Abstract: The main cause of Alzheimer disease (AD) was
believed to be mainly due to the accumulation of free radicals owing
to oxidative stress (OS) in brain tissue. The mechanism of the
neurotoxicity of Aluminum chloride (AlCl3) induced AD in
hippocampus Albino wister rat brain tissue, the curative & the
protective effects of Lipidium sativum group (LS) water extract were
assessed after 8 weeks by attenuated total reflection spectroscopy
ATR-IR and histologically by light microscope. ATR-IR results
revealed that the membrane phospholipid undergo free radical
attacks, mediated by AlCl3, primary affects the polyunsaturated fatty
acids indicated by the increased of the olefinic -C=CH sub-band area
around 3012 cm-1 from the curve fitting analysis. The narrowing in
the half band width (HBW) of the sνCH2 sub-band around 2852 cm-1
due to Al intoxication indicates the presence of trans form fatty acids
rather than gauch rotomer. The degradation of hydrocarbon chain to
shorter chain length, increasing in membrane fluidity, disorder, and
decreasing in lipid polarity in AlCl3 group indicated by the detected
changes in certain calculated area ratios compared to the control.
Administration of LS was greatly improved these parameters
compared to the AlCl3 group. Al influences the Aβ aggregation and
plaque formation, which in turn interferes to and disrupts the
membrane structure. The results also showed a marked increase in
the β-parallel and antiparallel structure, that characterize the Aβ
formation in Al-induced AD hippocampal brain tissue, indicated by
the detected increase in both amide I sub-bands around 1674, 1692
cm-1. This drastic increase in Aβ formation was greatly reduced in the
curative and protective groups compared to the AlCl3 group and
approached nearly the control values. These results supported too by
the light microscope. AlCl3 group showed significant marked
degenerative changes in hippocampal neurons. Most cells appeared
small, shrieked and deformed. Interestingly, the administration of LS
in curative and protective groups markedly decreases the amount of
degenerated cells compared to the non-treated group. In addition, the
intensity of congo red stained cells was decreased. Hippocampal
neurons looked more/or less similar to those of control. This study showed a promising therapeutic effect of Lipidium
sativum group (LS) on AD rat model that seriously overcome the
signs of oxidative stress on membrane lipid and restore the protein
misfolding.
Abstract: This paper focuses on the orbit avoidance strategy of
the optical remote sensing satellite. The optical remote sensing
satellite, moving along the Sun-synchronous orbit, is equipped with
laser warning equipment to alert CCD camera from laser attacks. This
paper explores the strategy of satellite avoidance to protect the CCD
camera and also the satellite. The satellite could evasive to several
target points in the orbital coordinates of virtual satellite. The so-called
virtual satellite is a passive vehicle which superposes the satellite at the
initial stage of avoidance. The target points share the consistent cycle
time and the same semi-major axis with the virtual satellite, which
ensures the properties of the satellite’s Sun-synchronous orbit remain
unchanged. Moreover, to further strengthen the avoidance capability
of satellite, it can perform multi-target-points avoid maneuvers. On
occasions of fulfilling the satellite orbit tasks, the orbit can be restored
back to virtual satellite through orbit maneuvers. There into, the avoid
maneuvers adopts pulse guidance. In addition, the fuel consumption is
optimized. The avoidance strategy discussed in this article is
applicable to optical remote sensing satellite when it is encountered
with hostile attack of space-based laser anti-satellite.
Abstract: The energy need is growing rapidly due to the
population growth and the large new usage of power. Several works
put considerable efforts to make the electricity grid more intelligent
to reduce essentially energy consumption and provide efficiency and
reliability of power systems. The Smart Grid is a complex
architecture that covers critical devices and systems vulnerable to
significant attacks. Hence, security is a crucial factor for the success
and the wide deployment of Smart Grids. In this paper, we present
security issues of the Smart Grid architecture and we highlight open
issues that will make the Smart Grid security a challenging research
area in the future.
Abstract: Myocardial infarction is one of the leading causes of
death in the world. Some of these deaths occur even before the
patient reaches the hospital. Myocardial infarction occurs as a result
of impaired blood supply. Because the most of these deaths are due to
coronary artery disease, hence the awareness of the warning signs of
a heart attack is essential. Some heart attacks are sudden and intense,
but most of them start slowly, with mild pain or discomfort, then
early detection and successful treatment of these symptoms is vital to
save them. Therefore, importance and usefulness of a system
designing to assist physicians in early diagnosis of the acute heart
attacks is obvious. The main purpose of this study would be to enable patients to
become better informed about their condition and to encourage them
to seek professional care at an earlier stage in the appropriate
situations. For this purpose, the data were collected on 711 heart
patients in Iran hospitals. 28 attributes of clinical factors can be
reported by patients; were studied. Three logistic regression models
were made on the basis of the 28 features to predict the risk of heart
attacks. The best logistic regression model in terms of performance
had a C-index of 0.955 and with an accuracy of 94.9%. The variables,
severe chest pain, back pain, cold sweats, shortness of breath, nausea
and vomiting, were selected as the main features.
Abstract: The Radio Frequency Identification (RFID) technology
has a diverse base of applications, but it is also prone to security
threats. There are different types of security attacks which limit the
range of the RFID applications. For example, deploying the RFID
networks in insecure environments could make the RFID system
vulnerable to many types of attacks such as spoofing attack, location
traceability attack, physical attack and many more. Therefore, security
is often an important requirement for RFID systems. In this paper,
RFID mutual authentication protocol is implemented based on mobile
agent technology and timestamp, which are used to provide strong
authentication and integrity assurances to both the RFID readers and
their corresponding RFID tags. The integration of mobile agent
technology and timestamp provides promising results towards
achieving this goal and towards reducing the security threats in RFID
systems.
Abstract: In this paper, we describe the use of formal methods
to model malware behaviour. The modelling of harmful behaviour
rests upon syntactic structures that represent malicious procedures
inside malware. The malicious activities are modelled by a formal
grammar, where API calls’ components are the terminals and the set
of API calls used in combination to achieve a goal are designated
non-terminals. The combination of different non-terminals in various
ways and tiers make up the attack vectors that are used by harmful
software. Based on these syntactic structures a parser can be
generated which takes execution traces as input for pattern
recognition.
Abstract: A Mobile Adhoc Network (MANET) is a collection of mobile nodes that communicate with each other with wireless links and without pre-existing communication infrastructure. Routing is an important issue which impacts network performance. As MANETs lack central administration and prior organization, their security concerns are different from those of conventional networks. Wireless links make MANETs susceptible to attacks. This study proposes a new trust mechanism to mitigate wormhole attack in MANETs. Different optimization techniques find available optimal path from source to destination. This study extends trust and reputation to an improved link quality and channel utilization based Adhoc Ondemand Multipath Distance Vector (AOMDV). Differential Evolution (DE) is used for optimization.
Abstract: Plate is one of the popular structural elements used in a wide range of industries and structures. They may be subjected to blast loads during explosion events, missile attacks or aircraft attacks. This study is to investigate dynamic responses of the rectangular plate subjected to explosive loads. The effects of material properties and plate thickness on responses of the plate are to be investigated. The compressive pressure is applied to the surface of the plate. Different amounts of thickness in the range from 1mm to 30mm are considered for the plate to evaluate the changes in responses of the plate with respect to plate thickness. Two different properties are considered for the steel. First, the analysis is performed by considering only the elastic-plastic properties for the steel plate. Later on damping is considered to investigate its effects on the responses of the plate. To do analysis, numerical method using a finite element based package ABAQUS is applied. Finally, dynamic responses and graphs showing the relation between maximum displacement of the plate and aim parameters are provided.
Abstract: The first laboratory synthesis of hard materials such as
diamond proceeded to attack of developing materials with high
hardness to compete diamond. Boron rich solids are good candidates
owing to their short interatomic bond lengths and strong covalent
character. Boron containing hard material was synthesized by modifiedmicrowave
method under nitrogen atmosphere by using a fuel
(glycine or urea), amorphous boron and/or boric acid in appropriate
molar ratio. Characterizations were done by x-ray diffraction (XRD),
Fourier transform infrared (FTIR) spectroscopy, scanning electron
microscopy/energy dispersive analyze (SEM/EDS), thermo
gravimetric/differential thermal analysis (TG/DTA).
Abstract: Due to the interference effects, the intrinsic
aerodynamic parameters obtained from the individual component
testing are always fundamentally different than those obtained for
complete model testing. Consideration and limitation for such testing
need to be taken into account in any design work related to the
component buildup method. In this paper, the scaled model of a
straight rectangular canard of a hybrid buoyant aircraft is tested at 50
m/s in IIUM-LSWT (Low Speed Wind Tunnel). Model and its
attachment with the balance are kept rigid to have results free from
the aeroelastic distortion. Based on the velocity profile of the test
section’s floor; the height of the model is kept equal to the
corresponding boundary layer displacement. Balance measurements
provide valuable but limited information of overall aerodynamic
behavior of the model. Zero lift coefficient is obtained at -2.2o and
the corresponding drag coefficient was found to be less than that at
zero angle of attack. As a part of the validation of low fidelity tool,
plot of lift coefficient plot was verified by the experimental data and
except the value of zero lift coefficients, the overall trend has under
predicted the lift coefficient. Based on this comparative study, a
correction factor of 1.36 is proposed for lift curve slope obtained
from the panel method.
Abstract: The availability to deploy mobile applications for
health care is increasing daily thru different mobile app stores. But
within these capabilities the number of hacking attacks has also
increased, in particular into medical mobile applications. The security
vulnerabilities in medical mobile apps can be triggered by errors in
code, incorrect logic, poor design, among other parameters. This is
usually used by malicious attackers to steal or modify the users’
information. The aim of this research is to analyze the vulnerabilities
detected in mobile medical apps according to risk factor standards
defined by OWASP in 2014.
Abstract: Erosion and abrasion are wear mechanisms reducing
the lifetime of machine elements like valves, pump and pipe systems.
Both wear mechanisms are acting at the same time, causing a
“Synergy” effect, which leads to a rapid damage of the surface.
Different parameters are effective on erosive abrasive wear rate. In
this study effect of particle impact angle on wear rate and wear
mechanism of ductile and brittle materials was investigated. A new
slurry pot was designed for experimental investigation. As abrasive
particle, silica sand was used. Particle size was ranking between 200-
500 μm. All tests were carried out in a sand-water mixture of 20%
concentration for four hours. Impact velocities of the particles were
4.76 m/s. As ductile material steel St 37 with Vickers Hardness
Number (VHN) of 245 and quenched St 37 with 510 VHN was used
as brittle material. After wear tests, morphology of the eroded
surfaces were investigated for better understanding of the wear
mechanisms acting at different impact angles by using Scanning
Electron Microscope. The results indicated that wear rate of ductile
material was higher than brittle material. Maximum wear rate was
observed by ductile material at a particle impact angle of 300 and
decreased further by an increase in attack angle. Maximum wear rate
by brittle materials was by impact angle of 450 and decreased further
up to 900. Ploughing was the dominant wear mechanism by ductile
material. Microcracks on the surface were detected by ductile
materials, which are nucleation centers for crater formation. Number
of craters decreased and depth of craters increased by ductile
materials by attack angle higher than 300. Deformation wear
mechanism was observed by brittle materials. Number and depth of
pits decreased by brittle materials by impact angles higher than 450.
At the end it is concluded that wear rate could not be directly related
to impact angle of particles due to the different reaction of ductile and
brittle materials.
Abstract: Mobile Ad Hoc Networks (MANETs) is a collection
of mobile devices forming a communication network without
infrastructure. MANET is vulnerable to security threats due to
network’s limited security, dynamic topology, scalability and the lack
of central management. The Quality of Service (QoS) routing in such
networks is limited by network breakage caused by node mobility or
nodes energy depletions. The impact of node mobility on trust
establishment is considered and its use to propagate trust through a
network is investigated in this paper. This work proposes an
enhanced Associativity Based Routing (ABR) with Fuzzy based
Trust (Fuzzy- ABR) routing protocol for MANET to improve QoS
and to mitigate network attacks.
Abstract: The aim of our study is to project an optimized wind turbine of Darrieus type. This type of wind turbine is characterized by a low starting torque in comparison with the Savonius rotor allowing them to operate for a period greater than wind speed. This led us to reconsider the Darrieus rotor to optimize a design which will increase its starting torque. The study of a system of monitoring and control of the angle of attack of blade profile, which allows an auto start to wind speeds as low as possible is presented for the straight blade of Darrieus turbine. The study continues to extend to other configurations namely those of parabolic type.
Abstract: Feature selection has been used in many fields such as
classification, data mining and object recognition and proven to be
effective for removing irrelevant and redundant features from the
original dataset. In this paper, a new design of distributed intrusion
detection system using a combination feature selection model based
on bees and decision tree. Bees algorithm is used as the search
strategy to find the optimal subset of features, whereas decision tree
is used as a judgment for the selected features. Both the produced
features and the generated rules are used by Decision Making Mobile
Agent to decide whether there is an attack or not in the networks.
Decision Making Mobile Agent will migrate through the networks,
moving from node to another, if it found that there is an attack on one
of the nodes, it then alerts the user through User Interface Agent or
takes some action through Action Mobile Agent. The KDD Cup 99
dataset is used to test the effectiveness of the proposed system. The
results show that even if only four features are used, the proposed
system gives a better performance when it is compared with the
obtained results using all 41 features.
Abstract: Mobile Ad hoc Network is a set of self-governing
nodes which communicate through wireless links. Dynamic topology
MANETs makes routing a challenging task. Various routing
protocols are there, but due to various fundamental characteristic
open medium, changing topology, distributed collaboration and
constrained capability, these protocols are tend to various types of
security attacks. Black hole is one among them. In this attack,
malicious node represents itself as having the shortest path to the
destination but that path not even exists. In this paper, we aim to
develop a routing protocol for detection and prevention of black hole
attack by modifying AODV routing protocol. This protocol is able to
detect and prevent the black hole attack. Simulation is done using
NS-2, which shows the improvement in network performance.
Abstract: The security of cloud services is the concern of cloud
service providers. In this paper, we will mention different
classifications of cloud attacks referred by specialized organizations.
Each agency has its classification of well-defined properties. The
purpose is to present a high-level classification of current research in
cloud computing security. This classification is organized around
attack strategies and corresponding defenses.
Abstract: Due to rapid advancement of powerful image
processing software, digital images are easy to manipulate and
modify by ordinary people. Lots of digital images are edited for a
specific purpose and more difficult to distinguish form their original
ones. We propose a clustering method to detect a copy-move image
forgery of JPEG, BMP, TIFF, and PNG. The process starts with
reducing the color of the photos. Then, we use the clustering
technique to divide information of measuring data by Hausdorff
Distance. The result shows that the purposed methods is capable of
inspecting the image file and correctly identify the forgery.
Abstract: This paper examines the system protection for cyber-physical
systems (CPS). CPS are particularly characterized by their
networking system components. This means they are able to adapt to
the needs of their users and its environment. With this ability, CPS
have new, specific requirements on the protection against anti-counterfeiting,
know-how loss and manipulation. They increase the
requirements on system protection because piracy attacks can be
more diverse, for example because of an increasing number of
interfaces or through the networking abilities. The new requirements
were identified and in a next step matched with existing protective
measures. Due to the found gap the development of new protection
measures has to be forced to close this gap. Moreover a comparison
of the effectiveness between selected measures was realized and the
first results are presented in this paper.
Abstract: This paper presents a novel algorithm for secure,
reliable and flexible transmission of big data in two hop wireless
networks using cooperative jamming scheme. Two hop wireless
networks consist of source, relay and destination nodes. Big data has
to transmit from source to relay and from relay to destination by
deploying security in physical layer. Cooperative jamming scheme
determines transmission of big data in more secure manner by
protecting it from eavesdroppers and malicious nodes of unknown
location. The novel algorithm that ensures secure and energy balance
transmission of big data, includes selection of data transmitting
region, segmenting the selected region, determining probability ratio
for each node (capture node, non-capture and eavesdropper node) in
every segment, evaluating the probability using binary based
evaluation. If it is secure transmission resume with the two- hop
transmission of big data, otherwise prevent the attackers by
cooperative jamming scheme and transmit the data in two-hop
transmission.