2,308 results on '"dos"'
Search Results
152. Simulation and Analysis of Jamming Attack in IoT Networks
- Author
-
Kerrakchou, Imane, Chadli, Sara, Kharbach, Amina, Saber, Mohammed, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Motahhir, Saad, editor, and Bossoufi, Badre, editor
- Published
- 2021
- Full Text
- View/download PDF
153. Infrastructure Design to Secure Cloud Environments Against DDoS-Based Attacks
- Author
-
Bhardwaj, Akashdeep, Goundar, Sam, Sapra, Luxmi, Chlamtac, Imrich, Series Editor, Bhardwaj, Akashdeep, editor, and Sapra, Varun, editor
- Published
- 2021
- Full Text
- View/download PDF
154. DDoS Attack Detection in SDN Using CUSUM
- Author
-
Shalini, P. V., Radha, V., Sanjeevi, Sriram G., Xhafa, Fatos, Series Editor, Chaki, Nabendu, editor, Pejas, Jerzy, editor, Devarakonda, Nagaraju, editor, and Rao Kovvur, Ram Mohan, editor
- Published
- 2021
- Full Text
- View/download PDF
155. ICN Based DOS Attack Mitigation in Vehicle Adhoc Networks
- Author
-
Patil, Mahesh R., Agilandeeswari, Loganathan, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Abraham, Ajith, editor, Piuri, Vincenzo, editor, Gandhi, Niketa, editor, Siarry, Patrick, editor, Kaklauskas, Arturas, editor, and Madureira, Ana, editor
- Published
- 2021
- Full Text
- View/download PDF
156. Detecting DoS and DDoS Attacks by Using CuSum Algorithm in 5G Networks
- Author
-
Chiu, Shih-Ting, Leu, Fang-Yie, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Barolli, Leonard, editor, Li, Kin Fun, editor, Enokido, Tomoya, editor, and Takizawa, Makoto, editor
- Published
- 2021
- Full Text
- View/download PDF
157. Detection and Prevention of Black Hole Attack Using Trusted and Secure Routing in Wireless Sensor Network
- Author
-
Bisen, Dhananjay, Barmaiya, Bhavana, Prasad, Ritu, Saurabh, Praneet, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Abraham, Ajith, editor, Shandilya, Shishir K., editor, Garcia-Hernandez, Laura, editor, and Varela, Maria Leonilde, editor
- Published
- 2021
- Full Text
- View/download PDF
158. Security Frameworks for Intra and Inter-Chip Wireless Interconnection Networks
- Author
-
Ahmed, M. Meraj, Vashist, Abhishek, Keats, Andrew, Ganguly, Amlan, Pudukotai Dinakarrao, Sai Manoj, Mishra, Prabhat, editor, and Charles, Subodha, editor
- Published
- 2021
- Full Text
- View/download PDF
159. Network-on-Chip Attack Detection using Machine Learning
- Author
-
Sudusinghe, Chamika, Charles, Subodha, Mishra, Prabhat, Mishra, Prabhat, editor, and Charles, Subodha, editor
- Published
- 2021
- Full Text
- View/download PDF
160. Trojan Aware Network-on-Chip Routing
- Author
-
Rajan, Manju, Das, Abhijit, Jose, John, Mishra, Prabhat, Mishra, Prabhat, editor, and Charles, Subodha, editor
- Published
- 2021
- Full Text
- View/download PDF
161. Trust-Aware Routing in NoC-Based SoCs
- Author
-
Charles, Subodha, Mishra, Prabhat, Mishra, Prabhat, editor, and Charles, Subodha, editor
- Published
- 2021
- Full Text
- View/download PDF
162. Detection and Mitigation of Low-Rate Denial-of-Service Attacks: A Survey
- Author
-
Vinicius De Miranda Rios, Pedro R. M. Inacio, Damien Magoni, and Mario M. Freire
- Subjects
Denial-of-service ,DoS ,distributed DoS ,DDoS ,low-rate DoS attack ,LDoS attack ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The potential for being the target of Denial of Service (DoS) attacks is one of the most severe security threats on the Internet. Attackers have been modifying their attack format over the years, damaging specific conditions of operating systems and protocols in an attempt to deny or diminish the quality of the service provided to legitimate users. Nowadays, attacks are stealthier and mimic legitimate user traffic in such a way that detection mechanisms against High-rate DoS attacks are no longer sufficient. This evolving type of attack, known as LDoS (Low-rate Denial of Service) attacks, has the potential to produce more damage than its predecessor due to its stealth nature and the lack of suitable detection and defense methods. This survey summarizes and complements previous studies and surveys related to this specific type of attack. First, we propose a taxonomy of the LDoS attacks, which were divided into three broad categories based on their modus operandi: QoS attacks, Slow rate attacks, and Service queue attacks. Next, we detail numerous detection mechanisms and counter-measures available against eight types of LDoS attacks. More specifically, we describe the methods used to throttle the attack traffic. Finally, we provide a feature comparison table for some existing attack tools. This survey aims at providing an extensive review of the literature for helping researchers and network administrators find up-to-date knowledge on LDoS attacks.
- Published
- 2022
- Full Text
- View/download PDF
163. Cybersecurity Attacks on Software Logic and Error Handling Within AIS Implementations: A Systematic Testing of Resilience
- Author
-
Syed Khandker, Hannu Turtiainen, Andrei Costin, and Timo Hamalainen
- Subjects
AIS ,attacks ,cybersecurity ,DoS ,maritime ,resiliency ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
To increase situational awareness of maritime vessels and other entities and to enable their exchange of various information, the International Maritime Organization mandated the use of the Automatic Identification System (AIS) in 2004. The AIS is a self-reporting system that uses the VHF radio link. However, any radio-based self-reporting system is prone to forgery, especially in situations where authentication of the message is not designed into the architecture. As AIS was designed in the 1990s when cyberattacks were in their infancy, it does not implement authentication or encryption; thus, it can be seen as fundamentally vulnerable against cyberattacks. This paper demonstrates and evaluates the impact of multiple cyberattacks on AIS via remote radio frequency (RF) links using transmission-enabled software-defined radio (SDR). Overall, we implemented and tested a total of 11 different tests/attacks on 19 AIS setups, using a controlled environment. The tested configurations were derived from heterogeneous platforms such as Windows, Android, generic receivers, and commercial transponders. Our aim is to enhance the early discovery of new vulnerabilities in AIS to effectively address AIS attacks in the nearest future. The results showed that approximately 89% of the setups were affected by Denial-of-Service (DoS) attacks at the AIS protocol level. Besides implementing some existing attack ideas (e.g., spoofing, DoS, and flooding), we showed some novel attack concepts in the AIS context such as a coordinated attack, overwhelming alerts, and logical vulnerabilities, all of which have the potential to cause software/system crashes in the worst-case scenarios. Moreover, an implementation/specification flaw related to the AIS preamble was identified during the experiments, which may affect the interoperability of different AIS devices. The error-handling system in AIS was also investigated. Unlike the aviation sector’s Automatic Dependent Surveillance-Broadcast (ADS-B), the maritime sector’s AIS does not effectively support any error correction method, which may contribute to RF pollution and less effective use of the overall system. The consistency of our results for a comprehensive range of hardware-software configurations indicated the reliability of our approach, test system, and evaluation results.
- Published
- 2022
- Full Text
- View/download PDF
164. SENMQTT-SET: An Intelligent Intrusion Detection in IoT-MQTT Networks Using Ensemble Multi Cascade Features
- Author
-
Hariprasad Siddharthan, T. Deepa, and Prabhu Chandhar
- Subjects
IoT-MQTT networks ,DoS ,multi-cascade features ,machine learning ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Recently, the number of Internet of Things (IoT) networks has been grown exponentially, which results in more data sharing between devices without appropriate security mechanisms. Since huge data management is involved, maintaining the time constraints between the devices in IoT networks is another significant issue. To address these issues, an intelligent intrusion detection system has been adapted to recognize or predict a cyber-attack using Elite Machine Learning algorithms (EML), and a lightweight protocol is used to manage the time-constrained issue. The experimental analysis of work is done on a testbed setup with the hardware and sensors connected using a lightweight Message Queue Telemetry Transport (MQTT) protocol. This comprises three parts: (i) collection of data with the help of a sensor for three different scenarios called SEN-MQTTSET; (ii) multi-context feature generation using an ensemble statistical multi-view cascade feature generation algorithm from the SEN-MQTTSET dataset; and (iii) evaluating the dataset using ML algorithms. The SEN-MQTTSET dataset has been created from the three scenarios, such as normal, attack on a subscriber, and attack on a broker. The multi-context feature is generated from the raw dataset using an ensemble statistical multi-view cascade feature generation algorithm. The EML is proposed to select the best model for intrusion detection among ML algorithms such as Logistic Regression, K-Nearest Neighbour, Random Forest, Naive Bias, Support Vector Machine, Gradient Boosting, and Decision Tree by the performance metrics such as accuracy, prediction time, F1-score, and others. The proposed dataset is validated and the accuracy is found to be above 99% for the considered system model. Different quality parameters have been carried out for legitimate and attack traffic features to calculate the delay between the IoT-MQTT network.
- Published
- 2022
- Full Text
- View/download PDF
165. Evaluating DoS jamming attack on reactive routing protocol in wireless sensor networks.
- Author
-
Osanaiye, Opeyemi A., Ogundile, Olayinka O., and Aina, Folayo
- Subjects
- *
WIRELESS sensor networks , *DENIAL of service attacks , *RADIO interference , *TECHNOLOGICAL innovations , *SENSOR networks , *RADIO frequency - Abstract
Wireless sensor networks (WSNs) over the years have emerged as the enabling underlining infrastructure for new wireless technology trends such as Internet-of Things (IoT) and Fog Computing. Its application has spread across diverse fields such as agriculture, military, healthcare and home automation. Despite its promising attributes, it is characterized by its extremely limited resources such as battery energy and memory. Additionally, its deployment in hostile and unattended areas make it vulnerable to security attacks. One of such attacks is the denial of service (DoS) jamming attack that is perpetrated by malicious nodes emitting radio frequency signals to disrupt and interfere with the normal functions of the sensor nodes in the network. This eventually causes a denial of service in the network. Different routing protocols have been proposed over the years to guarantee reliable communication and maintain the network lifetime and functionality for a reasonable duration, notwithstanding DoS jamming attack. Therefore, in this work, we evaluate the effect of a constant jamming DoS attack on two key reactive routing protocols in WSN, ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR). Metrics such as packet sending ratio (PSR), packet loss (PL) and transmitted packets are used to measure the impact of constant jamming DoS attack in the network. Simulation results using network simulation 2 (NS2) and trace graph show that, irrespective of the adopted reactive routing protocol, the impact of the jamming attack is the same. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
166. Secure control design for nonlinear cyber–physical systems under DoS, replay, and deception cyber-attacks with multiple transmission channels.
- Author
-
Tahoun, A.H. and Arafa, M.
- Subjects
CYBER physical systems ,DECEPTION ,NONLINEAR systems ,PSYCHOLOGICAL feedback ,DENIAL of service attacks ,TRANSMISSION of sound ,DATA transmission systems - Abstract
This paper introduces the state-/output-feedback control for multi-channel nonlinear cyber–physical systems (CPSs). Many cyber-attacks are considered such as Denial-of-Service (DoS), replay and deception attacks. The deception cyber-attacks can be treated as measurement additive and multiplicative uncertainties. Both time-varying state-dependent and state-independent sensor additive attacks are considered. As DoS attack makes the CPS states unavailable, the standard modeling and control methods cannot be applied directly. Alternatively, as attackers in the replay attack re-transmit previous data and prevent the transmission of the more recent data, a delayed model is generated. To deal with these problems, a new observer at the controller side is proposed. It is used to perform two main tasks. The first is to estimate all system states at every time instant. The second is to exclude some unsecured transmitting channels from affecting the system response. Therefore, all attacks in these channels will have no effect on the system response. Using the estimated states, an anti-cyber-attacks state-feedback controller is investigated. Meanwhile, it is verified that the suggested approach certifies the convergence of all the CPSs states under different cyber-attacks. The effectiveness of the proposed secure control approach against different kinds of cyber-attacks is confirmed through two examples with simulation results. • A new model of DoS, replay, and deception attacks with degradation gain and state-dependent/-independent forms is proposed. • An asymptotic observer at the controller side is synthesized to reconstruct the system states at every time instant. • There is no need to design predictors for predicting the time of occurrence of the DoS attacks. • A new multi-channel transmission method in which some channels are excluded from affecting the system response is proposed. • For state and output feedback, controllers are designed such that asymptotic stability rather than boundedness is ensured. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
167. Unveiling the effect of 2D silagraphene structural diversity on electronic properties: DFT, DOS, and ELF studies.
- Author
-
Chataoui, Hassan, Bahsis, Lahoucine, Anane, Hafid, Jarid, Abdellah, and El Houssame, Soufiane
- Subjects
- *
HYPERCONJUGATION , *ELECTRONIC equipment , *GRAPHENE , *ELECTRONS - Abstract
Recently, fully π-functional two-dimensional (2D) materials have been reported for electronic device applications. Graphene is one of these 2D materials that is attributed to 2D electron confinement effects and exhibits an aromatic character; however, it is characterized by vanishing the bandgap energy. Hence, research was focused on the discovery of graphene-based 2D materials to reduce the bandgap energy. Herein, we investigate the silagraphene structures (SixCy) using DFT calculations to undertake and improve structural, physico-chemical, and electronic properties. Various types of 2D networks have been investigated by considering C–C and C–Si bonds in relative positions. Both conjugation and hyperconjugation phenomenon have been deeply examined and it seemed that they take advantage of each other depending on the C–C and C–Si bond positions. Localized orbital locator (LOL) and electron localization function (ELF) were also performed to examine the electronic densities in the investigated 2D networks and unveil the electronic properties of the studied materials. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
168. Kvantitativ modellering av celltillväxt vid exponering av giftiga substanser – en analys av holografiska experiment
- Author
-
Nguyen, Thi My Hanh, Antunovic Olivera, Viktoria, Nguyen, Thi My Hanh, and Antunovic Olivera, Viktoria
- Abstract
Denna uppsats är skriven på uppdrag av ett företag som har utvecklat ett mikroskop för att stödja forskning av celler. Mikroskopet är det första som kan ta detaljerade bilder av celler vid olika utvecklingsfaser och är avsedd att hjälpa forskare att förstå cellers beteende, utveckling och tillväxt under cellens livstid. De experiment och den förberedande statistiska behandlingen av mätningarna som vår analys grundar sig på har gjorts av företaget. Huvudsyftet med uppsatsen är att undersöka och belysa de tillhandahållna cellexperimentens statistiska egenskaper samt även för att avgöra om det finns någon statistiskt säkerställd behandlingseffekt på cellernas tillväxt/tillväxthastighet när de odlas i ett medium med tillsatta giftiga substanser i olika doser. Det är också av intresse att analysera och modellera samt kvantifiera cellernas tillväxthastighet (deras celldelningsintensitet) under en längre tidsperiod (48 timmar) och hur den påverkas av aktuell dos. Studien, analysen och modelleringen görs med hjälp av enkel och multipel regressionsanalys. Resultaten i uppsatsen har bland annat betonat vikten av kontrollgruppen i varje experiment. Jämförelser mellan kontrollgrupperna avslöjar även experimenteffekter samt korrelationen mellan initialt cellantal och tillväxthastighet, där färre initialceller leder till högre tillväxt. Residualanalyser har påvisat att modellen uppfyller antaganden för kontrollgruppen och lägre doser, medan högre doser uppvisar negativa tillväxtkoefficienter. En möjlig förklaring är att giftpåverkan hämmar celltillväxten för högre doser och att celldelningsprocessen fungerar annorlunda vilket inte ger tillförlitlig mäteffekt. Statistiken och modelleringen i experimentet bör därför baseras på celldelningsintensiteten, särskilt under logfasen av celldelningscykeln. En logaritmisk transformation av cellantalet, log(Y) är särskilt lämplig för att fånga den exponentiella tillväxtfasen (log-fasen) hos en cellkultur. För låga doser av giftet/preparatet
- Published
- 2024
169. Praktisk analys av vilken skyddsförmåga VLAN har mot cyberattacker i nätverk
- Author
-
Berglund, Anton, Ayoub, Yousif, Berglund, Anton, and Ayoub, Yousif
- Abstract
Nätverkssäkerheten har blivit viktigare än någonsin med tanke på de allt mer sofistikeradecyberattackerna. Bristande nätverkssäkerhet kan leda till förödande konsekvenser såsomdataförluster, läckage av konfidentiella dokument eller total systemnedgång. Det är en allmänfakta mellan nätverksingenjörer att VLAN är en teknik för att höja säkerheten i nätverk genomatt segmentera det. Men hur effektivt kan det skydda mot verkliga cyberattacker? Det härarbetet bidrar till att öka kunskapen om vilken förmåga VLAN har för att skydda mot olikacyberattacker. I arbetet används programvaran GNS3 för att bygga två likadana nätverk där enaär segmenterat med VLAN och andra är inte segmenterat. Nätverken bestod av bland annat tvåklientdatorer där ena var offret med operativsystemet Windows 10 och andra var angriparenmed Kali Linux. I nätverken fanns även en switch och en router. Med hjälp av verktygenEttercap, Dsniff och Hping3 utfördes attackerna ARP spoofing, MAC flooding och Pingflooding. Syftet med detta är att jämföra attackernas skadeeffekt med och utan VLAN.Resultaten visade att VLAN-tekniken kunde mildra skadeeffekterna mot Ping flooding,blockera ARP spoofing, men hade ingen effekt mot MAC flooding-attacken. Slutsatsen vikunde dra av arbetet är att VLAN kan vara ett bra skydd mot vissa typer av attacker, men äringet skydd mot andra. Därför bör nätverksingenjörer inte förlita sig enbart på VLAN somsäkerhetsåtgärd för sina nätverk., Network security has become more important than ever, given the increasingly sophisticatedcyberattacks. Lacking network security can lead to devastating consequences such as data loss,leakage of confidential documents, or complete system downtime. It is a well-known factbetween network engineers that VLANs is a technique to enhance network security bysegmenting it. But how effective can it be against real cyberattacks? This work contributes toincreasing the knowledge of VLAN ability to protect against various cyberattacks. In the study,the software GNS3 is used to build two identical networks where one is segmented with VLANand the other is not segmented. The networks consisted of among other things two clientcomputers where one acted as the victim with the Windows 10 operating system and the otheras the attacker with Kali Linux. The networks also included a switch and a router. Using thetools Ettercap, Dsniff, and Hping3, the attacks ARP spoofing, MAC flooding, and Ping floodingwere carried out. The purpose of this is to compare the impact of the attacks with and withoutVLAN. The results showed that the VLAN technique could mitigate the damage from Pingflooding, block ARP spoofing, but had no effect against the MAC flooding attack. Theconclusion we drew from the study is that VLAN can be a good protection against certain typesof attacks but are of no use against others. Therefore, network engineers should not rely solelyon VLAN as a security measure for their networks.
- Published
- 2024
170. Thermoelectric Effect in NiAu Alloys : Estimating the Seebeck Coefficient from the Density of States of Nickel Impurities in Gold
- Author
-
Nerman, Karl and Nerman, Karl
- Abstract
In thermoelectric materials a temperature gradient results in the generation of an electric field – a phenomenon known as the Seebeck effect – making them applicable for powering wearable electronics or for converting waste heat into electrical energy. Generally, a prerequisite for a large Seebeck coefficient is a strong asymmetry for the electronic density of states around the Fermi level. As such, semiconductors have garnered considerably more interest than metals, due to their intrinsic band gaps. Here we investigate the thermoelectric effect in bimetallic NixAu1-x alloys, where the nickel atoms are added as impurities to gold. The strong Seebeck effect here can be attributed to energy-dependent scattering of conducting Au-s electrons into localized Ni-d states around the Fermi level. The scattering rates due to both Ni impurities and the electron-phonon interaction are estimated as being proportional to the density of states of the Ni-d states, as per Fermi's golden rule. Thus, by using Mott's formula in conjunction with the Nordheim-Gorter relation for the calculation of the total Seebeck coefficient due to multiple independent scattering mechanisms, we completely circumvent the issue of calculating any resistivities. The resulting implementation can be seen to be equivalent to the DOS-1 approximation. Using a tight-binding DFT implementation, the Seebeck coefficient and figure of merit are calculated for a range of Ni concentrations and temperatures, with the maximum effect obtained at an Ni concentration of ~ 44 % and temperature T = 1200 K; yielding S = -113 µV/K and zTmax = 0.68. Our calculations are in excellent agreement with recent experiments at high temperature. As such, our work adds to the notion of NiAu alloys having high potential as thermoelectric materials, while simultaneously lending credibility and explanatory power to the DOS-1 approximation.
- Published
- 2024
171. Exploring the Crystal Structure and Electronic Properties of γ-Al 2 O 3 : Machine Learning Drives Future Material Innovations.
- Author
-
Bu Z, Xue Y, Zhao X, Liu G, An Y, Zhou H, and Chen J
- Abstract
For decades, researchers have struggled to determine the precise crystal structure of γ-Al
2 O3 due to its atomic-level disorder and the challenges associated with obtaining high-purity, high-crystallinity γ-Al2 O3 in laboratory settings. This study investigates the crystal structure and electronic properties of γ-Al2 O3 coatings under the influence of an external electric field, integrating machine learning with density functional theory (DFT). A potential 160-atom supercell structure was identified from over 600,000 γ-Al2 O3 configurations and confirmed through high-resolution transmission electron microscopy and selected area electron diffraction. The findings indicate that γ-Al2 O3 deviates from the conventional spinel structure, suggesting that octahedral vacancies can reduce the system's energy. Under an external electric field, the material's band structure and density of states (DOS) undergo significant changes: the bandgap narrows from 3.996 to 0 eV, resulting in metallic behavior, while the projected density of states (PDOS) exhibits peak broadening and splitting of oxygen atom PDOS below the Fermi level. These alterations elucidate the variations in the electrical conductivity of alumina coatings under an electric field. These findings clarify the mechanisms of γ-Al2 O3 's electronic property modulation and offer insights into its covalent and ionic mixed bonding as a wide-bandgap semiconductor. This discovery is essential for understanding dielectric breakdown in insulating materials.- Published
- 2024
- Full Text
- View/download PDF
172. An Attempt to Perform TCP ACK Storm Based DoS Attack on Virtual and Docker Network
- Author
-
Tran Nam, Khanh, Nguyen Kim, Thanh, Thanh, Ta Minh, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin (Sherman), Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Vo, Nguyen-Son, editor, and Hoang, Van-Phuc, editor
- Published
- 2020
- Full Text
- View/download PDF
173. Towards a Framework for Improving Experiments on DoS Attacks
- Author
-
Catillo, Marta, Pecchia, Antonio, Villano, Umberto, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Shepperd, Martin, editor, Brito e Abreu, Fernando, editor, Rodrigues da Silva, Alberto, editor, and Pérez-Castillo, Ricardo, editor
- Published
- 2020
- Full Text
- View/download PDF
174. Brief of Intrusion Detection Systems in Detecting ICMPv6 Attacks
- Author
-
Bdair, Adnan Hasan, Abdullah, Rosni, Manickam, Selvakumar, Al-Ani, Ahmed K., Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Liang, Qilian, Series Editor, Martin, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zhang, Junjie James, Series Editor, Alfred, Rayner, editor, Lim, Yuto, editor, Haviluddin, Haviluddin, editor, and On, Chin Kim, editor
- Published
- 2020
- Full Text
- View/download PDF
175. Development of a Distributed VoIP Honeypot System with Advanced Malicious Traffic Detection
- Author
-
Behan, Ladislav, Sevcik, Lukas, Voznak, Miroslav, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Liang, Qilian, Series Editor, Martin, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zhang, Junjie James, Series Editor, Zelinka, Ivan, editor, Brandstetter, Pavel, editor, Trong Dao, Tran, editor, Hoang Duy, Vo, editor, and Kim, Sang Bong, editor
- Published
- 2020
- Full Text
- View/download PDF
176. Real-Time Distributed Denial-of-Service (DDoS) Attack Detection Using Decision Trees for Server Performance Maintenance
- Author
-
Khare, Mrunmayee, Oak, Rajvardhan, Verma, Ajit Kumar, Series Editor, Kapur, P. K., Series Editor, Kumar, Uday, Series Editor, Pant, Millie, editor, Sharma, Tarun K., editor, Basterrech, Sebastián, editor, and Banerjee, Chitresh, editor
- Published
- 2020
- Full Text
- View/download PDF
177. Implementing and Evaluating an Intrusion Detection System for Denial of Service Attacks in IoT Environments
- Author
-
Bamou, Abdelouahed, Khardioui, Mohamed, El Ouadghiri, My Driss, Aghoutane, Badraddine, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, and Ezziyyani, Mostafa, editor
- Published
- 2020
- Full Text
- View/download PDF
178. Secure and Practical Authentication Application to Evade Network Attacks
- Author
-
Indhumathi, V., Preethi, R., Raajashri, J., Jenefer, B. Monica, Xhafa, Fatos, Series Editor, Hemanth, D. Jude, editor, Kumar, V. D. Ambeth, editor, Malathi, S., editor, Castillo, Oscar, editor, and Patrut, Bogdan, editor
- Published
- 2020
- Full Text
- View/download PDF
179. Pattern Based Detection and Mitigation of DoS Attacks in MANET Using SVM-PSO
- Author
-
Gautam, Divya, Tokekar, Vrinda, Lim, Meng-Hiot, Series Editor, Ong, Yew Soon, Series Editor, Pandit, Manjaree, editor, Srivastava, Laxmi, editor, Venkata Rao, Ravipudi, editor, and Bansal, Jagdish Chand, editor
- Published
- 2020
- Full Text
- View/download PDF
180. Comparative Analysis of DoS and DDoS Attacks in Internet of Things Environment
- Author
-
Aminu Ghali, Abdulrahman, Ahmad, Rohiza, Alhussian, Hitham Seddiq Alhassan, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, and Silhavy, Radek, editor
- Published
- 2020
- Full Text
- View/download PDF
181. An Overview of DoS and DDoS Attack Detection Techniques
- Author
-
Gniewkowski, Mateusz, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Zamojski, Wojciech, editor, Mazurkiewicz, Jacek, editor, Sugier, Jarosław, editor, and Walkowiak, Tomasz, editor
- Published
- 2020
- Full Text
- View/download PDF
182. Chasing Botnets: A Real Security Incident Investigation
- Author
-
Hatzivasilis, George, Kunc, Martin, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Hatzivasilis, George, editor, and Ioannidis, Sotiris, editor
- Published
- 2020
- Full Text
- View/download PDF
183. A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks
- Author
-
Ullah, Imtiaz, Mahmoud, Qusay H., Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Goutte, Cyril, editor, and Zhu, Xiaodan, editor
- Published
- 2020
- Full Text
- View/download PDF
184. Denial-of-Service Attacks and Countermeasures in the RPL-Based Internet of Things
- Author
-
Ioulianou, Philokypros P., Vassilakis, Vassilios G., Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Katsikas, Sokratis, editor, Cuppens, Frédéric, editor, Cuppens, Nora, editor, Lambrinoudakis, Costas, editor, Kalloniatis, Christos, editor, Mylopoulos, John, editor, Antón, Annie, editor, Gritzalis, Stefanos, editor, Pallas, Frank, editor, Pohle, Jörg, editor, Sasse, Angela, editor, Meng, Weizhi, editor, Furnell, Steven, editor, and Garcia-Alfaro, Joaquin, editor
- Published
- 2020
- Full Text
- View/download PDF
185. A Comprehensive Review of Distributed Denial of Service (DDoS) Attacks in Fog Computing Environment
- Author
-
Paharia, Bhumika, Bhushan, Kriti, Gupta, Brij B., editor, Perez, Gregorio Martinez, editor, Agrawal, Dharma P., editor, and Gupta, Deepak, editor
- Published
- 2020
- Full Text
- View/download PDF
186. Functional Near-Infrared Spectroscopy in Cancer Diagnostics
- Author
-
Myllylä, Teemu, Korhonen, Vesa, Tuchin, Valery V., editor, Popp, Jürgen, editor, and Zakharov, Valery, editor
- Published
- 2020
- Full Text
- View/download PDF
187. The effect of Cr impurity and Zn vacancy on electronic and magnetic properties of ZnSe crystal
- Author
-
S.V. Syrotyuk and Moaid K. Hussain
- Subjects
a2b6 ,energy spectrum ,dos ,strongly correlated electrons ,hybrid functional ,Physics ,QC1-999 - Abstract
The spin-polarized electronic energy spectra of the ZnCrSe crystal were obtained based on calculations for a supercell containing 64 atoms. First, calculation is performed with an impurity of Cr atom, replacing the Zn atom. In the second variant, the Cr impurity and the vacancy at the Zn atom site are considered simultaneously. The results obtained in the first variant are as follows. It was found that the presence of the Cr atom leads to significant changes in the electronic energy bands, showing a large difference for different spin moments. The density curves of electronic states with opposite spins show an asymmetry, the consequence of which is the existence of a nonzero magnetic moment of the supercell. It was found that in the ZnCrSe crystal electronic 3d states with spin up are present at the Fermi level, i.e. the material is a metal. For spin-down states, the material is a semiconductor in which the Fermi level is inside the band gap. The value of the direct interband gap for electronic states with spin up is equal to 1.56 eV, and the magnetic moment of the supercell is 4.00 . The results obtained by the second variant of the calculation show a significant effect of the vacancy on the zinc site on the electronic structure of the ZnCrSe crystal. The Fermi level now intersects the dispersion curves of the upper part of the valence band for both spin orientations. The magnetic moment of the supercell is 2.74 .
- Published
- 2021
- Full Text
- View/download PDF
188. CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment
- Author
-
Euclides Carlos Pinto Neto, Sajjad Dadkhah, Raphael Ferreira, Alireza Zohourian, Rongxing Lu, and Ali A. Ghorbani
- Subjects
Internet of Things (IoT) ,dataset ,security ,machine learning ,deep learning ,DoS ,Chemical technology ,TP1-1185 - Abstract
Nowadays, the Internet of Things (IoT) concept plays a pivotal role in society and brings new capabilities to different industries. The number of IoT solutions in areas such as transportation and healthcare is increasing and new services are under development. In the last decade, society has experienced a drastic increase in IoT connections. In fact, IoT connections will increase in the next few years across different areas. Conversely, several challenges still need to be faced to enable efficient and secure operations (e.g., interoperability, security, and standards). Furthermore, although efforts have been made to produce datasets composed of attacks against IoT devices, several possible attacks are not considered. Most existing efforts do not consider an extensive network topology with real IoT devices. The main goal of this research is to propose a novel and extensive IoT attack dataset to foster the development of security analytics applications in real IoT operations. To accomplish this, 33 attacks are executed in an IoT topology composed of 105 devices. These attacks are classified into seven categories, namely DDoS, DoS, Recon, Web-based, brute force, spoofing, and Mirai. Finally, all attacks are executed by malicious IoT devices targeting other IoT devices. The dataset is available on the CIC Dataset website.
- Published
- 2023
- Full Text
- View/download PDF
189. The efficiency of n- and p-type doping silicon carbide nanocage toward (NO2, SO2, and NH3) gases.
- Author
-
Soliman, Kamal A. and Aal, S. Abdel
- Abstract
The sensitivity of pristine silicon carbide nanocage Si
12 C12 and their doping with n-type (SiP –Si11 C12 ) and p-type (CB –Si12 C11 ) were investigated for NO2 , SO2 , and NH3 gases using density functional theory (DFT). The reactivity of nanocages was examined through adsorption energy, charge transfer, the density of states (DOS), thermodynamic parameters, frontier molecular orbitals, molecular electrostatic potential, and nonlinear optical properties. The results revealed that doping with p-type has excellent sensitivity for SO2 , NO2 , and NH3 gases compared with pristine and n-type doped nanocages. [ABSTRACT FROM AUTHOR]- Published
- 2022
- Full Text
- View/download PDF
190. Design and Tailoring the Optical and Electronic Characteristics of Silicon Doped PS/SnS2 New Composites for Nano-Semiconductors Devices.
- Author
-
Ahmed, Hind and Hashim, Ahmed
- Abstract
The present paper deals with design of silicon doped PS/SnS
2 new composites to use in different nano-semiconductors devices include optic, electronic, photonic and electric approaches with individual characteristics contain few cost, high corrosion resistance, lightweight and good optical, thermal and electronic properties. Using the density functional theory (DFT), some of the electronic (energy band structure, density of states) and electronic characteristics of PS/SnS2 /Si composites. S-vacancy could lead to strong n doping for the original SnS2 , which largely influences its electronic structure. The obtained results indicated to the PS/SnS2 /Si composites may be used for various optoelectronics devices with low cost and high flexibly. The energy band gap PS/SnS2 /Si composites was found (Eg = 0.19 eV) which make it can be suitable in various nano-semiconductors devices. The calculated density of states (DOS) may interpret this magnitude of energy gap. [ABSTRACT FROM AUTHOR]- Published
- 2022
- Full Text
- View/download PDF
191. A Defense Mechanism Against DoS Attacks on Unmanned Aerial Vehicle Communication.
- Author
-
TÜMEN, Vedat and DEMİR, Kubilay
- Subjects
- *
DRONE aircraft , *WIRELESS communications , *EARTH stations , *DENIAL of service attacks , *MIDDLEWARE - Abstract
The use of Unmanned Aerial Vehicles (UAV) in every field is increasing rapidly. In order for UAVs to perform their duties correctly, they must be able to maintain continuous communication with ground stations. The use of WiFi wireless communication protocol has increased due to its high bandwidth. One of the most important threats that can threaten this type of communication is Denial of Service (DoS) attacks. In the event of such an attack, the UAV becomes inaccessible and may crash. Especially when the open port number is known, it becomes much easier to perform attacks that consume the resources of the drone. In this study, a mechanism is proposed to eliminate or at least mitigate the attack risk. This mechanism enables UAVs using wireless communication (WiFi) to communicate using TCP over UDP using middleware. In addition, by periodically changing the UDP open ports with a secret port number sequence known to both parties, it prevents the attacker from using the open port for a long time and renders the attack ineffective. In this study, the effects of the port hopping method on UAVs are evaluated. Test results on real systems shows that the proposed system makes the communication system of UAVs more resistant to DoS attacks by 91.2%. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
192. First-principle study on ionic pair dissociation in PEO-PVP-NaClO4 blend for solid polymer electrolyte.
- Author
-
Gupta, Shivani, Gupta, Abhishek Kumar, and Pandey, B. K.
- Subjects
- *
SOLID electrolytes , *POLYELECTROLYTES , *POLYMER blends , *POLYETHYLENE oxide , *IONIC crystals , *IONIC conductivity - Abstract
Investigation of physicochemical and electronic properties of polyethylene oxide (PEO) and polyvinylpyrrolidone (PVP) blended solid polymer electrolyte incorporated with sodium perchlorate (NaClO4) as ion-conducting species has been carried out using first-principle Study. A proficient approach is proposed to analyse the conductive mechanism of electrolytes, based on density functional theory. Density of states (DOS) and projected density of states (PDOS) analysis provides a quantitative explanation of the electronic bandgap of the polymer–polymer (PEO-PVP) and polymer–salt (PEO-PVP-NaClO4) system. The bonding characteristic and charge distributions determined by charge density plot and crystal orbital overlap population analysis show to have a strong qualitative correlation with the ionic conductivity in solid polymer electrolyte. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
193. Magneto-Electronic and Optical Properties of Full Heusler Alloy, Y2FeSi: a First Principle Calculation With and Without Spin–Orbit Coupling Effect.
- Author
-
Kumar, Arvind, Swati, Kumar, Manish, Chaudhary, Vikrant, Sharma, Gaurav, Singh, V. P., and Singh, Rishi P.
- Subjects
- *
HEUSLER alloys , *SPIN-orbit interactions , *OPTICAL properties , *SPIN polarization , *DIELECTRIC function - Abstract
The first principle calculation to investigate the structural, optoelectronic, and magnetic properties of the Y2FeSi Heusler alloy (HA) using the Wien2K code has been discussed in detail in the present manuscript. To estimate the physical properties of the HA, PBE-GGA and mBJ exchange–correlation functional were applied. The electronic charge density contour plot represents the dominant ionic character among the atomic configurations of Y2FeSi compound. Density of states (DOS) across the Fermi level (EF) exhibits the prominent role of Fe-3d electronic states along with Y-4d and Si-2p electronic states. Estimated spin polarization (SP ~ 75%) from the DOS profile suggests the metallic nature with magnetic (ferromagnetic having magnetic moment ~ 1.65 µB/cell for the HA) ordering of the compound. Phonon spectra represents the dynamical stability of the Y2FeSi compound. Additionally, the consequence of spin–orbit coupling (SOC) on material's physical properties was also explored. Band structure (BS) with SOC effect shows additional energy levels across the EF, due to splitting of Y-atoms' energy levels. A dielectric function was assessed with and without SOC to study the optical properties. Overall, Y2FeSi HA reveals interesting electronic, magnetic, and optical properties that have the potential for application in optical and spintronic devices. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
194. A new Zn(II)-based 3D MOF with PCU-like topology: Potent photocatalyst for nitrofurazone antibiotic degradation.
- Author
-
Zhang, Jian, Zhao, Tingting, Kushwaha, Aparna, Daniel, Omoding, Afzal, Mohd, Alarifi, Abdullah, Kumar, Abhinav, and Jin, Juncheng
- Subjects
- *
PHOTOCATALYSTS , *SURFACE analysis , *PHOTODEGRADATION , *BAND gaps , *DENSITY of states - Abstract
• A new 3D Zn(II)-based MOF was synthesized and characterized. • The MOF was employed as a photocatalyst for antibiotic degradation. • MOF exhibited best photocatalytic degradation of nitrofurazone antibiotic. • Effect of NFZ concentration and MOF dosage on photocatalytic performance studied. Metal-organic frameworks (MOFs), a sub-class of coordination polymers, are versatile multidimensional materials that have the potential to serve as photocatalysts for the degradation of antibiotics found in wastewater. Herein, a new three dimensional (3D) Zn(II)-based MOF [Zn(TA)(bpyp)·3H 2 O] (1) (bypy = 2,5-bis(pyrid-4-yl)pyridine; H 2 TA = terephthalic acid) has been synthesized and characterized. The MOF 1 shows a 3D PCU -like topology and exhibits semiconducting properties with band gap of 3.34 eV and hence used as a photocatalyst for photodegradation of antibiotics viz. sulfasalazine (SLA), nitrofurazone (NFZ) and furazolidone (FZD) under simulated UV light irradiation. The photocatalytic results suggest that MOF 1 exhibits best photocatalytic activity for the photodegradation of nitrofurazone (NFZ) in 60 min time-span. The effects of initial concentration of NFZ, and photocatalyst dosage have been monitored for the photocatalytic performance of 1. The radical trapping experiments suggest that (holes) h + and superoxide radical (O 2 ·−) collectively catalyzes the photodecomposition of antibiotics. The possible mechanism for the antibiotic degradation by photocatalyst 1 have been proposed by integrating experiment with density of states (DOS) calculations and Hirshfeld surface analysis. A new Zn(II)-based MOF with PCU-like topology synthesized, characterized and used as photocatalyst for photodegradation of antibiotics. [Display omitted] [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
195. Insight into the theoretical approach to calculate molecular geometries, absorption, and IR spectra of Vat Orange 7.
- Author
-
Yusaf, Amnah, Mansha, Asim, Usman, Muhammad, Bhatti, Muhammad Ahsan, Ibrahim, Ahmed, Zidan, Ammar, Alam, Kamran, Ullah, Asmat, Nasir, Jamal Abdul, Mahmood, Sajid, Afshan, Noshin, Iqbal, Shahid, and Akhter, Toheed
- Subjects
- *
TIME-dependent density functional theory , *MOLECULAR absorption spectra , *GASES , *INTRAMOLECULAR charge transfer , *MOLECULAR shapes - Abstract
• Theoretical investigation of VOG has been done and optimized by DFT/B3LYP method. • The IR and UV–visible data has been compared with the experimental results. • The chemical reactivity and the stability of the compounds were also examined. • Mulliken charge investigation and MESP shows the reactive site of the compound. • Thermodynamic parameters were studied, which confirmed the stability of compound. In this paper, the computational investigation of Vat orange 7 has been studied. Vat dyes have high color fatness, due to which the investigation into the geometric properties should be studied and can be helpful in various applications, therefore the geometric parameters i.e., bond angles, bond length, energies, dipole moment, dihedral angles, Mulliken, atomic polar tensor (APT) atomic charges, and thermodynamics energies were calculated for the titled compound. The potential energy surface of vat orange dyes was computed at the quantum mechanical calculation level by using the Density functional theory, DFT/B3LYP/6311/6–311++ G) basic set. The molecular absorption and IR spectra of vat orange 7 were computed in both the gaseous state and various solvent environments i.e., water, ethanol, DMSO, heptane, and acetonitrile. A comparison was also made with the experimental spectra of UV/visible and FTIR studies. Computer programs such as Gaussian 16 W and Hyperchem are used to perform calculations. The line shape of the emission spectrum of the computed spectra is correlated with the experimentally observed spectra. The effect of solvent shift, protonic shift, and other parameters for different solvents according to their polarity and prototype were thoroughly investigated. By polarized continuum model (PCM) coupled with time-dependent density functional theory (TD-DFT) along DFT/B3LYP/6–311G++ basic sets were calculated, which shows perfect converges to excitation spectra and geometries. To understand the intermolecular and intramolecular interaction of compounds and the transfer of density from filled to unfilled orbitals, NBO analysis was performed. The analysis of the intramolecular charge transfer mechanism involved the determination of HOMO-LUMO energies. The calculations show that Vat Orange 7 exhibits higher reactivity in the medium with the smallest HOMO-LUMO gap. [Display omitted] Representation of energy levels and molecular orbital surfaces of Vat Orange 7 computed by DFT/B3LYP/6311++ G (d,p) method. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
196. Insights into bismuthene and antimonene as cisplatin drug carriers: A theoretical comparative investigation.
- Author
-
Khalid, Swera, Ramzan, Sawera, Alarfaji, Saleh S, Ahmad Buzdar, Saeed, and Isa Khan, Muhammad
- Subjects
- *
FRONTIER orbitals , *DRUG adsorption , *DRUG delivery systems , *ANTINEOPLASTIC agents , *DRUG carriers - Abstract
While effective targeted delivery is a challenge in nanomedicine for the delivery of anti-cancer drugs, this work focuses on the potential use of Bismuthene and antimonene nanosheets as nanocarriers for cisplatin anti-cancer using DFT methods. The results indicate that, compared to antimonene, bismuthene demonstrates significantly better physical stability, drug release rate, solubility, and biocompatibility, making it an excellent candidate for drug delivery systems. The parallel and perpendicular orientations of the anticancer drug were adsorbed on both nanosheets; the parallel configuration was the most energetically favored with an adsorption energy of −0.79 eV at the parallel site. A charge transfer from the drug to the bismuthene sheet is also revealed by the electronic charge analysis and DOS calculation, thus confirming efficient drug adsorption. Modeling a proton attack on the drug and the carrier surface near the adsorption sites was performed to model drug release, showing the stability and potential of bismuthene in this aspect of drug release mechanisms. Further, with an approach to studying its interactions with biomolecules, interactions of the drug molecule have been analyzed with amino acids, showing that drugs interact efficiently. Further assessments concerning work function, recovery time, electron localization function, and frontier molecular orbital analyses leave no doubt that bismuthene has beneficial features over antimonene. These thorough assessments present bismuthene as a more promising nanocarrier for the delivery of anti-cancer drugs and open a potential pathway to enhance the efficacy of strategies against cancer treatment. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
197. Comparing fluoro- and trifluoromethyl-functionalized Ni(II) 1,1-dithiolates with 1,1′-bis-(diphenylphosphino)ferrocene co-ligand in DSSC applications.
- Author
-
Kushwaha, Aparna, Srivastava, Devyani, Kociok-Köhn, Gabriele, Gosavi, Suresh W., Ashokkumar, Mutthupandian, Chauhan, Ratna, Ahmed, Sarfaraz, and Kumar, Abhinav
- Subjects
- *
DYE-sensitized solar cells , *CHARGE exchange , *SINGLE crystals , *SHORT circuits , *PHOTOSENSITIZERS - Abstract
Four new heteroleptic Ni(II)-dithiolates with general formula [Ni(dppf)(dithiolate)] (dithiolate = 2-cyano-2-(4-fluorophenyl)ethene-1,1-bis(dithiolate) (Ni-1); 2-cyano-2(2-(trifluoromethyl)phenyl)ethene-1,1-bis(thiolate) (Ni-2); 2-cyano-2(3-(trifluoromethyl)phenyl)ethene-1,1-bis(thiolate) (Ni-3) and 2-cyano-2(4-(trifluoromethyl)phenyl)ethene-1,1-bis(thiolate) (Ni-4); dppf = 1,1′-bis(diphenylphosphino) ferrocene) have been synthesized and characterized spectroscopically as well as by single crystal X-ray diffraction technique. Single crystal X-ray analyses for Ni-1 and Ni-2 reveal distorted square planar geometry around Ni(II) that are satisfied by two sulfur and two phosphorus centers of the dithiolate and dppf ligands, respectively. These complexes have been used as photosensitizers in TiO 2 -based dye-sensitized solar cells (DSSCs) which suggest that the performance of fluoro-substituted sensitizer Ni-1 is superior to that of the other three trifluoromethyl-substituted sensitizers. Ni-1 showcases an efficiency (η) of 5.47 %, open circuit potential (V oc) of 0.699 V, short circuit current (J sc) of 12.17 mA∙cm−2 and display 64 % incident photon-to-current conversion efficiency. The plausible reason for the variation in photovoltaic performances have been explained by integrated experimental methods and theoretical calculations. Results indicate that the small sized fluoro-group exhibits significant p -orbital overlap with the aromatic fragment of the dithiolate ligand, allowing facile photo-induced electron transfer from sensitizer to titania, thereby enhancing the electron donation from dppf→Ni(II)→dithiolate. Further, the cell fabricated with Ni-1 retains approximately 93 % of its initial conversion efficiency in 800 h time span. [Display omitted] • Four new dppf appended Ni(II)-dithiolates with F- and CF 3 groups synthesized and characterized. • The nature of weak interactions in one of the complexes explored using Hirshfeld surface analysis. • These dithiolates have been employed as sensitizers in dye-sensitized solar cells. • The observed differences in the photovolatic behavior of the complexes were justified by integrated experimental and computational approach. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
198. Vacancy defect in boron nitride nanotube improves CO2 uptake from the gaseous mixture.
- Author
-
Akhtar, Kaynat, Sarfaraz, Sehrish, and Ayub, Khurshid
- Subjects
- *
CARBON sequestration , *ATOMS in molecules theory , *GREENHOUSE gas analysis , *BORON nitride , *FRONTIER orbitals - Abstract
Boron Nitride Nanotubes (BNNTs), 1-D nanomaterials, having extraordinary mechanical properties, are similar to carbon nanotubes. The structure of BNNT consists of alternative boron and nitrogen atoms, arranged in hexagonal lattice. In the current study, we have investigated the defected boron nitride nanotube (defBNNT) capability to capture CO 2 from a mixture of greenhouse gases such as CH 4 , CO 2 , CO, and H 2. The deep understanding of analytes@defBNNT complexation is acquired by interaction energies, quantum theory of atoms in molecules (QTAIM), noncovalent interaction (NCI), natural bond orbital (NBO), and frontier molecular orbital (FMO) analysis etc. It is evident from the results of interaction energies that all the analytes are physiosorbed over the defBNNT. The observed interaction energies are in the range of −2.09 to −6.43 kcal/mol. All the topological parameters, in QTAIM analysis, show that analyte@defBNNT complexes are stabilized through non-covalent interactions, particularly van der Waal's interactions. Results obtained from NCI analysis are strongly corroborated with the QTAIM analysis. The case of CO@defBNNT gives the highest charge transfer (0.031 e−), in natural bond orbital (NBO) analysis. Overall, there is a transfer of charge from analyte to the surface. Through electron density difference (EDD) analysis, the results of NBO charge transfer are also confirmed. We firmly believe that these findings could help experimentalists to design a well-suited surface for CO 2 capture using defective boron nitride nanotubes (defBNNTs). [Display omitted] • The highest interaction energy value is observed for CO 2 analyte (−6.43 kcal/mol). • QTAIM analysis reveals that analyte@defBNNT complexes are stabilized mainly through van der Waal's interactions. • defBNNT can act as a promising candidate for selective capture of CO 2. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
199. A Computational Investigation of Electronic Structure and Optical Properties of AlCuO2 and AlCu0.96Fe0.04O2: A First Principle Approach
- Author
-
Md. Tawhidul Islam, Ajoy Kumer, Unesco Chakma, and Debashis Howlader
- Subjects
band gap ,dos ,electronic structure ,fe doping ,optical properties ,pdos ,Science ,Chemistry ,QD1-999 - Abstract
The synthesized compound AlCuO2 was established and structurally characterized as the semiconductor. It is noted that there are no available data for theoretical studies, as well as computational studies. For developing theoretical studies on AlCuO2, this study has been designed by computational tools. Applying computational approaches, the electronic structure and optical properties were calculated for the AlCuO2 molecule, and computational tools of the CASTAP code from material studio 8.0 were used in this investigation. First of all, the band gap was recorded by 1.81 eV through the Generalized Gradient Approximation (GGA) based on the Perdew Burke Ernzerhof (PBE), and the density of state and the partial density of state were simulated for evaluating the nature of 3s2, 3p1 orbital for Al, 3d10, 4s1 orbital for Cu, 3d6, 4s2 orbital for Fe and 2s2, 2p4 orbital for O atom of AlCuO2. The optical properties, for instance, absorption, reflection, refractive index, conductivity, dielectric function, and loss function, were calculated. To develop the conducting nature, 4% Fe atom was doped by replacing the Cu atom on AlCuO2. As a result, the band gap was found at 0.00 eV having molecular formulation as AlCu0.96Fe0.04O2, as well as the optical conductivity and optical absorption was soared comparing with parent AlCuO2. From the analysis of the band gap and optical properties in AlCu0.96Fe0.04O2, it can be established that the semiconductor, AlCuO2, has converted into a superconductor due to 4% Fe atom doping. DOI: http://dx.doi.org/10.17807/orbital.v13i1.1533
- Published
- 2021
- Full Text
- View/download PDF
200. Monte Carlo Simulation of Diffuse Optical Spectroscopy for 3D Modeling of Dental Tissues
- Author
-
Mousa Moradi and Yu Chen
- Subjects
Monte Carlo ,DOS ,3D tooth model ,transmittance ,reflectance ,Chemical technology ,TP1-1185 - Abstract
Three-dimensional precise models of teeth are critical for a variety of dental procedures, including orthodontics, prosthodontics, and implantology. While X-ray-based imaging devices are commonly used to obtain anatomical information about teeth, optical devices offer a promising alternative for acquiring 3D data of teeth without exposing patients to harmful radiation. Previous research has not examined the optical interactions with all dental tissue compartments nor provided a thorough analysis of detected signals at various boundary conditions for both transmittance and reflectance modes. To address this gap, a GPU-based Monte Carlo (MC) method has been utilized to assess the feasibility of diffuse optical spectroscopy (DOS) systems operating at 633 nm and 1310 nm wavelengths for simulating light-tissue interactions in a 3D tooth model. The results show that the system’s sensitivity to detect pulp signals at both 633 nm and 1310 nm wavelengths is higher in the transmittance compared with that in the reflectance mode. Analyzing the recorded absorbance, reflectance, and transmittance data verified that surface reflection at boundaries can improve the detected signal, especially from the pulp region in both reflectance and transmittance DOS systems. These findings could ultimately lead to more accurate and effective dental diagnosis and treatment.
- Published
- 2023
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.