeling that others were looking at or scrutinizing the perceived appearance defects (61.9%), looking in the mirror at perceived defects (38.1%), and being in bright light where perceived defects would be more visible (23.8%). The most common panic attack symptoms were palpitations (86.4%), sweating (66.7%), shortness of breath (63.6%), trembling or shaking (63.6%), and fear of losing control or going crazy (63.6%). Compared to participants without such panic attacks, those with BDD-triggered panic attacks had more severe lifetime BDD, social anxiety, and depressive symptoms, as well as poorer functioning and quality of life on a number of measures. They were also less likely to be employed and more likely to have been psychiatrically hospitalized and to have had suicidal ideation due to BDD. Conclusions Panic attacks triggered by BDD-related situations appear common in individuals with this disorder. BDD-triggered panic attacks were associated with greater symptom severity and morbidity. PMID:23653076

  14. Constructed Wetlands for Wastewater Treatment

    OpenAIRE

    Jan Vymazal

    2010-01-01

    The first experiments using wetland macrophytes for wastewater treatment were carried out in Germany in the early 1950s. Since then, the constructed wetlands have evolved into a reliable wastewater treatment technology for various types of wastewater. The classification of constructed wetlands is based on: the vegetation type (emergent, submerged, floating leaved, free-floating); hydrology (free water surface and subsurface flow); and subsurface flow wetlands can be further classified accordi...

  15. Generating attacks in SysML activity diagrams by detecting attack surfaces

    NARCIS (Netherlands)

    Ouchani, Samir; Lenzini, Gabriele

    In the development process of a secure system is essential to detect as early as possible the system’s vulnerable points, the so called attack surfaces, and to estimate how feasible it would be that known attacks breach through them. Even if attack surfaces can be sometimes detected automatically,

  16. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  17. Aerobic degradation of olive mill wastewaters.

    Science.gov (United States)

    Benitez, J; Beltran-Heredia, J; Torregrosa, J; Acero, J L; Cercas, V

    1997-02-01

    The degradation of olive mill wastewater by aerobic microorganisms has been investigated in a batch reactor, by conducting experiments where the initial concentration of organic matter, quantified by the chemical oxygen demand, and the initial biomass were varied. The evolution of the chemical oxygen demand, biomass and the total contents of phenolic and aromatic compounds were followed through each experiment. According to the Contois model, a kinetic expression for the substrate utilization rate is derived, and its biokinetic constants are evaluated. This final predicted equation agrees well with all the experimental data.

  18. British used Congreve Rockets to Attack Napoleon

    Science.gov (United States)

    2004-01-01

    Sir William Congreve developed a rocket with a range of about 9,000 feet. The incendiary rocket used black powder, an iron case, and a 16-foot guide stick. In 1806, British used Congreve rockets to attack Napoleon's headquarters in France. In 1807, Congreve directed a rocket attack against Copenhagen.

  19. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  20. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  1. Micromechanics of high temperature hydrogen attack

    NARCIS (Netherlands)

    Schlögl, Sabine M.; Giessen, Erik van der

    1999-01-01

    Hydrogen attack is a material degradation process that occurs at elevated temperatures in hydrogen-rich environments, such as found in petro-chemical installations. Weldments in components such as reactor vessels are particularly susceptible to hydrogen attack. This paper discusses a multi-scale

  2. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  3. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  4. Revisiting attacker model for smart vehicles

    NARCIS (Netherlands)

    Petit, Jonathan; Feiri, Michael; Kargl, Frank

    Because of the potential impact on user's life in cooperative automated safety applications, the security of Vehicle-to-X communication (V2X) is mandatory. However, the current attacker model used in literature is often too network-oriented, and it is unclear what realistic attacks could be. In this

  5. Training Centers for Onsite Wastewater Treatment

    Science.gov (United States)

    Onsite wastewater training centers offer classes, demonstration projects and research facilities for onsite industry professionals. Classes include wastewater management, new technologies and pre-licensing.

  6. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  7. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  8. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    . In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...... but not the computation. Such weaker model can still be practically useful and moreover, may provide nice building-blocks to tackle full-fledged tampering in future. In this dissertation we study different models of memory-tampering and provide a number of solutions with different flavors. Mainly we took two different...

  9. Two Improved Multiple-Differential Collision Attacks

    Directory of Open Access Journals (Sweden)

    An Wang

    2014-01-01

    Full Text Available In CHES 2008, Bogdanov proposed multiple-differential collision attacks which could be applied to the power analysis attacks on practical cryptographic systems. However, due to the effect of countermeasures on FPGA, there are some difficulties during the collision detection, such as local high noise and the lack of sampling points. In this paper, keypoints voting test is proposed for solving these problems, which can increase the success ratio from 35% to 95% on the example of one implementation. Furthermore, we improve the ternary voting test of Bogdanov, which can improve the experiment efficiency markedly. Our experiments show that the number of power traces required in our attack is only a quarter of the requirement of traditional attack. Finally, some alternative countermeasures against our attacks are discussed.

  10. A quantitative method to evaluate microbial electrolysis cell effectiveness for energy recovery and wastewater treatment

    KAUST Repository

    Ivanov, Ivan

    2013-10-01

    Microbial electrolysis cells (MECs) are potential candidates for sustainable wastewater treatment as they allow for recovery of the energy input by producing valuable chemicals such as hydrogen gas. Evaluating the effectiveness of MEC treatment for different wastewaters requires new approaches to quantify performance, and the establishment of specific procedures and parameters to characterize the outcome of fed-batch treatability tests. It is shown here that Coulombic efficiency can be used to directly calculate energy consumption relative to wastewater treatment in terms of COD removal, and that the average current, not maximum current, is a better metric to evaluate the rate of the bioelectrochemical reactions. The utility of these methods was demonstrated using simulated current profiles and actual wastewater tests. Industrial and domestic wastewaters were evaluated using small volume MECs, and different inoculation strategies. The energy needed for treatment was 2.17kWhkgCOD-1 for industrial wastewater and 2.59kWhkgCOD-1 for domestic wastewater. When these wastewaters were combined in equal amounts, the energy required was reduced to 0.63kWhkgCOD-1. Acclimation of the MEC to domestic wastewater, prior to tests with industrial wastewaters, was the easiest and most direct method to optimize MEC performance for industrial wastewater treatment. A pre-acclimated MEC accomplished the same removal (1847 ± 53 mg L-1) as reactor acclimated to only the industrial wastewater (1839 ± 57 mg L-1), but treatment was achieved in significantly less time (70 h versus 238 h). © 2013, Hydrogen Energy Publications, LLC. Published by Elsevier Ltd. All rights reserved.

  11. Present status of and subjects on the industrial utilization of polymer separation membranes. Reuse of wastewater and recovery of resources using membrane technology; Kobunshi bunrimaku no sangyo riyo no genjo to kadai. Haisui sairiyo shigen kaishu bun`ya ni okeru makuriyo

    Energy Technology Data Exchange (ETDEWEB)

    Okuno, Y. [Hitachi Plant Engineering and Construction Co. Ltd., Tokyo (Japan)

    1998-07-05

    Membrane technology is introduced, involving the recovery of metal from wastewater after plating and of paint from wastewater after electrodeposition painting, and reuse of wastewater from buildings as water for miscellaneous use and of treated sewage for improving recreational water environments. For wastewater from planting, a recovery tank is provided right after the metal plating bath. The content of the tank is removed of organic matters by active carbon and then subjected to electrodialysis, and becomes roughly equal in concentration to what is in the plating bath. In the process of electrodeposition painting, the object to be plated is immersed in a tank and then taken out for washing in water. Paint is recovered at a rate of 98% or higher from the wastewater by a combination of ultrafiltration and reverse osmosis membranes. Wastewater from buildings after activated sludge treatment is subjected to microfiltration or ultrafiltration using membranes, to be reused for miscellaneous purposes for the building. As for treated sewage, it is further treated using a combination of microfiltration membranes, or ultrafiltration membranes, and reverse osmosis membranes for use in facilities such as artificial fountains and ponds. A recently developed bipolar membrane decomposes salts in wastewater into acids and alkalis and recover them separately, thereby enlarging the scope of wastewater from which valuables may be recovered. 11 refs., 4 figs., 4 tabs.

  12. Caffeine in an Urbanized Estuary: Past and Present Influence of Wastewater Effluents in Boston Harbor, MA, USA

    Science.gov (United States)

    Caffeine has been identified by previous research as a potential tracer of sanitary wastewater. To further assess the utility of caffeine as a tracer of wastewater sources, samples from 25 sites throughout Boston Harbor were collected and analyzed for caffeine by LC-MS/MS. Caff...

  13. Content modification attacks on consensus seeking multi-agent system with double-integrator dynamics

    Science.gov (United States)

    Dong, Yimeng; Gupta, Nirupam; Chopra, Nikhil

    2016-11-01

    In this paper, vulnerability of a distributed consensus seeking multi-agent system (MAS) with double-integrator dynamics against edge-bound content modification cyber attacks is studied. In particular, we define a specific edge-bound content modification cyber attack called malignant content modification attack (MCoMA), which results in unbounded growth of an appropriately defined group disagreement vector. Properties of MCoMA are utilized to design detection and mitigation algorithms so as to impart resilience in the considered MAS against MCoMA. Additionally, the proposed detection mechanism is extended to detect the general edge-bound content modification attacks (not just MCoMA). Finally, the efficacies of the proposed results are illustrated through numerical simulations.

  14. Physico-chemical wastewater treatment

    NARCIS (Netherlands)

    Mels, A.R.; Teerikangas, E.

    2002-01-01

    Wastewater reclamation strategies aimed at closing industrial water cycles and recovery of valuable components will in most cases require a combination of wastewater treatment unit operations. Biological unit operations are commonly applied as the core treatment. In addition, physico-chemical unit

  15. Trends in advanced wastewater treatment

    DEFF Research Database (Denmark)

    Henze, M.

    1997-01-01

    The paper examines the present trends within wastewater handling and treatment. The trend is towards the extremes, either local low-tech treatment or centralized advanced treatment plants. The composition of the wastewater will change and it will be regarded as a resource. There will be more...

  16. Wastewater Treatment I. Instructor's Manual.

    Science.gov (United States)

    California Water Pollution Control Association, Sacramento. Joint Education Committee.

    This instructor's manual provides an outline and guide for teaching Wastewater Treatment I. It consists of nine sections. An introductory note and a course outline comprise sections 1 and 2. Section 3 (the bulk of the guide) presents lesson outlines for teaching the ten chapters of the manual entitled "Operation of Wastewater Treatment…

  17. Eco-efficiency assessment of dairy wastewater reuse

    DEFF Research Database (Denmark)

    Rygaard, Martin; Skrydstrup, Julie; Larsen, Sille Lyster

    supply and wastewater management can limit the production capacity of an industrial facility, when local water resources are under stress or wastewater treatment capacity is limited. In such situations, the industry will seek to increase its water efficiency through implementation of new technology....... To evaluate the eco-efficiency of new technologies we have developed a method that aligns assessment of environmental impacts and value creation within a life-cycle boundary of a food processing industry. Using standard life-cycle assessment and the concept of value added we have demonstrated the method......€/ton reduction in value added. Further studies will investigate the value added from increased production capacity and potential investment savings at the public utilities. For the specific case study, a wastewater reuse scheme was found to reduce environmental impacts from dairy production...

  18. Pareto utility

    NARCIS (Netherlands)

    Ikefuji, M.; Laeven, R.J.A.; Magnus, J.R.; Muris, C.H.M.

    2013-01-01

    In searching for an appropriate utility function in the expected utility framework, we formulate four properties that we want the utility function to satisfy. We conduct a search for such a function, and we identify Pareto utility as a function satisfying all four desired properties. Pareto utility

  19. Identification of wastewater processes

    DEFF Research Database (Denmark)

    Carstensen, Niels Jacob

    of ammonia, nitrate, and phosphate concentrations, which are measured in the aeration tanks of the biological nutrient removal system. The alternatign operation modes of the BIO-DENITRO and BIO-DENIPHO processes are of particular interest. Time series models of the hydraulic and biological processes are very...... useful for gaining insight in real time operation of wastewater treatment systems with variable influent flows and pollution loads, and for the design of plant operation control. In the present context non-linear structural time series models are proposed, which are identified by combining the well...

  20. Inoculum selection to enhance performance of a microbial fuel cell for electricity generation during wastewater treatment.

    Science.gov (United States)

    Mathuriya, Abhilasha Singh

    2013-01-01

    Experiments were designed to evaluate the influence of various anaerobic inoculums to enhance microbial fuel cell (MFC) performance utilizing tannery wastewater as substrate. Three bacterial electrogenic strains, tolerant to tannery environment, were isolated from soil contaminated with tannery waste and tannery wastewater was inoculated with these monotypes and mixed consortia of three bacterial strains in different MFCs. Comparative analysis was made by treating the tannery wastewater with foreign microbial consortia (activated sludge inoculum) and with only natural habitat microbes already present in plain wastewater. It was observed that inoculum contributes great effect on the MFC performance. Among the studied inoculation strategies, mixed electrogenic strain inocula enabled higher current yield along with concurrent substrate removal efficiency. On the contrary, plain wastewater resulted in relatively low efficiency.

  1. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  2. Warning Signs of Heart Attack, Stroke and Cardiac Arrest

    Science.gov (United States)

    ... Heart Attack WARNING SIGNS OF HEART ATTACK, STROKE & CARDIAC ARREST HEART ATTACK WARNING SIGNS CHEST DISCOMFORT Most heart ... to the hospital immediately. Learn more about stroke CARDIAC ARREST WARNING SIGNS SUDDEN LOSS OF RESPONSIVENESS No response ...

  3. Net-Zero-Energy Model for Sustainable Wastewater Treatment.

    Science.gov (United States)

    Yan, Peng; Qin, Rong-Cong; Guo, Jin-Song; Yu, Qiang; Li, Zhe; Chen, You-Peng; Shen, Yu; Fang, Fang

    2017-01-17

    A large external energy input prevents wastewater treatment from being environmentally sustainable. A net-zero-energy (NZE) wastewater treatment concept based on biomass energy recycling was proposed to avoid wasting resources and to promote energy recycling in wastewater treatment plants (WWTPs). Simultaneously, a theoretical model and boundary condition based on energy balance were established to evaluate the feasibility of achieving NZE in WWTPs; the model and condition were employed to analyze data from 20 conventional WWTPs in China. A total of six WWTPs can currently export excess energy, eight WWTPs can achieve 100% energy self-sufficiency by adjusting the metabolic material allocation, and six municipal WWTPs cannot achieve net-zero energy consumption based on the evaluation of the theoretical model. The NZE model offset 79.5% of the electricity and sludge disposal cost compared with conventional wastewater treatment. The NZE model provides a theoretical basis for the optimization of material regulation for the effective utilization of organic energy from wastewater and promotes engineering applications of the NZE concept in WWTPs.

  4. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    Directory of Open Access Journals (Sweden)

    Xiapu Luo

    2009-01-01

    Full Text Available This paper addresses the important problem of detecting pulsing denial of service (PDoS attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval. Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation and detection algorithms (e.g., dynamic time warping.

  5. High salinity wastewater treatment.

    Science.gov (United States)

    Linarić, M; Markić, M; Sipos, L

    2013-01-01

    The shock effect, survival and ability of activated sludge to acclimatize to wastewater containing different concentrations of NaCl and Na2SO4 were investigated under laboratory conditions. To accomplish this, the potential penetration of a sewage system by seawater as a consequence of storm surge flooding was simulated. The experiments were conducted using activated sludge taken from the aeration tank of a communal wastewater treatment plant and adding different concentrations up to 40 g/L of NaCl and 4.33 g/L of Na2SO4. The effects of salinity on the activated sludge were monitored for 5 weeks based on the values of pH, dissolved oxygen, total suspended solids, volatile suspended solids, sludge volume, sludge volume index, electrokinetic potential, respirometric measurements and enzymatic activity. The addition of salt sharply reduced or completely inhibited the microbial activity in activated sludge. When salt concentrations were below 10 g/L NaCl, microorganisms were able to acclimatize in several weeks and achieve the same initial activity as in raw sludge samples. When the salt concentration was above 30 g/L NaCl, the acclimatization process was very slow or impossible.

  6. 40 CFR 63.1106 - Wastewater provisions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 10 2010-07-01 2010-07-01 false Wastewater provisions. 63.1106 Section... Technology Standards § 63.1106 Wastewater provisions. (a) Process wastewater. Except as specified in... source shall comply with the HON process wastewater requirements in §§ 63.132 through 63.148. (1) When...

  7. Attributing heart attack and stroke to "Old Age": Implications for subsequent health outcomes among older adults.

    Science.gov (United States)

    Stewart, Tara L; Chipperfield, Judith G; Perry, Raymond P; Hamm, Jeremy M

    2016-01-01

    This study assessed the extent to which older adults attribute a recent heart attack/stroke to "old age," and examined consequences for subsequent lifestyle behavior and health-care service utilization. Community-dwelling adults (N = 57, ages 73-98 years) were interviewed about their heart attack/stroke, and an objective health registry provided data on health-care utilization over a 3-year period. Endorsement of "old age" as a cause of heart attack/stroke negatively predicted lifestyle behavior change, and positively predicted frequency of physician visits and likelihood of hospitalization over the subsequent 3 years. Findings suggest the importance of considering "old age" attributions in the context of cardiovascular health events. © The Author(s) 2014.

  8. Outdoor Air Pollution, Heart Attack and Stroke

    Science.gov (United States)

    Elevated outdoor ambient air particle pollution triggers heart attacks, strokes, and abnormal heart rhythms and worsens heart failure in individuals at high risk due to underlying medical conditions. Emergency Medical Services in communities are the first responders to these eme...

  9. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  10. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... heart attack at age 36, it stopped her "dead in her tracks." Jennifer reminds us how heart disease takes too many of our moms, sisters, and friends from us every day. The more we share our stories, the faster ...

  11. How Is a Heart Attack Diagnosed?

    Science.gov (United States)

    ... heart attack at age 36, it stopped her "dead in her tracks." Jennifer reminds us how heart disease takes too many of our moms, sisters, and friends from us every day. The more we share our stories, the faster ...

  12. Transient ischemic attack: definition and natural history.

    Science.gov (United States)

    Caplan, Louis R

    2006-07-01

    The standard definition of a transient ischemic attack--"a cerebral dysfunction of an ischemic nature lasting no longer than 24 hours with a tendency to recur"--was arrived at arbitrarily and is no longer tenable. Experience shows that attacks are much briefer, usually less than an hour, and many are associated with brain infarction. A newer definition, more consonant with the data, is preferred--"transient ischemic attack is a brief episode of neurological dysfunction caused by focal brain or retinal ischemia, with clinical symptoms typically lasting less than an hour, and without evidence of acute infarction." Patients with transient ischemic attacks require urgent evaluation that includes brain and vascular imaging, blood tests, and often cardiac investigations. Treatment will depend on the nature of the causative cervico-cranial vascular, cardiac, and hematologic abnormalities found on investigation.

  13. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  14. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  15. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  16. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  17. Being active after your heart attack

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/patientinstructions/000093.htm Being active after your heart attack To use the sharing ... urac.org). URAC's accreditation program is an independent audit to verify that A.D.A.M. follows ...

  18. Attack by Pyemotes johnmoseri (Acari: Pyemotidae)

    Science.gov (United States)

    Tulin Askit; Ibrahim Cakmak; John Moser

    2007-01-01

    The Aegean Region of Turkey is one of the largest dried fig producers in the world. A Turkish cultivar sarilop (Ficus carica cv. Calimyrna L.) possesses good qualities for drying process, and has been grown extensively for many years in Turkey. Hypoborus ficus is the most common xylophagous insect attacking fig trees in Aydin (Aks¸it et al. 2003). This pest attacks...

  19. Panic attack history and smoking topography.

    Science.gov (United States)

    Farris, Samantha G; Brown, Lily A; Goodwin, Renee D; Zvolensky, Michael J

    2017-02-01

    Little is known about panic attacks and puffing topography, a behavioral index of the value of smoking reinforcement. This study examined smoking style during the course of smoking of a single cigarette among adult daily smokers with and without a history of panic attacks. Participants (n=124, Mage=43.9, SD=9.7; 44.4% female) were non-treatment seeking daily smokers. Lifetime panic attack history was assessed via diagnostic assessment; 28.2% (n=35) of the sample had a panic attack history. Participants smoked one cigarette during an ad libitum smoking trial. Puff volume, duration, and inter-puff interval were measured using the Clinical Research Support System (CReSS) pocket device. Regression analyses revealed that panic attack status was not associated with significant differences in average puff volume, duration, or inter-puff interval. Multi-level modeling was used to examine puffing trajectories. Puff-level data revealed that there was a significant quadratic time x panic effect for puff volume and duration. Those with a panic attack history demonstrated relatively sustained levels of both puff volume and duration over time, whereas those without a history of panic attacks demonstrated an increase followed by a decrease in volume and duration over time. These effects were not accounted for by the presence of general psychopathology. Smokers with a panic attack history demonstrate more persistent efforts to self-regulate the delivery of nicotine, and thus may be at risk for continued smoking and dependence. Tailored treatment may be needed to address unique vulnerabilities among this group. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  20. Panic Attack History and Smoking Topography

    Science.gov (United States)

    Farris, Samantha G.; Brown, Lily A.; Goodwin, Renee D.; Zvolensky, Michael J.

    2016-01-01

    Background Little is known about panic attacks and puffing topography, a behavioral index of the value of smoking reinforcement. This study examined smoking style during the course of smoking of a single cigarette among adult daily smokers with and without a history of panic attacks. Method Participants (n = 124, Mage = 43.9, SD = 9.7; 44.4% female) were non-treatment seeking daily smokers. Lifetime panic attack history was assessed via diagnostic assessment; 28.2% (n = 35) of the sample had a panic attack history. Participants smoked one cigarette during an ad libitum smoking trial. Puff volume, duration, and inter-puff interval were measured using the Clinical Research Support System (CReSS) pocket device. Results Regression analyses revealed that panic attack status was not associated with significant differences in average puff volume, duration, or inter-puff interval. Multi-level modeling was used to examine puffing trajectories. Puff-level data revealed that there was a significant quadratic time x panic effect for puff volume and duration. Those with a panic attack history demonstrated relatively sustained levels of both puff volume and duration over time, whereas those without a history of panic attacks demonstrated an increase followed by a decrease in volume and duration over time. These effects were not accounted for by the presence of general psychopathology. Discussion Smokers with a panic attack history demonstrate more persistent efforts to self-regulate the delivery of nicotine, and thus may be at risk for continued smoking and dependence. Tailored treatment may be needed to address unique vulnerabilities among this group. PMID:28033542

  1. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  2. Chlorella vulgaris production enhancement with supplementation of synthetic medium in dairy manure wastewater.

    Science.gov (United States)

    Shi, Jun; Pandey, Pramod K; Franz, Annaliese K; Deng, Huiping; Jeannotte, Richard

    2016-03-01

    To identify innovative ways for better utilizing flushed dairy manure wastewater, we have assessed the effect of dairy manure and supplementation with synthetic medium on the growth of Chlorella vulgaris. A series of experiments were carried out to study the impacts of pretreatment of dairy wastewater and the benefits of supplementing dairy manure wastewater with synthetic medium on C. vulgaris growth increment and the ultrastructure (chloroplast, starch, lipid, and cell wall) of C. vulgaris cells. Results showed that the biomass production of C. vulgaris in dairy wastewater can be enhanced by pretreatment and using supplementation with synthetic media. A recipe combining pretreated dairy wastewater (40 %) and synthetic medium (60 %) exhibited an improved growth of C. vulgaris. The effects of dairy wastewater on the ultrastructure of C. vulgaris cells were distinct compared to that of cells grown in synthetic medium. The C. vulgaris growth in both synthetic medium and manure wastewater without supplementing synthetic medium was lower than the growth in dairy manure supplemented with synthetic medium. We anticipate that the results of this study will help in deriving an enhanced method of coupling nutrient-rich dairy manure wastewater for biofuel production.

  3. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  4. Drivers for and against municipal wastewater recycling: a review.

    Science.gov (United States)

    Kunz, Nadja C; Fischer, Manuel; Ingold, Karin; Hering, Janet G

    2016-01-01

    The reclamation, treatment and reuse of municipal wastewater can provide important environmental benefits. In this paper, 25 studies on this topic were reviewed and it was found that there are many (>150) different drivers acting for and against wastewater recycling. To deal with the challenge of comparing studies which entailed different research designs, a framework was developed which allowed the literature to be organized into comparable study contexts. Studies were categorized according to the level of analysis (wastewater recycling scheme, city, water utility, state, country, global) and outcome investigated (development/investment in new schemes, program implementation, percentage of wastewater recycled, percentage of water demand covered by recycled water, multiple outcomes). Findings across comparable case studies were then grouped according to the type (for or against recycling) and category of driver (social, natural, technical, economic, policy or business). The utility of the framework is demonstrated by summarizing the findings from four Australian studies at the city level. The framework offers a unique approach for disentangling the broad range of potential drivers for and against water recycling and to focus on those that seem relevant in specific study contexts. It may offer a valuable starting point for building hypotheses in future work.

  5. An oracle-based attack on CAPTCHAs protected against oracle attacks

    OpenAIRE

    Hernández-Castro, Carlos Javier; R-Moreno, María D.; David F. Barrero; Li, Shujun

    2017-01-01

    CAPTCHAs/HIPs are security mechanisms that try to prevent automatic abuse of services. They are susceptible to learning attacks in which attackers can use them as oracles. Kwon and Cha presented recently a novel algorithm that intends to avoid such learning attacks and "detect all bots". They add uncertainties to the grading of challenges, and also use trap images designed to detect bots. The authors suggest that a major IT corporation is studying their proposal for mainstream implementation....

  6. Constructed Wetlands for Wastewater Treatment

    Directory of Open Access Journals (Sweden)

    Jan Vymazal

    2010-08-01

    Full Text Available The first experiments using wetland macrophytes for wastewater treatment were carried out in Germany in the early 1950s. Since then, the constructed wetlands have evolved into a reliable wastewater treatment technology for various types of wastewater. The classification of constructed wetlands is based on: the vegetation type (emergent, submerged, floating leaved, free-floating; hydrology (free water surface and subsurface flow; and subsurface flow wetlands can be further classified according to the flow direction (vertical or horizontal. In order to achieve better treatment performance, namely for nitrogen, various types of constructed wetlands could be combined into hybrid systems.

  7. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  8. One-Time Sensors: A Novel Concept to Mitigate Node Capture Attacks,

    NARCIS (Netherlands)

    Bicakci, K.; Gamage, C.D.; Crispo, B.; Tanenbaum, A.S.

    2005-01-01

    Dealing with captured nodes is generally accepted as the most difficult challenge to wireless sensor network security. By utilizing the low-cost property of sensor nodes, we introduce the novel concept of one-time sensors to mitigate node-capture attacks. The basic idea is to load each sensor with

  9. A relation between the temperature of atmosphere and the sludge in the wastewater treatment aeration tank

    OpenAIRE

    Tomáš Bakalár; Eliška Horniaková

    2006-01-01

    Processes in the aeration tank remove nitrogen from organic substances from wastewater by using bacteria. Nitrification utilizes the metabolism of aerobic bacteria Nitrosomonas, Nitrococus, Nitrospira, Nitrobacter Nitrocystis and Nitrosobolus and the anaerobical bacteria Pseudosomonas, Chromobacterium, Denitrobacillus and Micrococus are denitrifying. The bacteria are litotrophic and they are sensitive to pH of wastewater. Chlorine, heavy metals and cyanide are toxic for bacteria. For a correc...

  10. Wastewater treatment by flotation

    Directory of Open Access Journals (Sweden)

    F.P. Puget

    2000-12-01

    Full Text Available This work deals with the performance analysis of a separation set-up characterized by the ejector-hydrocyclone association, applied in the treatment of a synthetic dairy wastewater effluent. The results obtained were compared with the results from a flotation column (cylindrical body of a hydrocyclone operated both batch and continuously. As far as the experimental set-up studied in this work and the operating conditions imposed to the process, it is possible to reach a 25% decrease in the total effluent chemical oxygen demand (COD. This corresponds approximately to 60% of the COD of the material in suspension. The best results are obtained for ratios air flow rate-feed flow rate (Qair/Q L greater then 0.15 and for ratios underflow rate-overflow rate (Qu/Qo lower than 1.0.

  11. Arthrospira (Spirulina) in tannery wastewaters

    African Journals Online (AJOL)

    2012-05-29

    May 29, 2012 ... Part 1: The microbial ecology of tannery waste stabilisation ponds and the management of ... of tannery wastewaters in severely water-stressed areas, and .... ured using a Skye Instruments 210 light sensor and SDL 2580.

  12. The Sources and Solutions: Wastewater

    Science.gov (United States)

    Wastewater treatment plants process water from homes and businesses, which contains nitrogen and phosphorus from human waste, food and certain soaps and detergents, and they can be a major source of nutrient pollution.

  13. Constructed Wetlands for Wastewater Treatment

    Science.gov (United States)

    This presentation is a general introductory overview of constructed wetlands for wastewater treatment. Photographs show a wide range of applications and sizes. Summary data on cost and performance from previously published documents by WERF and EPA is presented. Previously pre...

  14. Opportunities and Challenges for Water and Wastewater Industries to Provide Exchangeable Services

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, Bethany [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hunsberger, Randolph [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2015-11-13

    Water and wastewater treatment plants and distribution systems use significant amounts of energy, around 2 - 4% of the total electricity used in the US, and their energy use is projected to increase as populations increase and regulations become more stringent. Water and wastewater systems have largely been disconnected from the electric utilities' efforts to improve energy efficiency and provide energy efficiency and provide grid services, likely because their core mission is to provide clean water and treated wastewater. Energy efficiency has slowly crept into the water and wastewater industry as the economic benefit has become more apparent, but there is still potential for significant improvement. Some of the larger, more progressive water utilities are starting to consider providing grid services; however, it remains a foreign concept to many. This report explores intrinsic mechanisms by which the water and wastewater industries can provide exchangeable services, the benefit to the parties involved, and the barriers to implementation. It also highlights relevant case studies and next steps. Although opportunities for increasing process efficiencies are certainly available, this report focuses on the exchangeable services that water and wastewater loads can provide to help maintain grid reliability, keep overall costs down, and increase the penetration of distributed renewables on the electric grid. These services have potential to provide water utilities additional value streams, using existing equipment with modest or negligible upgrade cost.

  15. A Probabilistic Framework for Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.; Halappanavar, Mahantesh

    2015-12-28

    Quantification and propagation of uncertainties in cyber attacker payoffs is a key aspect within multiplayer, stochastic security games. These payoffs may represent penalties or rewards associated with player actions and are subject to various sources of uncertainty, including: (1) cyber-system state, (2) attacker type, (3) choice of player actions, and (4) cyber-system state transitions over time. Past research has primarily focused on representing defender beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and mathematical intervals. For cyber-systems, probability distributions may help address statistical (aleatory) uncertainties where the defender may assume inherent variability or randomness in the factors contributing to the attacker payoffs. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as generalizations of probability boxes. This paper explores the mathematical treatment of such mixed payoff uncertainties. A conditional probabilistic reasoning approach is adopted to organize the dependencies between a cyber-system’s state, attacker type, player actions, and state transitions. This also enables the application of probabilistic theories to propagate various uncertainties in the attacker payoffs. An example implementation of this probabilistic framework and resulting attacker payoff distributions are discussed. A goal of this paper is also to highlight this uncertainty quantification problem space to the cyber security research community and encourage further advancements in this area.

  16. Supported graphene oxide hollow fibre membrane for oily wastewater treatment

    Science.gov (United States)

    Othman, Nur Hidayati; Alias, Nur Hashimah; Shahruddin, Munawar Zaman; Hussein, Siti Nurliyana Che Mohamed; Dollah, Aqilah

    2017-12-01

    Oil and gas industry deals with a large amount of undesirable discharges of liquid, solid, and gaseous wastes and the amounts can considerably change during the production phases. Oilfield wastewater or produced water is known to constitute various organic and inorganic components. Discharging the produced water can pollute surface and underground water and therefore the necessity to treat this oily wastewater is an inevitable challenge. The current technologies for the treatment of this metastable oil-in-water are not really effective and very pricey. As a result, there is a great interest from many parties around the world in finding cost-effective technologies. In recent years, membrane processes have been utilized for oily wastewater treatment. In these work, a graphene oxide membrane supported on a highly porous Al2O3 hollow fibre was prepared using vacuum assisted technique and its performance in treating oily wastewater was investigated. Graphene oxide (GO) was prepared using a modified Hummer's method and further characterized using XRD, FTIR, TGA and SEM. The results showed that the GO was successfully synthesized. The GO membrane was deposited on alumina hollow fibre substrates. The membrane performance was then investigated using dead-end filtration setup with synthetic oily wastewater as a feed. The effects of operating times on rejection rate and permeate flux were investigated. The experimental results showed that the oil rejections were over 90%. It was concluded that the supported GO membrane developed in this study may be considered feasible in treating oily wastewater. Detail study on the effects of transmembrane pressure, oil concentration, pH and fouling should be carried out in the future

  17. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  18. Power analysis attacks revealing the secrets of smart cards

    CERN Document Server

    Mangard, Stefan; Popp, Thomas

    2008-01-01

    A comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. It discusses simple and differential power analysis as well as advanced techniques like template attacks.

  19. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  20. Fault Analysis Attacks and Its Countermeasure using Elliptic Curve Cryptography

    OpenAIRE

    M. Prabu; R. Shanmugalakshmi

    2010-01-01

    In the last decade, many researchers had published the overall analysis attacks of cryptographic devices against implementation on elliptic curve attacks. Usually such type of information is not sufficient to learn about the individual attacks. Now in this article, we indisputably concentrated on fault analysis attack and its countermeasure.

  1. Modelling Social-Technical Attacks with Timed Automata

    NARCIS (Netherlands)

    David, Nicolas; David, Alexandre; Hansen, René Rydhof; Larsen, K.G.; Legay, Axel; Olesen, Mads Chr.; Probst, Christian W.

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation. In

  2. Noncombatants and liability to be attacked in wars

    DEFF Research Database (Denmark)

    Lippert-Rasmussen, Kasper

    2013-01-01

    attack," I mean that S has forfeited his or her right not to be attacked by armed forces. Here, "liable" is used in a normative-cum-legal sense, not descriptively as it is when one says "some colors are liable to darken in perpetual shade," and "attack" is used passively, as an equivalent of be attacked...

  3. Estimation of EuroQol 5-Dimensions health status utility values in hereditary angioedema

    DEFF Research Database (Denmark)

    Aygören-Pürsün, Emel; Bygum, Anette; Beusterien, Kathleen

    2016-01-01

    OBJECTIVE: To estimate health status utility (preference) weights for hereditary angioedema (HAE) during an attack and between attacks using data from the Hereditary Angioedema Burden of Illness Study in Europe (HAE-BOIS-Europe) survey. Utility measures quantitatively describe the net impact of a...

  4. Increased incidence rates of trauma and stressor related disorders in Denmark following the 9/11 attacks

    DEFF Research Database (Denmark)

    Hansen, Bertel Teilfeldt; Østergaard, Søren Dinesen; Sønderskov, Kim Mannemar

    2016-01-01

    The terrorist attacks that occurred on September 11, 2001 (hereafter referred to as 9/11) in the United States had a profound impact on the physical and mental health of Americans, but the effects beyond the United States are largely unknown. To understand the wider aftermath, we examined...... the consequences of the 9/11 attacks on mental disorders in the Kingdom of Denmark. Utilizing population data from the Danish Psychiatric Central Research Register from 1995 to 2012, we used a time-series intervention approach to estimate the change in the incidence rate of mental disorders after the 9/11 attacks...

  5. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  6. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  7. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  8. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    2017-01-01

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  9. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  10. Methane emission during municipal wastewater treatment.

    Science.gov (United States)

    Daelman, Matthijs R J; van Voorthuizen, Ellen M; van Dongen, Udo G J M; Volcke, Eveline I P; van Loosdrecht, Mark C M

    2012-07-01

    Municipal wastewater treatment plants emit methane. Since methane is a potent greenhouse gas that contributes to climate change, the abatement of the emission is necessary to achieve a more sustainable urban water management. This requires thorough knowledge of the amount of methane that is emitted from a plant, but also of the possible sources and sinks of methane on the plant. In this study, the methane emission from a full-scale municipal wastewater facility with sludge digestion was evaluated during one year. At this plant the contribution of methane emissions to the greenhouse gas footprint were slightly higher than the CO₂ emissions related to direct and indirect fossil fuel consumption for energy requirements. By setting up mass balances over the different unit processes, it could be established that three quarters of the total methane emission originated from the anaerobic digestion of primary and secondary sludge. This amount exceeded the carbon dioxide emission that was avoided by utilizing the biogas. About 80% of the methane entering the activated sludge reactor was biologically oxidized. This knowledge led to the identification of possible measures for the abatement of the methane emission. Copyright © 2012 Elsevier Ltd. All rights reserved.

  11. Utilization of fungi for biotreatment of raw wastewaters | Coulibaly ...

    African Journals Online (AJOL)

    However, the detoxification rates seem to be dependent on media and culture conditions. The postreatement by anaerobic bioprocesses of effluents that have been pretreated with fungi can lead to higher biogas than the original effluents. In addition to the degradation of organic pollutants, fungi produce added-value ...

  12. Utilization of fungi for biotreatment of raw wastewaters | Coulibaly ...

    African Journals Online (AJOL)

    The postreatement by anaerobic bioprocesses of effluents that have been pretreated with fungi can lead to higher biogas than the original effluents. In addition to the degradation of organic pollutants, fungi produce added-value products such as enzymes (LiP, MnP, Lacc, amylase, etc.) and single-cell protein (SCP).

  13. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property......In this paper we combine two powerful methods of symmetric cryptanalysis: rotational cryptanalysis and the rebound attack. Rotational cryptanalysis was designed for the analysis of bit-oriented designs like ARX (Addition-Rotation-XOR) schemes. It has been applied to several hash functions and block...... ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...

  14. Limb-shaking transient ischemic attack

    Directory of Open Access Journals (Sweden)

    Abhijit Das

    2013-01-01

    Full Text Available Limb shaking Transient Ischemic Attack is a rare manifestation of carotid-occlusive disease. The symptoms usually present with seizure like activity and often misdiagnosed as focal seizures. Only on careful history the important clinical clues-which may help in differentiating from seizure-are revealed: Lack of Jacksonian march or aura; precipitation by maneuvers that lead to carotid compression. We present the case of an elderly gentleman with recurrent limb shaking transient ischemic attacks that was initially diagnosed as a case of epilepsy. His symptoms responded to optimization of blood pressure. The case report highlights the importance of accurate diagnosis as the treatment of the associated carotid artery occlusion may not only abolish the attacks but also reduce the risk of future stroke.

  15. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey

    2015-01-01

    nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise to security concerns: At CRYPTO 2008, Handschuh and Preneel describe key recovery attacks, and at FSE 2013, Procter and Cid provide a comprehensive framework for forgery attacks. Both approaches rely...... heavily on the ability to construct forgery polynomials having disjoint sets of roots, with many roots (“weak keys”) each. Constructing such polynomials beyond naïve approaches is crucial for these attacks, but still an open problem. In this paper, we comprehensively address this issue. We propose to use...... twisted polynomials from Ore rings as forgery polynomials. We show how to construct sparse forgery polynomials with full control over the sets of roots. We also achieve complete and explicit disjoint coverage of the key space by these polynomials. We furthermore leverage this new construction...

  16. Multicollision attack on CBC-MAC, EMAC, and XCBC-MAC of AES-128 algorithm

    Science.gov (United States)

    Brolin Sihite, Alfonso; Hayat Susanti, Bety

    2017-10-01

    A Message Authentication Codes (MAC) can be constructed based on a block cipher algorithm. CBC-MAC, EMAC, and XCBC-MAC constructions are some of MAC schemes that used in the hash function. In this paper, we do multicollision attack on CBC-MAC, EMAC, and XCBC-MAC construction which uses AES-128 block cipher algorithm as basic construction. The method of multicollision attack utilizes the concept of existential forgery on CBC-MAC. The results show that the multicollision can be obtained easily in CBC-MAC, EMAC, and XCBC-MAC construction.

  17. Conditional beam splitting attack on quantum key distribution

    OpenAIRE

    Calsamiglia, John; Barnett, Stephen M.; Lütkenhaus, Norbert

    2001-01-01

    We present a novel attack on quantum key distribution based on the idea of adaptive absorption [calsam01]. The conditional beam splitting attack is shown to be much more efficient than the conventional beam spitting attack, achieving a performance similar to the, powerful but currently unfeasible, photon number splitting attack. The implementation of the conditional beam splitting attack, based solely on linear optical elements, is well within reach of current technology.

  18. Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis

    Science.gov (United States)

    Du, Haitao; Yang, Shanchieh Jay

    This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle component analysis to reduce the feature space, and hierarchical clustering to group attack sources that exhibit similar behavior. Experiments with real world data illustrate that our framework can effectively reduce from large dataset to clusters of attack sources exhibiting critical collaborative patterns.

  19. Viden: Attacker Identification on In-Vehicle Networks

    OpenAIRE

    Cho, Kyong-Tak; Shin, Kang

    2017-01-01

    Various defense schemes --- which determine the presence of an attack on the in-vehicle network --- have recently been proposed. However, they fail to identify which Electronic Control Unit (ECU) actually mounted the attack. Clearly, pinpointing the attacker ECU is essential for fast/efficient forensic, isolation, security patch, etc. To meet this need, we propose a novel scheme, called Viden (Voltage-based attacker identification), which can identify the attacker ECU by measuring and utilizi...

  20. Survival of child after lion attack

    OpenAIRE

    Carlos F Dabdoub; Dabdoub, Carlos B.; Chavez, Mario; Molina, Felipe

    2013-01-01

    Background: Injuries to humans caused by attacks from large predators are very rare, especially in the United States, Europe, or Latin America. A few cases were reported on accidents in zoos or animal farms, being very uncommon in children. The purposes of this report include describing the case of a child who sustained an attack by a lion named ?Bang-Bang?, which resulted in injuries to the head, chest, and abdomen, as well as the subsequent neurosurgical treatment and providing a review of ...

  1. The development of empirical models to evaluate energy use and energy cost in wastewater collection

    Science.gov (United States)

    Young, David Morgan

    This research introduces a unique data analysis method and develops empirical models to evaluate energy use and energy cost in wastewater collection systems using operational variables. From these models, several Best Management Processes (BMPs) are identified that should benefit utilities and positively impact the operation of existing infrastructure as well as the design of new infrastructure. Further, the conclusions generated herein display high transferability to certain manufacturing processes. Therefore, it is anticipated that these findings will also benefit pumping applications outside of the water sector. Wastewater treatment is often the single largest expense at the local government level. Not surprisingly, significant research effort has been expended on examining the energy used in wastewater treatment. However, the energy used in wastewater collection systems remains underexplored despite significant potential for energy savings. Estimates place potential energy savings as high as 60% within wastewater collection; which, if applied across the United States equates to the energy used by nearly 125,000 American homes. Employing three years of data from Renewable Water Resources (ReWa), the largest wastewater utility in the Upstate of South Carolina, this study aims to develop useful empirical equations that will allow utilities to efficiently evaluate the energy use and energy cost of its wastewater collection system. ReWa's participation was motivated, in part, by their recent adoption of the United States Environmental Protection Agency "Effective Utility Strategies" within which exists a focus on energy management. The study presented herein identifies two primary variables related to the energy use and cost associated with wastewater collection: Specific Energy (Es) and Specific Cost (Cs). These two variables were found to rely primarily on the volume pumped by the individual pump stations and exhibited similar power functions for the three year

  2. Energy-saving wastewater treatment systems: formulation of cost functions.

    Science.gov (United States)

    Nogueira, R; Ferreira, I; Janknecht, P; Rodríguez, J J; Oliveira, P; Brito, A G

    2007-01-01

    Natural interactions between water, soil, atmosphere, plants and microorganisms include physical, chemical and biological processes with decontaminating capacities. Natural or energy-saving wastewater treatment systems utilize these processes and thereby enable a sustainable management in the field of wastewater treatment, offering low investment and operation costs, little or no energy consumption, little and low-skill labor requirements, good landscape integration and excellent feasibility for small settlements, especially when remote from centralized sewer systems. The objective of this work is the development of cost functions for investment and operation of energy-saving wastewater treatment technologies. Cost functions are essential for making cost estimations based on a very reduced number of variables. The latter are easily identified and quantified and have a direct bearing on the costs in question. The formulated investment and operation cost functions follow a power law, and the costs decrease with the increase of the population served. The different energy-saving wastewater treatment systems serving small population settlements, between 50 p.e. and 250 p.e., present associated investment costs varying from 400 Euro/p.e. to 200 Euro/p.e. and annual operation costs in the range of 70 Euro/p.e. to 20 Euro/p.e., respectively.

  3. SEM analysis of particle size during conventional treatment of CMP process wastewater

    Energy Technology Data Exchange (ETDEWEB)

    Roth, Gary A.; Neu-Baker, Nicole M.; Brenner, Sara A., E-mail: sbrenner@sunycnse.com

    2015-03-01

    Engineered nanomaterials (ENMs) are currently employed by many industries and have different physical and chemical properties from their bulk counterparts that may confer different toxicity. Nanoparticles used or generated in semiconductor manufacturing have the potential to enter the municipal waste stream via wastewater and their ultimate fate in the ecosystem is currently unknown. This study investigates the fate of ENMs used in chemical mechanical planarization (CMP), a polishing process repeatedly utilized in semiconductor manufacturing. Wastewater sampling was conducted throughout the wastewater treatment (WWT) process at the fabrication plant's on-site wastewater treatment facility. The goal of this study was to assess whether the WWT processes resulted in size-dependent filtration of particles in the nanoscale regime by analyzing samples using scanning electron microscopy (SEM). Statistical analysis demonstrated no significant differences in particle size between sampling points, indicating low or no selectivity of WWT methods for nanoparticles based on size. All nanoparticles appeared to be of similar morphology (near-spherical), with a high variability in particle size. EDX verified nanoparticles composition of silicon- and/or aluminum-oxide. Nanoparticle sizing data compared between sampling points, including the final sampling point before discharge from the facility, suggested that nanoparticles could be released to the municipal waste stream from industrial sources. - Highlights: • The discrete treatments of a semiconductor wastewater treatment system were examined. • A sampling scheme and method for analyzing nanoparticles in wastewater was devised. • The wastewater treatment process studied is not size-selective for nanoparticles.

  4. Prospects, recent advancements and challenges of different wastewater streams for microalgal cultivation.

    Science.gov (United States)

    Guldhe, Abhishek; Kumari, Sheena; Ramanna, Luveshan; Ramsundar, Prathana; Singh, Poonam; Rawat, Ismail; Bux, Faizal

    2017-12-01

    Microalgae are recognized as one of the most powerful biotechnology platforms for many value added products including biofuels, bioactive compounds, animal and aquaculture feed etc. However, large scale production of microalgal biomass poses challenges due to the requirements of large amounts of water and nutrients for cultivation. Using wastewater for microalgal cultivation has emerged as a potential cost effective strategy for large scale microalgal biomass production. This approach also offers an efficient means to remove nutrients and metals from wastewater making wastewater treatment sustainable and energy efficient. Therefore, much research has been conducted in the recent years on utilizing various wastewater streams for microalgae cultivation. This review identifies and discusses the opportunities and challenges of different wastewater streams for microalgal cultivation. Many alternative routes for microalgal cultivation have been proposed to tackle some of the challenges that occur during microalgal cultivation in wastewater such as nutrient deficiency, substrate inhibition, toxicity etc. Scope and challenges of microalgal biomass grown on wastewater for various applications are also discussed along with the biorefinery approach. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Robustness of Dengue Complex Network under Targeted versus Random Attack

    Directory of Open Access Journals (Sweden)

    Hafiz Abid Mahmood Malik

    2017-01-01

    Full Text Available Dengue virus infection is one of those epidemic diseases that require much consideration in order to save the humankind from its unsafe impacts. According to the World Health Organization (WHO, 3.6 billion individuals are at risk because of the dengue virus sickness. Researchers are striving to comprehend the dengue threat. This study is a little commitment to those endeavors. To observe the robustness of the dengue network, we uprooted the links between nodes randomly and targeted by utilizing different centrality measures. The outcomes demonstrated that 5% targeted attack is equivalent to the result of 65% random assault, which showed the topology of this complex network validated a scale-free network instead of random network. Four centrality measures (Degree, Closeness, Betweenness, and Eigenvector have been ascertained to look for focal hubs. It has been observed through the results in this study that robustness of a node and links depends on topology of the network. The dengue epidemic network presented robust behaviour under random attack, and this network turned out to be more vulnerable when the hubs of higher degree have higher probability to fail. Moreover, representation of this network has been projected, and hub removal impact has been shown on the real map of Gombak (Malaysia.

  6. Properties of Concrete Mixes with Carwash Wastewater

    Directory of Open Access Journals (Sweden)

    Shahidan Shahiron

    2017-01-01

    Full Text Available The rapid growth of the car wash industry today results in the need for wastewater reclamation. Thus, this paper aims to investigate the effect of using car wash wastewater on concrete properties in terms of mechanical properties. The basic characteristics of wastewater were investigated according to USEPA (Method 150.1 & 3 00.0 while the mechanical properties of concrete with car wash wastewater were compared according to ASTM C1602 and BS EN 1008 standards. In this research, the compressive strength, modulus of elasticity and tensile strength were studied. The percentages of wastewater replaced in the concrete mix ranged from 0% up to 40%. In addition, the results also suggest that the concrete with 20% car wash wastewater achieved the highest compressive strength and modulus of elasticity compared to other compositions of wastewater. Moreover, the results also recommended that concrete mixed with car wash wastewater has better compressive strength compared to conventional concrete.

  7. Improving quality of textile wastewater with organic materials as multi soil layering

    Science.gov (United States)

    Supriyadi; Widijanto, H.; Pranoto; Dewi, AK

    2016-02-01

    On agricultural land, fresh water is needed especially for irrigation. Alternative ways to fulfill needs of fresh water is by utilizing wastewater from industry. Wastewater that produced in the industry in Surakarta is over flowing especially textile wastewater. Wastewater that produced from industry has many pollutants that affected decreasing fresh water quality for irrigation. Multi Soil Layering (MSL) is one of method that utilize the soil ability as main media by increasing its function of soil structure to purify wastewater, so it does not contaminate the environment and reusable. This research was purposed to know affectivity of organic materials (such as rice straw, baggase, sawdust, coconut fibre, and corncob) and dosage (5%, 10% and 25%) in MSL, also get alternative purification ways with easy and cheaper price as natural adsorbent. This study using field and laboratory experiment. The result shows that MSL can be an alternative method of purification of wastewater. The appropriate composition of organic materials that can be used as adsorbent is MSL with wood sawdust 10% dosage because it can increase pH, decrease the number of Cr, ammonia, and phosphate but less effective to decrease BOD and COD.

  8. A Study of Gaps in Attack Analysis

    Science.gov (United States)

    2016-10-12

    Kührer, Thomas Hupperich, Christian Rossow, and Thorsten Holz. Exit from Hell? Re- ducing the Impact of Amplification DDoS Attacks. In Proceedings of...Revisiting Network Protocols for DDoS Abuse. In 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA

  9. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available -1 International Journal of Cyber Warfare and Terrorism, vol. 6(3), 65-78 Using an Ontology for Network Attack Planning Renier van Heerden1,2, Peter Chan2 , Louise Leenen2,3 Jacques Theron4 1 Nelson Mandela Metropolitan University, South Africa 2...

  10. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  11. Cyber Attack! Crime or Act of War?

    Science.gov (United States)

    2011-04-13

    informational, or economic.54 Other legal scholars concur in this interpretation, one using the term ― agressive force‖ in lieu of ―armed force‖ but...distributed whiteboard to determine legal responses to online cyber attacks. Internet Research 16, no. 5, (October 20): 475-490. http

  12. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  13. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  14. Management of an acute asthma attack.

    Science.gov (United States)

    Barnard, Amanda

    2005-07-01

    Despite a more proactive approach to asthma management, which includes an increased range of drugs, wide dissemination of guidelines, and the use of asthma action plans, an acute severe asthma attack is one of the most common emergencies a general practitioner will encounter. This article discusses the management of an acute asthma attack in the general practice setting. Assessment of severity is vital and can be ascertained quite quickly with a brief history and rapid physical examination. It is important to remember that wheeze is an unreliable indicator of the severity of attack and may be absent in severe asthma. The cornerstones of treatment are oxygen and inhaled beta 2 agonists. Beta 2 agonists can be given continuously in severe life threatening asthma. Early administration of systemic steroids is important. Patients discharged to home after treatment of an asthma attack require close follow up including beta 2 agonists for symptom control, review of medications including a consideration of a short course of oral steroids, a written asthma action plan and detailed advice about what to do in case of deterioration in the next 24 hours. They should be reviewed in 24-48 hours.

  15. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... other risk factors. Overweight and obese adults with risk factors for cardiovascular disease such as high blood pressure, high cholesterol, ... over 40, or if you have multiple risk factors, work especially closely with ... cardiovascular disease. Heart attack prevention should begin early in ...

  16. Afghanistan: Green-on-Blue Attacks

    Science.gov (United States)

    2013-05-02

    spike-insider-attacks- stress- ramadan - fasting , 24 August 2012 37 Yousafzai, Sami and Moreau, Ron, http://www.thedailybeast.com/newsweek/2012/08/26...Ramazan.” “And so the daily pressures that are on some of these [Afghan] troops, compounded by the sacrifice associated with fasting , the nature of

  17. Survival of child after lion attack

    Science.gov (United States)

    Dabdoub, Carlos F.; Dabdoub, Carlos B.; Chavez, Mario; Molina, Felipe

    2013-01-01

    Background: Injuries to humans caused by attacks from large predators are very rare, especially in the United States, Europe, or Latin America. A few cases were reported on accidents in zoos or animal farms, being very uncommon in children. The purposes of this report include describing the case of a child who sustained an attack by a lion named “Bang-Bang”, which resulted in injuries to the head, chest, and abdomen, as well as the subsequent neurosurgical treatment and providing a review of the literature. Case Description: We report the case of an 8-year-old boy who was attacked by a lion during a circus show. The patient underwent an emergent neurosurgical procedure, including parietal craniectomy, cleaning, and extensive surgical debridement of the wounds. Despite open severe head trauma with brain damage as well as thorax and abdomen trauma, the child survived, with minimal neurological sequelae. Conclusions: Human injury resulting from encounters with nondomesticated animals is increasingly rising throughout the world. This case highlights the potentially violent and aggressive nature of wild mammals held in captivity. Unusual wild animal attacks and the complex injuries that result may pose a challenge to surgeons practicing in resource-limited settings. In this sense, the best treatment in the mentioned case is the prevention of human injuries by these animals. In addition, to attend to these infrequent cases, the authors emphasize the importance of a multidisciplinary approach to achieve the best cosmetic and functional results. PMID:23869277

  18. Shark Attack! Sinking Your Teeth into Anatomy.

    Science.gov (United States)

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  19. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  20. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  1. Plant defences against herbivore and insect attack

    Science.gov (United States)

    Plants deploy a number of defences against attack by insects and other herbivores. Direct defence is conferred by plant products and structures that deter or kill the herbivores. Chemical toxins and deterrents vary widely among plant species, and some typical toxins include alkaloids, terpenoids, st...

  2. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  3. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  4. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  5. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  6. ELECTRICITY GENERATION FROM SWINE WASTEWATER USING MICROBIAL FUEL CELL

    Directory of Open Access Journals (Sweden)

    Chimezie Jason Ogugbue

    2015-11-01

    Full Text Available Electricity generation from swine wastewater using microbial fuel cell (MFC was investigated. Swine wastewater was collected into dual-chambered (aerobic and anaerobic fuel cell. The maximum power output using copper and carbon electrodes were 250.54 and 52.33 µW, while 10.0 and 5.0 cm salt bridge length between the cathode and anode were 279.50 and 355.26 µW, respectively. Potassium permanganate and ordinal water gave a maximum power output of 1287.8 and 13 9.18 µW. MFCs utilize microbial communities to degrade organic materials found within wastewater and converted stored chemical energy to electrical energy in a single step. The initial bacterial and fungal counts were 7.4×106 and 1.1×103 CFU ml-1. Bacterial counts steadily increased with time to 1.40×107 CFU ml-1 while fungal count declined to 4.4×106 CFU ml-1 after day 60. The declined in microbial counts may be attributed to the time necessary for acclimatization of microbes to the anode. The genera identified were Bacillus, Citrobacter, Pseudomonas, Lactobacillus, Escherichia coli, Aspergillus and Rhizopus. These microbes acted as primary and secondary utilizers, utilizing carbon and other organics of the wastewater. Chemical parameters indicated that the biochemical oxygen demand ranged from 91.4–23.2 mg/L, giving 75% while the chemical oxygen demand ranged from 243.1–235.2 mg/L, representing 3.3%. Although, the metabolic activities of microbes were responsible for the observed degradation, leading to electricity, the overall power output depended on the distance between the anode and cathode compartment, types of electrode materials and mediators and oxygen reaction at the cathode.

  7. Properties of Concrete Mixes with Carwash Wastewater

    OpenAIRE

    Shahidan Shahiron; Senin Mohamad Syamir; Abdul Kadir Aeslina Binti; Yee Lau Hai; Ali Noorwirdawati

    2017-01-01

    The rapid growth of the car wash industry today results in the need for wastewater reclamation. Thus, this paper aims to investigate the effect of using car wash wastewater on concrete properties in terms of mechanical properties. The basic characteristics of wastewater were investigated according to USEPA (Method 150.1 & 3 00.0) while the mechanical properties of concrete with car wash wastewater were compared according to ASTM C1602 and BS EN 1008 standards. In this research, the compressiv...

  8. Linkages between microbial functional potential and wastewater constituents in large-scale membrane bioreactors for municipal wastewater treatment.

    Science.gov (United States)

    Sun, Yanmei; Shen, Yue-xiao; Liang, Peng; Zhou, Jizhong; Yang, Yunfeng; Huang, Xia

    2014-06-01

    Large-scale membrane bioreactors (MBRs) have been widely used for the municipal wastewater treatment, whose performance relies on microbial communities of activated sludge. Nevertheless, microbial functional structures in MBRs remain little understood. To gain insight into functional genes and their steering environmental factors, we adopted GeoChip, a high-throughput microarray-based tool, to examine microbial genes in four large-scale, in-operation MBRs located in Beijing, China. The results revealed substantial microbial gene heterogeneity (43.7-85.1% overlaps) among different MBRs. Mantel tests indicated that microbial nutrient cycling genes were significantly (P wastewater constituent removal. In addition, functional genes shared by all four MBRs contained a large number of genes involved in antibiotics resistance, metal resistance and organic remediation, suggesting that they were required for degradation or resistance to toxic compounds in wastewater. The linkages between microbial functional structures and environmental variables were also unveiled by the finding of hydraulic retention time, influent COD, [Formula: see text] -N, mixed liquid temperature and humic substances as major factors shaping microbial communities. Together, the results presented demonstrate the utility of GeoChip-based microarray approach in examining microbial communities of wastewater treatment plants and provide insights into the forces driving important processes of element cycling. Copyright © 2014 Elsevier Ltd. All rights reserved.

  9. Labview utilities

    Energy Technology Data Exchange (ETDEWEB)

    2011-09-30

    The software package provides several utilities written in LabView. These utilities don't form independent programs, but rather can be used as a library or controls in other labview programs. The utilities include several new controls (xcontrols), VIs for input and output routines, as well as other 'helper'-functions not provided in the standard LabView environment.

  10. Effect of treatment in a constructed wetland on toxicity of textile wastewater

    Science.gov (United States)

    Baughman, G.L.; Perkins, W.S.; Lasier, P.J.; Winger, P.V.

    2003-01-01

    Constructed wetlands for treating wastewater have proliferated in recent years and their characteristics have been studied extensively. In most cases, constructed wetlands have been used primarily for removal of nutrients and heavy metals. Extensive literature is available concerning construction and use of wetlands for treatment of wastewater. Even so, quantitative descriptions of wetland function and processes are highly empirical and difficult to extrapolate. The processes involved in removal of pollutants by wetlands are poorly understood, especially for waste streams as complex as textile effluents. The few studies conducted on treatment of textile wastewater in constructed wetlands were cited in earlier publications. Results of a two-year study of a full-scale wetland treating textile effluent are presented here. The paper describes the effects of the wetland on aquatic toxicity of the wastewater and draws conclusions about the utility and limitations of constructed wetlands for treatment of textile effluents.

  11. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  12. Opportunities for microbial electrochemistry in municipal wastewater treatment--an overview.

    Science.gov (United States)

    Modin, Oskar; Gustavsson, David J I

    2014-01-01

    Microbial bioelectrochemical systems (BESs) utilize living microorganisms to drive oxidation and reduction reactions at solid electrodes. BESs could potentially be used at municipal wastewater treatment plants (WWTPs) to recover the energy content of organic matter, to produce chemicals useful at the site, or to monitor and control biological treatment processes. In this paper, we review bioelectrochemical technologies that could be applied for municipal wastewater treatment. Sjölunda WWTP in Malmö, Sweden, is used as an example to illustrate how the different technologies potentially could be integrated into an existing treatment plant and the impact they could have on the plant's utilization of energy and chemicals.

  13. 40 CFR 63.647 - Wastewater provisions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 10 2010-07-01 2010-07-01 false Wastewater provisions. 63.647 Section... Emission Standards for Hazardous Air Pollutants From Petroleum Refineries § 63.647 Wastewater provisions... wastewater stream shall comply with the requirements of §§ 61.340 through 61.355 of 40 CFR part 61, subpart...

  14. 40 CFR 63.1330 - Wastewater provisions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Wastewater provisions. 63.1330 Section... for Hazardous Air Pollutant Emissions: Group IV Polymers and Resins § 63.1330 Wastewater provisions... subpart. (10) Whenever §§ 63.132 through 63.149 refer to a Group 1 wastewater stream or a Group 2...

  15. 18 CFR 1304.402 - Wastewater outfalls.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Wastewater outfalls. 1304.402 Section 1304.402 Conservation of Power and Water Resources TENNESSEE VALLEY AUTHORITY APPROVAL... Miscellaneous § 1304.402 Wastewater outfalls. Applicants for a wastewater outfall shall provide copies of all...

  16. 40 CFR 63.1433 - Wastewater provisions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Wastewater provisions. 63.1433 Section... for Hazardous Air Pollutant Emissions for Polyether Polyols Production § 63.1433 Wastewater provisions. (a) Process wastewater. Except as specified in paragraph (c) of this section, the owner or operator...

  17. 40 CFR 63.1256 - Standards: Wastewater.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Standards: Wastewater. 63.1256 Section... for Pharmaceuticals Production § 63.1256 Standards: Wastewater. (a) General. Each owner or operator of any affected source (existing or new) shall comply with the general wastewater requirements in...

  18. 40 CFR 63.501 - Wastewater provisions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 9 2010-07-01 2010-07-01 false Wastewater provisions. 63.501 Section... for Hazardous Air Pollutant Emissions: Group I Polymers and Resins § 63.501 Wastewater provisions. (a... comply with the requirements of §§ 63.132 through 63.147 for each process wastewater stream originating...

  19. remediation of refinery wastewater using electrocoagulation

    African Journals Online (AJOL)

    userpc

    ABSTRACT. This study was designed to assess the effi remediation of wastewater from Kaduna liters of wastewater was collected from. Petrochemical Company for the period of 1 sedimentation and filtration was perform wastewater. The results obtained showed turbidity, electrical conductivity, nitrate, grease as well as ...

  20. Orientation to Municipal Wastewater Treatment. Training Manual.

    Science.gov (United States)

    Office of Water Program Operations (EPA), Cincinnati, OH. National Training and Operational Technology Center.

    Introductory-level material on municipal wastewater treatment facilities and processes is presented. Course topics include sources and characteristics of municipal wastewaters; objectives of wastewater treatment; design, operation, and maintenance factors; performance testing; plant staffing; and laboratory considerations. Chapter topics include…

  1. Reclaimed wastewater use alternatives and quality standards

    OpenAIRE

    Dalahmeh, Sahar; Baresel, Christian

    2014-01-01

    Reclaimed wastewater use is crucial for increasing water availability, improving water resources management, minimising environmental pollution and permitting sustainable nutrient recycling. However, wastewater also contains microbiological and chemical pollutants posing risks to human health and the environment, and these risks have to be handled. Successful use of reclaimed wastewater requires stringent standards for its treatment, disposal and distribution. This report summarises global an...

  2. Automatic Regulation of Wastewater Discharge

    Directory of Open Access Journals (Sweden)

    Bolea Yolanda

    2017-01-01

    Full Text Available Wastewater plants, mainly with secondary treatments, discharge polluted water to environment that cannot be used in any human activity. When those dumps are in the sea it is expected that most of the biological pollutants die or almost disappear before water reaches human range. This natural withdrawal of bacteria, viruses and other pathogens is due to some conditions such as the salt water of the sea and the sun effect, and the dumps areas are calculated taking into account these conditions. However, under certain meteorological phenomena water arrives to the coast without the full disappearance of pollutant elements. In Mediterranean Sea there are some periods of adverse climatic conditions that pollute the coast near the wastewater dumping. In this paper, authors present an automatic control that prevents such pollution episodes using two mathematical models, one for the pollutant transportation and the other for the pollutant removal in wastewater spills.

  3. Wastewater Treatment: The Natural Way

    Science.gov (United States)

    1988-01-01

    Wolverton Environmental Services, Inc. is widely acclaimed for innovative work in natural water purification which involves use of aquatic plants to remove pollutants from wastewater at a relatively low-cost. Haughton, Louisiana, visited Wolverton's artificial marsh test site and decided to use this method of wastewater treatment. They built an 11 acre sewage lagoon with a 70 by 900 foot artificial marsh called a vascular aquatic plant microbial filter cell. In the cell, microorganisms and rooted aquatic plants combine to absorb and digest wastewater pollutants, thereby converting sewage to relatively clean water. Raw waste water, after a period in the sewage lagoon, flows over a rock bed populated by microbes that digest nutrients and minerals from the sewage thus partially cleaning it. Additional treatment is provided by the aquatic plants growing in the rock bed, which absorb more of the pollutants and help deodorize the sewage.

  4. Behavioral Modeling of WSN MAC Layer Security Attacks: A Sequential UML Approach

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    Wireless sensor networks (WSNs) are growing enormously and becoming increasingly attractive for a variety of application areas such as tele-health monitoring, industry monitoring, home automation and many more. The primary weakness shared by all wireless application and technologies is the vulner......Wireless sensor networks (WSNs) are growing enormously and becoming increasingly attractive for a variety of application areas such as tele-health monitoring, industry monitoring, home automation and many more. The primary weakness shared by all wireless application and technologies...... is the vulnerability to security attacks/threats. The performance and behavior of a WSN are vastly affected by such attacks. In order to be able to better address the vulnerabilities of WSNs in terms of security, it is important to understand the behavior of the attacks. This paper addresses the behavioral modeling...... of medium access control (MAC) security attacks in WSNs. The MAC layer is responsible for energy consumption, delay and channel utilization of the network and attacks on this layer can introduce significant degradation of the individual sensor nodes due to energy drain and in performance due to delays...

  5. Bioremediation of wastewater using microalgae

    Science.gov (United States)

    Chalivendra, Saikumar

    Population expansion and industrial development has deteriorated the quality of freshwater reservoirs around the world and has caused freshwater shortages in certain areas. Discharge of industrial effluents containing toxic heavy metals such as Cd and Cr into the environment have serious impact on human, animal and aquatic life. In order to solve these problems, the present study was focused on evaluating and demonstrating potential of microalgae for bioremediation of wastewater laden with nitrogen (N) in the form of nitrates, phosphorous (P) in the form of phosphates, chromium (Cr (VI)) and cadmium (Cd (II)). After screening several microalgae, Chlorella vulgaris and algae taken from Pleasant Hill Lake were chosen as candidate species for this study. The viability of the process was demonstrated in laboratory bioreactors and various experimental parameters such as contact time, initial metal concentration, algae concentration, pH and temperature that would affect remediation rates were studied. Based on the experimental results, correlations were developed to enable customizing and designing a commercial Algae based Wastewater Treatment System (AWTS). A commercial AWTS system that can be easily customized and is suitable for integration into existing wastewater treatment facilities was developed, and capital cost estimates for system including installation and annual operating costs were determined. The work concludes that algal bioremediation is a viable alternate technology for treating wastewater in an economical and sustainable way when compared to conventional treatment processes. The annual wastewater treatment cost to remove N,P is ~26x lower and to remove Cr, Cd is 7x lower than conventional treatment processes. The cost benefit analysis performed shows that if this technology is implemented at industrial complexes, Air Force freight and other Department of Defense installations with wastewater treatment plants, it could lead to millions of dollars in

  6. Characterization of functional microorganism groups and substrate in activated sludge and wastewater by AUR, NUR and OUR

    DEFF Research Database (Denmark)

    Kristensen, G. Holm; Jørgensen, P. Elberg; Henze, Mogens

    1992-01-01

    Activated sludge functional microorganism groups: nitrifiers, denitrifiers and heterotrophs, were characterized through determinations of maximum specific utilization rates of ammonia (AUR) nitrate (NUR) and oxygen (OUR). Characterizations of the functional groups were done on activated sludges...... from a pilot plant and from full-scale plants. Influent wastewater covered a wide spectrum, including raw wastewater, primary wastewater and chemically pretreated wastewater. AUR determinations showed significant variation with influent COD:N ratio, and good agreement was found with expected rates from...... mathematical simulations. For increased contents of particles in influent wastewaters a decreased maximum OUR was found, while maximum NUR was slightly increased or not affected. Based on NUR and OUR the fraction of denitrifiers to heterotrophs was estimated in the range of 41-73% in nitrogen removal sludges...

  7. Converting Chemical Oxygen Demand (COD) of Cellulosic Ethanol Fermentation Wastewater into Microbial Lipid by Oleaginous Yeast Trichosporon cutaneum.

    Science.gov (United States)

    Wang, Juan; Hu, Mingshan; Zhang, Huizhan; Bao, Jie

    2017-07-01

    Cellulosic ethanol fermentation wastewater is the stillage stream of distillation column of cellulosic ethanol fermentation broth with high chemical oxygen demand (COD). The COD is required to reduce before the wastewater is released or recycled. Without any pretreatment nor external nutrients, the cellulosic ethanol fermentation wastewater bioconversion by Trichosporon cutaneum ACCC 20271 was carried out for the first time. The major components of the wastewater including glucose, xylose, acetic acid, ethanol, and partial of phenolic compounds could be utilized by T. cutaneum ACCC 20271. In a 3-L bioreactor, 2.16 g/L of microbial lipid accumulated with 55.05% of COD reduced after a 5-day culture of T. cutaneum ACCC 20271 in the wastewater. The fatty acid composition of the derived microbial lipid was similar with vegetable oil, in which it could be used as biodiesel production feedstock. This study will both solve the environmental problem and offer low-cost lipid feedstock for biodiesel production.

  8. Recovery of polyphenols from rose oil distillation wastewater using adsorption resins--a pilot study.

    Science.gov (United States)

    Rusanov, Krasimir; Garo, Eliane; Rusanova, Mila; Fertig, Orlando; Hamburger, Matthias; Atanassov, Ivan; Butterweck, Veronika

    2014-11-01

    The production of rose oil from rose flowers by water steam distillation leaves a water fraction of the distillate as main part of the waste. Therefore, the rose oil distillation wastewater represents a serious environmental problem due to the high content of polyphenols which are difficult to decompose and have to be considered as biopollutants when discarded into the drainage system and rivers. On the other hand, natural polyphenols are valuable compounds with useful properties as bioactive substances. Until now there is no established practice for processing of rose oil distillation wastewater and utilization of contained substances. Thus, it was the aim of this study to develop a strategy to separate this wastewater into a polyphenol depleted water fraction and a polyphenol enriched fraction which could be developed into innovative value-added products. In a first step, the phytochemical profile of rose oil distillation wastewater was determined. Its HPLC-PDA-MS analysis revealed the presence of flavan-3-ols, flavanones, flavonols and flavones. In a second step, the development of a stepwise concentration of rose oil distillation wastewater was performed. The concentration process includes a filtration process to eliminate suspended solids in the wastewater, followed by adsorption of the contained phenolic compounds onto adsorption resins (XAD and SP). Finally, desorption of the polyphenol fraction from the resin matrix was achieved using ethanol and/or aqueous ethanol. The result of the process was a wastewater low in soluble organic compounds and an enriched polyphenol fraction (RF20 SP-207). The profile of this fraction was similar to that of rose oil distillation wastewater and showed the presence of flavonols such as quercetin and kaempferol glycosides as major metabolites. These compounds were isolated from the enriched polyphenol fraction and their structures confirmed by NMR. In summary, a pilot medium scale system was developed using adsorption resins

  9. Words Mean Things: The Case for Information System Attack and Control System Attack

    Science.gov (United States)

    2008-10-31

    FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE Words Mean Things: The Case for Information System Attack and Control System...Standard Form 298 (Rev. 8-98) NAVAL WAR COLLEGE Newport, R.I. WORDS MEAN THINGS: THE CASE FOR INFORMATION SYSTEM ATTACK AND... words , the DepSecDef definition acknowledges the existence of a new domain, but strongly implies the accepted definition of CNO is sufficient to

  10. Chosen-name attacks: An overlooked class of type-flaw attacks

    OpenAIRE

    Ceelen, Pieter; Mauw, Sjouke; Radomirovic, Sasa

    2008-01-01

    In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an intruder to dynamically choose and assign names to agents. This capability has been overlooked in all significant protocol verification frameworks based on formal methods. We identify and classify new type-flaw attacks arising from this capability. Several examples of protocols that are vulnerable to this type of attack are given, including Lowe’s modification of KSL. The consequences for automa...

  11. Estimating Utility

    DEFF Research Database (Denmark)

    Arndt, Channing; Simler, Kenneth R.

    2010-01-01

    an information-theoretic approach to estimating cost-of-basic-needs (CBN) poverty lines that are utility consistent. Applications to date illustrate that utility-consistent poverty measurements derived from the proposed approach and those derived from current CBN best practices often differ substantially...

  12. Television Utilization.

    Science.gov (United States)

    Dobosh, O.; Wright, E. N.

    The utilization of educational television (ETV) in schools can be ascertained by considering the teacher training in ETV, the extent of access to ETV, the student reaction, and the programing. Using a questionnaire survey method combined with detailed ETV logs, this study was able to analyze both ETV and film utilization in 13 elementary and…

  13. Innovation in radioactive wastewater-stream management. Pt. 1

    Energy Technology Data Exchange (ETDEWEB)

    Karameldin, A. [Reactor Dept., Nuclear Research Center, Atomic Energy Authority, Cairo (Egypt)

    2002-07-01

    Recently an invention of a system for volume reduction of the wastewater streams present in SDTs has been achieved. This system substantially utilized the air conditioning and ventilation techniques in water transfer from the wastewater to air. This process is promoted by a mutual heating and humidification of a compressed dry air introduced through SDTs (or in another tank). From the probable release of radioactive nuclides point of view, the analysis of the evaporation of waste streams present in SDTs have been indicated that the proposed optimal evaporating temperature is round 75 C. The design curve of the daily volumetric reduction of the wastewater streams versus the necessary volumetric airflow rates at different operating temperature has been achieved. The evaporating temperature varied from 40 C to 95 C with a step of 5 C. The obtained curve illustrates that the required volumetric airflow rate utilized to evaporate one m{sup 3}/day (when maintaining SDTs at the temperature 75 C) is less than 90 m{sup 3}/h. The assessments of the obtained curve have been indicated that this system is feasible and viable, economic and has no secondary waste residuals. Recently, an experimental facility proposed to be constructed to obtain the optimal operating parameters of the system, regarding to the probable emissions of the radioactive nuclides within the permissible release limits. (authors)

  14. Current status of urban wastewater treatment plants in China.

    Science.gov (United States)

    Zhang, Q H; Yang, W N; Ngo, H H; Guo, W S; Jin, P K; Dzakpasu, Mawuli; Yang, S J; Wang, Q; Wang, X C; Ao, D

    2016-01-01

    The study reported and analyzed the current state of wastewater treatment plants (WWTPs) in urban China from the perspective of treatment technologies, pollutant removals, operating load and effluent discharge standards. By the end of 2013, 3508 WWTPs have been built in 31 provinces and cities in China with a total treatment capacity of 1.48×10(8)m(3)/d. The uneven population distribution between China's east and west regions has resulted in notably different economic development outcomes. The technologies mostly used in WWTPs are AAO and oxidation ditch, which account for over 50% of the existing WWTPs. According to statistics, the efficiencies of COD and NH3-N removal are good in 656 WWTPs in 70 cities. The overall average COD removal is over 88% with few regional differences. The average removal efficiency of NH3-N is up to 80%. Large differences exist between the operating loads applied in different WWTPs. The average operating loading rate is approximately 83%, and 52% of WWTPs operate at loadings of wastewater generated. The implementation of discharge standards has been low. Approximately 28% of WWTPs that achieved the Grade I-A Discharge Standard of Pollutants for Municipal Wastewater Treatment Plant (GB 18918-2002) were constructed after 2010. The sludge treatment and recycling rates are only 25%, and approximately 15% of wastewater is inefficiently treated. Approximately 60% of WWTPs have capacities of 1×10(4)m(3)/d-5×10(4)m(3)/d. Relatively high energy consumption is required for small-scale processing, and the utilization rate of recycled wastewater is low. The challenges of WWTPs are discussed with the aim of developing rational criteria and appropriate technologies for water recycling. Suggestions regarding potential technical and administrative measures are provided. Copyright © 2016 Elsevier Ltd. All rights reserved.

  15. Evaluation of alternative institutional arrangements in public utilities

    Directory of Open Access Journals (Sweden)

    Ermishina Anna, V.

    2015-06-01

    Full Text Available Since early 2000s a policy of attracting private operators to public utilities, which should help to increase productivity, reduce costs, and as a result, reduce utility prices takes place in Russia. The aim of the study is to identify the relationship between institutional arrangements and pricing for water and wastewater services. Applying statistical and cluster analysis to empirical data on water utilities in 13 largest cities has revealed the differences in the level and dynamics of prices for water and wastewater services in the group of public utilities and public private water utilities. In 2011-2014 the level and growth price rates in the group of public private partnerships were higher than in group of municipal water utilities. Thus, the involvement of private operators has not yet lead to the expected reduction in prices.

  16. Electrochemical disinfection of toilet wastewater using wastewater electrolysis cell.

    Science.gov (United States)

    Huang, Xiao; Qu, Yan; Cid, Clément A; Finke, Cody; Hoffmann, Michael R; Lim, Keahying; Jiang, Sunny C

    2016-04-01

    The paucity of proper sanitation facilities has contributed to the spread of waterborne diseases in many developing countries. The primary goal of this study was to demonstrate the feasibility of using a wastewater electrolysis cell (WEC) for toilet wastewater disinfection. The treated wastewater was designed to reuse for toilet flushing and agricultural irrigation. Laboratory-scale electrochemical (EC) disinfection experiments were performed to investigate the disinfection efficiency of the WEC with four seeded microorganisms (Escherichia coli, Enterococcus, recombinant adenovirus serotype 5, and bacteriophage MS2). In addition, the formation of organic disinfection byproducts (DBPs) trihalomethanes (THMs) and haloacetic acids (HAA5) at the end of the EC treatment was also investigated. The results showed that at an applied cell voltage of +4 V, the WEC achieved 5-log10 reductions of all four seeded microorganisms in real toilet wastewater within 60 min. In contrast, chemical chlorination (CC) disinfection using hypochlorite [NaClO] was only effective for the inactivation of bacteria. Due to the rapid formation of chloramines, less than 0.5-log10 reduction of MS2 was observed in toilet wastewater even at the highest [NaClO] dosage (36 mg/L, as Cl2) over a 1 h reaction. Experiments using laboratory model waters showed that free reactive chlorine generated in situ during EC disinfection process was the main disinfectant responsible for the inactivation of microorganisms. However, the production of hydroxyl radicals [OH], and other reactive oxygen species by the active bismuth-doped TiO2 anode were negligible under the same electrolytic conditions. The formation of THMs and HAA5 were found to increase with higher applied cell voltage. Based on the energy consumption estimates, the WEC system can be operated using solar energy stored in a DC battery as the sole power source. Copyright © 2016 The Authors. Published by Elsevier Ltd.. All rights reserved.

  17. Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack

    Science.gov (United States)

    Ma, Hong-Xin; Bao, Wan-Su; Li, Hong-Wei; Chou, Chun

    2016-08-01

    We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulse-width, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward. Project supported by the National Basic Research Program of China (Grant No. 2013CB338002) and the National Natural Science Foundation of China (Grant Nos. 11304397 and 61505261).

  18. Diverticulitis Diet: Can Certain Foods Trigger an Attack?

    Science.gov (United States)

    ... there trigger foods I should avoid to prevent diverticulitis attacks? Answers from Katherine Zeratsky, R.D., L. ... Actually, no specific foods are known to trigger diverticulitis attacks. And no special diet has been proved ...

  19. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  20. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation....... In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  1. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  2. Aspirin to Prevent a First Heart Attack or Stroke

    Science.gov (United States)

    ... NHLBI on Twitter. Aspirin to Prevent a First Heart Attack or Stroke Also known as aspirin primary prevention. ... if I’m taking aspirin to prevent another heart attack or stroke? The information discussed in Who may ...

  3. Heart Attack Risk Spikes After Respiratory Infection, Study Finds

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_165626.html Heart Attack Risk Spikes After Respiratory Infection, Study Finds Even ... May 16, 2017 (HealthDay News) -- The risk of heart attack increases sharply after a respiratory infection, a new ...

  4. Fatal First-Time Heart Attacks More Common in Blacks

    Science.gov (United States)

    ... gov/news/fullstory_167101.html Fatal First-Time Heart Attacks More Common in Blacks: Study Black men are ... likely than whites to die of a first heart attack, a new analysis suggests. Two out of three ...

  5. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  6. Combined coagulation flocculation pre treatment unit for municipal wastewater

    Directory of Open Access Journals (Sweden)

    Ibrahim M. Ismail

    2012-10-01

    Full Text Available The potentials of using the hydraulic technique in combined unit for municipal wastewater treatment were studied. A combined unit in which processes of coagulation, flocculation and sedimentation, has been designed utilizing hydraulic mixing instead of mechanical mixing. A jar test treatability study has been conducted to locate the optimum dose of the coagulants to be used. Alum, ferrous sulfate, ferric sulfate, a mixture of ferric and ferrous sulfates, and mixture of lime and ferrous sulfate were all tested. A pilot unit was constructed in the existing wastewater treatment plant at El Mansoura governorate located in north Egypt. The optimum dose of coagulants used in the combined unit gives removal efficiencies for COD, BOD, and total phosphorous as 65%, 55%, and 83%, respectively.

  7. Research About Attacks Over Cloud Environment

    Directory of Open Access Journals (Sweden)

    Li Jie

    2017-01-01

    Full Text Available Cloud computing is expected to continue expanding in the next few years and people will start to see some of the following benefits in their real lives. Security of cloud computing environments is the set of control-based technologies and policies absolute to adhere regulatory compliance rules and protect information data applications and infrastructure related with cloud use. In this paper we suggest a model to estimating the cloud computing security and test the services provided to users. The simulator NG-Cloud Next Generation Secure Cloud Storage is used and modified to administer the proposed model. This implementation achieved security functions potential attacks as defined in the proposed model. Finally we also solve some attacks over cloud computing to provide the security and safety of the cloud.

  8. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  9. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  10. A review on wastewater disinfection

    Directory of Open Access Journals (Sweden)

    Mohammad Mehdi Amin

    2013-01-01

    Full Text Available Changes in regulations and development of new technologies have affected the selection of alternative for treated wastewater disinfection. Disinfection is the last barrier of wastewater reclamation process to protect ecosystem safety and human health. Driving forces include water scarcity and drinking water supply, irrigation, rapid industrialization, using reclaimed water, source protection, overpopulation, and environmental protection. The safe operation of water reuse depends on effluent disinfection. Understanding the differences in inactivation mechanisms is critical to identify rate-limiting steps involved in the inactivation process as well as to develop more effective disinfection strategies. Disinfection byproducts discharged from wastewater treatment plants may impair aquatic ecosystems and downstream drinking-water quality. Numerous inorganic and organic micropollutants can undergo reactions with disinfectants. Therefore, to mitigate the adverse effects and also to enhance that efficiency, the use of alternative oxidation/disinfection systems should be evaluated as possible alternative to chlorine. This review gives a summary of the traditional, innovative, and combined disinfection alternatives and also disinfection byproducts for effluent of municipal wastewater treatment plants.

  11. Wastewater Use in Irrigated Agriculture

    International Development Research Centre (IDRC) Digital Library (Canada)

    Yael Lampert, Graduate Student, Department of Ecology, Bar Ilan University, Ranut Gan, Israel. Jules B. van Lier, ... Urban population growth, particularly in developing countries, places immense pressure on water and land resources; it also results in the release of growing volumes of wastewater – most of it untreated.

  12. Design in Domestic Wastewater Irrigation

    NARCIS (Netherlands)

    Huibers, F.P.; Raschid-Sally, L.

    2005-01-01

    When looking at the domestic wastewater streams, from freshwater source to destination in an agricultural field, we are confronted with a complexity of issues that need careful attention. Social and economic realities arise, along with technical, biological and institutional issues. Local realities

  13. Wastewater Treatment I. Student's Guide.

    Science.gov (United States)

    California Water Pollution Control Association, Sacramento. Joint Education Committee.

    This student's guide is designed to provide students with the job skills necessary for the safe and effective operation and maintenance of wastewater treatment plants. It consists of three sections. Section 1 consists of an introductory note outlining course objectives and the format of the guide. A course outline constitutes the second section.…

  14. From Fault-tolerance to Attack Tolerance

    Science.gov (United States)

    2011-04-02

    AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT Means to build fault - tolerant ...bottlenecks. We also implemented a distributed storage service that uses Byzantine Quo- rum Systems (rather than state machine replication) and employs...From Fault - tolerance to Attack Tolerance AFOSR Grant F9550-06-1-0019 Final Report 1 December 2005 – 30 November 2010 Fred B. Schneider Computer

  15. Collision attack against Tav-128 hash function

    Science.gov (United States)

    Hariyanto, Fajar; Hayat Susanti, Bety

    2017-10-01

    Tav-128 is a hash function which is designed for Radio Frequency Identification (RFID) authentication protocol. Tav-128 is expected to be a cryptographically secure hash function which meets collision resistance properties. In this research, a collision attack is done to prove whether Tav-128 is a collision resistant hash function. The results show that collisions can be obtained in Tav-128 hash function which means in other word, Tav-128 is not a collision resistant hash function.

  16. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    devices through a Trojan horse program. This method is highly technical; it requires sophisticated hardware, software and a highly skilled hacker...Symantec, a leading manufacturer of anti- virus software and cybersecurity suites published a report on the economic impact of cyber-attacks (Symantec...Prior to the Egyptian’s introduction of the chariot, wars were waged primarily on foot. This horse driven cart added incredible speed on the open

  17. [Acute ischemic proctitis following an epileptic attack

    DEFF Research Database (Denmark)

    Klintmann, C.K.; Hillingso, J.G.; Glenthøj, Andreas

    2008-01-01

    Acute ischemic proctitis is a rare diagnosis mainly because the rectum is supplied by an extensive arterial network. Consequently, in more than 90% of patients with ischemic colitis the rectum is spared. Previously reported cases are related to severe vascular insufficiency of the rectal...... circulation caused by systemic atherosclerosis, usually following aortic or aortoiliac operations. We report one case of acute ischemic proctitis following an epileptic attack Udgivelsesdato: 2008/9/29...

  18. SQL Injection - Database Attack Revolution and Prevention

    OpenAIRE

    Dorai, Ramakanth; Kannan, Vinod

    2011-01-01

    SQL injection came with a bang and caused revolution in database attacking. In recent years, with the explosion in web-based commerce and information systems, databases have been drawing ever closer to the network and it is critical part of network security. This paper is incorporated with our research and firsthand experience in hacking the database by SQL injection. Database is the Storage Brain of a website. A hacked database is the source for Passwords and juicy information like credit ca...

  19. Finding Effective Responses Against Cyber Attacks for Divided Nations

    Science.gov (United States)

    2015-12-01

    Training and Exercise Center CSTIA Central Science and Technology Information Agency DDoS Distributed Denial of Service DNS Domain Name Server DOD...computers in 2004 and Distributed Denial of Service ( DDoS ) attacks in 2009, were attributed to North Korea. North Korea has attacked not only government...President Roh to Lee, North Korea intensified both their criticisms and attacks. In 2009, they conducted extensive DDoS attacks on South Korea and

  20. Randomized, controlled trial of telcagepant over four migraine attacks

    DEFF Research Database (Denmark)

    Ho, Andrew P; Dahlöf, Carl Gh; Silberstein, Stephen D

    2010-01-01

    This study evaluated the calcitonin gene-related peptide (CGRP) receptor antagonist telcagepant (tablet formulation) for treatment of a migraine attack and across four attacks. Adults with migraine were randomized, double-blind, to telcagepant 140 mg, telcagepant 280 mg, or control treatment sequ...... was defined as ≥ 3 successes, and lack of consistent efficacy was defined as ≥ 2 failures, in treatment response. A total of 1677 patients treated ≥ 1 attack and 1263 treated all four attacks....

  1. Smoking behaviour under intense terrorist attacks.

    Science.gov (United States)

    Keinan-Boker, Lital; Kohn, Robert; Billig, Miriam; Levav, Itzhak

    2011-06-01

    Smoking is one of the varied psychological reactions to stress. This study examined the rate and changes in cigarette smoking among former Gaza and current West Bank Jewish settlers subjected to direct and indirect terrorist attacks during the Al-Aksa Intifada. The relationship with degree of religious observance and emotional distress was explored as well. In this cross-sectional study, the respondents were settlers randomly selected and interviewed by telephone (N = 706). The interview schedule included socio-demographic items, information on direct exposure to terrorist attacks (e.g. threat to life or physical integrity, personal losses, property damage) and on steady and changes in smoking habits, and a scale to measure emotional distress. In contrast with the country population, a larger percentage of settlers who smoked increased the number of cigarettes consumed with exposure to terrorism (10 and 27%, respectively). Respondents who were injured or had their home damaged reported a higher rate of smoking during the preceding year (30 and 20%, respectively). Emotional distress was related to cigarette smoking, but not in the controlled analysis. Religious observance had no effect. Direct or indirect exposure to terrorist attacks had an impact on smoking prevalence rates and on changes in smoking habits. Studies investigating reactions to traumatic events should include a detailed section on smoking while mental health interventions should address the needs of smokers.

  2. ``Living off the land'': resource efficiency of wetland wastewater treatment

    Science.gov (United States)

    Nelson, M.; Odum, H. T.; Brown, M. T.; Alling, A.

    Bioregenerative life support technologies for space application are advantageous if they can be constructed using locally available materials, and rely on renewable energy resources, lessening the need for launch and resupply of materials. These same characteristics are desirable in the global Earth environment because such technologies are more affordable by developing countries, and are more sustainable long-term since they utilize less non-renewable, imported resources. Subsurface flow wetlands (wastewater gardens™) were developed and evaluated for wastewater recycling along the coast of Yucatan. Emergy evaluations, a measure of the environmental and human economic resource utilization, showed that compared to conventional sewage treatment, wetland wastewater treatment systems use far less imported and purchased materials. Wetland systems are also less energy-dependent, lessening dependence on electrical infrastructure, and require simpler maintenance since the system largely relies on the ecological action of microbes and plants for their efficacy. Detailed emergy evaluations showed that wetland systems use only about 15% the purchased emergy of conventional sewage systems, and that renewable resources contribute 60% of total emergy used (excluding the sewage itself) compared to less than 1% use of renewable resources in the high-tech systems. Applied on a larger scale for development in third world countries, wetland systems would require 1/5 the electrical energy of conventional sewage treatment (package plants), and save 2/3 of total capital and operating expenses over a 20-year timeframe. In addition, there are numerous secondary benefits from wetland systems including fiber/fodder/food from the wetland plants, creation of ecosystems of high biodiversity with animal habitat value, and aesthestic/landscape enhancement of the community. Wetland wastewater treatment is an exemplar of ecological engineering in that it creates an interface ecosystem to handle

  3. STAR Performance with SPEAR (Signal Processing Electronic Attack RFIC)

    Science.gov (United States)

    2017-03-01

    STAR Performance with SPEAR ( Signal Processing Electronic Attack RFIC) Luciano Boglione, Clayton Davis, Joel Goodman, Matthew McKeon, David...Parrett, Sanghoon Shin and Naomi Walker Naval Research Laboratory Washington, DC, 20375 Figure 1: The Signal Processing Electronic Attack RFIC...SPEAR) system. Abstract: The Signal Processing Electronic Attack RFIC (SPEAR) is a simultaneous transmit and receive (STAR) system capable of

  4. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  5. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  6. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  7. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  8. Microbial Community Analysis of a Single Chamber Microbial Fuel Cell Using Potato Wastewater

    Energy Technology Data Exchange (ETDEWEB)

    Zhen Li; Rishika Haynes; Eugene Sato; Malcolm Shields; Yoshiko Fujita; Chikashi Sato

    2014-04-01

    Microbial fuel cells (MFCs) convert chemical energy to electrical energy via bioelectrochemical reactions mediated by microorganisms. We investigated the diversity of the microbial community in an air cathode single chamber MFC that utilized potato-process wastewater as substrate. Terminal Restriction Fragment Length Polymorphism (T-RFLP) results indicated that the bacterial communities on the anode, cathode, control electrode, and MFC bulk fluid were similar, but differed dramatically from that of the anaerobic domestic sludge and potato wastewater inoculum. The 16S rDNA sequencing results showed that microbial species detected on the anode were predominantly within the phyla of Proteobacteria, Firmicutes, and Bacteroidetes. Fluorescent microscopy results indicated that there was a clear enhancement of biofilm formation on the anode. Results of this study could help improve understanding of the complexity of microbial communities and optimize the microbial composition for generating electricity by MFCs that utilize potato wastewater.

  9. Ecotoxicological risks associated with tannery effluent wastewater.

    Science.gov (United States)

    Shakir, Lubna; Ejaz, Sohail; Ashraf, Muhammad; Qureshi, Naureen Aziz; Anjum, Aftab Ahmad; Iltaf, Imran; Javeed, Aqeel

    2012-09-01

    The problem of water pollution acquires greater relevance in the context of a developing agrarian economy like Pakistan. Even though, the leather industry is a leading economic sector in Pakistan, there is an increasing environmental concern regarding tanneries because they produce large amounts of potentially toxic wastewater containing both trivalent and hexavalent chromium, which are equally hazardous for human population, aquaculture and agricultural activities in the area. Therefore, we defined the scope of the present study as to employ different bioassays to determine the eco-toxic potential of tannery effluent wastewater (TW) and its chromium based components, i.e., potassium dichromate (K(2)Cr(2)O(7)) and chromium sulfate Cr(2)(SO(4))(3). Particle-induced X-ray emission (PIXE) analysis of TW was carried out to determine the concentration of chromium in TW and then equal concentrations of hexavalent (K(2)Cr(2)O(7)) and trivalent chromium Cr(2)(SO(4))(3) were obtained for this study. Cytotoxicity assay, artemia bioassay and phytotoxicity assay was utilized to investigate the eco-toxicological potential of different concentrations of TW, K(2)Cr(2)O(7) and Cr(2)(SO(4))(3). All the dilutions of TW, K(2)Cr(2)O(7) and Cr(2)(SO(4))(3) presented concentration dependent cytotoxic effects in these assays. The data clearly represents that among all three tested materials, different dilutions of K(2)Cr(2)O(7) caused significantly more damage (Pindustry that can obliterate ecosystem surrounding the tanneries. Crown Copyright © 2012. Published by Elsevier B.V. All rights reserved.

  10. Feasibility study for alternate fuels production: unconventional natural gas from wastewater treatment plants. Volume II, Appendix D. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Overly, P.; Tawiah, K.

    1981-12-01

    Data are presented from a study performed to determined the feasibility of recovering methane from sewage at a typical biological secondary wastewater treatment plant. Three tasks are involved: optimization of digester gas; digester gas scrubbing; and application to the East Bay Municipal Utility District water pollution control plant. Results indicate that excess digester gas can be used economically at the wastewater treatment plant and that distribution and scrubbing can be complex and costly. (DMC) 193 references, 93 figures, 26 tables.

  11. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  12. Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Flach, G. P. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2015-05-12

    Recent Special Analysis modeling of Saltstone Disposal Units consider sulfate attack on concrete and utilize degradation rates estimated from Cementitious Barriers Partnership software simulations. This study provides an independent verification of those simulation results using an alternative analysis method and an independent characterization data source. The sulfate penetration depths estimated herein are similar to the best-estimate values in SRNL-STI-2013-00118 Rev. 2 and well below the nominal values subsequently used to define Saltstone Special Analysis base cases.

  13. Attack or retreat: contrasted defensive tactics used by Cyprian honeybee colonies under attack from hornets.

    Science.gov (United States)

    Papachristoforou, Alexandros; Rortais, Agnès; Sueur, Jérôme; Arnold, Gérard

    2011-02-01

    This study describes the tactics used by Cyprian honeybees (Apis mellifera cypria) to defend their colonies against hornet (Vespa orientalis orientalis) attacks. We use simulated hornet attacks and a combination of video recordings and image analysis to reveal, for the first time, contrasted intra-subspecies defensive tactics that operate at the colony level during predation. In some colonies, when attacked, the numbers of guards at the hive entrance increases rapidly to attack, engulf, and kill invading hornets. In other colonies, guards avoid conflicts with hornets by retreating gradually and by forming a defensive line of honeybees at the hive entrance. Retreater colonies have propolis walls at the hive entrances with small apertures that are too narrow to allow the hornet to access the hive and that therefore reinforces entrance protection. On the contrary, attacker colonies have propolis walls with large openings through which the hornet can pass; these bees block the hornet's access by intensively guarding the hive entrance. We experimentally destroy propolis walls to test whether colonies consistently rebuild walls with the same intrinsic characteristics and we also monitor the survival rate of each anti-predator tactic after massive natural predation by hornets. Copyright © 2010 Elsevier B.V. All rights reserved.

  14. Bioavailability of dissolved organic nitrogen (DON) in wastewaters from animal feedlots and storage lagoons.

    Science.gov (United States)

    Sun, Jingyi; Khan, Eakalak; Simsek, Senay; Ohm, Jae-Bom; Simsek, Halis

    2017-11-01

    Dissolved organic nitrogen (DON) from animal wastes can contribute to pollution of surface waters. Bioavailable DON (ABDON) is a portion of DON utilized by algae with or without bacteria. This study determined DON and ABDON levels in animal wastewater collected from two different sources: an animal feedlot wastewater storage tank and a sheep wastewater storage lagoon. Inocula for the ABDON bioassays were comprised of individual species and several combinations involving two algae (Chlamydomonas reinhardtii and Chlorella vulgaris) and a mixed liquor suspended solids (MLSS) bacterial culture. The ratio of initial DON to initial total dissolved nitrogen was 18% in the feedlot wastewater samples and 70% in the lagoon wastewater samples. The results showed that between 1.6 and 4.5 mg-NL-1 DON (45-79% of initial DON) in the feedlot samples and between 3.4 and 7.5 mg-NL-1 DON (36%-79% of initial DON) in the lagoon samples were bioavailable with the inocula tested. These results suggest that when considering eutrophication potential of livestock wastewater, organic nitrogen should be included in addition to the obvious culprits, ammonia and nitrate. Copyright © 2017 Elsevier Ltd. All rights reserved.

  15. Microbial Electrolytic Carbon Capture for Carbon Negative and Energy Positive Wastewater Treatment.

    Science.gov (United States)

    Lu, Lu; Huang, Zhe; Rau, Greg H; Ren, Zhiyong Jason

    2015-07-07

    Energy and carbon neutral wastewater management is a major goal for environmental sustainability, but current progress has only reduced emission rather than using wastewater for active CO2 capture and utilization. We present here a new microbial electrolytic carbon capture (MECC) approach to potentially transform wastewater treatment to a carbon negative and energy positive process. Wastewater was used as an electrolyte for microbially assisted electrolytic production of H2 and OH(-) at the cathode and protons at the anode. The acidity dissolved silicate and liberated metal ions that balanced OH(-), producing metal hydroxide, which transformed CO2 in situ into (bi)carbonate. Results using both artificial and industrial wastewater show 80-93% of the CO2 was recovered from both CO2 derived from organic oxidation and additional CO2 injected into the headspace, making the process carbon-negative. High rates and yields of H2 were produced with 91-95% recovery efficiency, resulting in a net energy gain of 57-62 kJ/mol-CO2 captured. The pH remained stable without buffer addition and no toxic chlorine-containing compounds were detected. The produced (bi)carbonate alkalinity is valuable for wastewater treatment and long-term carbon storage in the ocean. Preliminary evaluation shows promising economic and environmental benefits for different industries.

  16. Evaluation of different smoking habits during music festivals through wastewater analysis.

    Science.gov (United States)

    Mackuľak, Tomáš; Grabic, Roman; Gál, Marián; Gál, Miroslav; Birošová, Lucia; Bodík, Igor

    2015-11-01

    Wastewater analysis is a powerful method that can provide useful information about the abuse of legal and illicit drugs. The aim of our study was to determine nicotine consumption during four different music festivals and to find a connection between smoking and preferences for specific music styles using wastewater analysis. The amount of the nicotine metabolite cotinine was monitored in wastewater at the influent of three waste water treatment plants WWTPs in the Czech Republic and Slovakia, where the festivals took place. Urinary bio-markers of nicotine utilization were analyzed by LC-HRMS. More than 80,000 festival participants were monitored during our study from June to September 2014. A significant increase of nicotine consumption was observed in wastewaters during music festivals. The nicotine ingestion level was back-calculated and expressed as mass of pure drug consumed per day and per 1000 inhabitants for selected cities of both countries. The highest differences between typical levels of cotinine in wastewaters and the levels during music festivals were detected in Piešťany: 4 g/L/1000 inhabitants during non-festival days compared to 8 g/L/1000 inhabitants during the Topfest pop-rock festival and 6g/L/1000 inhabitants during the Grape dance festival. No significant increase of the amounts of cotinine in wastewater was recorded for the Country and Folk festivals. Copyright © 2015 Elsevier B.V. All rights reserved.

  17. Comparison of various advanced oxidation processes used in remediation of industrial wastewater laden with recalcitrant pollutants

    Science.gov (United States)

    Krishnan, S.; Rawindran, H.; Sinnathambi, C. M.; Lim, J. W.

    2017-06-01

    Due to the scarcity of water, it has become a necessity to improve the quality of wastewater that is discharged into the environment. Conventional wastewater treatment can be either a physical, chemical, and/or biological processes, or in some cases a combination of these operations. The main purpose of wastewater treatment is to eliminate nutrients, solids, and organic compounds from effluents. Current wastewater treatment technologies are deemed ineffective in the complete removal of pollutants, particularly organic matter. In many cases, these organic compounds are resistant to conventional treatment methods, thus creating the necessity for tertiary treatment. Advanced oxidation process (AOP), constitutes as a promising treatment technology for the management of wastewater. AOPs are characterised by a common chemical feature, where they utilize the highly reactive hydroxyl radicals for achieving complete mineralization of the organic pollutants into carbon dioxide and water. This paper delineates advanced oxidation processes currently used for the remediation of water and wastewater. It also provides the cost estimation of installing and running an AOP system. The costs are separated into three categories: capital, operational, and operating & maintenance.

  18. Using wastewater after lipid fermentation as substrate for bacterial cellulose production by Gluconacetobacter xylinus.

    Science.gov (United States)

    Huang, Chao; Guo, Hai-Jun; Xiong, Lian; Wang, Bo; Shi, Si-Lan; Chen, Xue-Fang; Lin, Xiao-Qing; Wang, Can; Luo, Jun; Chen, Xin-De

    2016-01-20

    In this study, lipid fermentation wastewater (fermentation broth after separation with yeast biomass) with high Chemical Oxygen Demand (COD) value of 25,591 mg/L was used as substrate for bacterial cellulose (BC) production by Gluconacetobacter xylinus for the first time. After 5 days of fermentation, the highest BC yield (0.659 g/L) was obtained. Both monosaccharide and polysaccharides present in lipid fermentation wastewater could be utilized by G. xylinus simultaneously during fermentation. By this bioconversion, 30.0% of COD could be removed after 10 days of fermentation and the remaining wastewater could be used for further BC fermentation. The crystallinity of BC samples in lipid fermentation wastewater increased gradually during fermentation but overall the environment of lipid fermentation wastewater showed small influence on BC structure by comparison with that in traditional HS medium by using FE-SEM, FTIR, and XRD. By this work, the possibility of using lipid fermentation wastewater containing low value carbohydrate polymer (extracellular polysaccharides) for high value carbohydrate polymer (BC) production was proven. Copyright © 2015 Elsevier Ltd. All rights reserved.

  19. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... components quickly results in a large quantity of interrelations, which are hard to grasp. In this work we present several approaches for visualising attributes of attacks such as likelihood of success, impact, and required time or skill level. The resulting visualisations provide a link between attacks...... on an organisations and the contribution of parts of an organisation to the attack and its impact....

  20. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  1. Biological wastewater treatment in brewhouses

    Directory of Open Access Journals (Sweden)

    Voronov Yuriy Viktorovich

    2014-03-01

    Full Text Available In the article the working principles of wastewater biological treatment for food companies is reviewed, including dairies and breweries, the waters of which are highly concentrated with dissolved organic contaminants and suspended solids. An example of successful implementation is anaerobic-aerobic treatment plants. Implementation of these treatment plants can achieve the required wastewater treatment at the lowest operational expenses and low volumes of secondary waste generated. Waste water from the food companies have high concentration of various organic contaminants (fats, proteins, starch, sugar, etc.. For such wastewater, high rates of suspended solids, grease and other contaminants are characteristic. Wastewater food industry requires effective purification flowsheets using biological treatment facilities. At the moment methods for the anaerobic-aerobic purification are applied. One of such methods is the treatment of wastewater at ASB-reactor (methane reactor and the further tertiary treatment on the OSB-reactor (aeration. Anaerobic process means water treatment processes in anoxic conditions. The anaerobic treatment of organic contamination is based on the process of methane fermentation - the process of converting substances to biogas. The role of biological effluent treatment is discussed with special attention given to combined anaerobic/aerobic treatment. Combining anaerobic pre-treatment with aerobic post-treatment integrates the advantages of both processes, amongst which there are reduced energy consumption (net energy production, reduced biological sludge production and limited space requirements. This combination allows for significant savings for operational costs as compared to complete aerobic treatment without compromising the required discharge standards. Anaerobic treatment is a proven and energy efficient method to treat industrial wastewater effluents. These days, more and more emphasis is laid on low energy use, a

  2. Web Forms and Untraceable DDoS Attacks

    Science.gov (United States)

    Jakobsson, Markus; Menczer, Filippo

    We analyze a Web vulnerability that allows an attacker to perform an email-based attack on selected victims, using standard scripts and agents. What differentiates the attack we describe from other, already known forms of distributed denial of service (DDoS) attacks is that an attacker does not need to infiltrate the network in any manner - as is normally required to launch a DDoS attack. Thus, we see this type of attack as a poor man's DDoS. Not only is the attack easy to mount, but it is also almost impossible to trace back to the perpetrator. Along with descriptions of our attack, we demonstrate its destructive potential with (limited and contained) experimental results. We illustrate the potential impact of our attack by describing how an attacker can disable an email account by flooding its inbox; block competition during on-line auctions; harm competitors with an on-line presence; disrupt phone service to a given victim; disconnect mobile corporate leaders from their networks; and disrupt electronic elections. Finally, we propose a set of countermeasures that are light-weight, do not require modifications to the infrastructure, and can be deployed in a gradual manner.

  3. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2017-11-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  4. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  5. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  6. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  7. Olive mill wastewater membrane filtration fraction: Drying techniques and quality assessment of the dried product (abstract)

    Science.gov (United States)

    A current trend in olive mill wastewater (OMWW) management is to not only decrease environmental pollution but also utilize valuable co-products. Recovery of phenolics from OMWW could help olive oil processors add value to their co-product, increasing the sustainability of olive oil production. The ...

  8. Oxidative Mineralization and Characterization of Polyvinyl Alcohol Solutions for Wastewater Treatment

    Energy Technology Data Exchange (ETDEWEB)

    Oji, L.N.

    1999-08-31

    The principal objectives of this study are to identify an appropriate polyvinyl alcohol (PVA) oxidative mineralization technique, perform compatibility and evaporation fate tests for neat and mineralized PVA, and determine potential for PVA chemical interferences which may affect ion exchange utilization for radioactive wastewater processing in the nuclear industry.

  9. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

    Directory of Open Access Journals (Sweden)

    Yang Lu

    2014-01-01

    Full Text Available Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.

  10. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  11. Feasibility of fly ash-based composite coagulant for coal washing wastewater treatment

    Energy Technology Data Exchange (ETDEWEB)

    Yan, Long, E-mail: ylyanlong@126.com [School of Chemistry and Chemical Engineering, Yulin University, Yulin, 719000 (China); Institute of Energy Chemistry, School of Chemistry and Chemical Engineering, Shaanxi Normal University, Xi' an, 710062 (China); Key Laboratory of Applied Surface and Colloid Chemistry, Shaanxi Normal University, Ministry of Education, Xi' an, 710062 (China); Wang, Yufei [School of Chemistry and Chemical Engineering, Yulin University, Yulin, 719000 (China); Ma, Hongzhu, E-mail: hzmachem@snnu.edu.cn [Institute of Energy Chemistry, School of Chemistry and Chemical Engineering, Shaanxi Normal University, Xi' an, 710062 (China); Key Laboratory of Applied Surface and Colloid Chemistry, Shaanxi Normal University, Ministry of Education, Xi' an, 710062 (China); Han, Zhiping; Zhang, Qiang [School of Chemistry and Chemical Engineering, Yulin University, Yulin, 719000 (China); Chen, Yashao [Institute of Energy Chemistry, School of Chemistry and Chemical Engineering, Shaanxi Normal University, Xi' an, 710062 (China); Key Laboratory of Applied Surface and Colloid Chemistry, Shaanxi Normal University, Ministry of Education, Xi' an, 710062 (China)

    2012-02-15

    Highlights: Black-Right-Pointing-Pointer Coal washing wastewater was analyzed. Black-Right-Pointing-Pointer Several fly ash-based composite coagulants were prepared to treat coal washing wastewater. Black-Right-Pointing-Pointer The effluent with the high COD and SS removal was obtained after treatment. - Abstract: In this study, several fly ash (FA)-based composite coagulants, leached by hydrochloric acid, were prepared to treat coal washing wastewater. The concentrations of Al{sup 3+} and Fe{sup 2+}/Fe{sup 3+} in the leachates and coagulants were analyzed, and optimal experimental conditions, including coagulant dosage and initial pH, were determined using various analytical techniques (scanning electron microscopy, energy dispersive spectrometry, X-ray diffraction (XRD), X-ray fluorescence (XRF), particle-size analysis, zeta potential, pH and conductivity measurements). A suspended solids (SS) and chemical oxygen demand (COD) removal efficiency from the effluent treated by one of the coagulants reached 99.61% and 96.48%, respectively, at dosages of 10 g l{sup -1} (initial pH of 9, adjusted by CaO). This indicates that the coagulant was an effective agent for coal washing wastewater treatment, and that the leached Al{sup 3+} and Fe{sup 3+} and introduced Ca{sup 2+} may have improved the coagulation process. Analysis of the dry sludge composition and slurry particle size distribution of the coal washing wastewater showed that charged colloidal particles and the fine particle distribution in the coal washing wastewater make the wastewater treatment a difficult process. Results from this study could provide a novel approach for the treatment of coal washing wastewater and coal fly ash utilization.

  12. Removal of Arsenic from Wastewaters by Airlift Electrocoagulation: Part 3: Copper Smelter Wastewater Treatment

    DEFF Research Database (Denmark)

    Hansen, H.K.; Ottosen, Lisbeth M.

    2010-01-01

    The arsenic content in wastewater is of major concern for copper smelters. A typical complex wastewater treatment is needed with a combination of chemical and physical processes. Electrocoagulation (EC) has shown its potential for arsenic removal due to the formation of ferric hydroxide-arsenate ......The arsenic content in wastewater is of major concern for copper smelters. A typical complex wastewater treatment is needed with a combination of chemical and physical processes. Electrocoagulation (EC) has shown its potential for arsenic removal due to the formation of ferric hydroxide......-arsenate precipitates. This work evaluates the feasibility of EC as a treatment process at various stages during conventional copper smelter wastewater treatment - with a focus on arsenic. The reactor used is a batch airlift electrocoagulator. The results showed that raw copper smelter wastewater was difficult to treat...... threshold value for wastewater discharge could rapidly be reached when the conventional method did not clean the wastewater sufficiently....

  13. Explosive attack: Lessons learned in Seyed Al Shohada mosque attack, April 2008, Shiraz, Iran

    Directory of Open Access Journals (Sweden)

    Shahram Paydar

    2012-01-01

    Full Text Available Introduction: The threat of explosive attacks has become a worldwide problem. Bombing is the preferred method of attacks. These attacks result in specific physical and psychiatric trauma. In this paper, we present an epidemiologic description of the physical injuries of patients who survived the explosive attack in Seyed Al Shohada mosque April 2008 Shiraz, Iran. Materials and Methods: All medical records of the patients admitted at Shiraz Hospitals on April 2008 due to Seyed Al Shohada mosque bombing attacks, Shiraz, Iran, were reviewed. Results: A total of 202 patients were referred to the hospitals over 24 h following the terrorist attack. One hundred sixty-four patients were admitted for short periods of observation (<24 h. Thirty-eight patients needed more than 1 day of hospitalization. The mean age of the patients was 26.2 (range 2 to 51 years. One hundred thirty-five (66.8% patients were males. Twenty-six (12.8% were children. Burn was the most prevalent cause of admission. Five (13.5% patients needed chest tube insertion and eight (21% needed skin grafts due to burn. Overall, 12 patients expired (5%. Three (25% of them were children (2 and 6, and 11 years old. Mortality rate was significantly higher among the children than adults (P value <0.05. The most important cause of death was head trauma which was seen in five (41.6% of the expired patients followed by burn (including air way burn in four (33%, and internal bleeding in three (25%. Patients with head trauma had significantly a higher rate of mortality than other patients (P value <0.05. Discussion: Following a bombing attack, numerous victims were brought to the emergency unit suffering from a combination of multi-organ injuries caused by the blast, penetrating injuries caused by shrapnel and other debris, and burns. It is important for a physician to be familiar with the clinical features and treatments of explosive attacks victims. Early management of patients at the scene and

  14. Quantum attacks on public-key cryptosystems

    CERN Document Server

    Yan, Song Y

    2013-01-01

    The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.Quantum Attacks on Public-Key Cryptosystems presemts almost all?known quantum comput

  15. History of transient ischemic attack definition.

    Science.gov (United States)

    Mohr, Jay P

    2014-01-01

    Transient ischemic attacks have been recognized as a clinical entity for well over a century. Efforts before the availability of modern imaging to establish a diagnosis of inferred ischemic stroke led to acceptance of too long a time period (>24 h) compared with the actual typical events lasting <24 min (usually 5-15 min). Revision of the time period has improved diagnostic yield and discovered many whose image-documented acute infarct is associated with a short clinical course. Copyright © 2014 S. Karger AG, Basel.

  16. Opportunities for Open Automated Demand Response in Wastewater Treatment Facilities in California - Phase II Report. San Luis Rey Wastewater Treatment Plant Case Study

    Energy Technology Data Exchange (ETDEWEB)

    Thompson, Lisa; Lekov, Alex; McKane, Aimee; Piette, Mary Ann

    2010-08-20

    This case study enhances the understanding of open automated demand response opportunities in municipal wastewater treatment facilities. The report summarizes the findings of a 100 day submetering project at the San Luis Rey Wastewater Treatment Plant, a municipal wastewater treatment facility in Oceanside, California. The report reveals that key energy-intensive equipment such as pumps and centrifuges can be targeted for large load reductions. Demand response tests on the effluent pumps resulted a 300 kW load reduction and tests on centrifuges resulted in a 40 kW load reduction. Although tests on the facility?s blowers resulted in peak period load reductions of 78 kW sharp, short-lived increases in the turbidity of the wastewater effluent were experienced within 24 hours of the test. The results of these tests, which were conducted on blowers without variable speed drive capability, would not be acceptable and warrant further study. This study finds that wastewater treatment facilities have significant open automated demand response potential. However, limiting factors to implementing demand response are the reaction of effluent turbidity to reduced aeration load, along with the cogeneration capabilities of municipal facilities, including existing power purchase agreements and utility receptiveness to purchasing electricity from cogeneration facilities.

  17. Fracking, wastewater disposal, and earthquakes

    Science.gov (United States)

    McGarr, Arthur

    2016-03-01

    In the modern oil and gas industry, fracking of low-permeability reservoirs has resulted in a considerable increase in the production of oil and natural gas, but these fluid-injection activities also can induce earthquakes. Earthquakes induced by fracking are an inevitable consequence of the injection of fluid at high pressure, where the intent is to enhance permeability by creating a system of cracks and fissures that allow hydrocarbons to flow to the borehole. The micro-earthquakes induced during these highly-controlled procedures are generally much too small to be felt at the surface; indeed, the creation or reactivation of a large fault would be contrary to the goal of enhancing permeability evenly throughout the formation. Accordingly, the few case histories for which fracking has resulted in felt earthquakes have been due to unintended fault reactivation. Of greater consequence for inducing earthquakes, modern techniques for producing hydrocarbons, including fracking, have resulted in considerable quantities of coproduced wastewater, primarily formation brines. This wastewater is commonly disposed by injection into deep aquifers having high permeability and porosity. As reported in many case histories, pore pressure increases due to wastewater injection were channeled from the target aquifers into fault zones that were, in effect, lubricated, resulting in earthquake slip. These fault zones are often located in the brittle crystalline rocks in the basement. Magnitudes of earthquakes induced by wastewater disposal often exceed 4, the threshold for structural damage. Even though only a small fraction of disposal wells induce earthquakes large enough to be of concern to the public, there are so many of these wells that this source of seismicity contributes significantly to the seismic hazard in the United States, especially east of the Rocky Mountains where standards of building construction are generally not designed to resist shaking from large earthquakes.

  18. Evaluation of Alternative Methods for Wastewater Disinfection

    Science.gov (United States)

    1994-09-01

    viruses in water and wastewater (Trojan, undated:l). Used properly, ultraviolet light can effectively destroy bacteria, viruses, algae and other...highly effective in disinfecting wastewaters of an industrial nature and viable for medium to large plants, where purified oxygen is readily available or...Alternatives This appendix provides information and cost data obtained from vendors in the wastewater disinfection industry . This data is provided for

  19. Measuring the efficiency of wastewater services through Data Envelopment Analysis.

    Science.gov (United States)

    Guerrini, A; Romano, G; Leardini, C; Martini, M

    2015-01-01

    Efficient water management is a priority in the European Union, since the operational efficiency of many water utilities is very low compared to best practice. Several countries are restructuring the water industry to save costs. Larger-scale operations and vertical integration are promoted to achieve scale and scope economies; however, the literature is not unanimous that such economies exist. There is also little evidence of the effect of customer density on costs. This article offers some insights into this matter, analysing the Danish water industry by a two-stage Data Envelopment Analysis approach to investigate the effects of size, scope and density in the wastewater industry. The results show that the Danish wastewater industry is positively affected by vertical integration and higher population density: firms that serve more than 100 person per km of sewer and combine water and wastewater services achieve better efficiency. Size does not have any significant influence on global efficiency, although technical pure efficiency decreases statistically with firm size.

  20. Energy and air emission implications of a decentralized wastewater system

    Science.gov (United States)

    Shehabi, Arman; Stokes, Jennifer R.; Horvath, Arpad

    2012-06-01

    Both centralized and decentralized wastewater systems have distinct engineering, financial and societal benefits. This paper presents a framework for analyzing the environmental effects of decentralized wastewater systems and an evaluation of the environmental impacts associated with two currently operating systems in California, one centralized and one decentralized. A comparison of energy use, greenhouse gas emissions and criteria air pollutants from the systems shows that the scale economies of the centralized plant help lower the environmental burden to less than a fifth of that of the decentralized utility for the same volume treated. The energy and emission burdens of the decentralized plant are reduced when accounting for high-yield wastewater reuse if it supplants an energy-intensive water supply like a desalination one. The centralized facility also reduces greenhouse gases by flaring methane generated during the treatment process, while methane is directly emitted from the decentralized system. The results are compelling enough to indicate that the life-cycle environmental impacts of decentralized designs should be carefully evaluated as part of the design process.

  1. Disinfection of Ebola Virus in Sterilized Municipal Wastewater.

    Directory of Open Access Journals (Sweden)

    Kyle Bibby

    2017-02-01

    Full Text Available Concerns have been raised regarding handling of Ebola virus contaminated wastewater, as well as the adequacy of proposed disinfection approaches. In the current study, we investigate the inactivation of Ebola virus in sterilized domestic wastewater utilizing sodium hypochlorite addition and pH adjustment. No viral inactivation was observed in the one-hour tests without sodium hypochlorite addition or pH adjustment. No virus was recovered after 20 seconds (i.e. 4.2 log10 unit inactivation to detection limit following the addition of 5 and 10 mg L-1 sodium hypochlorite, which resulted in immediate free chlorine residuals of 0.52 and 1.11 mg L-1, respectively. The addition of 1 mg L-1 sodium hypochlorite resulted in an immediate free chlorine residual of 0.16 mg L-1, which inactivated 3.5 log10 units of Ebola virus in 20 seconds. Further inactivation was not evident due to the rapid consumption of the chlorine residual. Elevating the pH to 11.2 was found to significantly increase viral decay over ambient conditions. These results indicate the high susceptibility of the enveloped Ebola virus to disinfection in the presence of free chlorine in municipal wastewater; however, we caution that extension to more complex matrices (e.g. bodily fluids will require additional verification.

  2. Process model economics of xanthan production from confectionery industry wastewaters.

    Science.gov (United States)

    Bajić, Bojana Ž; Vučurović, Damjan G; Dodić, Siniša N; Grahovac, Jovana A; Dodić, Jelena M

    2017-12-01

    In this research a process and cost model for a xanthan production facility was developed using process simulation software (SuperPro Designer ® ). This work represents a novelty in the field for two reasons. One is that xanthan gum has been produced from several wastes but never from wastewaters from confectionery industries. The other more important is that the aforementioned software, which in intended exclusively for bioprocesses, is used for generating a base case, i.e. starting point for transferring the technology to industrial scales. Previously acquired experimental knowledge about using confectionery wastewaters from five different factories as substitutes for commercially used cultivation medium have been incorporated into the process model in order to obtain an economic viability of implementing such substrates. A lower initial sugar content in the medium based on wastewater (28.41 g/L) compared to the synthetic medium (30.00 g/L) gave a lower xanthan content at the end of cultivation (23.98 and 26.27 g/L, respectively). Although this resulted in somewhat poorer economic parameters, they were still in the range of being an investment of interest. Also the possibility of utilizing a cheap resource (waste) and reducing pollution that would result from its disposal has a positive effect on the environment. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. LAW CAPACITY WASTEWATER TREATMENT PLANTS

    Directory of Open Access Journals (Sweden)

    Nicoleta Luminiţa Jurj

    2012-01-01

    Full Text Available The question of small water users having no centralized wastewater collecting, cleaning and discharging system is of maximal actuality in Romania. Therefor economically efficient solutions are looked for. For disperse mountain villages, farms, or detached households traditional systems, with high maintenance expences because of long networks for small flows, can be economicaly not advantageos. Very small capacity treatement plants are a solution for such cases. The aim of the experimental part of the present work is to simulate situations, damages which can occur during running of a low capacity wastewater treatement plant. Low capacity hosehold wastewater treatement plants are economic alternatives which remove the disadvantages of emptyable basins namely the high costs, the frequvent empying operations, with unpleasant smelling, continous danger of groundwater infection, need for massive and expensive concrete buildings. The proposed plants are based on a classical treatement technology and need emptying of the exess mud only once or twice a year. In opposition with the case of classical plants, the mixture extracted from the proposed low cost systems does not smell and has a relatively low content of solid matter.

  4. 40 CFR 63.133 - Process wastewater provisions-wastewater tanks.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 9 2010-07-01 2010-07-01 false Process wastewater provisions-wastewater tanks. 63.133 Section 63.133 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED... Chemical Manufacturing Industry for Process Vents, Storage Vessels, Transfer Operations, and Wastewater...

  5. 40 CFR Table 10 to Subpart G of... - Wastewater-Compliance Options for Wastewater Tanks

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 9 2010-07-01 2010-07-01 false Wastewater-Compliance Options for Wastewater Tanks 10 Table 10 to Subpart G of Part 63 Protection of Environment ENVIRONMENTAL PROTECTION... Wastewater Pt. 63, Subpt. G, Table 10 Table 10 to Subpart G of Part 63—Wastewater—Compliance Options for...

  6. A Probabilistic Approach to Mitigate Composition Attacks on Privacy in Non-Coordinated Environments.

    Science.gov (United States)

    Sarowar Sattar, A H M; Li, Jiuyong; Liu, Jixue; Heatherly, Raymond; Malin, Bradley

    2014-09-01

    Organizations share data about individuals to drive business and comply with law and regulation. However, an adversary may expose confidential information by tracking an individual across disparate data publications using quasi-identifying attributes (e.g., age, geocode and sex) associated with the records. Various studies have shown that well-established privacy protection models (e.g., k -anonymity and its extensions) fail to protect an individual's privacy against this "composition attack". This type of attack can be thwarted when organizations coordinate prior to data publication, but such a practice is not always feasible. In this paper, we introduce a probabilistic model called ( d , α)-linkable, which mitigates composition attack without coordination. The model ensures that d confidential values are associated with a quasi-identifying group with a likelihood of α. We realize this model through an efficient extension to k -anonymization and use extensive experiments to show our strategy significantly reduces the likelihood of a successful composition attack and can preserve more utility than alternative privacy models, such as differential privacy.

  7. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version.

    Science.gov (United States)

    Babu, M Rajesh; Dian, S Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things.

  8. Wastewater treatment: options for Louisiana seafood processors

    National Research Council Canada - National Science Library

    Zachritz, W.H; Malone, R.F

    1991-01-01

    ...) to define the environmental regulatory requirements that apply to seafood processors; 3) to catalog available historical data for describing the wastewaters of major Louisiana seafood processors, and 4...

  9. [Diagnosis, pathogenesis and treatment of panic attacks].

    Science.gov (United States)

    Turczyński, J

    Panic accompanies several diseases both psychological and somatic. It may be secondary, i.e. produced by other symptoms and morbid processes. It may also be primary--"neurotic". In such cases there are two forms of panic: generalized and paroxysmal. Attacks of panic are seen in 1.6-2.9% of women and in 0.4-1.7% of men. Main pathogenetic role is played by the psychologic factors (psychical trauma precedes the onset of diseases). The role of biological factors is also important. It is believed that disorders of the noradrenergic, serotonin-ergic, and GABA-ergic transmission may produce the attacks of panic. Psychotherapy is a treatment of choice. Pharmacotherapy plays only an adjuvant role. Antidepressants (tricyclic of II generation) are most frequently used for this purpose and--exceptionally due to possible addiction--benzodiazepines. The highest impact on the development of disease has first contact physician attitude. Patient and thoughtful listening to the patient, explanation of the complaints and their source often produce and improvement, and even complete recovery.

  10. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  11. On Realistically Attacking Tor with Website Fingerprinting

    Directory of Open Access Journals (Sweden)

    Wang Tao

    2016-10-01

    Full Text Available Website fingerprinting allows a local, passive observer monitoring a web-browsing client’s encrypted channel to determine her web activity. Previous attacks have shown that website fingerprinting could be a threat to anonymity networks such as Tor under laboratory conditions. However, there are significant differences between laboratory conditions and realistic conditions. First, in laboratory tests we collect the training data set together with the testing data set, so the training data set is fresh, but an attacker may not be able to maintain a fresh data set. Second, laboratory packet sequences correspond to a single page each, but for realistic packet sequences the split between pages is not obvious. Third, packet sequences may include background noise from other types of web traffic. These differences adversely affect website fingerprinting under realistic conditions. In this paper, we tackle these three problems to bridge the gap between laboratory and realistic conditions for website fingerprinting. We show that we can maintain a fresh training set with minimal resources. We demonstrate several classification-based techniques that allow us to split full packet sequences effectively into sequences corresponding to a single page each. We describe several new algorithms for tackling background noise. With our techniques, we are able to build the first website fingerprinting system that can operate directly on packet sequences collected in the wild.

  12. Quantitative Method for Network Security Situation Based on Attack Prediction

    Directory of Open Access Journals (Sweden)

    Hao Hu

    2017-01-01

    Full Text Available Multistep attack prediction and security situation awareness are two big challenges for network administrators because future is generally unknown. In recent years, many investigations have been made. However, they are not sufficient. To improve the comprehensiveness of prediction, in this paper, we quantitatively convert attack threat into security situation. Actually, two algorithms are proposed, namely, attack prediction algorithm using dynamic Bayesian attack graph and security situation quantification algorithm based on attack prediction. The first algorithm aims to provide more abundant information of future attack behaviors by simulating incremental network penetration. Through timely evaluating the attack capacity of intruder and defense strategies of defender, the likely attack goal, path, and probability and time-cost are predicted dynamically along with the ongoing security events. Furthermore, in combination with the common vulnerability scoring system (CVSS metric and network assets information, the second algorithm quantifies the concealed attack threat into the surfaced security risk from two levels: host and network. Examples show that our method is feasible and flexible for the attack-defense adversarial network environment, which benefits the administrator to infer the security situation in advance and prerepair the critical compromised hosts to maintain normal network communication.

  13. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  14. Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc); D. Shumow

    2017-01-01

    textabstractCounter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was introduced by Stevens at CRYPTO 2013 [22] with a hash collision detection algorithm. That is, an algorithm that detects whether a given single message is part of a colliding message

  15. Comprehensive techno-economic analysis of wastewater-based algal biofuel production: A case study.

    Science.gov (United States)

    Xin, Chunhua; Addy, Min M; Zhao, Jinyu; Cheng, Yanling; Cheng, Sibo; Mu, Dongyan; Liu, Yuhuan; Ding, Rijia; Chen, Paul; Ruan, Roger

    2016-07-01

    Combining algae cultivation and wastewater treatment for biofuel production is considered the feasible way for resource utilization. An updated comprehensive techno-economic analysis method that integrates resources availability into techno-economic analysis was employed to evaluate the wastewater-based algal biofuel production with the consideration of wastewater treatment improvement, greenhouse gases emissions, biofuel production costs, and coproduct utilization. An innovative approach consisting of microalgae cultivation on centrate wastewater, microalgae harvest through flocculation, solar drying of biomass, pyrolysis of biomass to bio-oil, and utilization of co-products, was analyzed and shown to yield profound positive results in comparison with others. The estimated break even selling price of biofuel ($2.23/gallon) is very close to the acceptable level. The approach would have better overall benefits and the internal rate of return would increase up to 18.7% if three critical components, namely cultivation, harvest, and downstream conversion could achieve breakthroughs. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. [Electricity generation and contaminants degradation performances of a microbial fuel cell fed with Dioscorea zingiberensis wastewater].

    Science.gov (United States)

    Li, Hui; Zhu, Xiu-Ping; Xu, Nan; Ni, Jin-Ren

    2011-01-01

    The electricity generation performance of a microbial fuel cell (MFC) utilizing Dioscorea zingiberensis wastewater was studied with an H-shape reactor. Indexes including pH, conductivity, oxidation peak potential and chemical oxygen demand (COD) of the anolyte were monitored to investigate the contaminants degradation performance of the MFC during the electricity generation process, besides, contaminant ingredients in anodic influent and effluent were analyzed by GC-MS and IR spectra as well. The maximum power density of the MFC could achieve 118.1 mW/m2 and the internal resistance was about 480 omega. Connected with a 1 000 omega external resistance, the output potential was about 0.4 V. Fed with 5 mL Dioscorea zingiberensis wastewater, the electricity generation lasted about 133 h and the coulombic efficiency was about 3.93%. At the end of electricity generation cycle, COD decreased by 90.1% while NH4(+) -N decreased by 66.8%. Furfural compounds, phenols and some other complicated organics could be decomposed and utilized in the electricity generation process, and the residual contaminants in effluent included some long-chain fatty acids, esters, ethers, and esters with benzene ring, cycloalkanes, cycloolefins, etc. The results indicate that MFC, which can degrade and utilize the organic contaminants in Dioscorea zingiberensis wastewater simultaneously, provides a new approach for resource recovery treatment of Dioscorea zingiberensis wastewater.

  17. Variability of clinical features in attacks of migraine with aura

    DEFF Research Database (Denmark)

    Hansen, Jakob M; Goadsby, Peter J; Charles, Andrew C

    2016-01-01

    BACKGROUND: There is significant variability in the clinical presentation of migraine, both among patients, and between attacks in an individual patient. We examined clinical features of migraine with aura in a large group of patients enrolled in a clinical trial, and compared retrospective...... migraine attack characteristics reported upon enrollment in the trial with those recorded prospectively in the trial. METHODS: Patients with migraine (n = 267) with typical visual aura in more than 30% of their attacks were enrolled from 16 centers for a clinical trial. Upon enrollment, patients provided...... a detailed retrospective description of the clinical features of their attacks of migraine. During the trial, clinical symptoms in migraine attacks starting with aura were recorded prospectively in 861 attacks. RESULTS: Retrospectively reported visual aura symptoms were variable and often overlapping...

  18. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Honglong Chen

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  19. Relating Admissibility Standards for Digital Evidence to Attack Scenario Reconstruction

    Directory of Open Access Journals (Sweden)

    Changwei Liu

    2014-09-01

    Full Text Available Attackers tend to use complex techniques such as combining multi-step, multi-stage attack with anti-forensic tools to make it difficult to find incriminating evidence and reconstruct attack scenarios that can stand up to the expected level of evidence admissibility in a court of law. As a solution, we propose to integrate the legal aspects of evidence correlation into a Prolog based reasoner to address the admissibility requirements by creating most probable attack scenarios that satisfy admissibility standards for substantiating evidence. Using a prototype implementation, we show how evidence extracted by using forensic tools can be integrated with legal reasoning to reconstruct network attack scenarios. Our experiment shows this implemented reasoner can provide pre-estimate of admissibility on a digital crime towards an attacked network.

  20. Maintaining defender's reputation in anomaly detection against insider attacks.

    Science.gov (United States)

    Zhang, Nan; Yu, Wei; Fu, Xinwen; Das, Sajal K

    2010-06-01

    We address issues related to establishing a defender's reputation in anomaly detection against two types of attackers: 1) smart insiders, who learn from historic attacks and adapt their strategies to avoid detection/punishment, and 2) naïve attackers, who blindly launch their attacks without knowledge of the history. In this paper, we propose two novel algorithms for reputation establishment--one for systems solely consisting of smart insiders and the other for systems in which both smart insiders and naïve attackers are present. The theoretical analysis and performance evaluation show that our reputation-establishment algorithms can significantly improve the performance of anomaly detection against insider attacks in terms of the tradeoff between detection and false positives.

  1. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  2. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  3. Simultaneous biohydrogen production and wastewater treatment in biofilm configured anaerobic periodic discontinuous batch reactor using distillery wastewater

    Energy Technology Data Exchange (ETDEWEB)

    Venkata Mohan, S.; Mohanakrishna, G.; Ramanaiah, S.V.; Sarma, P.N. [Bioengineering and Environmental Centre, Indian Institute of Chemical Technology, Hyderabad 500007 (India)

    2008-01-15

    Biohydrogen (H{sub 2}) production with simultaneous wastewater treatment was studied in anaerobic sequencing batch biofilm reactor (AnSBBR) using distillery wastewater as substrate at two operating pH values. Selectively enriched anaerobic mixed consortia sequentially pretreated with repeated heat-shock (100{sup o}C; 2 h) and acid (pH -3.0; 24 h) methods, was used as parent inoculum to startup the bioreactor. The reactor was operated at ambient temperature (28{+-}2 {sup circle} C) with detention time of 24 h in periodic discontinuous batch mode. Experimental data showed the feasibility of hydrogen production along with substrate degradation with distillery wastewater as substrate. The performance of the reactor was found to be dependent on the operating pH. Adopted acidophilic microenvironment (pH 6.0) favored H{sub 2} production (H{sub 2} production rate - 26 mmol H{sub 2}/day; specific H{sub 2} production - 6.98 mol H{sub 2}/kg COD{sub R}-day) over neutral microenvironment (H{sub 2} production rate - 7 mmol H{sub 2}/day; specific H{sub 2} production - 1.63 mol H{sub 2}/kg COD{sub R}-day). However, COD removal efficiency was found to be effective in operated neutral microenvironment (pH 7 - 69.68%; pH 6.0 - 56.25%). The described process documented the dual benefit of renewable energy generation in the form of H{sub 2} with simultaneous wastewater treatment utilizing it as substrate. (author)

  4. Efficacy of intravenous magnesium sulfate in severe migraine attacks

    OpenAIRE

    Zidverc-Trajkovi?, Jasna; Pavlovi?, Aleksandra M.; Jovanovi?, Zagorka; ?terni?, Nade?da; Kosti?, Vladimir S.

    2001-01-01

    The aim of this open study was to make a preliminary estimate of the efficacy and tolerability of intravenously administered magnesium sulfate (1 g) in comparison to subcutaneously administered sumatriptan in the treatment of severe migraine attacks. The study comprised 22 consecutive patients whose attacks were treated with magnesium sulfate (5 ml of a 20% solution), and the results were compared with those of another group of 14 consecutive patients whose attacks were treated with sumatript...

  5. Execute-Only Attacks against Execute-Only Defenses

    Science.gov (United States)

    2016-02-18

    webservers, the attack vectors that can be used to cause memory corruption in databases are not obvious. These systems usually serve as back-ends to public...attacks that have been widely used to bypass randomization-based memory corruption defenses. A recent technique, Readactor, provides one of the... corruption defenses with various impacts. We analyze the prevalence of opportunities for such attacks in popular code bases and build two proof-of-concept

  6. Non-harmful insertion of data mimicking computer network attacks

    Energy Technology Data Exchange (ETDEWEB)

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  7. Resveratrol products resulting by free radical attack

    Energy Technology Data Exchange (ETDEWEB)

    Bader, Yvonne; Quint, R.M. [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria); Getoff, Nikola [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria)], E-mail: nikola.getoff@univie.ac.at

    2008-06-15

    Trans-resveratrol (trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  8. Resveratrol products resulting by free radical attack

    Science.gov (United States)

    Bader, Yvonne; Quint, R. M.; Getoff, Nikola

    2008-06-01

    Trans-resveratrol ( trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  9. Suicide bomb attack causing penetrating craniocerebral injury

    Directory of Open Access Journals (Sweden)

    Hussain Manzar

    2013-02-01

    Full Text Available 【Abstract】Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma, al-though there are various reports of blast or gunshot inju-ries in warfare due to multiple foreign bodies like pellets and nails. In our case, a 30-year-old man presented to neurosur-gery clinic with signs and symptoms of right-sided weak-ness after suicide bomb attack. The skull X-ray showed a single intracranial nail. Small craniotomy was done and the nail was removed with caution to avoid injury to surround-ing normal brain tissue. At 6 months’ follow-up his right-sided power improved to against gravity. Key words: Head injury, penetrating; Bombs; Nails

  10. Capturing the uncertainty in adversary attack simulations.

    Energy Technology Data Exchange (ETDEWEB)

    Darby, John L.; Brooks, Traci N.; Berry, Robert Bruce

    2008-09-01

    This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a more realistic evaluation of PI, thereby requiring fewer resources to address scenarios and allowing resources to be used across more scenarios. For a given set of dversary resources, two types of uncertainty are associated with PI for a scenario: (1) aleatory (random) uncertainty for detection probabilities and time delays and (2) epistemic (state of knowledge) uncertainty for the adversary resources applied during an attack. Adversary esources consist of attributes (such as equipment and training) and knowledge about the security system; to date, most evaluations have assumed an adversary with very high resources, adding to the conservatism in the evaluation of PI. The aleatory uncertainty in PI is ddressed by assigning probability distributions to detection probabilities and time delays. A numerical sampling technique is used to evaluate PI, addressing the repeated variable dependence in the equation for PI.

  11. A Review Of Recent Cyber-Attacks In Fiji

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Computing technology has evolved in such dramatic ways that a child can use such technology and their features. Internet is one such technology which allows peripheral devices to be connected to each other creating a network to share information. In the same way information can be attacked. In this paper we will be discussing the different types of cyber-attack that recently took place in Fiji. Common attacks discussed in this review paper are phishing email scams website defacement and skimming. Apart from common preventative methods some novel recommendations have been made. We believe the Fiji experiences and recommendations will assist technology users prepare better against such attacks.

  12. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  13. The Need for Situational Awareness in a CBRNE Attack

    Directory of Open Access Journals (Sweden)

    Jordan Nelms

    2011-02-01

    Full Text Available Six years before the terrorist attacks on the World Trade Center and the Pentagon, and eight years before the United States went to war with Saddam Hussein for his alleged concealment of chemical and biological weapons caches, Japan's Tokyo subway was struck by one of the most vicious terror attacks in modern history.  The 1995 Sarin terrorist attack represents an important case study for post-9/11 emergency managers because it highlights the key issues first responders and public health officials face when confronted with a CBRNE ('C'hemical, 'B'iological, 'R'adiological, 'N'uclear, 'E'xplosive mass-casualty attack.

  14. Software test attacks to break mobile and embedded devices

    CERN Document Server

    Hagar, Jon Duncan

    2013-01-01

    Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It

  15. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  16. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  17. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  18. Privacy Leaks through Data Hijacking Attack on Mobile Systems

    Directory of Open Access Journals (Sweden)

    Zhang Daojuan

    2017-01-01

    Full Text Available To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user devices once, and they can persistently eavesdrop without any change to the original device. Specifically, we design a new approach to construct a shadow system by hijacking user data files. In the shadow system, attackers possess the identical abilities to the victims. For instance, if a victim has logged into the email app, the attacker can also access the email server in the shadow system without authentication in a long period of time. Without reauthentication of the app, it is difficult for victims to notice the intrusion since the whole eavesdropping is performed on other devices (rather than the user devices. In our experiments, we evaluate the effectiveness of the proposed attack and the result demonstrates that even the Android apps released by the top developers cannot resist this attack. Finally, we discuss some approaches to defend the proposed attack.

  19. Visual framing of terrorist attacks over the years

    OpenAIRE

    Chomátová, Nikola

    2017-01-01

    Diploma thesis Visual framing of terrorist attacks over the years focuses on how the selected terrorist attacks are presented in four Czech daily newspapers. The theoretical part of the thesis is focused on visual framing - which is based on the theoretical grounds of the concept of framing - and the visual presentation of terrorist attacks in the media. The aim of the research is to compare the visual framing of the attack in London in July 2005 and in Paris in 2015 using a quantitative cont...

  20. RFA: R-Squared Fitting Analysis Model for Power Attack

    Directory of Open Access Journals (Sweden)

    An Wang

    2017-01-01

    Full Text Available Correlation Power Analysis (CPA introduced by Brier et al. in 2004 is an important method in the side-channel attack and it enables the attacker to use less cost to derive secret or private keys with efficiency over the last decade. In this paper, we propose R-squared fitting model analysis (RFA which is more appropriate for nonlinear correlation analysis. This model can also be applied to other side-channel methods such as second-order CPA and collision-correlation power attack. Our experiments show that the RFA-based attacks bring significant advantages in both time complexity and success rate.