25 research outputs found

    Maximizing the antioxidant capacity of Padina pavonica by choosing the right drying and extraction methods

    Get PDF
    Marine algae are becoming an interesting source of biologically active compounds with a promising application as nutraceuticals, functional food ingredients, and therapeutic agents. The effect of drying (freeze-drying, oven-drying, and shade-drying) and extraction methods (shaking at room temperature, shaking in an incubator at 60 \ub0C, ultrasound-assisted extraction (UAE), and microwave-assisted extraction (MAE)) on the total phenolics content (TPC), total flavonoids content (TFC), and total tannins content (TTC), as well as antioxidant capacity of the water/ethanol extracts from Padina pavonica were investigated. The TPC, TFC, and TTC values of P. pavonica were in the range from 0.44 \ub1 0.03 to 4.32 \ub1 0.15 gallic acid equivalents in mg/g (mg GAE/g) dry algae, from 0.31 \ub1 0.01 to 2.87 \ub1 0.01 mg QE/g dry algae, and from 0.32 \ub1 0.02 to 10.41 \ub1 0.62 mg CE/g dry algae, respectively. The highest TPC was found in the freeze-dried sample in 50% ethanol, extracted by MAE (200 W, 60 \ub0C, and 5 min). In all cases, freeze-dried samples extracted with ethanol (both 50% and 70%) had the higher antioxidant activity, while MAE as a green option reduces the extraction time without the loss of antioxidant activity in P. pavonica

    A software framework for alleviating the effects of MAC-aware jamming attacks in wireless access networks

    Get PDF
    The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associated with a given access point (AP). In this paper, we first identify a clever, low-power jamming attack that can take advantage of this behavioral trait: the placement of a lowpower jammer in a way that it affects a single legitimate client can cause starvation to all the other clients. In other words, the total throughput provided by the corresponding AP is drastically degraded. To fight against this attack, we design FIJI, a cross-layer anti-jamming system that detects such intelligent jammers and mitigates their impact on network performance. FIJI looks for anomalies in the AP load distribution to efficiently perform jammer detection. It then makes decisions with regards to optimally shaping the traffic such that: (a) the clients that are not explicitly jammed are shielded from experiencing starvation and, (b) the jammed clients receive the maximum possible throughput under the given conditions. We implement FIJI in real hardware; we evaluate its efficacy through experiments on two wireless testbeds, under different traffic scenarios, network densities and jammer locations. We perform experiments both indoors and outdoors, and we consider both WLAN and mesh deployments. Our measurements suggest that FIJI detects such jammers in realtime and alleviates their impact by allocating the available bandwidth in a fair and efficient way. © Springer Science+Business Media

    Optimizing Decision Tree Attack on CAS Scheme

    No full text
    In this paper we show a successful side-channel timing attack on a well-known high-complexity cognitive authentication (CAS) scheme. We exploit the weakness of CAS scheme that comes from the asymmetry of the virtual interface and graphical layout which results in nonuniform human behavior during the login procedure, leading to detectable variations in user's response times. We optimized a well-known probabilistic decision tree attack on CAS scheme by introducing this timing information into the attack. We show that the developed classifier could be used to significantly reduce the number of login sessions required to break the CAS scheme

    Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks

    No full text
    Smartphones are being increasingly used to perform financial transactions (through m-banking, virtual wallet or as a smartcard). The latter applications involve contactless technology (e.g., NFC) that is known to be vulnerable to mafia fraud attacks. In this work we show that a secret message inside an appropriately folded piece of paper (fortune cookie) can be used to effectively mitigate the mafia fraud attack. Fortune cookies implement a weakly unrelayable channel that, in combination with smartphones, provides a provable protection against those attacks. Our solution requires minimal or no hardware changes to the existing equipment (especially on the user’s side) and is suitable for different communication technologies (e.g., intra-body communication, NFC, WiFi, Bluetooth, sound, infrared)

    Capacity-Fairness Performance of an Ad Hoc IEEE 802.11 WLAN with Noncooperative Stations

    No full text
    corecore