Abstract: Thousands of organisations store important and
confidential information related to them, their customers, and their
business partners in databases all across the world. The stored data
ranges from less sensitive (e.g. first name, last name, date of birth) to
more sensitive data (e.g. password, pin code, and credit card
information). Losing data, disclosing confidential information or
even changing the value of data are the severe damages that
Structured Query Language injection (SQLi) attack can cause on a
given database. It is a code injection technique where malicious SQL
statements are inserted into a given SQL database by simply using a
web browser. In this paper, we propose an effective pattern
recognition neural network model for detection and classification of
SQLi attacks. The proposed model is built from three main elements
of: a Uniform Resource Locator (URL) generator in order to generate
thousands of malicious and benign URLs, a URL classifier in order
to: 1) classify each generated URL to either a benign URL or a
malicious URL and 2) classify the malicious URLs into different
SQLi attack categories, and a NN model in order to: 1) detect either a
given URL is a malicious URL or a benign URL and 2) identify the
type of SQLi attack for each malicious URL. The model is first
trained and then evaluated by employing thousands of benign and
malicious URLs. The results of the experiments are presented in
order to demonstrate the effectiveness of the proposed approach.
Abstract: Corrosion of concrete sewer pipes induced by
sulphuric acid attack is a recognised problem worldwide, which is not
only an attribute of countries with hot climate conditions as thought
before. The significance of this problem is by far only realised when
the pipe collapses causing surface flooding and other severe
consequences. To change the existing post-reactive attitude of
managing companies, easy to use and robust models are required to
be developed which currently lack reliable data to be correctly
calibrated. This paper focuses on laboratory experiments of
establishing concrete pipe corrosion rate by submerging samples in to
0.5pH sulphuric acid solution for 56 days under 10ºC, 20ºC and 30ºC
temperature regimes. The result showed that at very early stage of the
corrosion process the samples gained overall mass, at 30ºC the
corrosion progressed quicker than for other temperature regimes,
however with time the corrosion level for 10ºC and 20ºC regimes
tended towards those at 30ºC. Overall, at these conditions the
corrosion rates of 10 mm/year, 13,5 mm/year and 17 mm/year were
observed.
Abstract: One of the crucial parameters of digital cryptographic
systems is the selection of the keys used and their distribution. The
randomness of the keys has a strong impact on the system’s security
strength being difficult to be predicted, guessed, reproduced, or
discovered by a cryptanalyst. Therefore, adequate key randomness
generation is still sought for the benefit of stronger cryptosystems.
This paper suggests an algorithm designed to generate and test
pseudo random number sequences intended for cryptographic
applications. This algorithm is based on mathematically manipulating
a publically agreed upon information between sender and receiver
over a public channel. This information is used as a seed for
performing some mathematical functions in order to generate a
sequence of pseudorandom numbers that will be used for
encryption/decryption purposes. This manipulation involves
permutations and substitutions that fulfill Shannon’s principle of
“confusion and diffusion”. ASCII code characters were utilized in the
generation process instead of using bit strings initially, which adds
more flexibility in testing different seed values. Finally, the obtained
results would indicate sound difficulty of guessing keys by attackers.
Abstract: Phelipanche ramosa is the most damaging obligate
flowering parasitic weed on wide species of cultivated plants. The
semi-arid regions of the world are considered the main centers of this
parasitic plant that causes heavy infestation. This is due to its
production of high numbers of seeds (up to 200,000) that remain
viable for extended periods (up to 20 years). In this study, 13
treatments for the control of Phelipanche were carried out, which
included agronomic, chemical, and biological treatments and the use
of resistant plant methods. In 2014, a trial was performed at the
Department of Agriculture, Food and Environment, University of
Foggia (southern Italy), on processing tomato (cv ‘Docet’) grown in
pots filled with soil taken from a field that was heavily infested by P.
ramosa). The tomato seedlings were transplanted on May 8, 2014,
into a sandy-clay soil (USDA). A randomized block design with 3
replicates (pots) was adopted. During the growing cycle of the
tomato, at 70, 75, 81 and 88 days after transplantation, the number of
P. ramosa shoots emerged in each pot was determined. The tomato
fruit were harvested on August 8, 2014, and the quantitative and
qualitative parameters were determined. All of the data were
subjected to analysis of variance (ANOVA) using the JMP software
(SAS Institute Inc. Cary, NC, USA), and for comparisons of means
(Tukey's tests). The data show that each treatment studied did not
provide complete control against P. ramosa. However, the virulence
of the attacks was mitigated by some of the treatments tried: radicon
biostimulant, compost activated with Fusarium, mineral fertilizer
nitrogen, sulfur, enzone, and the resistant tomato genotype. It is
assumed that these effects can be improved by combining some of
these treatments with each other, especially for a gradual and
continuing reduction of the “seed bank” of the parasite in the soil.
Abstract: Wireless Sensor Networks (WSNs) have wide variety
of applications and provide limitless future potentials. Nodes in
WSNs are prone to failure due to energy depletion, hardware failure,
communication link errors, malicious attacks, and so on. Therefore,
fault tolerance is one of the critical issues in WSNs. We study how
fault tolerance is addressed in different applications of WSNs. Fault
tolerant routing is a critical task for sensor networks operating in
dynamic environments. Many routing, power management, and data
dissemination protocols have been specifically designed for WSNs
where energy awareness is an essential design issue. The focus,
however, has been given to the routing protocols which might differ
depending on the application and network architecture.
Abstract: In this paper we are presenting some spamming
techniques their behaviour and possible solutions. We have analyzed
how Spammers enters into online social networking sites (OSNSs) to
target them and diverse techniques used by them for this purpose.
Spamming is very common issue in present era of Internet
especially through Online Social Networking Sites (like Facebook,
Twitter, and Google+ etc.). Spam messages keep wasting Internet
bandwidth and the storage space of servers. On social networking
sites; spammers often disguise themselves by creating fake accounts
and hijacking user’s accounts for personal gains. They behave like
normal user and they continue to change their spamming strategy.
Following spamming techniques are discussed in this paper like
clickjacking, social engineered attacks, cross site scripting, URL
shortening, and drive by download. We have used elgg framework
for demonstration of some of spamming threats and respective
implementation of solutions.
Abstract: The main objective of aircraft aerodynamics is to
enhance the aerodynamic characteristics and maneuverability of the
aircraft. This enhancement includes the reduction in drag and stall
phenomenon. The airfoil which contains dimples will have
comparatively less drag than the plain airfoil. Introducing dimples on
the aircraft wing will create turbulence by creating vortices which
delays the boundary layer separation resulting in decrease of pressure
drag and also increase in the angle of stall. In addition, wake
reduction leads to reduction in acoustic emission. The overall
objective of this paper is to improve the aircraft maneuverability by
delaying the flow separation point at stall and thereby reducing the
drag by applying the dimple effect over the aircraft wing. This project
includes both computational and experimental analysis of dimple
effect on aircraft wing, using NACA 0018 airfoil. Dimple shapes of
Semi-sphere, hexagon, cylinder, square are selected for the analysis;
airfoil is tested under the inlet velocity of 30m/s and 60m/s at
different angle of attack (5˚, 10˚, 15˚, 20˚, and 25˚). This analysis
favors the dimple effect by increasing L/D ratio and thereby
providing the maximum aerodynamic efficiency, which provides the
enhanced performance for the aircraft.
Abstract: It is important to take security measures to protect
your computer information, reduce identify theft, and prevent from
malicious cyber-attacks. With cyber-attacks on the continuous rise,
people need to understand and learn ways to prevent from these
attacks. Cyber-attack is an important factor to be considered if one is
to be able to protect oneself from malicious attacks. Without proper
security measures, most computer technology would hinder home
users more than such technologies would help. Knowledge of how
cyber-attacks operate and protective steps that can be taken to reduce
chances of its occurrence are key to increasing these security
measures. The purpose of this paper is to inform home users on the
importance of identifying and taking preventive steps to avoid cyberattacks.
Throughout this paper, many aspects of cyber-attacks will be
discuss: what a cyber-attack is, the affects of cyber-attack for home
users, different types of cyber-attacks, methodology to prevent such
attacks; home users can take to fortify security of their computer.
Abstract: Solar energy is a good option among renewable
energy resources due to its easy availability and abundance. The
simplest and most efficient way to utilize solar energy is to convert it
into thermal energy and this can be done with the help of solar
collectors. The thermal performance of such collectors is poor due to
less heat transfer from the collector surface to air. In this work,
experimental investigations of single pass solar air heater having
triangular duct and provided with roughness element on the underside
of the absorber plate. V-shaped ribs are used for investigation having
three different values of relative roughness pitch (p/e) ranges from 4-
16 for a fixed value of angle of attack (α), relative roughness height
(e/Dh) and a relative gap distance (d/x) values are 60°, 0.044 and 0.60
respectively. Result shows that considerable augmentation in heat
transfer has been obtained by providing roughness.
Abstract: A Distributed Denial of Service (DDoS) attack is a
major threat to cyber security. It originates from the network layer or
the application layer of compromised/attacker systems which are
connected to the network. The impact of this attack ranges from the
simple inconvenience to use a particular service to causing major
failures at the targeted server. When there is heavy traffic flow to a
target server, it is necessary to classify the legitimate access and
attacks. In this paper, a novel method is proposed to detect DDoS
attacks from the traces of traffic flow. An access matrix is created
from the traces. As the access matrix is multi dimensional, Principle
Component Analysis (PCA) is used to reduce the attributes used for
detection. Two classifiers Naive Bayes and K-Nearest neighborhood
are used to classify the traffic as normal or abnormal. The
performance of the classifier with PCA selected attributes and actual
attributes of access matrix is compared by the detection rate and
False Positive Rate (FPR).
Abstract: Spam is any unwanted electronic message or material
in any form posted too many people. As the world is growing as
global world, social networking sites play an important role in
making world global providing people from different parts of the
world a platform to meet and express their views. Among different
social networking sites Facebook become the leading one. With
increase in usage different users start abusive use of Facebook by
posting or creating ways to post spam. This paper highlights the
potential spam types nowadays Facebook users’ faces. This paper
also provide the reason how user become victim to spam attack. A
methodology is proposed in the end discusses how to handle different
types of spam.
Abstract: Securing the confidential data transferred via wireless
network remains a challenging problem. It is paramount to ensure
that data are accessible only by the legitimate users rather than by the
attackers. One of the most serious threats to organization is jamming,
which disrupts the communication between any two pairs of nodes.
Therefore, designing an attack-defending scheme without any packet
loss in data transmission is an important challenge. In this paper,
Dependence based Malicious Route Defending DMRD Scheme has
been proposed in multi path routing environment to prevent jamming
attack. The key idea is to defend the malicious route to ensure
perspicuous transmission. This scheme develops a two layered
architecture and it operates in two different steps. In the first step,
possible routes are captured and their agent dependence values are
marked using triple agents. In the second step, the dependence values
are compared by performing comparator filtering to detect malicious
route as well as to identify a reliable route for secured data
transmission. By simulation studies, it is observed that the proposed
scheme significantly identifies malicious route by attaining lower
delay time and route discovery time; it also achieves higher
throughput.
Abstract: The tomato is a very important crop, whose
cultivation in the Mediterranean basin is severely affected by the
phytoparasitic weed Phelipanche ramosa. The semiarid regions of
the world are considered the main areas where this parasitic weed is
established causing heavy infestation as it is able to produce high
numbers of seeds (up to 500,000 per plant), which remain viable for
extended period (more than 20 years). In this paper the results
obtained from eleven treatments in order to control this parasitic
weed including chemical, agronomic, biological and biotechnological
methods compared with the untreated test under two plowing depths
(30 and 50 cm) are reported. The split-plot design with 3 replicates
was adopted. In 2014 a trial was performed in Foggia province
(southern Italy) on processing tomato (cv Docet) grown in the field
infested by Phelipanche ramosa. Tomato seedlings were transplant
on May 5, on a clay-loam soil. During the growing cycle of the
tomato crop, at 56-78 and 92 days after transplantation, the number
of parasitic shoots emerged in each plot was detected. At tomato
harvesting, on August 18, the major quantity-quality yield parameters
were determined (marketable yield, mean weight, dry matter, pH,
soluble solids and color of fruits). All data were subjected to analysis
of variance (ANOVA) and the means were compared by Tukey's test.
Each treatment studied did not provide complete control against
Phelipanche ramosa. However, among the different methods tested,
some of them which Fusarium, gliphosate, radicon biostimulant and
Red Setter tomato cv (improved genotypes obtained by Tilling
technology) under deeper plowing (50 cm depth) proved to mitigate
the virulence of the Phelipanche ramose attacks. It is assumed that
these effects can be improved combining some of these treatments
each other, especially for a gradual and continuing reduction of the
“seed bank” of the parasite in the soil.
Abstract: Bamboo is extensively used in construction industry.
Low durability of bamboo due to fungus infestation and termites
attack under storage puts certain constrains for it usage as modern
structural material. Looking at many chemical formulations for
bamboo treatment leading to severe harmful environment effects,
research on eco-friendly preservatives for bamboo treatment has been
initiated world-over. In the present studies, eco-friendly preservative
for bamboo treatment has been developed. To validate its application
for structural purposes, investigation of effect of treatment on
compressive strength has been investigated. Neemoil (25%)
integrated with copper naphthenate (0.3%) on dilution with kerosene
oil impregnated into bamboo culm at 2 bar pressure, has shown
weight loss of only 3.15% in soil block analysis method. The results
from compressive strength analysis using HEICO Automatic
Compression Testing Machine reveal that preservative treatment has
not altered the structural properties of bamboo culms. Compressive
strength of control (11.72 N/mm2) and above treated samples (11.71
N/mm2) was found to be comparable.
Abstract: Steganography is the art and science that hides the information in an appropriate cover carrier like image, text, audio and video media. In this work the authors propose a new image based steganographic method for hiding information within the complex bit planes of the image. After slicing into bit planes the cover image is analyzed to extract the most complex planes in decreasing order based on their bit plane complexity. The complexity function next determines the complex noisy blocks of the chosen bit plane and finally pixel mapping method (PMM) has been used to embed secret bits into those regions of the bit plane. The novel approach of using pixel mapping method (PMM) in bit plane domain adaptively embeds data on most complex regions of image, provides high embedding capacity, better imperceptibility and resistance to steganalysis attack.
Abstract: An active slat is developed to increase the lift and delay
the separation for a DU96-W180 airfoil. The active slat is a fixed slat
that can be closed, fully opened or intermittently opened by a rotating
vane depending on the need. Experimental results show that the active
slat has reduced the mean pressure and increased the mean velocity
on the suction side of the airfoil for all positive angles of attack,
indicating an increase of lift. The experimental data and numerical
simulations also show that the direction of actuator vane rotation can
influence the mixing of the flow streams on the suction side and
hence influence the aerodynamic performance.
Abstract: Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.
Abstract: Comprehensive numerical studies have been carried
out to examine the best aerodynamic performance of subsonic aircraft
at different winglet cant angles using a validated 3D k-ω SST model.
In the parametric analytical studies NACA series of airfoils are
selected. Basic design of the winglet is selected from the literature
and flow features of the entire wing including the winglet tip effects
have been examined with different cant angles varying from 150 to
600 at different angles of attack up to 140. We have observed, among
the cases considered in this study that a case, with 150 cant angle the
aerodynamics performance of the subsonic aircraft during takeoff
was found better up to an angle of attack of 2.80 and further its
performance got diminished at higher angles of attack. Analyses
further revealed that increasing the winglet cant angle from 150 to 600
at higher angles of attack could negate the performance deterioration
and additionally it could enhance the peak CL/CD on the order of
3.5%. The investigated concept of variable-cant-angle winglets
appears to be a promising alternative for improving the aerodynamic
efficiency of aircraft.
Abstract: Artificial Immune Systems (AIS), inspired by the
human immune system, are algorithms and mechanisms which are
self-adaptive and self-learning classifiers capable of recognizing and
classifying by learning, long-term memory and association. Unlike
other human system inspired techniques like genetic algorithms and
neural networks, AIS includes a range of algorithms modeling on
different immune mechanism of the body. In this paper, a mechanism
of a human immune system based on apoptosis is adopted to build an
Intrusion Detection System (IDS) to protect computer networks.
Features are selected from network traffic using Fisher Score. Based
on the selected features, the record/connection is classified as either
an attack or normal traffic by the proposed methodology. Simulation
results demonstrates that the proposed AIS based on apoptosis
performs better than existing AIS for intrusion detection.
Abstract: Wireless sensor network is vulnerable to a wide range
of attacks. Recover secrecy after compromise, to develop technique
that can detect intrusions and able to resilient networks that isolates
the point(s) of intrusion while maintaining network connectivity for
other legitimate users. To define new security metrics to evaluate
collaborative intrusion resilience protocol, by leveraging the sensor
mobility that allows compromised sensors to recover secure state
after compromise. This is obtained with very low overhead and in a
fully distributed fashion using extensive simulations support our
findings.