In the age of smartphones, people do most of their daily work using their smartphones due to significant improvement in smartphone technology. When comparing different platforms such as Windows, iOS, Android, and Blac...In the age of smartphones, people do most of their daily work using their smartphones due to significant improvement in smartphone technology. When comparing different platforms such as Windows, iOS, Android, and Blackberry, Android has captured the highest percentage of total market share [1]. Due to this tremendous growth, cybercriminals are encouraged to penetrate various mobile marketplaces with malicious applications. Most of these applications require device information permissions aiming to collect sensitive data without user’s consent. This paper investigates each element of system information permissions and illustrates how cybercriminals can harm users’ privacy. It presents some attack scenarios using READ_PHONE_STATE permission and the risks behind it. In addition, this paper refers to possible attacks that can be performed when additional permissions are combined with READ_PHONE_STATE permission. It also discusses a proposed solution to defeat these types of attacks.展开更多
Mobile applications affect user’s privacy based on the granted application’s permissions as attackers exploit mobile application permissions in Android and other mobile operating systems. This research divides permi...Mobile applications affect user’s privacy based on the granted application’s permissions as attackers exploit mobile application permissions in Android and other mobile operating systems. This research divides permissions based on Google’s classification of dangerous permissions into three groups. The first group contains the permissions that can access user’s private data such as reading call log. The second group contains the permissions that can modify user’s data such as modifying the numbers in contacts. The third group contains the remaining permissions which can track the location, and use the microphone and other sensitive issues that can spy on the user. This research is supported by a study that was conducted on 100 participants in Saudi Arabia to show the level of users’ awareness of associated risks in mobile applications permissions. Associations among the collected data are also analyzed. This research fills the gap in user’s awareness by providing best practices in addition to developing a new mobile application to help users decide whether an application is safe to be installed and used or not. This application is called “Sparrow” and is available in Google Play Store.展开更多
The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and...The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and access information.Among the many smartphones available,those operating on the Android platform dominate,being the most widely used type.This widespread adoption of the Android OS has significantly contributed to increased malware attacks targeting the Android ecosystem in recent years.Therefore,there is an urgent need to develop new methods for detecting Android malware.The literature contains numerous works related to Android malware detection.As far as our understanding extends,we are the first ones to identify dangerous combinations of permissions and system calls to uncover malicious behavior in Android applications.We introduce a novel methodology that pairs permissions and system calls to distinguish between benign and malicious samples.This approach combines the advantages of static and dynamic analysis,offering a more comprehensive understanding of an application’s behavior.We establish covalent bonds between permissions and system calls to assess their combined impact.We introduce a novel technique to determine these pairs’Covalent Bond Strength Score.Each pair is assigned two scores,one for malicious behavior and another for benign behavior.These scores serve as the basis for classifying applications as benign or malicious.By correlating permissions with system calls,the study enables a detailed examination of how an app utilizes its requested permissions,aiding in differentiating legitimate and potentially harmful actions.This comprehensive analysis provides a robust framework for Android malware detection,marking a significant contribution to the field.The results of our experiments demonstrate a remarkable overall accuracy of 97.5%,surpassing various state-of-the-art detection techniques proposed in the current literature.展开更多
In recent days the usage of android smartphones has increased exten-sively by end-users.There are several applications in different categories bank-ing/finance,social engineering,education,sports andfitness,and many mor...In recent days the usage of android smartphones has increased exten-sively by end-users.There are several applications in different categories bank-ing/finance,social engineering,education,sports andfitness,and many more applications.The android stack is more vulnerable compared to other mobile plat-forms like IOS,Windows,or Blackberry because of the open-source platform.In the Existing system,malware is written using vulnerable system calls to bypass signature detection important drawback is might not work with zero-day exploits and stealth malware.The attackers target the victim with various attacks like adware,backdoor,spyware,ransomware,and zero-day exploits and create threat hunts on the day-to-day basics.In the existing approach,there are various tradi-tional machine learning classifiers for building a decision support system with limitations such as low detection rate and less feature selection.The important contents taken for building model from android applications like Intent Filter,Per-mission Signature,API Calls,and System commands are taken from the manifestfile.The function parameters of various machine and deep learning classifiers like Nave Bayes,k-Nearest Neighbors(k-NN),Support Vector Machine(SVM),Ada Boost,and Multi-Layer Perceptron(MLP)are done for effective results.In our pro-posed work,we have used an unsupervised learning multilayer perceptron with multiple target labels and built a model with a better accuracy rate compared to logistic regression,and rank the best features for detection of applications and clas-sify as malicious or benign can be used as threat model by online antivirus scanners.展开更多
China Nitrogenous Fertilizer Industry Association(CNFIA) disclosed on March 12th thatthe drafted permission conditions for the syntheticammonia will soon be submitted to theMinistry of Industry and Information Technol...China Nitrogenous Fertilizer Industry Association(CNFIA) disclosed on March 12th thatthe drafted permission conditions for the syntheticammonia will soon be submitted to theMinistry of Industry and Information Technologyof China for approval.The draftedpermissions, drawn by CFNIA, proposedprimarily the minimum capacity for new syntheticammonia project is 300 000 t/a, mean-展开更多
The purpose of introducing blockchain into electronic archives sharing and utilization is to break the information barrier between electronic archives sharing departments by relying on technologies such as smart contr...The purpose of introducing blockchain into electronic archives sharing and utilization is to break the information barrier between electronic archives sharing departments by relying on technologies such as smart contract and asymmetric encryption.Aiming at the problem of dynamic permission management in common access control methods,a new access control method based on smart contract under blockchain is proposed,which improves the intelligence level under blockchain technology.Firstly,the Internet attribute access control model based on smart contract is established.For the dynamic access of heterogeneous devices,the management contract,permission judgment contract and access control contract are designed;Secondly,the access object credit evaluation algorithm based on particle swarm optimization radial basis function(PSO-RBF)neural network is used to dynamically generate the access node credit threshold combined with the access policy,so as to realize the intelligent access right management method.Finally,combined with the abovemodels and algorithms,the workflow of electronic archives sharing and utilization model of multi blockchain is constructed.The experimental results show that the timeconsuming of the process increases linearly with the number of continuous access to electronic archives blocks,and the secure access control of sharing and utilization is feasible,secure and effective.展开更多
Mining activities in the Copperbelt province of Zambia have been of great environmental concern, despite recorded improvements in the socio-economic sector. Heavy metal contamination of soils resulting from depositing...Mining activities in the Copperbelt province of Zambia have been of great environmental concern, despite recorded improvements in the socio-economic sector. Heavy metal contamination of soils resulting from depositing mine tailings and rock waste has posed possible health risks for communities nearer such facilities. The current study was conducted around residential homes surrounding Kitwe slimes (TD25). This work investigated levels of Co, Cu, Fe, Mn and Pb in the soils, and avocado and lemons fruits, growing near TD25. Heavy metals were analyzed using Atomic Absorption Spectrophotometer. The work further assessed the estimated daily intake (EDI) associated with potential health risks to humans. In the soil, concentration levels of heavy metals showed a trend in the order: Fe > Cu > Mn > Co > Pb. Heavy metal contents in avocado and lemon fruits at 200 and 400 m away from TD25, all had p-values < 0.05. The distances from the suspect source (TD25) to where the fruit trees were grown, had no influence on their concentration in the fruit samples. Fruit sample results showed that Fe had the highest EDI of 0.22 mg·kg<sup>-1</sup> (avocado) and 0.14 mg·kg<sup>-1</sup> (lemon), though both results were far below the FAO/WHO standard range (12.5 - 19.6 mg·kg<sup>-1</sup>). For both fruits, Co and Pb results were negligible. The concentration of the five heavy metals in avocado and lemon fruits grown around Kitwe slimes did not pose any health risks to the consumers.展开更多
'Core' neuropathology of degenerative central nervous system (CNS) disorders The common human neurodegenerative disorders (Alzheimer's disease (AD), Parkinson's disease (PD), amyotrophic lateral sclerosis, ...'Core' neuropathology of degenerative central nervous system (CNS) disorders The common human neurodegenerative disorders (Alzheimer's disease (AD), Parkinson's disease (PD), amyotrophic lateral sclerosis, etc.) vary with respect to risk factors, ages of onset, sex predilections, neuraxial regions affected, hallmark cellular inclusions, behavioral and neurological symptoms, and responses to treatment. Despite these differences, there appears to be a set of 'core' neuropathological features shared among these and related entities. Common to these conditions are 1) pathological deposition of non-transferrin bound iron, 2) oxidative stress and associated protein, lipid and nucleic acid modifications, 3) mitochondrial membrane damage and bioenergetic failure, and 4) macroautophagy in the affected neural tissues.展开更多
Dynamic soaring is a flight maneuver to exploit gradient wind field to extend endurance and traveling distance.Optimal trajectories for permissible wind conditions are generated for loitering dynamic soaring as well a...Dynamic soaring is a flight maneuver to exploit gradient wind field to extend endurance and traveling distance.Optimal trajectories for permissible wind conditions are generated for loitering dynamic soaring as well as for traveling patterns with a small unmanned aerial vehicle.The efficient direct collection approach based on the Runge-Kutta integrator is used to solve the optimization problem.The fast convergence of the optimization process leads to the potential for real-time applications.Based on the results of trajectory optimizations,the general permissible wind conditions which involve the allowable power law exponents and feasible reference wind strengths supporting dynamic soaring are proposed.Increasing the smallest allowable wingtip clearance to trade for robustness and safety of the vehicle system and improving the maximum traveling speed results in shrunken permissible domain of wind conditions for loitering and traveling dynamic soaring respectively.Sensitivity analyses of vehicle model parameters show that properly reducing the wingspan and increasing the maximum lift-to-drag ratio and the wing loading can enlarge the permissible domain.Permissible domains for different traveling directions show that the downwind dynamic soaring benefitting from the drift is more efficient than the upwind traveling pattern in terms of permissible domain size and net traveling speed.展开更多
Background:Electronic Health Record(EHR)systems are used as an efficient and effective technique for sharing patient’s health records among different hospitals and various other key stakeholders of the healthcare ind...Background:Electronic Health Record(EHR)systems are used as an efficient and effective technique for sharing patient’s health records among different hospitals and various other key stakeholders of the healthcare industry to achieve better diagnosis and treatment of patients globally.However,the existing EHR systems mostly lack in providing appropriate security,entrusted access control and handling privacy and secrecy issues and challenges in current hospital infrastructures.Objective:To solve this delicate problem,we propose a Blockchain-enabled Hyperledger Fabric Architecture for different EHR systems.Methodology:In our EHR blockchain system,Peer nodes from various organizations(stakeholders)create a ledger network,where channels are created to enable secure and private communication between different stakeholders on the ledger network.Individual patients and other stakeholders are identified and registered on the network by unique digital certificates issued by membership service provider(MSP)component of the fabric architecture.Results:We created and implemented different Chaincodes to handle the business logic for executing separate EHR transactions on the network.The proposed fabric architecture provides a secure,transparent and immutable mechanism to store,share and exchange EHRs in a peer-to-peer network of different healthcare stakeholders.It ensures interoperability,scalability and availability in adapting the existing EHRs for strengthening and providing an effective and secure method to integrate and manage patient records among medical institutions in the healthcare ecosystem.展开更多
Abstract: This paper presented the results from the study of irrigation erosion of irrigated lands in southern Ka- zakhstan. The main purpose of the work is the conservation of the fertility of irrigated soils, and t...Abstract: This paper presented the results from the study of irrigation erosion of irrigated lands in southern Ka- zakhstan. The main purpose of the work is the conservation of the fertility of irrigated soils, and then the soils of the upper, middle and lower sections of the slopes at the experimental site were studied. Based on field investigations, authors studied the water resistance of aggregates of gray-brown soils and light gray soils before and after irrigation and qualitative indicators of changes in physical and chemical properties of structured soils in irrigation were de- termined by conventional methods of soil research. The results indicated that the changes in the physical properties of soils by using polymeric compounds created a fundamentally new opportunity to control water erosion of soils.展开更多
This research is focused on the search of a biomass for the sequestration of fluoride from drinking water. Defluoridation of water was studied by batch experiments in biosorption process. The biomass was found to redu...This research is focused on the search of a biomass for the sequestration of fluoride from drinking water. Defluoridation of water was studied by batch experiments in biosorption process. The biomass was found to reduce fluoride to permissible limit 1.5 mg/L as prescribed by WHO. The efficiency of the sorption process was investigated under different experimental parameters such as pH 7, standing time 120 min and biomass doses 7.0 g with 5 mg/L concentration of fluoride. Neutral pH was identified as the optimum condition of the medium and 120 minutes was the best contact time for maximum fluoride adsorption. The experimental data was found good fitting to Langmuir and Freundlich isotherm models. In interference study tolerable effect was found with 50 mg/L concentration of co-ions, whereas increasing the concentration of co-ions retarded the fluoride removal capacity in some extent. FT-IR spectrum analysis showed fluoride binding in the different frequency ranges of the biomass. Eventually, this plant biomass is recommended as a suitable and low cost adsorbent to reduce fluoride into standard permissible limit.展开更多
文摘In the age of smartphones, people do most of their daily work using their smartphones due to significant improvement in smartphone technology. When comparing different platforms such as Windows, iOS, Android, and Blackberry, Android has captured the highest percentage of total market share [1]. Due to this tremendous growth, cybercriminals are encouraged to penetrate various mobile marketplaces with malicious applications. Most of these applications require device information permissions aiming to collect sensitive data without user’s consent. This paper investigates each element of system information permissions and illustrates how cybercriminals can harm users’ privacy. It presents some attack scenarios using READ_PHONE_STATE permission and the risks behind it. In addition, this paper refers to possible attacks that can be performed when additional permissions are combined with READ_PHONE_STATE permission. It also discusses a proposed solution to defeat these types of attacks.
文摘Mobile applications affect user’s privacy based on the granted application’s permissions as attackers exploit mobile application permissions in Android and other mobile operating systems. This research divides permissions based on Google’s classification of dangerous permissions into three groups. The first group contains the permissions that can access user’s private data such as reading call log. The second group contains the permissions that can modify user’s data such as modifying the numbers in contacts. The third group contains the remaining permissions which can track the location, and use the microphone and other sensitive issues that can spy on the user. This research is supported by a study that was conducted on 100 participants in Saudi Arabia to show the level of users’ awareness of associated risks in mobile applications permissions. Associations among the collected data are also analyzed. This research fills the gap in user’s awareness by providing best practices in addition to developing a new mobile application to help users decide whether an application is safe to be installed and used or not. This application is called “Sparrow” and is available in Google Play Store.
文摘The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and access information.Among the many smartphones available,those operating on the Android platform dominate,being the most widely used type.This widespread adoption of the Android OS has significantly contributed to increased malware attacks targeting the Android ecosystem in recent years.Therefore,there is an urgent need to develop new methods for detecting Android malware.The literature contains numerous works related to Android malware detection.As far as our understanding extends,we are the first ones to identify dangerous combinations of permissions and system calls to uncover malicious behavior in Android applications.We introduce a novel methodology that pairs permissions and system calls to distinguish between benign and malicious samples.This approach combines the advantages of static and dynamic analysis,offering a more comprehensive understanding of an application’s behavior.We establish covalent bonds between permissions and system calls to assess their combined impact.We introduce a novel technique to determine these pairs’Covalent Bond Strength Score.Each pair is assigned two scores,one for malicious behavior and another for benign behavior.These scores serve as the basis for classifying applications as benign or malicious.By correlating permissions with system calls,the study enables a detailed examination of how an app utilizes its requested permissions,aiding in differentiating legitimate and potentially harmful actions.This comprehensive analysis provides a robust framework for Android malware detection,marking a significant contribution to the field.The results of our experiments demonstrate a remarkable overall accuracy of 97.5%,surpassing various state-of-the-art detection techniques proposed in the current literature.
文摘In recent days the usage of android smartphones has increased exten-sively by end-users.There are several applications in different categories bank-ing/finance,social engineering,education,sports andfitness,and many more applications.The android stack is more vulnerable compared to other mobile plat-forms like IOS,Windows,or Blackberry because of the open-source platform.In the Existing system,malware is written using vulnerable system calls to bypass signature detection important drawback is might not work with zero-day exploits and stealth malware.The attackers target the victim with various attacks like adware,backdoor,spyware,ransomware,and zero-day exploits and create threat hunts on the day-to-day basics.In the existing approach,there are various tradi-tional machine learning classifiers for building a decision support system with limitations such as low detection rate and less feature selection.The important contents taken for building model from android applications like Intent Filter,Per-mission Signature,API Calls,and System commands are taken from the manifestfile.The function parameters of various machine and deep learning classifiers like Nave Bayes,k-Nearest Neighbors(k-NN),Support Vector Machine(SVM),Ada Boost,and Multi-Layer Perceptron(MLP)are done for effective results.In our pro-posed work,we have used an unsupervised learning multilayer perceptron with multiple target labels and built a model with a better accuracy rate compared to logistic regression,and rank the best features for detection of applications and clas-sify as malicious or benign can be used as threat model by online antivirus scanners.
文摘China Nitrogenous Fertilizer Industry Association(CNFIA) disclosed on March 12th thatthe drafted permission conditions for the syntheticammonia will soon be submitted to theMinistry of Industry and Information Technologyof China for approval.The draftedpermissions, drawn by CFNIA, proposedprimarily the minimum capacity for new syntheticammonia project is 300 000 t/a, mean-
基金supported by Shandong Social Science Planning and Research Project in 2021(No.21CPYJ40).
文摘The purpose of introducing blockchain into electronic archives sharing and utilization is to break the information barrier between electronic archives sharing departments by relying on technologies such as smart contract and asymmetric encryption.Aiming at the problem of dynamic permission management in common access control methods,a new access control method based on smart contract under blockchain is proposed,which improves the intelligence level under blockchain technology.Firstly,the Internet attribute access control model based on smart contract is established.For the dynamic access of heterogeneous devices,the management contract,permission judgment contract and access control contract are designed;Secondly,the access object credit evaluation algorithm based on particle swarm optimization radial basis function(PSO-RBF)neural network is used to dynamically generate the access node credit threshold combined with the access policy,so as to realize the intelligent access right management method.Finally,combined with the abovemodels and algorithms,the workflow of electronic archives sharing and utilization model of multi blockchain is constructed.The experimental results show that the timeconsuming of the process increases linearly with the number of continuous access to electronic archives blocks,and the secure access control of sharing and utilization is feasible,secure and effective.
文摘Mining activities in the Copperbelt province of Zambia have been of great environmental concern, despite recorded improvements in the socio-economic sector. Heavy metal contamination of soils resulting from depositing mine tailings and rock waste has posed possible health risks for communities nearer such facilities. The current study was conducted around residential homes surrounding Kitwe slimes (TD25). This work investigated levels of Co, Cu, Fe, Mn and Pb in the soils, and avocado and lemons fruits, growing near TD25. Heavy metals were analyzed using Atomic Absorption Spectrophotometer. The work further assessed the estimated daily intake (EDI) associated with potential health risks to humans. In the soil, concentration levels of heavy metals showed a trend in the order: Fe > Cu > Mn > Co > Pb. Heavy metal contents in avocado and lemon fruits at 200 and 400 m away from TD25, all had p-values < 0.05. The distances from the suspect source (TD25) to where the fruit trees were grown, had no influence on their concentration in the fruit samples. Fruit sample results showed that Fe had the highest EDI of 0.22 mg·kg<sup>-1</sup> (avocado) and 0.14 mg·kg<sup>-1</sup> (lemon), though both results were far below the FAO/WHO standard range (12.5 - 19.6 mg·kg<sup>-1</sup>). For both fruits, Co and Pb results were negligible. The concentration of the five heavy metals in avocado and lemon fruits grown around Kitwe slimes did not pose any health risks to the consumers.
基金supported by grants from the Canadian Institutes of Health Researchthe Mary Katz Claman Foundationthe Oberfeld Family Fund for Alzheimer Research
文摘'Core' neuropathology of degenerative central nervous system (CNS) disorders The common human neurodegenerative disorders (Alzheimer's disease (AD), Parkinson's disease (PD), amyotrophic lateral sclerosis, etc.) vary with respect to risk factors, ages of onset, sex predilections, neuraxial regions affected, hallmark cellular inclusions, behavioral and neurological symptoms, and responses to treatment. Despite these differences, there appears to be a set of 'core' neuropathological features shared among these and related entities. Common to these conditions are 1) pathological deposition of non-transferrin bound iron, 2) oxidative stress and associated protein, lipid and nucleic acid modifications, 3) mitochondrial membrane damage and bioenergetic failure, and 4) macroautophagy in the affected neural tissues.
文摘Dynamic soaring is a flight maneuver to exploit gradient wind field to extend endurance and traveling distance.Optimal trajectories for permissible wind conditions are generated for loitering dynamic soaring as well as for traveling patterns with a small unmanned aerial vehicle.The efficient direct collection approach based on the Runge-Kutta integrator is used to solve the optimization problem.The fast convergence of the optimization process leads to the potential for real-time applications.Based on the results of trajectory optimizations,the general permissible wind conditions which involve the allowable power law exponents and feasible reference wind strengths supporting dynamic soaring are proposed.Increasing the smallest allowable wingtip clearance to trade for robustness and safety of the vehicle system and improving the maximum traveling speed results in shrunken permissible domain of wind conditions for loitering and traveling dynamic soaring respectively.Sensitivity analyses of vehicle model parameters show that properly reducing the wingspan and increasing the maximum lift-to-drag ratio and the wing loading can enlarge the permissible domain.Permissible domains for different traveling directions show that the downwind dynamic soaring benefitting from the drift is more efficient than the upwind traveling pattern in terms of permissible domain size and net traveling speed.
基金funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program.
文摘Background:Electronic Health Record(EHR)systems are used as an efficient and effective technique for sharing patient’s health records among different hospitals and various other key stakeholders of the healthcare industry to achieve better diagnosis and treatment of patients globally.However,the existing EHR systems mostly lack in providing appropriate security,entrusted access control and handling privacy and secrecy issues and challenges in current hospital infrastructures.Objective:To solve this delicate problem,we propose a Blockchain-enabled Hyperledger Fabric Architecture for different EHR systems.Methodology:In our EHR blockchain system,Peer nodes from various organizations(stakeholders)create a ledger network,where channels are created to enable secure and private communication between different stakeholders on the ledger network.Individual patients and other stakeholders are identified and registered on the network by unique digital certificates issued by membership service provider(MSP)component of the fabric architecture.Results:We created and implemented different Chaincodes to handle the business logic for executing separate EHR transactions on the network.The proposed fabric architecture provides a secure,transparent and immutable mechanism to store,share and exchange EHRs in a peer-to-peer network of different healthcare stakeholders.It ensures interoperability,scalability and availability in adapting the existing EHRs for strengthening and providing an effective and secure method to integrate and manage patient records among medical institutions in the healthcare ecosystem.
基金supported by the International Science & Technology Cooperation Program of China(2010DFA92720)the Department of Ecology in Kazakh Research Institute of Soil Science and Agrochemistry named after Uspanov, Almaty, Kazakhstan
文摘Abstract: This paper presented the results from the study of irrigation erosion of irrigated lands in southern Ka- zakhstan. The main purpose of the work is the conservation of the fertility of irrigated soils, and then the soils of the upper, middle and lower sections of the slopes at the experimental site were studied. Based on field investigations, authors studied the water resistance of aggregates of gray-brown soils and light gray soils before and after irrigation and qualitative indicators of changes in physical and chemical properties of structured soils in irrigation were de- termined by conventional methods of soil research. The results indicated that the changes in the physical properties of soils by using polymeric compounds created a fundamentally new opportunity to control water erosion of soils.
文摘This research is focused on the search of a biomass for the sequestration of fluoride from drinking water. Defluoridation of water was studied by batch experiments in biosorption process. The biomass was found to reduce fluoride to permissible limit 1.5 mg/L as prescribed by WHO. The efficiency of the sorption process was investigated under different experimental parameters such as pH 7, standing time 120 min and biomass doses 7.0 g with 5 mg/L concentration of fluoride. Neutral pH was identified as the optimum condition of the medium and 120 minutes was the best contact time for maximum fluoride adsorption. The experimental data was found good fitting to Langmuir and Freundlich isotherm models. In interference study tolerable effect was found with 50 mg/L concentration of co-ions, whereas increasing the concentration of co-ions retarded the fluoride removal capacity in some extent. FT-IR spectrum analysis showed fluoride binding in the different frequency ranges of the biomass. Eventually, this plant biomass is recommended as a suitable and low cost adsorbent to reduce fluoride into standard permissible limit.