Search results for: salt and peppers attacks
362 A New Design of Vacuum Membrane Distillation Module for Water Desalination
Authors: Adnan Alhathal Alanezi
Abstract:
The performance of vacuum membrane distillation (VMD) process for water desalination was investigated utilizing a new design membrane module using two commercial polytetrafluoroethylene (PTFE) and polyvinylidene fluoride (PVDF) flat sheet hydrophobic membranes. The membrane module's design demonstrated its suitability for achieving a high heat transfer coefficient of the order of 103 (W/m2K) and a high Reynolds number (Re). The heat and mass transport coefficients within the membrane module were measured using VMD experiments. The permeate flux has been examined in relation to process parameters such as feed temperature, feed flow rate, vacuum degree, and feed concentration. Because the feed temperature, feed flow rate, and vacuum degree all play a role in improving the performance of the VMD process, optimizing all of these parameters is the best method to achieve a high permeate flux. In VMD desalination, the PTFE membrane outperformed the PVDF membrane. When compared to previous studies, the obtained water flux is relatively high, reaching 43.8 and 52.6 (kg/m2h) for PVDF and PTFE, respectively. For both membranes, the salt rejection of NaCl was greater than 99%.Keywords: desalination, vacuum membrane distillation, PTFE and PVDF, hydrophobic membranes, O-ring membrane module
Procedia PDF Downloads 89361 Isolation and Characterization White Spot Syndrome Protein Envelope Protein 19 from Black Tiger Shrimp (Penaeus monodon)
Authors: Andi Aliah Hidayani, Asmi Citra Malina A. R. Tassakka, Andi Parenrengi
Abstract:
Vanname Shrimp is one of the high yielding varieties that are more resistant to virus attacks. However, now this shrimp more death due to virus attack such as white spot disease caused by white spot syndrome virus (WSSV). Various efforts have done to prevent the disease, like immunostimulatory, probiotics, and vaccine. White spot syndrome virus (WSSV) envelope protein VP19 gene is important because of its involvement in the system infection of shrimp. This study aimed to isolate and characterize an envelope protein VP19 – encoding gene of WSSV using WSSV infected Vanname Shrimp sample from some areas in South Sulawesi (Pangkep, Barru and Pinrang). The genomic of DNA were isolated from shrimp muscle using DTAB-CTAB method. Isolation of gene encoding envelope protein VP19 WSSV ws successfully performed with the results of the length of DNA fragment was 387 bp. The results of homology analysis using BLASTn homology suggested that these isolates genes from Barru, Pangkep and Pinrang have closest relationship with isolates from Mexican.Keywords: vanname, shrimp, WSSV, viral protein 19
Procedia PDF Downloads 535360 Determination of the Risks of Heart Attack at the First Stage as Well as Their Control and Resource Planning with the Method of Data Mining
Authors: İbrahi̇m Kara, Seher Arslankaya
Abstract:
Frequently preferred in the field of engineering in particular, data mining has now begun to be used in the field of health as well since the data in the health sector have reached great dimensions. With data mining, it is aimed to reveal models from the great amounts of raw data in agreement with the purpose and to search for the rules and relationships which will enable one to make predictions about the future from the large amount of data set. It helps the decision-maker to find the relationships among the data which form at the stage of decision-making. In this study, it is aimed to determine the risk of heart attack at the first stage, to control it, and to make its resource planning with the method of data mining. Through the early and correct diagnosis of heart attacks, it is aimed to reveal the factors which affect the diseases, to protect health and choose the right treatment methods, to reduce the costs in health expenditures, and to shorten the durations of patients’ stay at hospitals. In this way, the diagnosis and treatment costs of a heart attack will be scrutinized, which will be useful to determine the risk of the disease at the first stage, to control it, and to make its resource planning.Keywords: data mining, decision support systems, heart attack, health sector
Procedia PDF Downloads 356359 Seed Germination, Seedling Emergence and Response to Herbicides of Papaver Species (Papaver rhoeas and P. dubium)
Authors: Faezeh Zaefarian1, Sajedeh Golmohammadzadeh, Mohammad Rezvani
Abstract:
Weed management decisions for weed species can be derived from knowledge of seed germination biology. Experiments were conducted in laboratory and greenhouse to determine the effects of light, temperature, salt and water stress, seed burial depth on seed germination and seedling emergence of Papaver rhoeas and P.dubium and to assay the response of these species to commonly available POST herbicides. Germination of the Papaver seeds was influenced by the tested temperatures (day/night temperatures of 20 and 25 °C) and light. The concentrations of sodium chloride, ranging from 0 to 80 mM, influence germination of seeds. The osmotic potential required for 50% inhibition of maximum germination of P. rhoeas was -0.27 MPa and for P. dubium species was 0.25 MPa. Seedling emergence was greatest for the seeds placed at 1 cm and emergence declined with increased burial depth in the soil. No seedlings emerged from a burial depth of 6 cm. The herbicide 2,4-D at 400 g ai ha-1 provided excellent control of both species when applied at the four-leaf and six-leaf stages. However, at the six-leaf stage, percent control was reduced. The information gained from this study could contribute to developing components of integrated weed management strategies for Papaver species.Keywords: germination, papaver species, planting depth, POST herbicides
Procedia PDF Downloads 244358 A Lifetime-Enhancing Monitoring Node Distribution Using Minimum Spanning Tree in Mobile Ad Hoc Networks
Authors: Sungchul Ha, Hyunwoo Kim
Abstract:
In mobile ad hoc networks, all nodes in a network only have limited resources and calculation ability. Therefore communication topology which have long lifetime is good for all nodes in mobile ad hoc networks. There are a variety of researches on security problems in wireless ad hoc networks. The existing many researches try to make efficient security schemes to reduce network power consumption and enhance network lifetime. Because a new node can join the network at any time, the wireless ad hoc networks are exposed to various threats and can be destroyed by attacks. Resource consumption is absolutely necessary to secure networks, but more resource consumption can be a critical problem to network lifetime. This paper focuses on efficient monitoring node distribution to enhance network lifetime in wireless ad hoc networks. Since the wireless ad hoc networks cannot use centralized infrastructure and security systems of wired networks, a new special IDS scheme is necessary. The scheme should not only cover all nodes in a network but also enhance the network lifetime. In this paper, we propose an efficient IDS node distribution scheme using minimum spanning tree (MST) method. The simulation results show that the proposed algorithm has superior performance in comparison with existing algorithms.Keywords: MANETs, IDS, power control, minimum spanning tree
Procedia PDF Downloads 372357 Eimeria spp. in Naturally Infected Calves
Authors: Nermin Isik, Ozlem Derinbay Ekici
Abstract:
Bovine coccidiosis is a protozoan disease caused by various species of Eimeria and most signs of disease are chronic or subclinical. The aim of this study was to determine the prevalence of Eimeria spp. in calves in Konya, in Turkey. The study, conducted from January- February 2015, involved 240 faecal samples of calves in the age groups of <1 month, 1-3 months and >3 months in Konya city centre, in Turkey. In a retrospective study from these faecal samples of calves submitted to the University of Selcuk, Faculty of Veterinary Medicine, Laboratory of Parasitology were evaluated regarding the prevalence of Eimeria spp. Faecal samples were examined by Fulleborn saturated salt floatation technique. Eimeria oocysts were found in 8.33% of all samples. The positivity rates in each of the age groups were different. According to the age groups (<1 month, 1-3 months and >3 months), the Eimeria spp. were determined as 0.83, 22.73 and 7.41%, respectively. After examination of stool, detected oocysts were sporulated in 2.5% potassium dichromate at 22º C and species were identified as E. cylindrica, E. zuernii, E. ellipsoidalis, E. subspherica, E. bovis, E. auburnensis, E. canadensis, E. illinoisensis and E. brasiliensis in infected calves. In conclusion, the highest prevalence was observed in the age group of 1-3 months. The presence of Eimeria species in calves demonstrated for the first time in the Konya region in Turkey. Other etiologic agents should also be investigated in calves more seriously. Further molecular epidemiological studies should be performed in this community.Keywords: Eimeria spp., calves, diarrhea, bovine coccidiosis
Procedia PDF Downloads 537356 The Strategy of Orbit Avoidance for Optical Remote Sensing Satellite
Authors: Dianxun Zheng, Wuxing Jing, Lin Hetong
Abstract:
Optical remote sensing satellite, always running on the Sun-synchronous orbit, equipped laser warning equipment to alert CCD camera from laser attack. There have three ways to protect the CCD camera, closing the camera cover satellite attitude maneuver and satellite orbit avoidance. In order to enhance the safety of optical remote sensing satellite in orbit, this paper explores the strategy of satellite avoidance. The avoidance strategy is expressed as the evasion of pre-determined target points in the orbital coordinates of virtual satellite. The so-called virtual satellite is a passive vehicle which superposes a satellite at the initial stage of avoidance. The target points share the consistent cycle time and the same semi-major axis with the virtual satellite, which ensures the properties of the Sun-synchronous orbit remain unchanged. Moreover, to further strengthen the avoidance capability of satellite, it can perform multi-object avoid maneuvers. On occasions of fulfilling the orbit tasks of the satellite, the orbit can be restored back to virtual satellite through orbit maneuvers. There into, the avoid maneuvers adopts pulse guidance. and the fuel consumption is also optimized. The avoidance strategy discussed in this article is applicable to avoidance for optical remote sensing satellite when encounter the laser hostile attacks.Keywords: optical remote sensing satellite, always running on the sun-synchronous
Procedia PDF Downloads 400355 Detection of Cyberattacks on the Metaverse Based on First-Order Logic
Authors: Sulaiman Al Amro
Abstract:
There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic
Procedia PDF Downloads 40354 Status, Habitat Use, and Behaviour of Wintering Greater Flamingos Phoenicopterus roseus in Semi-Arid and Saharan Wetlands of Algeria
Authors: E. Bensaci, M. Saheb, Y. Nouidjem, A. Zoubiri, A. Bouzegag, M. Houhamdi
Abstract:
The Greater flamingo is considered the flagship species of wetlands across semi-arid and Saharan regions of Africa, especially Chotts and Sebkhas, which also concentrate significant numbers of bird species. Flamingos have different status (wintering and breeder) which vary between sites in different parts of Algeria. We conducted surveys and recorded banded flamingos across distinct regions within two climatic belts: semi-arid (Hauts Plateaux) and arid (Sahara), showing the importance of these sites in the migratory flyways particularly the relation between West Mediterranean and West Africa populations. The distribution of Greater flamingos varied between sites and seasons, where the concentrations mainly were in the wide, lees deep and salt lakes. Many of the sites (17) in the surveyed area were regularly supporting at least 1% of the regional population during winter. The analysis of Greater flamingos behaviour in different climatic regions in relation showed that the feeding is the dominant diurnal activity with rates exceeding 60% of the time. While feeding varies between seasons, and showed a negative relationship with the degree of disturbance.Keywords: Algeria, greater flamingo, Phoenicopterus roseus, Sahara, semi-arid
Procedia PDF Downloads 510353 Human-Tiger Conflict in Chitwan National Park, Nepal
Authors: Abishek Poudel
Abstract:
Human-tiger conflicts are serious issues of conflicts between local people and park authority and the conflicting situation potentially play negative role in park management. The study aimed (1) To determine the trend and nature of human-tiger conflicts (2) To understand people's perception and mitigation measures towards tiger conservation. Both primary and secondary information were used to determine human- tiger conflicts in Chitwan National Park. Systematic random sampling with 5% intensity was done to collect the perception of the villagers regarding human-tiger conflicts. The study sites were selected based on frequencies of incidences of human attacks and livestock depredation viz. Rajahar and Ayodhyapuri VDCs respectively. The trend of human casualties by tiger has increased in last five year whereas the trend of livestock has decreased. Reportedly, between 2008 and 2012, tigers killed 22 people, injured 10 and killed at least 213 livestock. Conflict was less common in the park and more intense in the sub-optimal habitats of Buffer Zone. Goat was the most vulnerable livestock followed by cattle. The livestock grazing and human intrusion into tiger habitat were the causes of conflicts. Developing local stewardship and support for tiger conservation, livestock insurance, and compensation policy simplification may help reduce human-tiger conflicts.Keywords: livestock depredation, sub optimal habitat, human-tiger, local stewardship
Procedia PDF Downloads 463352 DH-Students Promoting Underage Asylum Seekers' Oral Health in Finland
Authors: Eeva Wallenius-Nareneva, Tuula Toivanen-Labiad
Abstract:
Background: Oral health promotion event was organised for forty Afghanistan, Iraqi and Bangladeshi underage asylum seekers in Finland. The invitation to arrange this coaching occasion was accepted in the Degree Programme in Oral Hygiene in Metropolia. The personnel in the reception center found the need to improve oral health among the youngsters. The purpose was to strengthen the health literacy of the boys in their oral self-care and to reduce dental fears. The Finnish studies, especially the terminology of oral health was integrated to coaching with the help of interpreters. Cooperative learning was applied. Methods: Oral health was interactively discussed in four study group sessions: 1. The importance of healthy eating habits; - Good and bad diets, - Regular meals, - Acid attack o Xylitol. 2. Oral diseases − connection to general health; - Aetiology of gingivitis, periodontitis and caries, - Harmfulness of smoking 3. Tools and techniques for oral self-care; - Brushing and inter dental cleaning. 4. Sharing earlier dental care experiences; - Cultural differences, - Dental fear, - Regular check-ups. Results: During coaching deficiencies appeared in brushing and inter dental cleaning techniques. Some boys were used to wash their mouth with salt justifying it by salt’s antiseptic properties. Many brushed their teeth by vertical movements. The boys took feedback positively when a demonstration with model jaws revealed the inefficiency of the technique. The advantages of fluoride tooth paste were advised. Dental care procedures were new and frightening for many boys. Finnish dental care system was clarified. The safety and indolence of the treatments and informed consent were highlighted. Video presentations and the dialog lowered substantially the threshold to visit dental clinic. The occasion gave the students means for meeting patients from different cultural and language backgrounds. The information hidden behind the oral health problems of the asylum seekers was valuable. Conclusions: Learning dental care practices used in different cultures is essential for dental professionals. The project was a good start towards multicultural oral health care. More experiences are needed before graduation. Health education themes should be held simple regardless of the target group. The heterogeneity of the group does not pose a problem. Open discussion with questions leading to the theme works well in clarifying the target group’s knowledge level. Sharing own experiences strengthens the sense of equality among the participants and encourages them to express own opinions. Motivational interview method turned out to be successful. In the future coaching occasions must confirm active participation of everyone. This could be realized by dividing the participants to even smaller groups. The different languages impose challenges but they can be solved by using more interpreters. Their presence ensures that everyone understands the issues properly although the use of plain and sign languages are helpful. In further development, it would be crucial to arrange a rehearsal occasion to the same participants in two/three months’ time. This would strengthen the adaption of self-care practices and give the youngsters opportunity to pose more open questions. The students would gain valuable feedback regarding the effectiveness of their work.Keywords: cooperative learning, interactive methods, motivational interviewing, oral health promotion, underage asylum seekers
Procedia PDF Downloads 290351 An Immune-Inspired Web Defense Architecture
Authors: Islam Khalil, Amr El-Kadi
Abstract:
With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on the operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down or throttling suspected malicious digital pathogens (intrusions) to reduce their damage footprint while providing more opportunities for forensic inspection of suspected pathogens in addition to the ability to snapshot, rollback, and recover from possible damage. The proposed platform also leverages existing intrusion detection algorithms by integrating and orchestrating their cooperative operation for more effective intrusion detection. We show how this model reduces the damage footprint of intrusions and gives a greater time window for forensic investigation. Moreover, during our experiments, our proposed platform was able to uncover unintentional system design flaws that resulted in internal DDoS-like attacks by submodules of the system itself rather than external intrusions.Keywords: containers, human immunity, intrusion detection, security, web services
Procedia PDF Downloads 95350 Infestations of Olive Fruit Fly, Bactrocera oleae (Rossi) (Diptera: Tephritidae), in Different Olive Cultivars in Çanakkale, Turkey
Authors: Hanife Genç
Abstract:
The olive fruit fly, Bactrocera oleae (Rossi), is an economically important and endemic pest in olive (Oleae europae) orchards in Turkey. The aim of this study was to determine olive fruit fly infestation in different olive cultivars in the laboratory. Olive fly infested fruits were collected in Çanakkale province to establish wild fly population. After having reproductive olive fly colonies, 14 olive cultivars were tested in the controlled laboratory conditions, at 23±2 °C, 65% RH and 16:8 h (light: dark) photoperiod. The olive samples from 14 different olive cultivars were collected in October 2015, in Campus of Dardanos, Çanakkale Onsekiz Mart University. Observations were carried out detecting some biological parameters such as the number of oviposition stings, active infestation, total infestation, the number of pupae and the adult emergence. The results indicated that oviposition stings were not associated with pupal yield. A few pupae were found within olive fruits which were not able to exit. Screening of the varieties suggested that less susceptible cultivar to olive fruit fly attacks was Arbequin while Gemlik-2M 2/3 showed significant susceptibility. Ovipositional preference of olive fly females and the success of larval development in different olive varieties are crucial for establishing new olive orchards to prevent high olive fruit fly infestation.Keywords: infestation, olive fruit fly, olive cultivars, oviposition sting
Procedia PDF Downloads 217349 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework
Authors: Abdulrahman S. Alqahtani
Abstract:
The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism
Procedia PDF Downloads 404348 Multiscale Model of Blast Explosion Human Injury Biomechanics
Authors: Raj K. Gupta, X. Gary Tan, Andrzej Przekwas
Abstract:
Bomb blasts from Improvised Explosive Devices (IEDs) account for vast majority of terrorist attacks worldwide. Injuries caused by IEDs result from a combination of the primary blast wave, penetrating fragments, and human body accelerations and impacts. This paper presents a multiscale computational model of coupled blast physics, whole human body biodynamics and injury biomechanics of sensitive organs. The disparity of the involved space- and time-scales is used to conduct sequential modeling of an IED explosion event, CFD simulation of blast loads on the human body and FEM modeling of body biodynamics and injury biomechanics. The paper presents simulation results for blast-induced brain injury coupling macro-scale brain biomechanics and micro-scale response of sensitive neuro-axonal structures. Validation results on animal models and physical surrogates are discussed. Results of our model can be used to 'replicate' filed blast loadings in laboratory controlled experiments using animal models and in vitro neuro-cultures.Keywords: blast waves, improvised explosive devices, injury biomechanics, mathematical models, traumatic brain injury
Procedia PDF Downloads 249347 Utilization Reactive Dilutes to Improve the Properties of Epoxy Resin as Anticorrosion Coating
Authors: El-Sayed Negim, Ainakulova D. T., Puteri S. M., Khaldun M. Azzam, Bekbayeva L. K., Arpit Goyal, Ganjian E.
Abstract:
Anticorrosion coatings protect metal surfaces from environmental factors including moisture, oxygen, and gases that caused corrosion to the metal. Various types of anticorrosion coatings are available, with different properties and application methods. Many researchers have been developing methods to prevent corrosion, and epoxy polymers are one of the wide methods due to their excellent adhesion, chemical resistance, and durability. In this study, synthesis reactive dilute based on glycidyl methacrylate (GMA) with each of 2-ethylhexyl acrylate (2-EHA) and butyl acrylate (BuA) to improve the performance of epoxy resin and anticorrosion coating. The copolymers were synthesized with composition ratio (5/5) by bulk polymerization technique using benzoyl peroxide as a catalyst and temperature at 85 oC for 2 hours and at 90 oC for 30 minutes to complete the polymerization process. The obtained copolymers were characterized by FTIR, viscosity and thixotropic index. The effect of copolymers as reactive dilute on the physical and mechanical properties of epoxy resin was investigated. Metal plates coated by the modified epoxy resins with different contents of copolymers were tested using alkali and salt test methods, and the copolymer based on GMA and BUA showed the best protection efficiency due to the barrier effect of the polymer layer.Keywords: epoxy, coating, dilute, corrosion, reactive
Procedia PDF Downloads 52346 Convergence and Stability in Federated Learning with Adaptive Differential Privacy Preservation
Authors: Rizwan Rizwan
Abstract:
This paper provides an overview of Federated Learning (FL) and its application in enhancing data security, privacy, and efficiency. FL utilizes three distinct architectures to ensure privacy is never compromised. It involves training individual edge devices and aggregating their models on a server without sharing raw data. This approach not only provides secure models without data sharing but also offers a highly efficient privacy--preserving solution with improved security and data access. Also we discusses various frameworks used in FL and its integration with machine learning, deep learning, and data mining. In order to address the challenges of multi--party collaborative modeling scenarios, a brief review FL scheme combined with an adaptive gradient descent strategy and differential privacy mechanism. The adaptive learning rate algorithm adjusts the gradient descent process to avoid issues such as model overfitting and fluctuations, thereby enhancing modeling efficiency and performance in multi-party computation scenarios. Additionally, to cater to ultra-large-scale distributed secure computing, the research introduces a differential privacy mechanism that defends against various background knowledge attacks.Keywords: federated learning, differential privacy, gradient descent strategy, convergence, stability, threats
Procedia PDF Downloads 30345 Structural Performance of Prefabricated Concrete and Reinforced Concrete Structural Walls under Blast Loads
Authors: S. Kamil Akin, Turgut Acikara
Abstract:
In recent years the world and our country has experienced several explosion events occurred due to terrorist attacks and accidents. In these explosion events many people have lost their lives and many buildings have been damaged. If structures were designed taking the blast loads into account, these results may not have happened or the casualties would have been less. In this thesis analysis of the protection walls have been conducted to prevent the building damage from blast loads. These analyzes was carried out for two different types of wall, concrete and reinforced concrete. Analyses were carried out on four different thicknesses of each wall element. In each wall element the stresses and displacements of the exposed surface due to the detonation charge has been calculated. The limit shear stress and displacement of the wall element according to their material properties has been taken into account. As the result of the analyses the standoff distances and TNT equivalent amount has been determined. According to equivalent TNT amounts and standoff distances the structural response of the protective wall elements has been observed. These structural responses have been observed by ABAQUS finite element package. Explosion loads were brought into effect to the protective wall element models by using the ABAQUS / CONWEP.Keywords: blast loading, blast wave, TNT equivalent method, CONWEP, finite element analysis, detonation
Procedia PDF Downloads 439344 Novel Anticorrosion Epoxy Reinforced Graphitic Nanocomposite as a Durable Surface
Authors: Shimaa A. Higazy, Mohamed S. Selim, Olfat E. El-Azabawy, Abeer A. Hassan
Abstract:
We designed novel epoxy/graphitic carbon nitride (g-C₃N₄) nanocomposite materials as suitable surface coatings. g-C₃N₄ nanosheets were facilely prepared and dispersed in the epoxy resin via solution casting. This research focuses on the mechanical and anticorrosion properties of g-C₃N₄ nanofiller reinforced epoxy nanocomposites. The structures, sizes, and morphologies of designed polymeric nanocomposites and nanofillers were elucidated using various techniques such as FT-IR, NMR, FE-TEM, FE-SEM. The developed nanocomposite was applied as a surface coating by air-assisted spray method. The structure-property relationship was studied for different concentrations of nanofiller in the epoxy matrix. The anticorrosive properties were studied via electrochemical experiments, including potentiodynamic polarization, electrochemical impedance, and open-circuit potential analyses, as well as salt spray test. Mechanical durability was assessed by various methods, such as impact, T-bending, and crosscut tests. Surface heterogeneity, elasticity, and corrosion-resistance features are among the merits of developed composite. The highest improvement was achieved with well dispersion of g-C₃N₄ sheets fillers. This fascinating epoxy nanostructured coating provides a promising anticorrosive coatings for a sustainable future environment.Keywords: epoxy, nanocomposite, surface coating, anticorrosive properties, mechanical durability
Procedia PDF Downloads 88343 Investigating Nanocrystalline CaF2:Tm for Carbon Beam and Gamma Radiation Dosimetry
Authors: Kanika Sharma, Shaila Bahl, Birendra Singh, Pratik Kumar, S. P. Lochab, A. Pandey
Abstract:
In the present investigation, initially nano-particles of CaF2 were prepared by the chemical co-precipitation method and later the prepared salt was activated by thulium (0.1 mol%) using the combustion technique. The final product was characterized and confirmed by X-Ray diffraction (XRD) and transmission electron microscopy (TEM). Further, the thermoluminescence (TL) properties of the nanophosphor were studied by irradiating it with 1.25 MeV of gamma radiation and 65 MeV of carbon (C6+) ion beam. For gamma rays, two prominent TL peaks were observed with a low temperature peak at around 1070C and a high temperature peak at around 1570C. Furthermore, the nanophosphor maintained a linear TL response for the entire range of studied doses i.e. 10 Gy to 2000 Gy for both the temperature peaks. Moreover, when the nanophosphor was irradiated with 65 MeV of C6+ ion beam the shape and structure of the glow curves remained spectacularly similar and the nanophosphor displayed a linear TL response for the full range of studied fluences i.e. 5*1010 ions/cm2 to 1 *1012 ions/ cm2. Finally, various tests like reproducibility test and batch homogeneity were also carried out to define the final product. Thus, co-precipitation method followed by combustion technique was successful in effectively producing dosimetric grade CaF2:Tm for dosimetry of gamma as well as carbon (C6+) beam.Keywords: gamma radiation, ion beam, nanocrystalline, radiation dosimetry
Procedia PDF Downloads 184342 The Shadow of Terrorism in the World Tourism Industry: Impacts, Prevention and Recovery Strategies
Authors: Maria Brás
Abstract:
The main purpose of the presentation is to identify the impacts and appropriate measures to prevent potential attacks, or minimize the risk of an attack in tourist destination. Terrorism has been growing in the shadow of unpredictability, however, is possible to minimize the danger of a terrorist attack by doing the: (1) recognition; (2); evaluation; (3) avoidance; (4) threat reduction. The vulnerability of tourism industry to terrorism is an undeniable fact, and terrorists know it. They use this advantage attacking tourists for very specific reasons, such as the: (1) international coverage by the media, “if it bleeds it leads” ; (2) chances of getting different nationalities at the same place and time; (3) possibility of destroyed the economy of a destination, or destinations (“terrorism contamination effect”), through the reduction of tourist demand; (4) psychological, and social disruption based on fear of negative consequences. Security incidents, such as terrorism, include different preventive measures that can be conducted in partnership with: tourism industry (hotels, airports, tourist attractions, among others); central government; public and/or private sector; local community; and media. The recovery strategies must be based on the dissemination of positive information to the media; in creating new marketing strategies that emphasize the social and cultural values of the destination; encourage domestic tourism; get government, or state, financial support.Keywords: terrorism, tourism, safety, security, impacts, prevention, recovery
Procedia PDF Downloads 342341 Capsaicin Derivatives Enhanced Activity of α1β2γ2S-Aminobutyric Acid Type a Receptor Expressed in Xenopus laevis Oocytes
Authors: Jia H. Wong, Jingli Zhang, Habsah Mohamad, Iswatun H. Abdullah Ripain, Muhammad Bilal, Amelia J. Lloyd, Abdul A. Mohamed Yusoff, Jafri M. Abdullah
Abstract:
Epilepsy is one of the most common neurological diseases affecting more than 50 million of people worldwide. Epilepsy is a state of recurrent, spontaneous seizures with multiple syndromes and symptoms of different causes of brain dysfunction, prognosis, and treatments; characterized by transient, occasional and stereotyped interruptions of behavior whereby the excitatory-inhibitory activities within the central nervous system (CNS) are thrown out of balance due to various kinds of interferences. The goal of antiepileptic treatment is to enable patients to be free from seizures or to achieve control of seizures through surgical treatment and/or pharmacotherapy. Pharmacotherapy through AED plays an important role especially in countries with epilepsy treatment gap due to costs and availability of health facilities, skills and resources, yet there are about one-third of the people with epilepsy have drug-resistant seizures. Hence, this poses considerable challenges to the healthcare system and the effort in providing cost-effective treatment as well as the search for alternatives to treatment and management of epilepsy. Enhancement of γ-aminobutyric acid (GABA)-mediated inhibitory neurotransmission is one of the key mechanisms of actions of antiepileptic drugs. GABA type > a receptors (GABAAR) are ligand-gated ion channels that mediate rapid inhibitory neurotransmission upon the binding of GABA with a heteropentameric structure forming a central pore that is permeable to the influx of chloride ions in its activated state. The major isoform of GABAA receptors consists of two α1, two β2, and one γ2 subunit. It is the most abundantly expressed combinations in the brain and the most commonly researched through Xenopus laevis oocytes. With the advancing studies on ethnomedicine and traditional treatments using medicinal plants, increasing evidence reveal that spice and herb plants with medicinal properties play an important role in the treatment of ailments within communities across different cultures. Capsaicin is the primary natural capsaicinoid in hot peppers of plant genus Capsicum, consist of an aromatic ring, an amide linkage and a hydrophobic side chain. The study showed that capsaicins conferred neuroprotection in status epilepticus mouse models through anti-ictogenic, hypothermic, antioxidative, anti-inflammatory, and anti-apoptotic actions in a dose-dependent manner. In this study, five capsaicin derivatives were tested for their ability to increase the GABA-induced chloride current on α1β2γ2S of GABAAR expressed on Xenopus laevis oocytes using the method of two-microelectrode voltage clamp. Two of the capsaicin derivatives, IS5 (N-(4-hydroxy-3-methoxybenzyl)-3-methylbutyramide) and IS10 (N-(4-hydroxy-3-methoxybenzyl)-decanamide) at a concentration of 30µM were able to significantly increase the GABA-induced chloride current with p=0.002 and p=0.026 respectively. This study were able to show the enhancement effect of two capsaicin derivatives with moderate length of hydrocarbon chain on this receptor subtype, revealing the promising inhibitory activity of capsaicin derivatives through enhancement of GABA-induced chloride current and further investigations should be carried out to verify its antiepileptic effects in animal models.Keywords: α1β2γ2 GABAA receptors, α1β2γ2S, antiepileptic, capsaicin derivatives, two-microelectrode voltage clamp, Xenopus laevis oocytes
Procedia PDF Downloads 362340 Fulani Herdsmen and the Threat to Grassroots Security in Rural Nigeria
Authors: Akachi Odoemene
Abstract:
There is an ongoing grassroots war in Nigeria, particularly in its north central zone, as well as all through its southern parts, which have been most bloody. The war is between Fulani herdsmen and farming communities – an age-long problem which has escalated in the last decade and has assumed a very deadly dimension. In a typical scenario, Fulani herdsmen move into non-Fulani homelands with their cattle which graze on local farmlands, destroying farmers’ crops. This provokes their victims – the farmers – to acts of resistance, preventing the Fulani and their cattle from entering into farmlands. In some cases, there have been incidences of killing and/or stealing cattle, or poisoning of fields. In response, the herders wedge deadly attacks on farming communities, leading to the death of thousands of people. To be sure, this has been a major factor of instability in the rural areas of Nigeria. This paper aims at engaging the issues and cross-cutting issues of interest, as well as providing context and perspectives to the violent conflicts between Fulani herders and local communities in Nigeria. It particularly interrogates four central issues: (1) the nature and dynamics of the crisis, (2) the positions and stakes of the parties to the crisis, (3) the remedies available for containing/managing the conflicts and their desirability, and (4) perspectives on the positions of government(s) (and the African Union) on this conflict. Both primary and secondary sources were used for the purposes of this essay.Keywords: Fulani Herdsmen, violent conflicts and insecurity, sustainable remedies, Nigeria
Procedia PDF Downloads 253339 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare
Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon
Abstract:
This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty
Procedia PDF Downloads 357338 Robust Quantum Image Encryption Algorithm Leveraging 3D-BNM Chaotic Maps and Controlled Qubit-Level Operations
Authors: Vivek Verma, Sanjeev Kumar
Abstract:
This study presents a novel quantum image encryption algorithm, using a 3D chaotic map and controlled qubit-level scrambling operations. The newly proposed 3D-BNM chaotic map effectively reduces the degradation of chaotic dynamics resulting from the finite word length effect. It facilitates the generation of highly unpredictable random sequences and enhances chaotic performance. The system’s efficacy is additionally enhanced by the inclusion of a SHA-256 hash function. Initially, classical plain images are converted into their quantum equivalents using the Novel Enhanced Quantum Representation (NEQR) model. The Generalized Quantum Arnold Transformation (GQAT) is then applied to disrupt the coordinate information of the quantum image. Subsequently, to diffuse the pixel values of the scrambled image, XOR operations are performed using pseudorandom sequences generated by the 3D-BNM chaotic map. Furthermore, to enhance the randomness and reduce the correlation among the pixels in the resulting cipher image, a controlled qubit-level scrambling operation is employed. The encryption process utilizes fundamental quantum gates such as C-NOT and CCNOT. Both theoretical and numerical simulations validate the effectiveness of the proposed algorithm against various statistical and differential attacks. Moreover, the proposed encryption algorithm operates with low computational complexity.Keywords: 3D Chaotic map, SHA-256, quantum image encryption, Qubit level scrambling, NEQR
Procedia PDF Downloads 10337 Three Dimensional Model of Full Scale Plate Load Test on Stone Column in Sabkha Deposit: Case Study from Jubail Industrial City - Saudi Arabia
Authors: Hassan. A. Abas, Saad A. Aiban
Abstract:
Soil improvement by means of stone column method is used to improve sabkha soils in order to limit total and differential settlement and to achieve the required bearing capacity. Full-scale plate test was performed on site to confirm the achievement of required bearing capacity at the specified settlement. Despite the fact that this technique is widely used to improve sabkha soils, there are no studies focusing on the behavior of stone columns in such problematic soils. Sabkha soils are known for its high compressibility, low strength and water sensitivity due to loss of salt cementation upon flooding during installation of stone columns. Numerical modeling of plate load test assist to understand complicated behavior of sabkha – stone column interaction. This paper presents a three-dimensional Finite element model, using PLAXIS 3D software, to simulate vertical plate load tests on a stone column installed in sabkha. The predicted settlement values are in reasonable agreement with the field measure values and the field load - settlement curve can be predicted with good accuracy.Keywords: soil improvement, stone column, sabkha, PLAXIS 3D
Procedia PDF Downloads 388336 Quantum Cryptography: Classical Cryptography Algorithms’ Vulnerability State as Quantum Computing Advances
Authors: Tydra Preyear, Victor Clincy
Abstract:
Quantum computing presents many computational advantages over classical computing methods due to the utilization of quantum mechanics. The capability of this computing infrastructure poses threats to standard cryptographic systems such as RSA and AES, which are designed for classical computing environments. This paper discusses the impact that quantum computing has on cryptography, while focusing on the evolution from classical cryptographic concepts to quantum and post-quantum cryptographic concepts. Standard Cryptography is essential for securing data by utilizing encryption and decryption methods, and these methods face vulnerability problems due to the advancement of quantum computing. In order to counter these vulnerabilities, the methods that are proposed are quantum cryptography and post-quantum cryptography. Quantum cryptography uses principles such as the uncertainty principle and photon polarization in order to provide secure data transmission. In addition, the concept of Quantum key distribution is introduced to ensure more secure communication channels by distributing cryptographic keys. There is the emergence of post-quantum cryptography which is used for improving cryptographic algorithms in order to be more secure from attacks by classical and quantum computers. Throughout this exploration, the paper mentions the critical role of the advancement of cryptographic methods to keep data integrity and privacy safe from quantum computing concepts. Future research directions that would be discussed would be more effective cryptographic methods through the advancement of technology.Keywords: quantum computing, quantum cryptography, cryptography, data integrity and privacy
Procedia PDF Downloads 25335 Preliminary Study of Fermented Pickle of Tabah Bamboo Shoot: Gigantochloa nigrociliata (Buese) Kurz
Authors: Luh Putu T. Darmayanti, A. A. Duwipayana, I. Nengah K. Putra, Nyoman S. Antara
Abstract:
Tabah Bamboo (Gigantochloa nigrociliata (Buese) Kurz) is the indigenous bamboo species which grows in District of Pupuan, Tabanan at Province of Bali. Compared to the others, this shoot has low concentration of hydrocyanide acid (HCN). However, as found for almost of bamboo shoot, its seasonal availability, perishable in nature, and short-lived. This study aimed to gather information about total of lactic acid bacteria (LAB), pH, total acidity, HCN content, detection of LAB’s type involved during fermentation, and organic acids’ profiles of fermented pickles of Tabah bamboo shoot. The pickle was made by natural fermentation with 6 % salt concentration and fermentation conducted for 13 days. The result showed during the fermentation time, in the fourth day we found LAB’s number was highest as much as 72 x 107 CFU/ml and the lowest pH was 3.09. We also found decreasing in HCN from 37.8 ppm at the beginning to 20.52 ppm at the end of fermentation process. The total number of indigenous LAB isolated from the pickle are 48 strains we found 18 out of these had rod shape. For the preliminary study, all of the LAB with rod shape were detected by PCR as member of Lactobacillus spp., in which 17 strains detected as L. plantarum. The organic acids detected during the fermentation were lactic acid with the highest concentration was 0.0546 g/100 g and small amount of acetic acid.Keywords: fermentation, LAB, pickle, Tabah Bamboo shoot
Procedia PDF Downloads 344334 Polyampholytic Resins: Advances in Ion Exchanging Properties
Authors: N. P. G. N. Chandrasekara, R. M. Pashley
Abstract:
Ion exchange (IEX) resins are commonly available as cationic or anionic resins but not as polyampholytic resins. This is probably because sequential acid and base washing cannot produce complete regeneration of polyampholytic resins with chemically attached anionic and cationic groups in close proximity. The ‘Sirotherm’ process, developed by the Commonwealth Scientific and Industrial Research Organization (CSIRO) in Melbourne, Australia was originally based on the use of a physical mixture of weakly basic (WB) and weakly acidic (WA) ion-exchange resin beads. These resins were regenerated thermally and they were capable of removing salts from an aqueous solution at higher temperatures compared to the salt sorbed at ambient temperatures with a significant reduction of the sorption capacity with increasing temperature. A new process for the efficient regeneration of mixed bead resins using ammonium bicarbonate with heat was studied recently and this chemical/thermal regeneration technique has the capability for completely regenerating polyampholytic resins. Even so, the low IEX capacities of polyampholytic resins restrict their commercial applications. Recently, we have established another novel process for increasing the IEX capacity of a typical polyampholytic resin. In this paper we will discuss the chemical/thermal regeneration of a polyampholytic (WA/WB) resin and a novel process for enhancing its ion exchange capacity, by increasing its internal pore area. We also show how effective this method is for completely recycled regeneration, with the potential of substantially reducing chemical waste.Keywords: capacity, ion exchange, polyampholytic resin, regeneration
Procedia PDF Downloads 376333 Isolation, Identification and Crude Oil Biodegradation Potential of Providencia sp. BAZ 01
Authors: Aisami A., Z. A. Adamu, Lawan Bulama
Abstract:
Due to growing issues of crude oil pollution in both marine and terrestrial environments, Billions to Trillions of US Dollars were spent over the years for the treatment of this spill. There is an urgent need for effective bioremediation strategies. This current study focuses on the isolation and characterization of a crude oil-degrading bacterium from hydrocarbon-contaminated soil samples. Soil samples were collected from an oil spill site and subjected to enrichment culture techniques in a mineral salt medium supplemented with crude oil as the singular carbon source. The isolates were screened for their crude oil-degrading capabilities using gravimetric analysis. The most efficient isolation was identified through 16S rRNA gene sequencing. Cultural and physical conditions such pH, temperature salinity and crude oil concentrations were optimized. The isolates showed significant crude oil degradation efficiency, reducing oil concentration (2.5%) by 75% within 15 days of incubation. The strain was identified as Providencia sp. through molecular characterization, the sequence was deposited at the NCBI Genbank with accession number MN880494. The bacterium exhibited optimal growth at 32.5°C, pH 7.0 to 7.5, and in the presence of 1.5% (w/v) NaCl. The isolated Providencia sp. shows encouraging potential for bioremediation of crude oil-contaminated environments. This study successfully isolated and characterized a crude oil-degrading Providencia sp., highlighting its potential in bioremediation.Keywords: crude oil degradation, providencia sp., bioremediation, hydrocarbon utilization, environmental pollution.
Procedia PDF Downloads 42