Search results for: image compression and salt and peppers attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4703

Search results for: image compression and salt and peppers attacks

4673 Salt Scarcity and Crisis Solution in Islam Perspective

Authors: Taufik Nugroho, Firsty Dzainuurahmana, Tika Widiastuti

Abstract:

The polemic about the salt crisis re-emerged, this is a classic problem in Indonesia and is still a homework that is not finished yet. This salt crisis occurs due to low productivity of salt commodities that have not been able to meet domestic demand and lack of salt productivity caused by several factors. One of the biggest factors of the crisis is the weather anomaly that disrupts salt production, less supportive technology and price stability. This study will try to discuss the salt scarcity and crisis solution in Islamic view. As for the conclusion of this study is the need for equilibrium or balancing between demand and supply, need to optimize the role of the government as Hisbah to maintain the balance of market mechanisms and prepare the stock system of salt stock by buying farmers products at reasonable prices then storing them.

Keywords: crisis, Islamic solution, scarcity, salt

Procedia PDF Downloads 261
4672 A Hybrid Digital Watermarking Scheme

Authors: Nazish Saleem Abbas, Muhammad Haris Jamil, Hamid Sharif

Abstract:

Digital watermarking is a technique that allows an individual to add and hide secret information, copyright notice, or other verification message inside a digital audio, video, or image. Today, with the advancement of technology, modern healthcare systems manage patients’ diagnostic information in a digital way in many countries. When transmitted between hospitals through the internet, the medical data becomes vulnerable to attacks and requires security and confidentiality. Digital watermarking techniques are used in order to ensure the authenticity, security and management of medical images and related information. This paper proposes a watermarking technique that embeds a watermark in medical images imperceptibly and securely. In this work, digital watermarking on medical images is carried out using the Least Significant Bit (LSB) with the Discrete Cosine Transform (DCT). The proposed methods of embedding and extraction of a watermark in a watermarked image are performed in the frequency domain using LSB by XOR operation. The quality of the watermarked medical image is measured by the Peak signal-to-noise ratio (PSNR). It was observed that the watermarked medical image obtained performing XOR operation between DCT and LSB survived compression attack having a PSNR up to 38.98.

Keywords: watermarking, image processing, DCT, LSB, PSNR

Procedia PDF Downloads 12
4671 A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

Authors: Nidal F. Shilbayeh, Belal AbuHaija, Zainab N. Al-Qudsy

Abstract:

In this paper, a hybrid blind digital watermarking system using Discrete Wavelet Transform (DWT) and Contourlet Transform (CT) has been implemented and tested. The implemented combined digital watermarking system has been tested against five common types of image attacks. The performance evaluation shows improved results in terms of imperceptibility, robustness, and high tolerance against these attacks; accordingly, the system is very effective and applicable.

Keywords: discrete wavelet transform (DWT), contourlet transform (CT), digital image watermarking, copyright protection, geometric attack

Procedia PDF Downloads 365
4670 Secure Image Encryption via Enhanced Fractional Order Chaotic Map

Authors: Ismail Haddad, Djamel Herbadji, Aissa Belmeguenai, Selma Boumerdassi

Abstract:

in this paper, we provide a novel approach for image encryption that employs the Fibonacci matrix and an enhanced fractional order chaotic map. The enhanced map overcomes the drawbacks of the classical map, especially the limited chaotic range and non-uniform distribution of chaotic sequences, resulting in a larger encryption key space. As a result, this strategy improves the encryption system's security. Our experimental results demonstrate that our proposed algorithm effectively encrypts grayscale images with exceptional efficiency. Furthermore, our technique is resistant to a wide range of potential attacks, including statistical and entropy attacks.

Keywords: image encryption, logistic map, fibonacci matrix, grayscale images

Procedia PDF Downloads 281
4669 Halophilic Bacterium: A Review of New Studies

Authors: Bassam Al Johny

Abstract:

Halophilic bacteria are organisms which thrive in salt-rich environments, such as salt lakes, solar salterns and salt mines which contain large populations of these organisms. In biotechnology, such salt-tolerant bacteria are widely used for the production of valuable enzymes, and more than a thousand years ago humans began using salt to cure and thereby preserve perishable foods and other materials, such as hides; halophiles can be detrimental to the preservation of salt brine cured hides. The aim of this review is to provide an overview of the taxonomy of these organisms including novel isolates from rock salt, and also to discuss their current and future biotechnological and environmental uses.

Keywords: hypersaline environments, halophilic bacteria, environmental application, industrial application

Procedia PDF Downloads 248
4668 Evaluation of Salt Content in Bread and the Amount Intake by Hypertensive Patients in the Algiers Region

Authors: S.lanasri, A.Boudjerrane, R.Belgherbi, O.Hadjoudj

Abstract:

Introduction: Bread is the most popular food in Algeria. The aim of this study was to examine the consumption of salt from bread by hypertensive patients. Materials and methods: sixty breads were collected from different artisans Algiers bakeries, each sample was mixed in harm distilled water until homogeneous and filtered. Analysis of the salt content was carried out according to the Mohr method titration. We calculated the amount of salt in bread consumed by 100 hypertensive patients using a questionnaire about the average amount of bread per day. Results: The salt content values from bread were 3.4g ± 0.37 NaCl / 100g.The average amount of salt consumed per day by patients from only bread was 3.82 g ± 3.8 with a maximum of 17 g per day. Only 38.18% of patients consume bread without salt even then 95% knew that excess salt intake can complicate hypertension. Conclusion: This study showed that bread is a major contributor to salt intake by Algerian hypertensive patients.

Keywords: salt, bread, hypertensive patients, Algiers

Procedia PDF Downloads 128
4667 Robust Medical Image Watermarking based on Contourlet and Extraction Using ICA

Authors: S. Saju, G. Thirugnanam

Abstract:

In this paper, a medical image watermarking algorithm based on contourlet is proposed. Medical image watermarking is a special subcategory of image watermarking in the sense that images have special requirements. Watermarked medical images should not differ perceptually from their original counterparts because clinical reading of images must not be affected. Watermarking techniques based on wavelet transform are reported in many literatures but robustness and security using contourlet are better when compared to wavelet transform. The main challenge in exploring geometry in images comes from the discrete nature of the data. In this paper, original image is decomposed to two level using contourlet and the watermark is embedded in the resultant sub-bands. Sub-band selection is based on the value of Peak Signal to Noise Ratio (PSNR) that is calculated between watermarked and original image. To extract the watermark, Kernel ICA is used and it has a novel characteristic is that it does not require the transformation process to extract the watermark. Simulation results show that proposed scheme is robust against attacks such as Salt and Pepper noise, Median filtering and rotation. The performance measures like PSNR and Similarity measure are evaluated and compared with Discrete Wavelet Transform (DWT) to prove the robustness of the scheme. Simulations are carried out using Matlab Software.

Keywords: digital watermarking, independent component analysis, wavelet transform, contourlet

Procedia PDF Downloads 506
4666 Development of a Harvest Mechanism for the Kahramanmaraş Chili Pepper

Authors: O. E. Akay, E. Güzel, M. T. Özcan

Abstract:

The pepper has quite a rich variety. The development of a single harvesting machine for all kinds of peppers is a difficult research topic. By development of harvesting mechanisms, we could be able to facilitate the pepper harvesting problems. In this study, an experimental harvesting machine was designed for chili pepper. Four-bar mechanism was used for the design of the prototype harvesting machine. At the result of harvest trials, 80% of peppers were harvested and 8% foreign materials were collected. These results have provided some tips on how to apply to large-scale pepper Four-bar mechanism of the harvest machine.

Keywords: kinematic simulation, four bar linkage, harvest mechanization, pepper harvest

Procedia PDF Downloads 321
4665 An Efficient Discrete Chaos in Generalized Logistic Maps with Applications in Image Encryption

Authors: Ashish Ashish

Abstract:

In the last few decades, the discrete chaos of difference equations has gained a massive attention of academicians and scholars due to its tremendous applications in each and every branch of science, such as cryptography, traffic control models, secure communications, weather forecasting, and engineering. In this article, a generalized logistic discrete map is established and discrete chaos is reported through period doubling bifurcation, period three orbit and Lyapunov exponent. It is interesting to see that the generalized logistic map exhibits superior chaos due to the presence of an extra degree of freedom of an ordered parameter. The period doubling bifurcation and Lyapunov exponent are demonstrated for some particular values of parameter and the discrete chaos is determined in the sense of Devaney's definition of chaos theoretically as well as numerically. Moreover, the study discusses an extended chaos based image encryption and decryption scheme in cryptography using this novel system. Surprisingly, a larger key space for coding and more sensitive dependence on initial conditions are examined for encryption and decryption of text messages, images and videos which secure the system strongly from external cyber attacks, coding attacks, statistic attacks and differential attacks.

Keywords: chaos, period-doubling, logistic map, Lyapunov exponent, image encryption

Procedia PDF Downloads 119
4664 Perceptual Image Coding by Exploiting Internal Generative Mechanism

Authors: Kuo-Cheng Liu

Abstract:

In the perceptual image coding, the objective is to shape the coding distortion such that the amplitude of distortion does not exceed the error visibility threshold, or to remove perceptually redundant signals from the image. While most researches focus on color image coding, the perceptual-based quantizer developed for luminance signals are always directly applied to chrominance signals such that the color image compression methods are inefficient. In this paper, the internal generative mechanism is integrated into the design of a color image compression method. The internal generative mechanism working model based on the structure-based spatial masking is used to assess the subjective distortion visibility thresholds that are visually consistent to human eyes better. The estimation method of structure-based distortion visibility thresholds for color components is further presented in a locally adaptive way to design quantization process in the wavelet color image compression scheme. Since the lowest subband coefficient matrix of images in the wavelet domain preserves the local property of images in the spatial domain, the error visibility threshold inherent in each coefficient of the lowest subband for each color component is estimated by using the proposed spatial error visibility threshold assessment. The threshold inherent in each coefficient of other subbands for each color component is then estimated in a local adaptive fashion based on the distortion energy allocation. By considering that the error visibility thresholds are estimated using predicting and reconstructed signals of the color image, the coding scheme incorporated with locally adaptive perceptual color quantizer does not require side information. Experimental results show that the entropies of three color components obtained by using proposed IGM-based color image compression scheme are lower than that obtained by using the existing color image compression method at perceptually lossless visual quality.

Keywords: internal generative mechanism, structure-based spatial masking, visibility threshold, wavelet domain

Procedia PDF Downloads 220
4663 Size Reduction of Images Using Constraint Optimization Approach for Machine Communications

Authors: Chee Sun Won

Abstract:

This paper presents the size reduction of images for machine-to-machine communications. Here, the salient image regions to be preserved include the image patches of the key-points such as corners and blobs. Based on a saliency image map from the key-points and their image patches, an axis-aligned grid-size optimization is proposed for the reduction of image size. To increase the size-reduction efficiency the aspect ratio constraint is relaxed in the constraint optimization framework. The proposed method yields higher matching accuracy after the size reduction than the conventional content-aware image size-reduction methods.

Keywords: image compression, image matching, key-point detection and description, machine-to-machine communication

Procedia PDF Downloads 392
4662 Antioxidant Defence Systems, Lipid Peroxidation, and Photosynthetic Variables in Salt-Sensitive and Salt-Tolerant Soybean Genotypes in Response to Salt Stress

Authors: Faheema Khan

Abstract:

We have investigated the effects of salt stress on the stability of plant growth, water relations, photosynthetic variables, lipid peroxidation and antioxidant system in salt-tolerant (PK-327) and salt-sensitive (PK-471) soybean genotypes. Ten-day-old salt-tolerant and salt-sensitive soybean plants were subjected to 0-150 mM NaCl for 15 days. While the growth of genotype PK-327 was not affected significantly up to 75 mM NaCl treatment, the growth of the PK-471 was reduced significantly beyond 25 mM NaCl treatments. Salt stress caused severe impairments in photosynthetic variables like photosynthetic rate, chlorophyll fluorescence and chlorophyll content, being more pronounced in salt-sensitive genotype than in salt-tolerant.The activities of antioxidant enzymes (superoxide dismutase, catalase, ascorbate peroxidase and glutathione reductase) were higher in PK-327 than in PK-471 at various levels of salt treatments.It is concluded that tolerance capacity of PK-327 against salinity can be associated with the ability of this genotype in keeping an active photosynthetic system and strong antioxidant defence system.

Keywords: salt stress, soybean, antioxidant, photosynthesis

Procedia PDF Downloads 351
4661 Image Denoising Using Spatial Adaptive Mask Filter for Medical Images

Authors: R. Sumalatha, M. V. Subramanyam

Abstract:

In medical image processing the quality of the image is degraded in the presence of noise. Especially in ultra sound imaging and Magnetic resonance imaging the data was corrupted by signal dependent noise known as salt and pepper noise. Removal of noise from the medical images is a critical issue for researchers. In this paper, a new type of technique Adaptive Spatial Mask Filter (ASMF) has been proposed. The proposed filter is used to increase the quality of MRI and ultra sound images. Experimental results show that the proposed filter outperforms the implementation of mean, median, adaptive median filters in terms of MSE and PSNR.

Keywords: salt and pepper noise, ASMF, PSNR, MSE

Procedia PDF Downloads 413
4660 DOS and DDOS Attacks

Authors: Amin Hamrahi, Niloofar Moghaddam

Abstract:

Denial of Service is for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Denial of Service (DoS) attacks have become a major threat to current computer networks. Many recent DoS attacks were launched via a large number of distributed attacking hosts in the Internet. These attacks are called distributed denial of service (DDoS) attacks. To have a better understanding on DoS attacks, this article provides an overview on existing DoS and DDoS attacks and major defense technologies in the Internet.

Keywords: denial of service, distributed denial of service, traffic, flooding

Procedia PDF Downloads 368
4659 PEINS: A Generic Compression Scheme Using Probabilistic Encoding and Irrational Number Storage

Authors: P. Jayashree, S. Rajkumar

Abstract:

With social networks and smart devices generating a multitude of data, effective data management is the need of the hour for networks and cloud applications. Some applications need effective storage while some other applications need effective communication over networks and data reduction comes as a handy solution to meet out both requirements. Most of the data compression techniques are based on data statistics and may result in either lossy or lossless data reductions. Though lossy reductions produce better compression ratios compared to lossless methods, many applications require data accuracy and miniature details to be preserved. A variety of data compression algorithms does exist in the literature for different forms of data like text, image, and multimedia data. In the proposed work, a generic progressive compression algorithm, based on probabilistic encoding, called PEINS is projected as an enhancement over irrational number stored coding technique to cater to storage issues of increasing data volumes as a cost effective solution, which also offers data security as a secondary outcome to some extent. The proposed work reveals cost effectiveness in terms of better compression ratio with no deterioration in compression time.

Keywords: compression ratio, generic compression, irrational number storage, probabilistic encoding

Procedia PDF Downloads 263
4658 A Survey of Domain Name System Tunneling Attacks: Detection and Prevention

Authors: Lawrence Williams

Abstract:

As the mechanism which converts domains to internet protocol (IP) addresses, Domain Name System (DNS) is an essential part of internet usage. It was not designed securely and can be subject to attacks. DNS attacks have become more frequent and sophisticated and the need for detecting and preventing them becomes more important for the modern network. DNS tunnelling attacks are one type of attack that are primarily used for distributed denial-of-service (DDoS) attacks and data exfiltration. Discussion of different techniques to detect and prevent DNS tunneling attacks is done. The methods, models, experiments, and data for each technique are discussed. A proposal about feasibility is made. Future research on these topics is proposed.

Keywords: DNS, tunneling, exfiltration, botnet

Procedia PDF Downloads 50
4657 A Blind Three-Dimensional Meshes Watermarking Using the Interquartile Range

Authors: Emad E. Abdallah, Alaa E. Abdallah, Bajes Y. Alskarnah

Abstract:

We introduce a robust three-dimensional watermarking algorithm for copyright protection and indexing. The basic idea behind our technique is to measure the interquartile range or the spread of the 3D model vertices. The algorithm starts by converting all the vertices to spherical coordinate followed by partitioning them into small groups. The proposed algorithm is slightly altering the interquartile range distribution of the small groups based on predefined watermark. The experimental results on several 3D meshes prove perceptual invisibility and the robustness of the proposed technique against the most common attacks including compression, noise, smoothing, scaling, rotation as well as combinations of these attacks.

Keywords: watermarking, three-dimensional models, perceptual invisibility, interquartile range, 3D attacks

Procedia PDF Downloads 447
4656 Secure E-Pay System Using Steganography and Visual Cryptography

Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi

Abstract:

Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.

Keywords: image security, random LSB, steganography, visual cryptography

Procedia PDF Downloads 308
4655 Robust Medical Image Watermarking Using Frequency Domain and Least Significant Bits Algorithms

Authors: Volkan Kaya, Ersin Elbasi

Abstract:

Watermarking and stenography are getting importance recently because of copyright protection and authentication. In watermarking we embed stamp, logo, noise or image to multimedia elements such as image, video, audio, animation and text. There are several works have been done in watermarking for different purposes. In this research work, we used watermarking techniques to embed patient information into the medical magnetic resonance (MR) images. There are two methods have been used; frequency domain (Digital Wavelet Transform-DWT, Digital Cosine Transform-DCT, and Digital Fourier Transform-DFT) and spatial domain (Least Significant Bits-LSB) domain. Experimental results show that embedding in frequency domains resist against one type of attacks, and embedding in spatial domain is resist against another group of attacks. Peak Signal Noise Ratio (PSNR) and Similarity Ratio (SR) values are two measurement values for testing. These two values give very promising result for information hiding in medical MR images.

Keywords: watermarking, medical image, frequency domain, least significant bits, security

Procedia PDF Downloads 263
4654 Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

Authors: Haydar Teymourlouei

Abstract:

It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.

Keywords: cyber-attacks, home user, prevention, security, technology

Procedia PDF Downloads 368
4653 Optimal Image Representation for Linear Canonical Transform Multiplexing

Authors: Navdeep Goel, Salvador Gabarda

Abstract:

Digital images are widely used in computer applications. To store or transmit the uncompressed images requires considerable storage capacity and transmission bandwidth. Image compression is a means to perform transmission or storage of visual data in the most economical way. This paper explains about how images can be encoded to be transmitted in a multiplexing time-frequency domain channel. Multiplexing involves packing signals together whose representations are compact in the working domain. In order to optimize transmission resources each 4x4 pixel block of the image is transformed by a suitable polynomial approximation, into a minimal number of coefficients. Less than 4*4 coefficients in one block spares a significant amount of transmitted information, but some information is lost. Different approximations for image transformation have been evaluated as polynomial representation (Vandermonde matrix), least squares + gradient descent, 1-D Chebyshev polynomials, 2-D Chebyshev polynomials or singular value decomposition (SVD). Results have been compared in terms of nominal compression rate (NCR), compression ratio (CR) and peak signal-to-noise ratio (PSNR) in order to minimize the error function defined as the difference between the original pixel gray levels and the approximated polynomial output. Polynomial coefficients have been later encoded and handled for generating chirps in a target rate of about two chirps per 4*4 pixel block and then submitted to a transmission multiplexing operation in the time-frequency domain.

Keywords: chirp signals, image multiplexing, image transformation, linear canonical transform, polynomial approximation

Procedia PDF Downloads 394
4652 Noise Removal Techniques in Medical Images

Authors: Amhimmid Mohammed Saffour, Abdelkader Salama

Abstract:

Filtering is a part of image enhancement techniques, it is used to enhance certain details such as edges in the image that are relevant to the application. Additionally, filtering can even be used to eliminate unwanted components of noise. Medical images typically contain salt and pepper noise and Poisson noise. This noise appears to the presence of minute grey scale variations within the image. In this paper, different filters techniques namely (Median, Wiener, Rank order3, Rank order5, and Average) were applied on CT medical images (Brain and chest). We using all these filters to remove salt and pepper noise from these images. This type of noise consists of random pixels being set to black or white. Peak Signal to Noise Ratio (PSNR), Mean Square Error r(MSE) and Histogram were used to evaluated the quality of filtered images. The results, which we have achieved shows that, these filters, are more useful and they prove to be helpful for general medical practitioners to analyze the symptoms of the patients with no difficulty.

Keywords: CT imaging, median filter, adaptive filter and average filter, MATLAB

Procedia PDF Downloads 295
4651 Experimental Chevreul’s Salt Production Methods on Copper Recovery

Authors: Turan Çalban, Oral Laçin, Abdüsselam Kurtbaş

Abstract:

The experimental production methods Chevreul’s salt being a intermediate stage product for copper recovery were investigated by dealing with the articles written on this topic. Chevreul’s salt, Cu2SO3.CuSO3.2H2O, being a mixed valence copper sulphite compound has been obtained by using different methods and reagents. Chevreul’s salt has a intense brick-red color. It is a highly stable and expensive salt. The production of Chevreul’s salt plays a key role in hiydrometallurgy. In recent years, researchs on this compound have been intensified. Silva et al. reported that this salt is thermally stable up to 200oC. Çolak et al. precipitated the Chevreul’s salt by using ammonia and sulphur dioxide. Çalban et al. obtained at the optimum conditions by passing SO2 from leach solutions with NH3-(NH4)2SO4. Yeşiryurt and Çalban investigated the optimum precipitation conditions of Chevreul’s salt from synthetic CuSO4 solutions including Na2SO3. Çalban et al. achieved the precipitation of Chevreul’s salt at the optimum conditions by passing SO2 from synthetic CuSO4 solutions. Çalban et al. examined the precipitation conditions of Chevreul’s salt using (NH4)2SO3 from synthetic aqueous CuSO4 solutions. In light of these studies, it can be said that Chevreul’s salt can be produced practically from both a leach solutions including copper and synthetic CuSO4 solutions.

Keywords: Chevreul’s salt, ammonia, copper sulpfite, sodium sülfite, optimum conditions

Procedia PDF Downloads 247
4650 The Investigation of Precipitation Conditions of Chevreul’s Salt

Authors: Turan Çalban, Fatih Sevim, Oral Laçin

Abstract:

In this study, the precipitation conditions of Chevreul’s salt were evaluated. The structure of Chevreul’s salt was examined by considering the previous studies. Thermodynamically, the most important precipitation parameters were pH, temperature, and sulphite-copper(II) ratio. The amount of Chevreul’s salt increased with increasing the temperature and sulphite-copper(II) ratio at the certain range, while it increased with decreasing the pH value at the chosen range. The best solution medium for recovery of Chevreul’s salt is sulphur dioxide gas-water system. Moreover, the soluble sulphite salts are used as efficient precipitating reagents. Chevreul’s salt is generally used to produce the highly pure copper powders from synthetic copper sulphate solutions and impure leach solutions. When the pH of the initial ammoniacal solution is greater than 8.5, ammonia in the medium is not free, and Chevreul’s salt from solution does not precipitate. In contrast, copper ammonium sulphide is precipitated. The pH of the initial solution containing ammonia for precipitating of Chevreul’s salt must be less than 8.5.

Keywords: Chevreul's salt, production, copper sulfites, copper compound

Procedia PDF Downloads 224
4649 Mechanistic Studies of Compacted and Sintered Rock Salt

Authors: Claudia H. Swanson, Jens Günster

Abstract:

This research addresses the densification via compaction and sintering of naturally occurring rock salt which was motivated by the fact that in a saline environment rock salt is thermodynamically stable and does show a mechanical behavior compatible to the surrounding host material. The sintering of rock salt powder compacts was systematically investigated using temperature and pressure as variables for the sinter process. The behavior of rock salt showed segregations of anhydrite, CaSO4 - the major impurity found in rock salt, to the grain boundaries between individual sodium chloride crystals. Powder compacts treated with lower pressures lost those anhydrite segregates over time while high pressure treated compacts remained with anhydrite segregates. The density reached in this study is 2.008 g cm-3 corresponding to a density of 92.5 % of the theoretical value. This high density is making the sintering a promising technique for rock salt as applications in underground appropriate environment.

Keywords: rock salt, sinter, anhydrite, nuclear safety

Procedia PDF Downloads 472
4648 Strengthening National Salt Industry through Cultivation Upgrading and Product Diversification

Authors: Etty Soesilowati

Abstract:

This research was intended to: (1) designing production systems that produce high quality salt and (2) diversification of salt products. This research used qualitative and quantitative approaches which Garam Mas Ltd. as the research site. The data were analyzed interactively and subjected to laboratory tests. The analyses showed that salt production system using HDPE geomembranes produced whiter and cleaner salts than those produced by conventional methods without HDPE geomembranes. High quality consumption salt contained 97% NaCl and a maximum of 0.05% water, in the form of white minute crystals and usually used for table salt of food and snack seasoning, souses and cheese and vegetable oil industries. Medium grade salt contained 94.7%-97% NaCl and 3%-7% water and usually used for kitchen salt, soy sauce, tofu industries and cattle feeding. Low quality salt contained 90%-94.7% NaCl and 5%-10% water, with dull white color and usually used for fish preservation and agriculture. The quality and quantity of salts production were influenced by temperatures, weather, water concentrations used during production processes and the discipline of salt farmers itself. The use of water temperature less than 23 °Be during the production processes produced low quality salts. Optimizing cultivation of the production process from raw material to end product (consumption salt) should be attempted to produce quality salt that fulfills the Indonesian National Standard. Therefore, the integrated policies among stakeholders are really needed to build strong institutional base at salt farmer level. This might be achieved through the establishment of specific region for salt production.

Keywords: cultivation system, diversification, salt products, high quality salt

Procedia PDF Downloads 380
4647 Image Enhancement of Histological Slides by Using Nonlinear Transfer Function

Authors: D. Suman, B. Nikitha, J. Sarvani, V. Archana

Abstract:

Histological slides provide clinical diagnostic information about the subjects from the ancient times. Even with the advent of high resolution imaging cameras the image tend to have some background noise which makes the analysis complex. A study of the histological slides is done by using a nonlinear transfer function based image enhancement method. The method processes the raw, color images acquired from the biological microscope, which, in general, is associated with background noise. The images usually appearing blurred does not convey the intended information. In this regard, an enhancement method is proposed and implemented on 50 histological slides of human tissue by using nonlinear transfer function method. The histological image is converted into HSV color image. The luminance value of the image is enhanced (V component) because change in the H and S components could change the color balance between HSV components. The HSV image is divided into smaller blocks for carrying out the dynamic range compression by using a linear transformation function. Each pixel in the block is enhanced based on the contrast of the center pixel and its neighborhood. After the processing the V component, the HSV image is transformed into a colour image. The study has shown improvement of the characteristics of the image so that the significant details of the histological images were improved.

Keywords: HSV space, histology, enhancement, image

Procedia PDF Downloads 308
4646 New Features for Copy-Move Image Forgery Detection

Authors: Michael Zimba

Abstract:

A novel set of features for copy-move image forgery, CMIF, detection method is proposed. The proposed set presents a new approach which relies on electrostatic field theory, EFT. Solely for the purpose of reducing the dimension of a suspicious image, firstly performs discrete wavelet transform, DWT, of the suspicious image and extracts only the approximation subband. The extracted subband is then bijectively mapped onto a virtual electrostatic field where concepts of EFT are utilised to extract robust features. The extracted features are shown to be invariant to additive noise, JPEG compression, and affine transformation. The proposed features can also be used in general object matching.

Keywords: virtual electrostatic field, features, affine transformation, copy-move image forgery

Procedia PDF Downloads 521
4645 X-Ray Photoelectron Spectroscopy Characterization of the Surface Layer on Inconel 625 after Exposition in Molten Salt

Authors: Marie Kudrnova, Jana Petru

Abstract:

This study is part of the international research - Materials for Molten Salt Reactors (MSR) and addresses the part of the project dealing with the corrosion behavior of candidate construction materials. Inconel 625 was characterized by x-ray photoelectron spectroscopy (XPS) before and after high–temperature experiment in molten salt. The experiment was performed in a horizontal tube furnace molten salt reactor, at 450 °C in argon, at atmospheric pressure, for 150 hours. Industrially produced HITEC salt was used (NaNO3, KNO3, NaNO2). The XPS study was carried out using the ESCAProbe P apparatus (Omicron Nanotechnology Ltd.) equipped with a monochromatic Al Kα (1486.6 eV) X-ray source. The surface layer on alloy 625 after exposure contains only Na, C, O, and Ni (as NiOx) and Nb (as NbOx BE 206.8 eV). Ni was detected in the metallic state (Ni0 – Ni 2p BE-852.7 eV, NiOx - Ni 2p BE-854.7 eV) after a short Ar sputtering because the oxide layer on the surface was very thin. Nickel oxides can form a protective layer in the molten salt, but only future long-term exposures can determine the suitability of Inconel 625 for MSR.

Keywords: Inconel 625, molten salt, oxide layer, XPS

Procedia PDF Downloads 122
4644 Airborne SAR Data Analysis for Impact of Doppler Centroid on Image Quality and Registration Accuracy

Authors: Chhabi Nigam, S. Ramakrishnan

Abstract:

This paper brings out the analysis of the airborne Synthetic Aperture Radar (SAR) data to study the impact of Doppler centroid on Image quality and geocoding accuracy from the perspective of Stripmap mode of data acquisition. Although in Stripmap mode of data acquisition radar beam points at 90 degrees broad side (side looking), shift in the Doppler centroid is invariable due to platform motion. In-accurate estimation of Doppler centroid leads to poor image quality and image miss-registration. The effect of Doppler centroid is analyzed in this paper using multiple sets of data collected from airborne platform. Occurrences of ghost (ambiguous) targets and their power levels have been analyzed that impacts appropriate choice of PRF. Effect of aircraft attitudes (roll, pitch and yaw) on the Doppler centroid is also analyzed with the collected data sets. Various stages of the RDA (Range Doppler Algorithm) algorithm used for image formation in Stripmap mode, range compression, Doppler centroid estimation, azimuth compression, range cell migration correction are analyzed to find the performance limits and the dependence of the imaging geometry on the final image. The ability of Doppler centroid estimation to enhance the imaging accuracy for registration are also illustrated in this paper. The paper also tries to bring out the processing of low squint SAR data, the challenges and the performance limits imposed by the imaging geometry and the platform dynamics on the final image quality metrics. Finally, the effect on various terrain types, including land, water and bright scatters is also presented.

Keywords: ambiguous target, Doppler Centroid, image registration, Airborne SAR

Procedia PDF Downloads 191