Search results for: alkali attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 827

Search results for: alkali attack

467 Wet Extraction of Lutein and Lipids from Microalga by Quantitative Determination of Polarity

Authors: Mengyue Gong, Xinyi Li, Amarjeet Bassi

Abstract:

Harvesting by-products while recovering biodiesel is considered a potentially valuable approach to increase the market feasibility of microalgae industry. Lutein is a possible by-product from microalgae that promotes eye health. The extraction efficiency and the expensive drying process of wet algae represent the major challenges for the utilization of microalgae biomass as a feedstock for lipids, proteins, and carotenoids. A wet extraction method was developed to extract lipids and lutein from microalga Chlorella vulgaris. To evaluate different solvent (mixtures) for the extraction, a quantitative analysis was established based on the polarity of solvents using Nile Red as the polarity (ETN) indicator. By the choice of binary solvent system then adding proper amount of water to achieve phase separation, lipids and lutein can be extracted simultaneously. Some other parameters for lipids and lutein production were also studied including saponification time, temperature, choice of alkali, and pre-treatment methods. The extraction efficiency with wet algae was compared with dried algae and shown better pigment recovery. The results indicated that the product pattern in each extracted phase was polarity dependent. Lutein and β-carotene were the main carotenoids extracted with ethanol while lipids come out with hexane.

Keywords: biodiesel, Chlorella vulgaris, extraction, lutein

Procedia PDF Downloads 341
466 A Method and System for Secure Authentication Using One Time QR Code

Authors: Divyans Mahansaria

Abstract:

User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.

Keywords: authentication, QR code, cipher / decipher text, one time password, secret information

Procedia PDF Downloads 266
465 Performance of Heifer Camels (Camelus dromedarius) on Native Range Supplemented with Different Energy Levels

Authors: Shehu, B., Muhammad, B. F., Madigawa, I. L., H. A. Alkali

Abstract:

The study was conducted to assess heifer camel behavior and live weight changes on native range supplemented with different energy levels. A total of nine camels aged between 2 and 3 years were randomly allotted into three groups and supplemented with 3400, 3600 and 3800 Kcal and designated A, B and C, respectively. The data obtained was analyzed for variance in a Completely Randomized Design. The heifers utilized average of 371.70 min/day (64% of daylight time) browsing on native pasture and 2.30 min/day (6%) sand bathing. A significantly higher mean time was spent by heifers on browsing Leptadenia hastata (P<0.001), Dichrostachys cinerea (P<0.01), Acacia nilotica (P<0.001) and Ziziphus spina-christi (P<0.05) in early dry season (January). No significant difference was recorded on browsing time on Tamarindus indica, Adansonia digitata, Piliostigma reticulatum, Parkia biglobosaand Azadirachta indica. No significant (P<0.05) liveweight change was recorded on she-camels due to the three energy levels. It was concluded that nutritive browse species in the study area could meet camel nutrient requirements including energy. Further research on effect of period on camel nutrients requirement in different physiological conditions is recommended.

Keywords: heifer, camel, grazing, pasture

Procedia PDF Downloads 541
464 Pioneer Synthesis and Characterization of Boron Containing Hard Materials

Authors: Gülşah Çelik Gül, Figen Kurtuluş

Abstract:

The first laboratory synthesis of hard materials such as diamond proceeded to attack of developing materials with high hardness to compete diamond. Boron rich solids are good candidates owing to their short interatomic bond lengths and strong covalent character. Boron containing hard material was synthesized by modified-microwave method under nitrogen atmosphere by using a fuel (glycine or urea), amorphous boron and/or boric acid in appropriate molar ratio. Characterizations were done by x-ray diffraction (XRD), fourier transform infrared (FTIR) spectroscopy, scanning electron microscopy/energy dispersive analyze (SEM/EDS), thermo gravimetric/differantial thermal analysis (TG/DTA).

Keywords: boron containing materials, hard materials, microwave synthesis, powder X-ray diffraction

Procedia PDF Downloads 591
463 Impact of Corn Gluten Hydrolysate on Seedling Growth

Authors: Jyotika Chopra, Dinesh Goyal

Abstract:

A study was initiated to examine the effects of corn gluten hydrolysate on seedlings growth and its development. Corn gluten is the byproduct of starch industry rich in proteins was hydrolysed by acid and alkali, and the impact of hydrolysate was studied on seed germination of Vigna radiata, Phaseolus vulagris (Fabaceae) and Triticum aestivum and Oryza sativa (Gramineae). For this, the optimum hydrolysis was obtained by 4NHCl and 4M NaOH where insoluble protein in gluten was broken down to glutamic acid, alanine, aspartic acid which was initially confirmed by biuret test, xanthoproteic, solubility and chromatographic tests. The seeds of above families were separately treated with different dilutions of corn gluten hydrolysate ranging from 1-100% to see effects produced by these dilutions on seed germination, plumule, and radical growth. The seedlings were put in the Petri plates and placed in the optimized conditions of temperature (37˚C) and photoperiod of 16:8 hours. The results indicate the plumule of all seeds shows the increase in growth pattern up to 25.75%. Whereas radical shows the increase in growth up to 25.88% till 10% of dilution of corn and wheat gluten hydrolysate with respect to water as blank. Further, there is decrease in growth from 30- 100% of dilutions of both, the hydrolysate indicates the inhibitory effects which unveil about the careful usage of gluten hydrolysate.

Keywords: corn gluten, characterization, hydrolysis, seedling growth

Procedia PDF Downloads 112
462 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey

Authors: Maleh Yassine, Ezzati Abdellah

Abstract:

Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.

Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS

Procedia PDF Downloads 380
461 Identification of Information War in Lithuania

Authors: Vitalijus Leibenka

Abstract:

After 2014 the world of Russia’s actions in annexing Crimea has seen a hybrid war that has helped Russia achieve its goals. The world and NATO nations have pointed out that hybrid action can help achieve not only military but also economic and political goals. One of the weapons of action in hybrid warfare is information warfare tools, the use of which helps to carry out actions in the context of hybrid warfare as a whole. In addition, information war tools can be used alone, over time and for long-term purposes. Although forms of information war, such as propaganda and disinformation, have been used in the past, in old conflicts and wars, new forms of information war have emerged as a result of technological development, making the dissemination of information faster and more efficient. The world understands that information is becoming a weapon, but not everyone understands that both information war and information warfare differ in their essence and full content. In addition, the damage and impact of the use of information war, which may have worse consequences than a brief military conflict, is underestimated. Lithuania is also facing various interpretations of the information war. Some believe that the information attack is an information war and the understanding of the information war is limited to a false message in the press. Others, however, deepen and explain the essence of the information war. Society has formed in such a way that not all people are able to assess the threats of information war, to separate information war from information attack. Recently, the Lithuanian government has been taking measures in the context of the information war, making decisions that allow the development of the activities of the state and state institutions in order to create defense mechanisms in the information war. However, this is happening rather slowly and incompletely. Every military conflict, related to Lithuania in one way or another, forces Lithuanian politicians to take up the theme of information warfare again. As a result, a national cyber security center is being set up, and Russian channels spreading lies are banned. However, there is no consistent development and continuous improvement of action against information threats. Although a sufficiently influential part of society (not a political part) helps to stop the spread of obscure information by creating social projects such as “Demaskuok” and “Laikykis ten su Andriumi tapinu”, it goes without saying that it will not become a key tool in the fight against information threats. Therefore, in order to achieve clean dissemination of information in Lithuania, full-fledged and substantial political decisions are necessary, the adoption of which would change the public perception of the information war, its damage, impact and actions that would allow to combat the spread. Political decisions should cover the educational, military, economic and political areas, which are one of the main and most important in the state, which would allow to fundamentally change the situation against the background of information war.

Keywords: information war, information warfare, hybrid war, hybrid warfare, NATO, Lithuania, Russia

Procedia PDF Downloads 61
460 Use of Hierarchical Temporal Memory Algorithm in Heart Attack Detection

Authors: Tesnim Charrad, Kaouther Nouira, Ahmed Ferchichi

Abstract:

In order to reduce the number of deaths due to heart problems, we propose the use of Hierarchical Temporal Memory Algorithm (HTM) which is a real time anomaly detection algorithm. HTM is a cortical learning algorithm based on neocortex used for anomaly detection. In other words, it is based on a conceptual theory of how the human brain can work. It is powerful in predicting unusual patterns, anomaly detection and classification. In this paper, HTM have been implemented and tested on ECG datasets in order to detect cardiac anomalies. Experiments showed good performance in terms of specificity, sensitivity and execution time.

Keywords: cardiac anomalies, ECG, HTM, real time anomaly detection

Procedia PDF Downloads 226
459 Effect of Enzymatic Modification on the Crystallinity of Cellulose Pulps

Authors: J. Janicki, M. Rom, C. Slusarczyk, J. Fabia, M. Siika-aho, K. Marjamaa, K. Kruus, K. Langfelder, C. Steel, M. Paloheimo, T. Puranen, S. Mäkinen, D. Wawro

Abstract:

The cellulose is one of the most abundant polymers in the world, however, its application in the high-end value products such as films or fibres, it triggered by the cellulose properties. The noticeable presence of hydrogen bonding reflected with partially crystalline structure makes the cellulose insoluble in common solvents and not meltable. The existing technologies, such as viscose process, suffer from environmental and economical problems, because of the risk of harmful chemicals liberation during the spinning process. The enzymatic modification of cellulose with endoglucanase makes it directly alkali soluble in NaOH solution, giving the opportunities for film and fibers formation. As the effect of enzymatic treatment, there are observed changes in crystalline structure and accompanying changes of the affinity of cellulose to water, demonstrated by water retention value. The objective of the project ELMO - Novel carbohydrate modifying enzymes for fibre modification is is to develop new enzyme products for modification of dissolving grade pulps. The aim is to increase the reactivity of dissolving grade pulps and remove residual hemicellulose. The scientific aim of this paper is to present the effect of enzymatic treatment on the crystallinity and affinity to water of cellulose pulps modified with enzymes.

Keywords: cellulose, crystallinity, WAXS, enzyme

Procedia PDF Downloads 234
458 Methods for Mitigating Corrosion Caused by Biogenic Sulfuric Acid in Sewerage Systems: State of the Art Review

Authors: M. Cortés, E. Vera, M. Avella

Abstract:

Corrosion is an imminent process in nature, which affects all types of materials. In sewerage systems, the corrosion process caused by microorganisms, also known as biogenic sulfuric acid attack, has been studied. This affects the structural integrity of the concrete drainage pipes and the sewage treatment plants. This article is a review of research which focuses on the study of how to reduce the production of hydrogen sulfide, how to improve the resistance of concrete through the use of additives and the implementation of antimicrobial techniques to reduce bacterial growth.

Keywords: bactericides, biogenic sulfuric acid, corrosion, concrete, hydrogen sulphide, nano materials, zeolites

Procedia PDF Downloads 443
457 Phone Number Spoofing Attack in VoLTE 4G

Authors: Joo-Hyung Oh

Abstract:

The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on all-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. And in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.

Keywords: LTE, 4G, VoLTE, phone number spoofing

Procedia PDF Downloads 430
456 A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

Authors: Nidal F. Shilbayeh, Belal AbuHaija, Zainab N. Al-Qudsy

Abstract:

In this paper, a hybrid blind digital watermarking system using Discrete Wavelet Transform (DWT) and Contourlet Transform (CT) has been implemented and tested. The implemented combined digital watermarking system has been tested against five common types of image attacks. The performance evaluation shows improved results in terms of imperceptibility, robustness, and high tolerance against these attacks; accordingly, the system is very effective and applicable.

Keywords: discrete wavelet transform (DWT), contourlet transform (CT), digital image watermarking, copyright protection, geometric attack

Procedia PDF Downloads 393
455 Physicochemical and Bacteriological Assessment of Water Resources in Ughelli and Its Environs, Delta State Nigeria

Authors: M. O. Eyankware, D. O. Ufomata

Abstract:

Groundwater samples were collected from Otovwodo-Ughelli and Environ with the aim of assessing groundwater quality of the area. Twenty (20) water samples from Boreholes (BH) (six) and Hand Dug Wells (HDW) (fourteen) were randomly sampled and were analysed for different physiochemical and bacteriological parameters. The following 16 parameters have been considered viz: pH, electrical conductivity, temperature, total hardness, total dissolved solids, dissolved oxygen, biological oxygen demand, phosphate, sulphate, chloride, nitrate, calcium, sodium, chloride, magnesium, and total suspended solids. On comparing the results against drinking quality standards laid by World Health Organization and Nigeria industrial standard, it was found that the water quality parameters were not above the (WHO, 2011 and NIS, 2007) permissible limit. Microbial analysis reveals the presence of coliform and E.coli in two hand-dug well (HDW7 and 13) and one borehole well (BH20). These contaminations are perhaps traceable to have originated from human activities (septic tanks, latrines, dumpsites) and have affected the quality of groundwater in Otovwodo-Ughelli. From the piper trilinear diagram, the dominant ionic species is alkali bicarbonate water type, with bicarbonate as the predominant ion (Na+ + K+)-HCO3.

Keywords: groundwater, surface water, Ughelli, Nigeria industrial standard, who standard

Procedia PDF Downloads 443
454 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels

Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur

Abstract:

With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.

Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography

Procedia PDF Downloads 123
453 Cooking Qualities and Sensory Evaluation Analysis of a Collection of Traditional Rice Genotypes of Kerala, India

Authors: Vanaja T., Sravya P. K.

Abstract:

Cooking and eating qualities have major roles in determining the quality characteristics of rice. Traditional rice varieties are highly diversified with each other with respect to unique nutrient, cooking, and eating characteristics, which can be used as parents for the development of high-quality varieties. In order to gather vital information for upcoming rice breeding programs, a study was conducted to assess the diversity of the cooking attributes and sensory evaluation of 28 traditional rice genotypes of Kerala, India, conserved at Regional Agricultural Research Station, Pilicode of Kerala Agricultural University. The cultivars ‘Kochuvithu’, ‘Jeerakachamba’, and ‘Rajameni’ exhibited the highest volume expansion ratio. The highest Kernel elongation ratio was recorded for ‘Gandhakasala’, ‘Rajameni’, and ‘Avadi’. A shorter cooking time based on Alkali spread value was shown by the cultivars ‘Kozhivalan’, ‘Kunhikayama’, ‘Rasagadham’, ‘Jadathi’, ‘Japanviolet’, ‘Nooravella’, ‘Punchavella’, ‘Avadi’, ‘Vadakan vellarikayama’, ‘Punchaparuthi’, ‘Shyamala’, ‘China Silk’, ‘Marathondi’, and ‘Gandhakasala’. Sensory evaluation revealed that the cultivars ‘Japanviolet’, ‘Kunhukunhu’, and ‘Kalladiyaran’ can be categorized under moderate to very much.

Keywords: rice, traditional rice varieties, cooking qualities, sensory evaluation, consumer acceptance

Procedia PDF Downloads 16
452 Phone Number Spoofing Attack in VoLTE

Authors: Joo-Hyung Oh, Sekwon Kim, Myoungsun Noh, Chaetae Im

Abstract:

The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on All-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. Moreover, in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.

Keywords: LTE, 4G, VoLTE, phone number spoofing

Procedia PDF Downloads 520
451 Utilization Reactive Dilutes to Improve the Properties of Epoxy Resin as Anticorrosion Coating

Authors: El-Sayed Negim, Ainakulova D. T., Puteri S. M., Khaldun M. Azzam, Bekbayeva L. K., Arpit Goyal, Ganjian E.

Abstract:

Anticorrosion coatings protect metal surfaces from environmental factors including moisture, oxygen, and gases that caused corrosion to the metal. Various types of anticorrosion coatings are available, with different properties and application methods. Many researchers have been developing methods to prevent corrosion, and epoxy polymers are one of the wide methods due to their excellent adhesion, chemical resistance, and durability. In this study, synthesis reactive dilute based on glycidyl methacrylate (GMA) with each of 2-ethylhexyl acrylate (2-EHA) and butyl acrylate (BuA) to improve the performance of epoxy resin and anticorrosion coating. The copolymers were synthesized with composition ratio (5/5) by bulk polymerization technique using benzoyl peroxide as a catalyst and temperature at 85 oC for 2 hours and at 90 oC for 30 minutes to complete the polymerization process. The obtained copolymers were characterized by FTIR, viscosity and thixotropic index. The effect of copolymers as reactive dilute on the physical and mechanical properties of epoxy resin was investigated. Metal plates coated by the modified epoxy resins with different contents of copolymers were tested using alkali and salt test methods, and the copolymer based on GMA and BUA showed the best protection efficiency due to the barrier effect of the polymer layer.

Keywords: epoxy, coating, dilute, corrosion, reactive

Procedia PDF Downloads 52
450 Oral Microflora and the Risk of Dental Caries in Portuguese Children

Authors: Sara Sousa, Veronique Gomes, Nélio Veiga, Maria José Correia

Abstract:

Objectives: To assess the presence or absence of Streptococcus mutans, Streptococcus gordonii and Streptococcus salivarius in the oral biofilm of children in an elementary school of Viseu, Portugal, and verify the relationship between Streptococcus gordonii and Streptococcus salivarius and the absence of dental caries. Methods: A cross-sectional study was designed with a final sample of 40 children aged 6-11 years old. Oral examination was accomplished with the identification of their oral health status and oral biofilm collection. Analysis of biological samples by molecular techniques of DNA isolation and identification of three Streptococci bacteria by Polimerase Chain Reaction (PCR) was made. Results: We identified Streptococcus salivarius and Streptococcus gordoni only in the lower interincisal region. These species were also present mainly in the first permanent non-decayed molars. On the contrary, Streptococcus mutans was found mostly in decayed first permanent molars. Conclusion: This preliminary study establishes a possible association between the absence of dental caries and the presence of Streptococcus gordonii and Streptococcus salivarius. Since these two species are described as alkali producers, it is suggested that their presence somehow confers protection against caries. These results support new dental caries prevention strategies based on oral biofilm modulation by enrichment with alkalinogenic species.

Keywords: dental caries, oral biofilm, Streptococcus gordonii, Streptococcus salivarius

Procedia PDF Downloads 292
449 Preparation and Characterization of Bioplastic from Sorghum Husks

Authors: Hannatu Abubakar Sani, Abubakar Umar Birnin Yauri, Aliyu Muhammad, Mujahid Salau, Aminu Musa, Hadiza Adamu Kwazo

Abstract:

The increase in the global population and advances in technology have made plastic materials to have wide applications in every aspect of life. However, the non-biodegradability of these petrochemical-based materials and their increasing accumulation in the environment has been a threat to the planet and has been a source of environmental concerns and hence, the driving force in the search for ‘green’ alternatives for which agricultural waste remains the front liner. Sorghum husk, an agricultural waste with potentials as a raw material in the production of bioplastic, was used in this research to prepare bioplastic using sulphuric acid-catalyzed acetylation process. The prepared bioplastic was characterized by X-ray diffraction and Fourier transform infrared spectroscopy (FTIR), and the structure of the prepared bioplastic was confirmed. The Fourier transform infrared spectroscopy (FTIR) spectra of the product displayed the presence of OH, C-H, C=O, and C-O absorption peaks. The bioplastic obtained is biodegradable and is affected by acid, salt, and alkali to a lesser extent. Other tests like solubility and swelling studies were carried out to ensure the commercial properties of these bioplastic materials. Therefore, this revealed that new bioplastics with better environmental and sustainable properties could be produced from agricultural waste, which may have applications in many industries.

Keywords: agricultural waste, bioplastic, characterization, Sorghum Husk

Procedia PDF Downloads 155
448 Evaluation of Corrosion Caused by Biogenic Sulfuric Acid (BSA) on the Concrete Structures of Sewerage Systems: Chemical Tests

Authors: M. Cortés, E. Vera, O. Rojas

Abstract:

The research studies of the kinetics of the corrosion process that attacks concrete and occurs within sewerage systems agree on the amount of variables that interfere in the process. This study aims to check the impact of the pH levels of the corrosive environment and the concrete surface, the concentrations of chemical sulfuric acid, and in turn, measure the resistance of concrete to this attack under controlled laboratory conditions; it also aims to contribute to the development of further research related to the topic, in order to compare the impact of biogenic sulfuric acid and chemical sulfuric acid involvement on concrete structures, especially in scenarios such as sewerage systems.

Keywords: acid sulfuric, concrete, corrosion, biogenic

Procedia PDF Downloads 378
447 Becoming a Warrior: Conspiracy, Dramaturgy, and Follower Charisma on the Far Right

Authors: Anthony Albanese

Abstract:

While much of the literature concerning Max Weber’s concept of charisma has addressed the importance of the follower’s recognition of and devotion to the charismatic leader, very little has been said about the processes that lead to the development of follower charisma. This article examines this largely overlooked aspect of the concept, as doing so (1) exacts the dynamics behind charisma’s transferability by moving beyond follower-centric models that focus on the recognition of the leader and toward one that emphasizes the follower’s generation and exhibition of charisma, (2) bridges a crucial gap between the rather wanting “losers of modernization” thesis and the social actor’s proclivity to produce stories and self-cast in said stories, (3) presents authoritarian dispositions as a reaction to the weakening effects everydayness have on charisma, and (4) complicates Weber’s formulation by reassessing the role of continually demonstrable mastery. To illustrate these dynamics, one should turn to the January 6th Capitol attack in the United States.

Keywords: max weber, extremism, right-wing populism, charisma

Procedia PDF Downloads 91
446 Investigation of the Turbulent Cavitating Flows from the Viewpoint of the Lift Coefficient

Authors: Ping-Ben Liu, Chien-Chou Tseng

Abstract:

The objective of this study is to investigate the relationship between the lift coefficient and dynamic behaviors of cavitating flow around a two-dimensional Clark Y hydrofoil at 8° angle of attack, cavitation number of 0.8, and Reynolds number of 7.10⁵. The flow field is investigated numerically by using a vapor transfer equation and a modified turbulence model which applies the filter and local density correction. The results including time-averaged lift/drag coefficient and shedding frequency agree well with experimental observations, which confirmed the reliability of this simulation. According to the variation of lift coefficient, the cycle which consists of growth and shedding of cavitation can be divided into three stages, and the lift coefficient at each stage behaves similarly due to the formation and shedding of the cavity around the trailing edge.

Keywords: Computational Fluid Dynamics, cavitation, turbulence, lift coefficient

Procedia PDF Downloads 347
445 Mineralogical Characteristics of Phosphates from the Djebel Onk Deposits: Treatment and Valorization of Co-Products

Authors: Samira Tlili, Amina Grairia, Sihem Benayache, Saida Bouyegh, Sabrina Ladjama, Abdelmoumen Guedri

Abstract:

Phosphorites from Djebel Onk Tebessa/Algeria deposit contain a CaO of 50-52 wt. % and P₂O₅ level of ≥ 30.20 wt. %. The microstructure revealed using a spectroscopy electronic microscope (SEM) consists of phosphate granules with an ovular form. In this investigation, we have identified phosphate with varying particle sizes using mineralogical methods. The phosphogypsum formed by the mineralization of natural phosphate has also been discovered. This co-product was formed during the attack on natural phosphates by sulfuric acid. This study demonstrated the effectiveness of the thermoanalytical technique of differential scanning calorimetry (DSC), X-ray diffraction, and EDS/MEB analysis. FTIR analyses also validated the identification of mineral phases with the observation of bands from structural phosphate groups.

Keywords: phosphate, Djebel Onk deposit, mineralogy, valorization, phosphogypsum

Procedia PDF Downloads 19
444 Biodegradation Study of a Biocomposite Material Based on Sunflower Oil and Alfa Fibers as Natural Resources

Authors: Sihem Kadem, Ratiba Irinislimane, Naima Belhaneche

Abstract:

The natural resistance to biodegradation of polymeric materials prepared from petroleum-based source and the management of their wastes in the environment are the driving forces to replace them by other biodegradable materials from renewable resources. For that, in this work new biocomposites materials have been synthesis from sunflower oil (Helianthus annuus) and alfa plants (Stipatenacissima) as natural based resources. The sunflower oil (SFO) was chemically modified via epoxidation then acrylation reactions to obtain acrylated epoxidized sunflower oil resin (AESFO). The AESFO resin was then copolymerized with styrene as co-monomer in the presence of boron trifluoride (BF3) as cationic initiator and cobalt octoate (Co) as catalyst. The alfa fibers were treated with alkali treatment (5% NaOH) before been used as bio-reinforcement. Biocomposites were prepared by mixing the resin with untreated and treated alfa fibers at different percentages. A biodegradation study was carried out for the synthesized biocomposites in a solid medium (burial in the soil) by evaluated, first, the loss of mass, the results obtained were reached between 7.8% and 11% during one year. Then an observation under an optical microscope was carried out, after one year of burial in the soil, microcracks, brown and black spots were appeared on the samples surface. This results shows that the synthesized biocomposites have a great aptitude for biodegradation.

Keywords: alfa fiber, biocomposite, biodegradation, soil, sunflower oil

Procedia PDF Downloads 159
443 Theoretical Evaluation of the Effect of Solvent on the Feasibility of the Reaction of 2-Chlorobenzimidazole With Four N,N′-Cyclic Azomethine Imines to Construct Polycyclic Benzimidazoles

Authors: Mohamed Abdoul-Hakim, A. Zeroual, H. Garmes

Abstract:

In this work, we theoretically evaluated the reactivity of four 4-methyl-3-oxo-1,2-pyrazolidinium ylides with 2-Chlorobenzimidazole in MeOH in basic medium using DFT at the B3LYP/6-311+G(d,p) level. The analysis of the results shows that apart from its ability to retain its electrons, the deprotonated 2-Chlorobenzimidazole has a higher nucleophilic character. The reaction requires energy input to initiate the nucleophilic attack of the 2-Chlorobenzimidazole anion, and the inclusion of the solvent effect facilitates the formation of two regioisomers via an intramolecular vinyl nucleophilic substitution (SNVi). The transition states of this latter step are stabilized by charge transfer interactions σ(N-C) →σ*(C-Cl) for the more favorable regioisomer and n(N)→σ*(C-Cl) for the other regioisomer.

Keywords: benzonitrile N-oxide, DFT, intramolecular vinyl nucleophilic substitution (SNVi), 4-methyl-3-OXO-1, 2-pyrazolidinium ylides

Procedia PDF Downloads 137
442 Preservation of Endocrine Function after Central Pancreatectomy without Anastomoses for a Mid Gland Pancreatic Insulinoma: A Case Report

Authors: Karthikeyan M., Paul M. J.

Abstract:

This abstract describes a case of central pancreatectomy (CP) for a 50-year-old woman with a neuroendocrine tumor in the mid-body of the pancreas. CP, a parenchyma-sparing surgical option, preserves the distal pancreas and spleen, reducing the risk of pancreatic endocrine and exocrine insufficiency compared to traditional resections. The patient, initially misdiagnosed with transient ischemic attack, presented with hypoglycemic symptoms and was found to have a pancreatic lesion. Post-operative results were positive, with a reduction in pancreatic drain volume and normalization of blood sugar levels. This case highlights CP's efficacy in treating centrally located pancreatic lesions while maintaining pancreatic function.

Keywords: central pancreatectomy without anastomosis, no endocrine deficiency on follow-op, less post-op hospital stay, less post-op complications

Procedia PDF Downloads 42
441 Strategies for Patient Families Integration in Caregiving: A Consensus Opinion

Authors: Ibrahim A. Alkali

Abstract:

There is no reservation on the outstanding contribution of patient families in restoration of hospitalised patients, hence their consideration as essential component of hospital ward regimen. The psychological and emotional support a patient requires has been found to be solely provided by the patient’s family. However, consideration of their presence as one of the major functional requirements of an inpatient setting design have always been a source of disquiet, especially in developing countries where policies, norms and protocols of healthcare administration have no consideration for the patients’ family. This have been a major challenge to the hospital ward facilities, a concern for the hospital administration and patient management. The study therefore is aimed at obtaining a consensus opinion on the best approach for family integration in the design of an inpatient setting.  A one day visioning charrette involving Architects, Nurses, Medical Doctors, Healthcare assistants and representatives from the Patient families was conducted with the aim of arriving at a consensus opinion on practical design approach for sustainable family integration. Patient’s family are found to be decisive character of hospital ward regimen that cannot be undermined. However, several challenges that impede family integration were identified and subsequently a recommendation for an ideal approach. This will serve as a guide to both architects and hospital management in implementing much desired Patient and Family Centred Care.

Keywords: patient's family, inpatient setting, care giving, integration

Procedia PDF Downloads 206
440 Development of Light-Weight Fibre-Based Materials for Building Envelopes

Authors: René Čechmánek, Vladan Prachař, Ludvík Lederer, Jiří Loskot

Abstract:

Thin-walled elements with a matrix set on a base of high-valuable Portland cement with dispersed reinforcement from alkali-resistant glass fibres are used in a range of applications as claddings of buildings and infrastructure constructions as well as various architectural elements of residential buildings. Even if their elementary thickness and therefore total weight is quite low, architects and building companies demand on even further decreasing of the bulk density of these fibre-cement elements for the reason of loading elimination of connected superstructures and easier assembling in demand conditions. By the means of various kinds of light-weight aggregates it is possible to achieve light-weighing of thin-walled fibre-cement composite elements. From the range of possible fillers with different material properties granulated expanded glass worked the best. By the means of laboratory testing an effect of two fillers based on expanded glass on the fibre reinforced cement composite was verified. Practical applicability was tested in the production of commonly manufactured glass fibre reinforced concrete elements, such as channels for electrical cable deposition, products for urban equipment and especially various cladding elements. Even if these are not structural elements, it is necessary to evaluate also strength characteristics and resistance to environment for their durability in certain applications.

Keywords: fibre-cement composite, granulated expanded glass, light-weighing

Procedia PDF Downloads 289
439 Application of Co-Flow Jet Concept to Aircraft Lift Increase

Authors: Sai Likitha Siddanathi

Abstract:

Present project is aimed at increasing the amount of lift produced by typical airfoil. This is achieved by its modification into the co-flow jet structure where a new internal flow is created inside the airfoil from well-designed apertures on its surface. The limit where produced excess lift overcomes the weight of pumping system inserted in airfoil upper portion, and drag force is converted into thrust is discussed in terms of airfoil velocity and angle of attack. Two normal and co-flow jet models are numerically designed and experimental results for both fabricated normal airfoil and CFJ model have been tested in low subsonic wind tunnel. Application has been made to subsonic NACA 652-415 airfoil. Produced lift in CFJ airfoil indicates a maximum value up to a factor of 5 above normal airfoil nearby flow separation ie in relatively weak flow distribution.

Keywords: flow Jet, lift coefficient, drag coefficient, airfoil performance

Procedia PDF Downloads 353
438 HelpMeBreathe: A Web-Based System for Asthma Management

Authors: Alia Al Rayssi, Mahra Al Marar, Alyazia Alkhaili, Reem Al Dhaheri, Shayma Alkobaisi, Hoda Amer

Abstract:

We present in this paper a web-based system called “HelpMeBreathe” for managing asthma. The proposed system provides analytical tools, which allow better understanding of environmental triggers of asthma, hence better support of data-driven decision making. The developed system provides warning messages to a specific asthma patient if the weather in his/her area might cause any difficulty in breathing or could trigger an asthma attack. HelpMeBreathe collects, stores, and analyzes individuals’ moving trajectories and health conditions as well as environmental data. It then processes and displays the patients’ data through an analytical tool that leads to an effective decision making by physicians and other decision makers.

Keywords: asthma, environmental triggers, map interface, web-based systems

Procedia PDF Downloads 293