CINXE.COM
Search results for: salt and peppers attacks
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: salt and peppers attacks</title> <meta name="description" content="Search results for: salt and peppers attacks"> <meta name="keywords" content="salt and peppers attacks"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="salt and peppers attacks" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="salt and peppers attacks"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 1302</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: salt and peppers attacks</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1302</span> Bitplanes Gray-Level Image Encryption Approach Using Arnold Transform</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ali%20Abdrhman%20M.%20Ukasha">Ali Abdrhman M. Ukasha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SSPCE%20method" title="SSPCE method">SSPCE method</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20compression-salt-%20peppers%20attacks" title=" image compression-salt- peppers attacks"> image compression-salt- peppers attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=bitplanes%20decomposition" title=" bitplanes decomposition"> bitplanes decomposition</a>, <a href="https://publications.waset.org/abstracts/search?q=Arnold%20transform" title=" Arnold transform"> Arnold transform</a>, <a href="https://publications.waset.org/abstracts/search?q=lossless%20image%20encryption" title=" lossless image encryption"> lossless image encryption</a> </p> <a href="https://publications.waset.org/abstracts/14573/bitplanes-gray-level-image-encryption-approach-using-arnold-transform" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/14573.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">436</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1301</span> Bitplanes Image Encryption/Decryption Using Edge Map (SSPCE Method) and Arnold Transform</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ali%20A.%20Ukasha">Ali A. Ukasha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SSPCE%20method" title="SSPCE method">SSPCE method</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20compression" title=" image compression"> image compression</a>, <a href="https://publications.waset.org/abstracts/search?q=salt%20and%0D%0Apeppers%20attacks" title=" salt and peppers attacks"> salt and peppers attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=bitplanes%20decomposition" title=" bitplanes decomposition"> bitplanes decomposition</a>, <a href="https://publications.waset.org/abstracts/search?q=Arnold%20transform" title=" Arnold transform"> Arnold transform</a>, <a href="https://publications.waset.org/abstracts/search?q=lossless%20image%20encryption" title=" lossless image encryption"> lossless image encryption</a> </p> <a href="https://publications.waset.org/abstracts/14570/bitplanes-image-encryptiondecryption-using-edge-map-sspce-method-and-arnold-transform" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/14570.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">497</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1300</span> Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ali%20A.%20Ukasha">Ali A. Ukasha</a>, <a href="https://publications.waset.org/abstracts/search?q=Majdi%20F.%20Elbireki"> Majdi F. Elbireki</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20F.%20Abdullah"> Mohammad F. Abdullah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SSPCE%20method" title="SSPCE method">SSPCE method</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20compression%20and%20salt%20and%20peppers%20attacks" title=" image compression and salt and peppers attacks"> image compression and salt and peppers attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=bitplanes%20decomposition" title=" bitplanes decomposition"> bitplanes decomposition</a>, <a href="https://publications.waset.org/abstracts/search?q=Arnold%20transform" title=" Arnold transform"> Arnold transform</a>, <a href="https://publications.waset.org/abstracts/search?q=color%20image" title=" color image"> color image</a>, <a href="https://publications.waset.org/abstracts/search?q=wavelet%20transform" title=" wavelet transform"> wavelet transform</a>, <a href="https://publications.waset.org/abstracts/search?q=lossless%20image%20encryption" title=" lossless image encryption"> lossless image encryption</a> </p> <a href="https://publications.waset.org/abstracts/18519/color-image-compressionencryptioncontour-extraction-using-3l-dwt-and-sspce-method" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/18519.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">518</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1299</span> A Review on the Use of Salt in Building Construction</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vesna%20Pungercar">Vesna Pungercar</a>, <a href="https://publications.waset.org/abstracts/search?q=Florian%20Musso"> Florian Musso</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Identifying materials that can substitute rare or expensive natural resources is one of the key challenges for improving resource efficiency in the building sector. With a growing world population and rising living standards, more and more salt is produced as waste through seawater desalination and potash mining processes. Unfortunately, most of the salt is directly disposed of into nature, where it causes environmental pollution. On the other hand, salt is affordable, is used therapeutically in various respiratory treatments, and can store humidity and heat. It was, therefore, necessary to determine salt materials already in use in building construction and their hygrothermal properties. This research aims to identify salt materials from different scientific branches and historically, to investigate their properties and prioritize the most promising salt materials for indoor applications in a thermal envelope. This was realized through literature review and classification of salt materials into three groups (raw salt materials, composite salt materials, and processed salt materials). The outcome of this research shows that salt has already been used as a building material for centuries and has a potential for future applications due to its hygrothermal properties in a thermal envelope. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=salt" title="salt">salt</a>, <a href="https://publications.waset.org/abstracts/search?q=building%20material" title=" building material"> building material</a>, <a href="https://publications.waset.org/abstracts/search?q=hygrothermal%20properties" title=" hygrothermal properties"> hygrothermal properties</a>, <a href="https://publications.waset.org/abstracts/search?q=environment" title=" environment"> environment</a> </p> <a href="https://publications.waset.org/abstracts/131197/a-review-on-the-use-of-salt-in-building-construction" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/131197.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">169</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1298</span> Salt Scarcity and Crisis Solution in Islam Perspective</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Taufik%20Nugroho">Taufik Nugroho</a>, <a href="https://publications.waset.org/abstracts/search?q=Firsty%20Dzainuurahmana"> Firsty Dzainuurahmana</a>, <a href="https://publications.waset.org/abstracts/search?q=Tika%20Widiastuti"> Tika Widiastuti</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The polemic about the salt crisis re-emerged, this is a classic problem in Indonesia and is still a homework that is not finished yet. This salt crisis occurs due to low productivity of salt commodities that have not been able to meet domestic demand and lack of salt productivity caused by several factors. One of the biggest factors of the crisis is the weather anomaly that disrupts salt production, less supportive technology and price stability. This study will try to discuss the salt scarcity and crisis solution in Islamic view. As for the conclusion of this study is the need for equilibrium or balancing between demand and supply, need to optimize the role of the government as Hisbah to maintain the balance of market mechanisms and prepare the stock system of salt stock by buying farmers products at reasonable prices then storing them. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crisis" title="crisis">crisis</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic%20solution" title=" Islamic solution"> Islamic solution</a>, <a href="https://publications.waset.org/abstracts/search?q=scarcity" title=" scarcity"> scarcity</a>, <a href="https://publications.waset.org/abstracts/search?q=salt" title=" salt"> salt</a> </p> <a href="https://publications.waset.org/abstracts/85939/salt-scarcity-and-crisis-solution-in-islam-perspective" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/85939.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">290</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1297</span> Development of a Harvest Mechanism for the Kahramanmaraş Chili Pepper</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=O.%20E.%20Akay">O. E. Akay</a>, <a href="https://publications.waset.org/abstracts/search?q=E.%20G%C3%BCzel"> E. Güzel</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20T.%20%C3%96zcan"> M. T. Özcan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The pepper has quite a rich variety. The development of a single harvesting machine for all kinds of peppers is a difficult research topic. By development of harvesting mechanisms, we could be able to facilitate the pepper harvesting problems. In this study, an experimental harvesting machine was designed for chili pepper. Four-bar mechanism was used for the design of the prototype harvesting machine. At the result of harvest trials, 80% of peppers were harvested and 8% foreign materials were collected. These results have provided some tips on how to apply to large-scale pepper Four-bar mechanism of the harvest machine. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=kinematic%20simulation" title="kinematic simulation">kinematic simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=four%20bar%20linkage" title=" four bar linkage"> four bar linkage</a>, <a href="https://publications.waset.org/abstracts/search?q=harvest%20mechanization" title=" harvest mechanization"> harvest mechanization</a>, <a href="https://publications.waset.org/abstracts/search?q=pepper%20harvest" title=" pepper harvest"> pepper harvest</a> </p> <a href="https://publications.waset.org/abstracts/44062/development-of-a-harvest-mechanism-for-the-kahramanmaras-chili-pepper" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/44062.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">346</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1296</span> Halophilic Bacterium: A Review of New Studies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bassam%20Al%20Johny">Bassam Al Johny</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Halophilic bacteria are organisms which thrive in salt-rich environments, such as salt lakes, solar salterns and salt mines which contain large populations of these organisms. In biotechnology, such salt-tolerant bacteria are widely used for the production of valuable enzymes, and more than a thousand years ago humans began using salt to cure and thereby preserve perishable foods and other materials, such as hides; halophiles can be detrimental to the preservation of salt brine cured hides. The aim of this review is to provide an overview of the taxonomy of these organisms including novel isolates from rock salt, and also to discuss their current and future biotechnological and environmental uses. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=hypersaline%20environments" title="hypersaline environments">hypersaline environments</a>, <a href="https://publications.waset.org/abstracts/search?q=halophilic%20bacteria" title=" halophilic bacteria"> halophilic bacteria</a>, <a href="https://publications.waset.org/abstracts/search?q=environmental%20application" title=" environmental application"> environmental application</a>, <a href="https://publications.waset.org/abstracts/search?q=industrial%20application" title=" industrial application"> industrial application</a> </p> <a href="https://publications.waset.org/abstracts/54097/halophilic-bacterium-a-review-of-new-studies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/54097.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">271</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1295</span> Evaluation of Salt Content in Bread and the Amount Intake by Hypertensive Patients in the Algiers Region</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.lanasri">S.lanasri</a>, <a href="https://publications.waset.org/abstracts/search?q=A.Boudjerrane"> A.Boudjerrane</a>, <a href="https://publications.waset.org/abstracts/search?q=R.Belgherbi"> R.Belgherbi</a>, <a href="https://publications.waset.org/abstracts/search?q=O.Hadjoudj"> O.Hadjoudj</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introduction: Bread is the most popular food in Algeria. The aim of this study was to examine the consumption of salt from bread by hypertensive patients. Materials and methods: sixty breads were collected from different artisans Algiers bakeries, each sample was mixed in harm distilled water until homogeneous and filtered. Analysis of the salt content was carried out according to the Mohr method titration. We calculated the amount of salt in bread consumed by 100 hypertensive patients using a questionnaire about the average amount of bread per day. Results: The salt content values from bread were 3.4g ± 0.37 NaCl / 100g.The average amount of salt consumed per day by patients from only bread was 3.82 g ± 3.8 with a maximum of 17 g per day. Only 38.18% of patients consume bread without salt even then 95% knew that excess salt intake can complicate hypertension. Conclusion: This study showed that bread is a major contributor to salt intake by Algerian hypertensive patients. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=salt" title="salt">salt</a>, <a href="https://publications.waset.org/abstracts/search?q=bread" title=" bread"> bread</a>, <a href="https://publications.waset.org/abstracts/search?q=hypertensive%20patients" title=" hypertensive patients"> hypertensive patients</a>, <a href="https://publications.waset.org/abstracts/search?q=Algiers" title=" Algiers"> Algiers</a> </p> <a href="https://publications.waset.org/abstracts/117913/evaluation-of-salt-content-in-bread-and-the-amount-intake-by-hypertensive-patients-in-the-algiers-region" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/117913.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">151</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1294</span> Antioxidant Defence Systems, Lipid Peroxidation, and Photosynthetic Variables in Salt-Sensitive and Salt-Tolerant Soybean Genotypes in Response to Salt Stress</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Faheema%20Khan">Faheema Khan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We have investigated the effects of salt stress on the stability of plant growth, water relations, photosynthetic variables, lipid peroxidation and antioxidant system in salt-tolerant (PK-327) and salt-sensitive (PK-471) soybean genotypes. Ten-day-old salt-tolerant and salt-sensitive soybean plants were subjected to 0-150 mM NaCl for 15 days. While the growth of genotype PK-327 was not affected significantly up to 75 mM NaCl treatment, the growth of the PK-471 was reduced significantly beyond 25 mM NaCl treatments. Salt stress caused severe impairments in photosynthetic variables like photosynthetic rate, chlorophyll fluorescence and chlorophyll content, being more pronounced in salt-sensitive genotype than in salt-tolerant.The activities of antioxidant enzymes (superoxide dismutase, catalase, ascorbate peroxidase and glutathione reductase) were higher in PK-327 than in PK-471 at various levels of salt treatments.It is concluded that tolerance capacity of PK-327 against salinity can be associated with the ability of this genotype in keeping an active photosynthetic system and strong antioxidant defence system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=salt%20stress" title="salt stress">salt stress</a>, <a href="https://publications.waset.org/abstracts/search?q=soybean" title=" soybean"> soybean</a>, <a href="https://publications.waset.org/abstracts/search?q=antioxidant" title=" antioxidant"> antioxidant</a>, <a href="https://publications.waset.org/abstracts/search?q=photosynthesis" title=" photosynthesis"> photosynthesis</a> </p> <a href="https://publications.waset.org/abstracts/16638/antioxidant-defence-systems-lipid-peroxidation-and-photosynthetic-variables-in-salt-sensitive-and-salt-tolerant-soybean-genotypes-in-response-to-salt-stress" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16638.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">384</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1293</span> DOS and DDOS Attacks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amin%20Hamrahi">Amin Hamrahi</a>, <a href="https://publications.waset.org/abstracts/search?q=Niloofar%20Moghaddam"> Niloofar Moghaddam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Denial of Service is for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Denial of Service (DoS) attacks have become a major threat to current computer networks. Many recent DoS attacks were launched via a large number of distributed attacking hosts in the Internet. These attacks are called distributed denial of service (DDoS) attacks. To have a better understanding on DoS attacks, this article provides an overview on existing DoS and DDoS attacks and major defense technologies in the Internet. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=denial%20of%20service" title="denial of service">denial of service</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20denial%20of%20service" title=" distributed denial of service"> distributed denial of service</a>, <a href="https://publications.waset.org/abstracts/search?q=traffic" title=" traffic"> traffic</a>, <a href="https://publications.waset.org/abstracts/search?q=flooding" title=" flooding"> flooding</a> </p> <a href="https://publications.waset.org/abstracts/6782/dos-and-ddos-attacks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6782.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">392</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1292</span> A Survey of Domain Name System Tunneling Attacks: Detection and Prevention</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lawrence%20Williams">Lawrence Williams</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As the mechanism which converts domains to internet protocol (IP) addresses, Domain Name System (DNS) is an essential part of internet usage. It was not designed securely and can be subject to attacks. DNS attacks have become more frequent and sophisticated and the need for detecting and preventing them becomes more important for the modern network. DNS tunnelling attacks are one type of attack that are primarily used for distributed denial-of-service (DDoS) attacks and data exfiltration. Discussion of different techniques to detect and prevent DNS tunneling attacks is done. The methods, models, experiments, and data for each technique are discussed. A proposal about feasibility is made. Future research on these topics is proposed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=DNS" title="DNS">DNS</a>, <a href="https://publications.waset.org/abstracts/search?q=tunneling" title=" tunneling"> tunneling</a>, <a href="https://publications.waset.org/abstracts/search?q=exfiltration" title=" exfiltration"> exfiltration</a>, <a href="https://publications.waset.org/abstracts/search?q=botnet" title=" botnet"> botnet</a> </p> <a href="https://publications.waset.org/abstracts/159239/a-survey-of-domain-name-system-tunneling-attacks-detection-and-prevention" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/159239.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">75</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1291</span> The Expression Patterns of Thai Moderately Salt Tolerant Rice and High Salt Tolerant Rice in Response to Salt Stress</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kongngern%20K.">Kongngern K.</a>, <a href="https://publications.waset.org/abstracts/search?q=Homwonk%20C."> Homwonk C.</a>, <a href="https://publications.waset.org/abstracts/search?q=Theerakulpisut%20P."> Theerakulpisut P.</a>, <a href="https://publications.waset.org/abstracts/search?q=Roytrakul%20R."> Roytrakul R.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Rice cultivation is crucial globally, especially in Asia. Soil salinity poses a significant challenge for agricultural lands. Understanding the expression patterns of different rice varieties under salt stress can provide insights for developing more salt-tolerant cultivars. This study aims to compare the expression patterns of two rice varieties, Thai moderately salt-tolerant rice (Leaung Anan) and high salt-tolerant rice (Pokkali), in response to salt stress. By analyzing protein expression, the research seeks to identify key proteins associated with salt tolerance in rice. The expression patterns of the two rice varieties under salt stress were analyzed using 1D-SDS-PAGE, NanoLC-MS/MS, and MEV software. These methods enabled the researchers to assess the differential expression of proteins in the leaf sheaths of the rice plants. These results indicate that the study identified 18 proteins, exhibited significantly different expression patterns between the two rice cultivars under salt stress. Notably, certain proteins, such as Os05g0364500 and pr1-like protein, showed contrasting expression profiles in the two varieties. The up-regulated proteins, predominantly observed in the salt-tolerant rice, may contribute to the survival of rice plants under salt stress and may provide valuable insights for breeding programs aiming to enhance salt tolerancein rice cultivars. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mass%20spectrometry" title="mass spectrometry">mass spectrometry</a>, <a href="https://publications.waset.org/abstracts/search?q=proteomics" title=" proteomics"> proteomics</a>, <a href="https://publications.waset.org/abstracts/search?q=rice%20leaf%20sheaths" title=" rice leaf sheaths"> rice leaf sheaths</a>, <a href="https://publications.waset.org/abstracts/search?q=salt%20stress" title=" salt stress"> salt stress</a> </p> <a href="https://publications.waset.org/abstracts/194601/the-expression-patterns-of-thai-moderately-salt-tolerant-rice-and-high-salt-tolerant-rice-in-response-to-salt-stress" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/194601.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">8</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1290</span> Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Haydar%20Teymourlouei">Haydar Teymourlouei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber-attacks" title="cyber-attacks">cyber-attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=home%20user" title=" home user"> home user</a>, <a href="https://publications.waset.org/abstracts/search?q=prevention" title=" prevention"> prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a> </p> <a href="https://publications.waset.org/abstracts/25329/quick-reference-cyber-attacks-awareness-and-prevention-method-for-home-users" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25329.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">393</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1289</span> Experimental Chevreul’s Salt Production Methods on Copper Recovery</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Turan%20%C3%87alban">Turan Çalban</a>, <a href="https://publications.waset.org/abstracts/search?q=Oral%20La%C3%A7in"> Oral Laçin</a>, <a href="https://publications.waset.org/abstracts/search?q=Abd%C3%BCsselam%20Kurtba%C5%9F"> Abdüsselam Kurtbaş</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The experimental production methods Chevreul’s salt being a intermediate stage product for copper recovery were investigated by dealing with the articles written on this topic. Chevreul’s salt, Cu2SO3.CuSO3.2H2O, being a mixed valence copper sulphite compound has been obtained by using different methods and reagents. Chevreul’s salt has a intense brick-red color. It is a highly stable and expensive salt. The production of Chevreul’s salt plays a key role in hiydrometallurgy. In recent years, researchs on this compound have been intensified. Silva et al. reported that this salt is thermally stable up to 200oC. Çolak et al. precipitated the Chevreul’s salt by using ammonia and sulphur dioxide. Çalban et al. obtained at the optimum conditions by passing SO2 from leach solutions with NH3-(NH4)2SO4. Yeşiryurt and Çalban investigated the optimum precipitation conditions of Chevreul’s salt from synthetic CuSO4 solutions including Na2SO3. Çalban et al. achieved the precipitation of Chevreul’s salt at the optimum conditions by passing SO2 from synthetic CuSO4 solutions. Çalban et al. examined the precipitation conditions of Chevreul’s salt using (NH4)2SO3 from synthetic aqueous CuSO4 solutions. In light of these studies, it can be said that Chevreul’s salt can be produced practically from both a leach solutions including copper and synthetic CuSO4 solutions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chevreul%E2%80%99s%20salt" title="Chevreul’s salt">Chevreul’s salt</a>, <a href="https://publications.waset.org/abstracts/search?q=ammonia" title=" ammonia"> ammonia</a>, <a href="https://publications.waset.org/abstracts/search?q=copper%20sulpfite" title=" copper sulpfite"> copper sulpfite</a>, <a href="https://publications.waset.org/abstracts/search?q=sodium%20s%C3%BClfite" title=" sodium sülfite"> sodium sülfite</a>, <a href="https://publications.waset.org/abstracts/search?q=optimum%20conditions" title=" optimum conditions"> optimum conditions</a> </p> <a href="https://publications.waset.org/abstracts/27873/experimental-chevreuls-salt-production-methods-on-copper-recovery" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/27873.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">268</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1288</span> The Investigation of Precipitation Conditions of Chevreul’s Salt</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Turan%20%C3%87alban">Turan Çalban</a>, <a href="https://publications.waset.org/abstracts/search?q=Fatih%20Sevim"> Fatih Sevim</a>, <a href="https://publications.waset.org/abstracts/search?q=Oral%20La%C3%A7in"> Oral Laçin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this study, the precipitation conditions of Chevreul’s salt were evaluated. The structure of Chevreul’s salt was examined by considering the previous studies. Thermodynamically, the most important precipitation parameters were pH, temperature, and sulphite-copper(II) ratio. The amount of Chevreul’s salt increased with increasing the temperature and sulphite-copper(II) ratio at the certain range, while it increased with decreasing the pH value at the chosen range. The best solution medium for recovery of Chevreul’s salt is sulphur dioxide gas-water system. Moreover, the soluble sulphite salts are used as efficient precipitating reagents. Chevreul’s salt is generally used to produce the highly pure copper powders from synthetic copper sulphate solutions and impure leach solutions. When the pH of the initial ammoniacal solution is greater than 8.5, ammonia in the medium is not free, and Chevreul’s salt from solution does not precipitate. In contrast, copper ammonium sulphide is precipitated. The pH of the initial solution containing ammonia for precipitating of Chevreul’s salt must be less than 8.5. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chevreul%27s%20salt" title="Chevreul's salt">Chevreul's salt</a>, <a href="https://publications.waset.org/abstracts/search?q=production" title=" production"> production</a>, <a href="https://publications.waset.org/abstracts/search?q=copper%20sulfites" title=" copper sulfites"> copper sulfites</a>, <a href="https://publications.waset.org/abstracts/search?q=copper%20compound" title=" copper compound"> copper compound</a> </p> <a href="https://publications.waset.org/abstracts/52071/the-investigation-of-precipitation-conditions-of-chevreuls-salt" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/52071.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">249</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1287</span> Mechanistic Studies of Compacted and Sintered Rock Salt</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Claudia%20H.%20Swanson">Claudia H. Swanson</a>, <a href="https://publications.waset.org/abstracts/search?q=Jens%20G%C3%BCnster"> Jens Günster</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research addresses the densification via compaction and sintering of naturally occurring rock salt which was motivated by the fact that in a saline environment rock salt is thermodynamically stable and does show a mechanical behavior compatible to the surrounding host material. The sintering of rock salt powder compacts was systematically investigated using temperature and pressure as variables for the sinter process. The behavior of rock salt showed segregations of anhydrite, CaSO4 - the major impurity found in rock salt, to the grain boundaries between individual sodium chloride crystals. Powder compacts treated with lower pressures lost those anhydrite segregates over time while high pressure treated compacts remained with anhydrite segregates. The density reached in this study is 2.008 g cm-3 corresponding to a density of 92.5 % of the theoretical value. This high density is making the sintering a promising technique for rock salt as applications in underground appropriate environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=rock%20salt" title="rock salt">rock salt</a>, <a href="https://publications.waset.org/abstracts/search?q=sinter" title=" sinter"> sinter</a>, <a href="https://publications.waset.org/abstracts/search?q=anhydrite" title=" anhydrite"> anhydrite</a>, <a href="https://publications.waset.org/abstracts/search?q=nuclear%20safety" title=" nuclear safety"> nuclear safety</a> </p> <a href="https://publications.waset.org/abstracts/25847/mechanistic-studies-of-compacted-and-sintered-rock-salt" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25847.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">489</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1286</span> Strengthening National Salt Industry through Cultivation Upgrading and Product Diversification</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Etty%20Soesilowati">Etty Soesilowati</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research was intended to: (1) designing production systems that produce high quality salt and (2) diversification of salt products. This research used qualitative and quantitative approaches which Garam Mas Ltd. as the research site. The data were analyzed interactively and subjected to laboratory tests. The analyses showed that salt production system using HDPE geomembranes produced whiter and cleaner salts than those produced by conventional methods without HDPE geomembranes. High quality consumption salt contained 97% NaCl and a maximum of 0.05% water, in the form of white minute crystals and usually used for table salt of food and snack seasoning, souses and cheese and vegetable oil industries. Medium grade salt contained 94.7%-97% NaCl and 3%-7% water and usually used for kitchen salt, soy sauce, tofu industries and cattle feeding. Low quality salt contained 90%-94.7% NaCl and 5%-10% water, with dull white color and usually used for fish preservation and agriculture. The quality and quantity of salts production were influenced by temperatures, weather, water concentrations used during production processes and the discipline of salt farmers itself. The use of water temperature less than 23 °Be during the production processes produced low quality salts. Optimizing cultivation of the production process from raw material to end product (consumption salt) should be attempted to produce quality salt that fulfills the Indonesian National Standard. Therefore, the integrated policies among stakeholders are really needed to build strong institutional base at salt farmer level. This might be achieved through the establishment of specific region for salt production. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cultivation%20system" title="cultivation system">cultivation system</a>, <a href="https://publications.waset.org/abstracts/search?q=diversification" title=" diversification"> diversification</a>, <a href="https://publications.waset.org/abstracts/search?q=salt%20products" title=" salt products"> salt products</a>, <a href="https://publications.waset.org/abstracts/search?q=high%20quality%20salt" title=" high quality salt"> high quality salt</a> </p> <a href="https://publications.waset.org/abstracts/8095/strengthening-national-salt-industry-through-cultivation-upgrading-and-product-diversification" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/8095.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">401</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1285</span> X-Ray Photoelectron Spectroscopy Characterization of the Surface Layer on Inconel 625 after Exposition in Molten Salt</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Marie%20Kudrnova">Marie Kudrnova</a>, <a href="https://publications.waset.org/abstracts/search?q=Jana%20Petru"> Jana Petru</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study is part of the international research - Materials for Molten Salt Reactors (MSR) and addresses the part of the project dealing with the corrosion behavior of candidate construction materials. Inconel 625 was characterized by x-ray photoelectron spectroscopy (XPS) before and after high–temperature experiment in molten salt. The experiment was performed in a horizontal tube furnace molten salt reactor, at 450 °C in argon, at atmospheric pressure, for 150 hours. Industrially produced HITEC salt was used (NaNO3, KNO3, NaNO2). The XPS study was carried out using the ESCAProbe P apparatus (Omicron Nanotechnology Ltd.) equipped with a monochromatic Al Kα (1486.6 eV) X-ray source. The surface layer on alloy 625 after exposure contains only Na, C, O, and Ni (as NiOx) and Nb (as NbOx BE 206.8 eV). Ni was detected in the metallic state (Ni0 – Ni 2p BE-852.7 eV, NiOx - Ni 2p BE-854.7 eV) after a short Ar sputtering because the oxide layer on the surface was very thin. Nickel oxides can form a protective layer in the molten salt, but only future long-term exposures can determine the suitability of Inconel 625 for MSR. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Inconel%20625" title="Inconel 625">Inconel 625</a>, <a href="https://publications.waset.org/abstracts/search?q=molten%20salt" title=" molten salt"> molten salt</a>, <a href="https://publications.waset.org/abstracts/search?q=oxide%20layer" title=" oxide layer"> oxide layer</a>, <a href="https://publications.waset.org/abstracts/search?q=XPS" title=" XPS"> XPS</a> </p> <a href="https://publications.waset.org/abstracts/131354/x-ray-photoelectron-spectroscopy-characterization-of-the-surface-layer-on-inconel-625-after-exposition-in-molten-salt" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/131354.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">141</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1284</span> Development of a Process to Manufacture High Quality Refined Salt from Crude Solar Salt </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rathnayaka%20D.%20D.%20T.">Rathnayaka D. D. T. </a>, <a href="https://publications.waset.org/abstracts/search?q=Vidanage%20P.%20W."> Vidanage P. W. </a>, <a href="https://publications.waset.org/abstracts/search?q=Wasalathilake%20K.%20C."> Wasalathilake K. C. </a>, <a href="https://publications.waset.org/abstracts/search?q=Wickramasingha%20H.%20W."> Wickramasingha H. W. </a>, <a href="https://publications.waset.org/abstracts/search?q=Wijayarathne%20U.%20P.%20L."> Wijayarathne U. P. L. </a>, <a href="https://publications.waset.org/abstracts/search?q=Perera%20S.%20A.%20S."> Perera S. A. S. </a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper describes the research carried out to develop a process to increase the NaCl percentage of crude salt which is obtained from the conventional solar evaporation process. In this study refined salt was produced from crude solar salt by a chemico-physical method which consists of coagulation, precipitation and filtration. Initially crude salt crystals were crushed and dissolved in water. Optimum amounts of calcium hydroxide, sodium carbonate and Poly Aluminium Chloride (PAC) were added to the solution respectively. Refined NaCl solution was separated out by a filtration process. The solution was tested for Total Suspended Solids, SO42-, Mg2+, Ca2+. With optimum dosage of reagents, the results showed that a level of 99.60% NaCl could be achieved. Further this paper discusses the economic viability of the proposed process. A 83% profit margin can be achieved by this process and it is an increase of 112.3% compared to the traditional process. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=chemico-physical" title="chemico-physical">chemico-physical</a>, <a href="https://publications.waset.org/abstracts/search?q=economic" title=" economic"> economic</a>, <a href="https://publications.waset.org/abstracts/search?q=optimum" title=" optimum"> optimum</a>, <a href="https://publications.waset.org/abstracts/search?q=refined" title=" refined"> refined</a>, <a href="https://publications.waset.org/abstracts/search?q=solar%20salt" title=" solar salt"> solar salt</a> </p> <a href="https://publications.waset.org/abstracts/3889/development-of-a-process-to-manufacture-high-quality-refined-salt-from-crude-solar-salt" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3889.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">253</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1283</span> Development of the Manufacturing Process of Low Salt-Fermented Soy Sauce</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Young-Ran%20Song">Young-Ran Song</a>, <a href="https://publications.waset.org/abstracts/search?q=Byeong-Uk%20Lim"> Byeong-Uk Lim</a>, <a href="https://publications.waset.org/abstracts/search?q=Sang-Ho%20Baik"> Sang-Ho Baik</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study was initiated in order to develop a method for soy sauce fermentation at low salt concentrations without decreasing quality. Soy sauce was fermented with the fermentation starter (meju) and different salt contents (8-14%, w/v) by inoculating two strains or not, in which Torulaspora delbrueckii and Pichia guilliermondii strains having different abilities to induce sterilizing effects or enhance flavor production were used. As the results, there were microbial and biochemical differences among prepared soy sauce. First, Staphylococcus and Enterococcus spp. in addition to Bacillus genus that is the most important bacteria in Korean fermented soy product were detected by salt reduction. However, application of yeast starters can inhibit the undesirable bacterial growth. Moreover, PCA bi-plots of major principal components on various biochemical parameters (final pH, total acidity, soluble sugar, reducing sugar, ethanol and 32 volatile flavor compounds) were drawn to demonstrate the physicochemical differences and similarities among the samples. It was confirmed that the soy sauce samples produced with different salt concentrations were clearly different since salt reduction induced low contents of acids, alcohols and esters with higher acidity. However despite low salt concentration, combining two different yeasts appeared to have similar characteristics to the high salt-fermented soy sauce with elevated concentrations of ethanol, some alcohols, and most ketones, hence resulted in a balance of more complex and richer flavors with a flavor profile pattern identical to that of high-salt. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Soy%20sauce" title="Soy sauce">Soy sauce</a>, <a href="https://publications.waset.org/abstracts/search?q=low%20salt" title=" low salt"> low salt</a>, <a href="https://publications.waset.org/abstracts/search?q=fermentation" title=" fermentation"> fermentation</a>, <a href="https://publications.waset.org/abstracts/search?q=yeast." title=" yeast."> yeast.</a> </p> <a href="https://publications.waset.org/abstracts/41059/development-of-the-manufacturing-process-of-low-salt-fermented-soy-sauce" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41059.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">391</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1282</span> Robust Control of Cyber-Physical System under Cyber Attacks Based on Invariant Tubes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bruno%20Vili%C4%87%20Belina">Bruno Vilić Belina</a>, <a href="https://publications.waset.org/abstracts/search?q=Jadranko%20Matu%C5%A1ko"> Jadranko Matuško</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The rapid development of cyber-physical systems significantly influences modern control systems introducing a whole new range of applications of control systems but also putting them under new challenges to ensure their resiliency to possible cyber attacks, either in the form of data integrity attacks or deception attacks. This paper presents a model predictive approach to the control of cyber-physical systems robust to cyber attacks. We assume that a cyber attack can be modelled as an additive disturbance that acts in the measuring channel. For such a system, we designed a tube-based predictive controller based. The performance of the designed controller has been verified in Matlab/Simulink environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=control%20systems" title="control systems">control systems</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20attacks" title=" cyber attacks"> cyber attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=resiliency" title=" resiliency"> resiliency</a>, <a href="https://publications.waset.org/abstracts/search?q=robustness" title=" robustness"> robustness</a>, <a href="https://publications.waset.org/abstracts/search?q=tube%20based%20model%20predictive%20control" title=" tube based model predictive control"> tube based model predictive control</a> </p> <a href="https://publications.waset.org/abstracts/169652/robust-control-of-cyber-physical-system-under-cyber-attacks-based-on-invariant-tubes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/169652.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">67</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1281</span> The Impact of Malicious Attacks on the Performance of Routing Protocols in Mobile Ad-Hoc Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Habib%20Gorine">Habib Gorine</a>, <a href="https://publications.waset.org/abstracts/search?q=Rabia%20Saleh"> Rabia Saleh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile Ad-Hoc Networks are the special type of wireless networks which share common security requirements with other networks such as confidentiality, integrity, authentication, and availability, which need to be addressed in order to secure data transfer through the network. Their routing protocols are vulnerable to various malicious attacks which could have a devastating consequence on data security. In this paper, three types of attacks such as selfish, gray hole, and black hole attacks have been applied to the two most important routing protocols in MANET named dynamic source routing and ad-hoc on demand distance vector in order to analyse and compare the impact of these attacks on the Network performance in terms of throughput, average delay, packet loss, and consumption of energy using NS2 simulator. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=MANET" title="MANET">MANET</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20networks" title=" wireless networks"> wireless networks</a>, <a href="https://publications.waset.org/abstracts/search?q=routing%20protocols" title=" routing protocols"> routing protocols</a>, <a href="https://publications.waset.org/abstracts/search?q=malicious%20attacks" title=" malicious attacks"> malicious attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20networks%20simulation" title=" wireless networks simulation"> wireless networks simulation</a> </p> <a href="https://publications.waset.org/abstracts/88341/the-impact-of-malicious-attacks-on-the-performance-of-routing-protocols-in-mobile-ad-hoc-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/88341.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">320</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1280</span> Phishing Attacks Facilitated by Open Source Intelligence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Urva%20Maryam">Urva Maryam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=e-mail%20spoofing" title="e-mail spoofing">e-mail spoofing</a>, <a href="https://publications.waset.org/abstracts/search?q=Maltego" title=" Maltego"> Maltego</a>, <a href="https://publications.waset.org/abstracts/search?q=OSINT" title=" OSINT"> OSINT</a>, <a href="https://publications.waset.org/abstracts/search?q=phishing" title=" phishing"> phishing</a>, <a href="https://publications.waset.org/abstracts/search?q=spear%20phishing" title=" spear phishing"> spear phishing</a>, <a href="https://publications.waset.org/abstracts/search?q=theHarvester" title=" theHarvester"> theHarvester</a> </p> <a href="https://publications.waset.org/abstracts/134607/phishing-attacks-facilitated-by-open-source-intelligence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/134607.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">148</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1279</span> Relationship Salt Sensitivity and с825т Polymorphism of gnb3 Gene in Patients with Essential Hypertension </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aleksandr%20Nagay">Aleksandr Nagay</a>, <a href="https://publications.waset.org/abstracts/search?q=Gulnoz%20Khamidullayeva"> Gulnoz Khamidullayeva</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is known that an unbalanced intake of salt (NaCI), lifestyle and genetic predisposition to pathology is a key component of the risk and the development of essential hypertension (EH). Purpose: To study the relationship between salt-sensitivity and blood pressure (BP) on systolic (SBP) and diastolic (DBP) blood pressure, depending on the C825T polymorphism of GNB3 in individuals of Uzbek nationality with EH. Method: studied 148 healthy and 148 patients with EH with I-II degree (WHO/ISH, 2003) with disease duration 6,5±1,3 years. Investigation of the gene GNB3 was produced by PCR-RFLP method. Determination of salt-sensitivity was performed by the method of R. Henkin. Results: For a comparative analysis of BP, the groups with carriage of CТ and TT genotypes were combined. The analysis showed that carriers of CC genotype and low salt-sensitivity were determined by higher levels of SBP compared with carriers of CT and TT genotypes, and low salt-sensitivity of SBP: 166,2±4,3 against 158,2±9,1 mm Hg (p=0,000). A similar analysis on the values of DBP also showed significantly higher values of blood pressure in carriers of CC genotype DBP: 105,8±10,6 vs. 100,5±7,2 mm Hg, respectively (p=0,001). The average values of SBP and DBP in groups with carriers of CC genotype at medium or high salt-sensitivity in comparison with carriers of CT or TT genotype did not differ statistically SBP: 165,0±0,1 vs. 160,0±8,6 mm Hg (p=0,275) and DBP: 100,1±0,1 vs. 101,6±7,6 mm Hg (p=0,687), respectively. Conclusion: It is revealed that in patients with EH CC genotype of the gene GNB3 given salt-sensitivity has a negative effect on blood pressure profile. Since patients with EH with the CC genotype of GNB3 gene with low-salt taste sensitivity is determined by a higher level of blood pressure, both on SBP and DBP. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=salt%20sensitivity" title="salt sensitivity">salt sensitivity</a>, <a href="https://publications.waset.org/abstracts/search?q=essential%20hypertension%20EH" title=" essential hypertension EH"> essential hypertension EH</a>, <a href="https://publications.waset.org/abstracts/search?q=blood%20pressure%20BP" title=" blood pressure BP"> blood pressure BP</a>, <a href="https://publications.waset.org/abstracts/search?q=genetic%20predisposition" title=" genetic predisposition"> genetic predisposition</a> </p> <a href="https://publications.waset.org/abstracts/59953/relationship-salt-sensitivity-and-s825t-polymorphism-of-gnb3-gene-in-patients-with-essential-hypertension" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/59953.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">276</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1278</span> A Novel Gene Encoding Ankyrin-Repeat Protein, SHG1, Is Indispensable for Seed Germination under Moderate Salt Stress</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20Sakamoto">H. Sakamoto</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20Tochimoto"> J. Tochimoto</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Kurosawa"> S. Kurosawa</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Suzuki"> M. Suzuki</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Oguri"> S. Oguri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Salt stress adversely affects plant growth at various stages of development including seed germination, seedling establishment, vegetative growth and finally reproduction. Because of their immobile nature, plants have evolved mechanisms to sense and respond to salt stress. Seed dormancy is an adaptive trait that enables seed germination to coincide with favorable environmental conditions. We identified a novel locus of Arabidopsis, designated SHG1 (salt hypersensitive germination 1), whose disruption leads to reduced germination rate under moderate salt stress conditions. SHG1 encodes a transmembrane protein with an ankyrin repeat motif that has been implicated in diverse cellular processes such as signal transduction. The SGH1-disrupted Arabidopsis mutant died at the cotyledon stage when sown on salt-containing medium, although wild type plants could form true leaves under the same conditions. On the other hand, this mutant showed similar phenotypes to wild type plants when sown on medium without salt and transferred to salt-containing medium at the vegetative stage. These results suggested that SHG1 played indispensable role in the seed germination and seedling establishment under moderate salt stress conditions. SHG1 may be involved in the release of seed dormancy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=germination" title="germination">germination</a>, <a href="https://publications.waset.org/abstracts/search?q=ankyrin%20repeat" title=" ankyrin repeat"> ankyrin repeat</a>, <a href="https://publications.waset.org/abstracts/search?q=arabidopsis" title=" arabidopsis"> arabidopsis</a>, <a href="https://publications.waset.org/abstracts/search?q=salt%20tolerance" title=" salt tolerance"> salt tolerance</a> </p> <a href="https://publications.waset.org/abstracts/7011/a-novel-gene-encoding-ankyrin-repeat-protein-shg1-is-indispensable-for-seed-germination-under-moderate-salt-stress" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7011.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">398</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1277</span> Phishing Attacks Facilitated by Open Source Intelligence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Urva%20Maryam">Urva Maryam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=OSINT" title="OSINT">OSINT</a>, <a href="https://publications.waset.org/abstracts/search?q=phishing" title=" phishing"> phishing</a>, <a href="https://publications.waset.org/abstracts/search?q=spear%20phishing" title=" spear phishing"> spear phishing</a>, <a href="https://publications.waset.org/abstracts/search?q=email%20spoofing" title=" email spoofing"> email spoofing</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20harvester" title=" the harvester"> the harvester</a>, <a href="https://publications.waset.org/abstracts/search?q=maltego" title=" maltego"> maltego</a> </p> <a href="https://publications.waset.org/abstracts/159721/phishing-attacks-facilitated-by-open-source-intelligence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/159721.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">81</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1276</span> Factors Controlling Durability of Some Egyptian Non-Stylolitic Marbleized Limestone to Salt Weathering</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20El%20Shayab">H. El Shayab</a>, <a href="https://publications.waset.org/abstracts/search?q=G.%20M.%20Kamh"> G. M. Kamh</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20G.%20Abdel%20Ghafour"> N. G. Abdel Ghafour</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20L.%20Abdel%20Latif"> M. L. Abdel Latif </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, marbleized limestone becomes one of the most important sources of the mineral wealth in Egypt as they have beautiful colors (white, grey, rose, yellow and creamy, etc.) make it very suitable for decoration purposes. Non-styolitic marbleized limestone which not contains styolitic surfaces. The current study aims to study different factors controlling durability of non-styolitic marbleized limestone against salt crystallization weathering. The achievement aim of the research was required nine representative samples were collected from the studied areas. Three samples from each of the studied areas. The studied samples was characterized by various instrumental methods before salt weathering, to determine its mineralogical composition, chemical composition and pore physical properties respectively. The obtained results revealed that both of Duwi and Delga studied samples nearly have the same average ∆M% 1.63 and 1.51 respectively and consequently A.I. stage of deformation. On the other hand, average ∆M% of Wata studied samples is 0.29 i.e. lower than two other studied areas. Wata studied samples are more durable against salt crystallization test than Duwi and Delga. The difference in salt crystallization durability may be resulted from one of the following factors: Microscopic textural effect as both of micrite and skeletal percent are in directly proportional to durability of stones to salt weathering. Dolomite mineral present as a secondary are in indirectly proportional to durability of stones to salt weathering. Increase in MgO% also associated with decrease the durability of studied samples against salt crystallization test. Finally, all factors affecting positively against salt crystallization test presents in Wadi Wata studied samples rather than others two areas. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=marbleized%20limestone" title="marbleized limestone">marbleized limestone</a>, <a href="https://publications.waset.org/abstracts/search?q=salt%20weathering" title=" salt weathering"> salt weathering</a>, <a href="https://publications.waset.org/abstracts/search?q=Wata" title=" Wata"> Wata</a>, <a href="https://publications.waset.org/abstracts/search?q=salt%20weathering" title=" salt weathering"> salt weathering</a> </p> <a href="https://publications.waset.org/abstracts/11044/factors-controlling-durability-of-some-egyptian-non-stylolitic-marbleized-limestone-to-salt-weathering" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11044.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">327</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1275</span> Salinity Response of Some Cowpea Genotypes in Germination of Periods</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Meryem%20Aydin">Meryem Aydin</a>, <a href="https://publications.waset.org/abstracts/search?q=Serdar%20Karadas"> Serdar Karadas</a>, <a href="https://publications.waset.org/abstracts/search?q=Ercan%20Ceyhan"> Ercan Ceyhan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The research was conducted to determine effects of salt concentrations on emergence of cowpea genotypes. Trials were performed during the year of 2014 on the laboratory of Agricultural Faculty, Selcuk University. Emergency trial was set up according to “Randomized Plots Design” by two factors and four replications with three replications. Samandag, Akkiz-86, Karnikara and Sarigobek cowpea genotypes have been used as trial material in this study. Effects of the five doses of salt concentrations (control, 30 mM, 60 mM, 90 mM and 120 mM) on the ratio of emergency, speed of emergency, average time for emergency, index of sensibility were evaluated. Responses of the cowpea genotypes for salt concentrations were found different. Comparing to the control, all of the investigated characteristics on the cowpea genotypes showed significant reduction by depending on the increasing salt application. According to the effects of salt application, the cowpea genotypes Samandag and Karnikara were the most tolerant in respect to index of sensibility while the Sarigobek genotypes was the most sensitive. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cowpea" title="cowpea">cowpea</a>, <a href="https://publications.waset.org/abstracts/search?q=Vigna%20sinensis" title=" Vigna sinensis"> Vigna sinensis</a>, <a href="https://publications.waset.org/abstracts/search?q=emergence" title=" emergence"> emergence</a>, <a href="https://publications.waset.org/abstracts/search?q=salt%20tolerant" title=" salt tolerant"> salt tolerant</a> </p> <a href="https://publications.waset.org/abstracts/41888/salinity-response-of-some-cowpea-genotypes-in-germination-of-periods" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41888.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">267</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1274</span> Detection of Intentional Attacks in Images Based on Watermarking</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hazem%20Munawer%20Al-Otum">Hazem Munawer Al-Otum</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this work, an efficient watermarking technique is proposed and can be used for detecting intentional attacks in RGB color images. The proposed technique can be implemented for image authentication and exhibits high robustness against unintentional common image processing attacks. It deploys two measures to discern between intentional and unintentional attacks based on using a quantization-based technique in a modified 2D multi-pyramidal DWT transform. Simulations have shown high accuracy in detecting intentionally attacked regions while exhibiting high robustness under moderate to severe common image processing attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=image%20authentication" title="image authentication">image authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=copyright%20protection" title=" copyright protection"> copyright protection</a>, <a href="https://publications.waset.org/abstracts/search?q=semi-fragile%20watermarking" title=" semi-fragile watermarking"> semi-fragile watermarking</a>, <a href="https://publications.waset.org/abstracts/search?q=tamper%20detection" title=" tamper detection"> tamper detection</a> </p> <a href="https://publications.waset.org/abstracts/44443/detection-of-intentional-attacks-in-images-based-on-watermarking" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/44443.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">255</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1273</span> A Tutorial on Network Security: Attacks and Controls</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Belbahi%20Ahlam">Belbahi Ahlam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have an understanding of the typical attacks that have been carried out in such networks. The first half of this paper will expose the readers to the classical network attacks that have exploited the typical vulnerabilities of computer networks in the past and solutions that have been adopted since then to prevent or reduce the chances of some of these attacks. The second half of the paper will expose the readers to the different network security controls including the network architecture, protocols, standards and software/ hardware tools that have been adopted in modern day computer networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=network%20security" title="network security">network security</a>, <a href="https://publications.waset.org/abstracts/search?q=attacks%20and%20controls" title=" attacks and controls"> attacks and controls</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20and%20information" title=" computer and information"> computer and information</a>, <a href="https://publications.waset.org/abstracts/search?q=solutions" title=" solutions"> solutions</a> </p> <a href="https://publications.waset.org/abstracts/47725/a-tutorial-on-network-security-attacks-and-controls" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/47725.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">455</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=salt%20and%0D%0Apeppers%20attacks&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=salt%20and%0D%0Apeppers%20attacks&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=salt%20and%0D%0Apeppers%20attacks&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=salt%20and%0D%0Apeppers%20attacks&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=salt%20and%0D%0Apeppers%20attacks&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=salt%20and%0D%0Apeppers%20attacks&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=salt%20and%0D%0Apeppers%20attacks&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=salt%20and%0D%0Apeppers%20attacks&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=salt%20and%0D%0Apeppers%20attacks&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=salt%20and%0D%0Apeppers%20attacks&page=43">43</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=salt%20and%0D%0Apeppers%20attacks&page=44">44</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=salt%20and%0D%0Apeppers%20attacks&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>