Search results for: salt and peppers attacks
552 Corrosion and Tribocorrosion Behaviour of Potential Coatings Applied in High-Strength Low-Alloy Steel for Offshore Applications
Authors: Ainara Lopez-Ortega, Raquel Bayon, Elena Rodriguez, Amaya Igartua
Abstract:
The materials used in offshore structural applications are continuously subjected to aggressive environmental conditions that accelerate their degradation, thus shortening their useful life. Wear, corrosion and the effect of marine microorganisms are the main processes taking place in marine environments, and whenever they occur simultaneously the durability of materials is strongly reduced. In the present work, the tribocorrosion behaviour of a High-Strength Low-Alloy (HSLA) steel and three coatings commonly used for protecting offshore components has been studied by means of unidirectional tribological tests in synthetic seawater. The coatings were found to enhance the tribological response of the uncoated steel and provide the system with improved corrosion resistance, in terms of smaller material losses and reduction of friction coefficients. The tests were repeated after ageing the materials in a salt-fog cabinet, and the aging process was found to slightly affect the performance of two of the coatings, in terms of higher material losses, meanwhile the third coating was not affected.Keywords: coatings, corrosion, high-strength low-alloy steel, seawater, tribocorrosion
Procedia PDF Downloads 419551 Recovery of Iodide Ion from TFT-LCD Wastewater by Forward Osmosis
Authors: Yu-Ting Chen, Shiao-Shing Chen, Hung-Te Hsu, Saikat Sinha Ray
Abstract:
Forward osmosis (FO) is a crucial technology with low operating pressure and cost for water reuse and reclamation. In Taiwan, with the advance of science and technology, thin film transistor liquid crystal displays (TFT-LCD) based industries are growing exponentially. In the optoelectronic industry wastewater, the iodide is one of the valuable element; it is also used in the medical industry. In this study, it was intended to concentrate iodide by utilizing FO system and can be reused for TFT-LCD production. Cellulose triacetate (CTA) membranes were used for all these FO experiments, and potassium iodide solution was used as the feed solution. It has been found that EDTA-2Na as draw solution at pH 8 produced high water flux and minimized salt leakage. The result also demonstrated that EDTA-2Na of concentration 0.6M could achieve the highest water flux (6.69L/m2 h). Additionally, from the recovered iodide ion from pH 3-8, the I- species was found to be more than 99%, whereas I2 was measured to be less than 1%. When potassium iodide solution was used from low to high concentration (1000 ppm to 10000 ppm), the iodide rejection was found to be than more 90%. Since, CTA membrane is negatively charged and I- is anionic in nature, so it will from electrostatic repulsion and hence there will be higher rejection. The overall performance demonstrates that recovery of concentrated iodide using FO system is a promising technology.Keywords: draw solution, EDTA-2Na, forward osmosis, potassium iodide
Procedia PDF Downloads 367550 The Antibacterial Efficacy of Gold Nanoparticles Derived from Gomphrena celosioides and Prunus amygdalus (Almond) Leaves on Selected Bacterial Pathogens
Authors: M. E. Abalaka, S. Y. Daniyan, S. O. Adeyemo, D. Damisa
Abstract:
Gold nanoparticles (AuNPs) have gained increasing interest in recent times. This is greatly due to their special features, which include unusual optical and electronic properties, high stability and biological compatibility, controllable morphology and size dispersion, and easy surface functionalization. In typical synthesis, AuNPs were produced by reduction of gold salt AuCl4 in an appropriate solvent. A stabilizing agent was added to prevent the particles from aggregating. The antibacterial activity of different sizes of gold nanoparticles was investigated against Staphylococcus aureus, Salmonella typhi and Pseudomonas pneumonia using the disk diffusion method in a Müeller–Hinton Agar. The Au-NPs were effective against all bacteria tested. That the Au-NPs were successfully synthesized in suspension and were used to study the antibacterial activity of the two medicinal plants against some bacterial pathogens suggests that Au-NPs can be employed as an effective bacteria inhibitor and may be an effective tool in medical field. The study clearly showed that the Au-NPs exhibiting inhibition towards the tested pathogenic bacteria in vitro could have the same effects in vivo and thus may be useful in the medical field if well researched into.Keywords: gold nanoparticles, Gomphrena celesioides, Prunus amygdalus, pathogens
Procedia PDF Downloads 311549 Dried Venison Quality Parameters Changes during Storage
Authors: Laima Silina, Ilze Gramatina, Liga Skudra, Tatjana Rakcejeva
Abstract:
The aim of the current research was to determine quality parameters changes of dried venison during storage. Protein, fat and moisture content dynamics as well microbiological quality was analyzed. For the experiments the meat (0.02×4.00×7.00 cm) pieces were marinated in “teriyaki sauce” marinade (composition: teriyaki sauce, sweet and sour sauce, taco sauce, soy sauce, American BBQ sauce hickory, sesame oil, garlic, garlic salt, tabasco red pepper sauce) at 4±2°C temperature for 48±1h. Sodium monophosphate (E339) was also added in part of marinade to improve the meat textural properties. After marinating, meat samples were dried in microwave-vacuum drier MUSSON–1, packaged in vacuum pouches made from polymer film (PA/PE) with barrier properties and storage for 4 months at 18±1°C temperature in dark place. Dried venison samples were analyzed after 0, 35, 91 and 112 days of storage. During the storage total plate counts of dried venison samples significantly (p<0.05) increased. No significant differences in the content of protein, fat and moisture were detected when analyzing dried meat samples during storage and comparing them with the chemical parameters of just dried meat.Keywords: drying, microwave-vacuum drier, quality, venison
Procedia PDF Downloads 321548 Construct the Fur Input Mixed Model with Activity-Based Benefit Assessment Approach of Leather Industry
Authors: M. F. Wu, F. T. Cheng
Abstract:
Leather industry is the most important traditional industry to provide the leather products in the world for thousand years. The fierce global competitive environment and common awareness of global carbon reduction make livestock supply quantities falling, salt and wet blue leather material reduces and the price skyrockets significantly. Exchange rate fluctuation led sales revenue decreasing which due to the differences of export exchanges and compresses the overall profitability of leather industry. This paper applies activity-based benefit assessment approach to build up fitness fur input mixed model, fur is Wet Blue, which concerned with four key factors: the output rate of wet blue, unit cost of wet blue, yield rate and grade level of Wet Blue to achieve the low cost strategy under given unit price of leather product condition of the company. The research findings indicate that applying this model may improve the input cost structure, decrease numbers of leather product inventories and to raise the competitive advantages of the enterprise in the future.Keywords: activity-based benefit assessment approach, input mixed, output rate, wet blue
Procedia PDF Downloads 375547 Synthesis and Thermoluminescence Study of Nanocrystalline Radiation Dosimeter CaSO₄:Ce/Sm/Dy
Authors: Anant Pandey, Kanika Sharma, Vibha Chopra, Shaila Bahl, Pratik Kumar, S. P. Lochab, Birendra Singh
Abstract:
This paper reports the thermoluminescence (TL) properties of nanocrystalline CaSO₄ activated by Ce, Sm, and Dy. TL properties are investigated by chiefly changing the dopant element and also by varying the concentration of the dopant elements (from 0.05 mol % to 0.5 mol %) so as to establish the optimized dopant concentration for each of the activators. The method of salt preparation used is the typical chemical co-precipitation method and the technique used for characterization of the prepared samples is the X-Ray Diffraction (XRD) technique. Further, the phosphors are irradiated with gamma radiation from Co-60 (1.25 MeV) source (dose range- 30 Gy to 500 Gy). The optimized concentration (vis-a-vis TL peak intensity) of activator for CaSO₄:Ce is found to be 0.2 mol %, for CaSO₄:Sm it is 0.1 mol % and for CaSO₄:Dy it is 0.2 mol %. Further, the primary study of the TL response curves for all the three phosphors confirms linearity in the studied dose range (i.e., 30 Gy to 500 Gy). Finally, CaSO₄:Dy was also studied for its energy dependence property which plays an important role in defining the utility of a phosphor for dosimetric applications. The range of doses used for the energy dependence study was from 30 Gy to 500 Gy from Cs-137 (0.662 MeV). The nano-phosphors showed potential to be used as radiation dosimeter in the studied range of gamma radiation and thus must be studied for a wider range of doses.Keywords: gamma radiation, nanocrystalline, radiation dosimetry, thermoluminescence
Procedia PDF Downloads 175546 Image Encryption Using Eureqa to Generate an Automated Mathematical Key
Authors: Halima Adel Halim Shnishah, David Mulvaney
Abstract:
Applying traditional symmetric cryptography algorithms while computing encryption and decryption provides immunity to secret keys against different attacks. One of the popular techniques generating automated secret keys is evolutionary computing by using Eureqa API tool, which got attention in 2013. In this paper, we are generating automated secret keys for image encryption and decryption using Eureqa API (tool which is used in evolutionary computing technique). Eureqa API models pseudo-random input data obtained from a suitable source to generate secret keys. The validation of generated secret keys is investigated by performing various statistical tests (histogram, chi-square, correlation of two adjacent pixels, correlation between original and encrypted images, entropy and key sensitivity). Experimental results obtained from methods including histogram analysis, correlation coefficient, entropy and key sensitivity, show that the proposed image encryption algorithms are secure and reliable, with the potential to be adapted for secure image communication applications.Keywords: image encryption algorithms, Eureqa, statistical measurements, automated key generation
Procedia PDF Downloads 482545 On Dynamic Chaotic S-BOX Based Advanced Encryption Standard Algorithm for Image Encryption
Authors: Ajish Sreedharan
Abstract:
Security in transmission and storage of digital images has its importance in today’s image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. This paper presents modifications to the Advanced Encryption Standard to reflect a high level security and better image encryption. The modifications are done by adjusting the ShiftRow Transformation and using On Dynamic chaotic S-BOX. In AES the Substitute bytes, Shift row and Mix columns by themselves would provide no security because they do not use the key. In Dynamic chaotic S-BOX Based AES the Substitute bytes provide security because the S-Box is constructed from the key. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks.Keywords: advanced encryption standard (AES), on dynamic chaotic S-BOX, image encryption, security analysis, ShiftRow transformation
Procedia PDF Downloads 437544 Blind Watermarking Using Discrete Wavelet Transform Algorithm with Patchwork
Authors: Toni Maristela C. Estabillo, Michaela V. Matienzo, Mikaela L. Sabangan, Rosette M. Tienzo, Justine L. Bahinting
Abstract:
This study is about blind watermarking on images with different categories and properties using two algorithms namely, Discrete Wavelet Transform and Patchwork Algorithm. A program is created to perform watermark embedding, extraction and evaluation. The evaluation is based on three watermarking criteria namely: image quality degradation, perceptual transparency and security. Image quality is measured by comparing the original properties with the processed one. Perceptual transparency is measured by a visual inspection on a survey. Security is measured by implementing geometrical and non-geometrical attacks through a pass or fail testing. Values used to measure the following criteria are mostly based on Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The results are based on statistical methods used to interpret and collect data such as averaging, z Test and survey. The study concluded that the combined DWT and Patchwork algorithms were less efficient and less capable of watermarking than DWT algorithm only.Keywords: blind watermarking, discrete wavelet transform algorithm, patchwork algorithm, digital watermark
Procedia PDF Downloads 268543 Physical Theory for One-Dimensional Correlated Electron Systems
Authors: Nelson Nenuwe
Abstract:
The behavior of interacting electrons in one dimension was studied by calculating correlation functions and critical exponents at zero and external magnetic fields for arbitrary band filling. The technique employed in this study is based on the conformal field theory (CFT). The charge and spin degrees of freedom are separated, and described by two independent conformal theories. A detailed comparison of the t-J model with the repulsive Hubbard model was then undertaken with emphasis on their Tomonaga-Luttinger (TL) liquid properties. Near half-filling the exponents of the t-J model take the values of the strong-correlation limit of the Hubbard model, and in the low-density limit the exponents are those of a non-interacting system. The critical exponents obtained in this study belong to the repulsive TL liquid (conducting phase) and attractive TL liquid (superconducting phase). The theoretical results from this study find applications in one-dimensional organic conductors (TTF-TCNQ), organic superconductors (Bechgaard salts) and carbon nanotubes (SWCNTs, DWCNTs and MWCNTs). For instance, the critical exponent at from this study is consistent with the experimental result from optical and photoemission evidence of TL liquid in one-dimensional metallic Bechgaard salt- (TMTSF)2PF6.Keywords: critical exponents, conformal field theory, Hubbard model, t-J model
Procedia PDF Downloads 343542 Combating Islamophobia in Australia: An Analysis of Six Legal and Holistic Strategies to Help Address Discrimination towards Muslims
Authors: F. Zamani Ashni, P. Gerber
Abstract:
In today's religious and political climate, Muslims find themselves the focus of much attention, often in the form of discrimination and vilification. There is a widely held belief that Islam and terrorism are inextricably intertwined. An anti-Muslim narrative has been shaping policy around the world for some time now. This study, which focuses on the experience of Muslims in Australia, provides guidance on legislative and other steps that can be taken by Australia to help address Islamophobia. This study provides a doctrinal analysis of the state, territory, and federal anti-discrimination laws in Australia. Using principles of statutory interpretation along aside an analysis of relevant jurisprudence, this study concludes that Australian anti-discrimination laws are ill-equipped to address modern-day Islamophobia. The study also finds that laws alone are insufficient to combat Islamophobia, and a more holistic approach is required. Six strategies are identified, which can, in combination, help to successfully respond to Islamophobia. In addition to legislative initiatives, combating Islamophobia requires Australia to promote inclusive human rights education, fair media coverage, strong leadership, integration of the Islamic community, and comprehensive documentation of anti-Muslim attacks.Keywords: Australia, discrimination, Islamophobia, Muslim
Procedia PDF Downloads 133541 Evaluating the Total Costs of a Ransomware-Resilient Architecture for Healthcare Systems
Authors: Sreejith Gopinath, Aspen Olmsted
Abstract:
This paper is based on our previous work that proposed a risk-transference-based architecture for healthcare systems to store sensitive data outside the system boundary, rendering the system unattractive to would-be bad actors. This architecture also allows a compromised system to be abandoned and a new system instance spun up in place to ensure business continuity without paying a ransom or engaging with a bad actor. This paper delves into the details of various attacks we simulated against the prototype system. In the paper, we discuss at length the time and computational costs associated with storing and retrieving data in the prototype system, abandoning a compromised system, and setting up a new instance with existing data. Lastly, we simulate some analytical workloads over the data stored in our specialized data storage system and discuss the time and computational costs associated with running analytics over data in a specialized storage system outside the system boundary. In summary, this paper discusses the total costs of data storage, access, and analytics incurred with the proposed architecture.Keywords: cybersecurity, healthcare, ransomware, resilience, risk transference
Procedia PDF Downloads 132540 Parameter Selection for Computationally Efficient Use of the Bfvrns Fully Homomorphic Encryption Scheme
Authors: Cavidan Yakupoglu, Kurt Rohloff
Abstract:
In this study, we aim to provide a novel parameter selection model for the BFVrns scheme, which is one of the prominent FHE schemes. Parameter selection in lattice-based FHE schemes is a practical challenges for experts or non-experts. Towards a solution to this problem, we introduce a hybrid principles-based approach that combines theoretical with experimental analyses. To begin, we use regression analysis to examine the parameters on the performance and security. The fact that the FHE parameters induce different behaviors on performance, security and Ciphertext Expansion Factor (CEF) that makes the process of parameter selection more challenging. To address this issue, We use a multi-objective optimization algorithm to select the optimum parameter set for performance, CEF and security at the same time. As a result of this optimization, we get an improved parameter set for better performance at a given security level by ensuring correctness and security against lattice attacks by providing at least 128-bit security. Our result enables average ~ 5x smaller CEF and mostly better performance in comparison to the parameter sets given in [1]. This approach can be considered a semiautomated parameter selection. These studies are conducted using the PALISADE homomorphic encryption library, which is a well-known HE library. The abstract goes here.Keywords: lattice cryptography, fully homomorphic encryption, parameter selection, LWE, RLWE
Procedia PDF Downloads 154539 Multisignature Schemes for Reinforcing Trust in Cloud Software-As-A-Service Services
Authors: Mustapha Hedabou, Ali Azougaghe, Ahmed Bentajer, Hicham Boukhris, Mourad Eddiwani, Zakaria Igarramen
Abstract:
Software-as-a-service (SaaS) is emerging as a dominant approach to delivering software. It encompasses a range of business, technical opportunities, issue, and challenges. Trustiness in the cloud services regarding the security and the privacy of the delivered data is the most critical issue with the SaaS model. In this paper, we survey the security concerns related to the SaaS model, and we propose the design of a trusted SaaS model that gives users more confidence into SaaS services by leveraging a trust in a neutral source code certifying authority. The proposed design is based on the use of the multisignature mechanism for signing the source code of the application service. In our model, the cloud provider acts as a root of trust by ensuring the integrity of the application service when it was running on its platform. The proposed design prevents insider attacks from tampering with application service before and after it was launched in a cloud provider platform.Keywords: cloud computing, SaaS Platform, TPM, trustiness, code source certification, multi-signature schemes
Procedia PDF Downloads 275538 A Framework for Blockchain Vulnerability Detection and Cybersecurity Education
Authors: Hongmei Chi
Abstract:
The Blockchain has become a necessity for many different societal industries and ordinary lives including cryptocurrency technology, supply chain, health care, public safety, education, etc. Therefore, training our future blockchain developers to know blockchain programming vulnerability and I.T. students' cyber security is in high demand. In this work, we propose a framework including learning modules and hands-on labs to guide future I.T. professionals towards developing secure blockchain programming habits and mitigating source code vulnerabilities at the early stages of the software development lifecycle following the concept of Secure Software Development Life Cycle (SSDLC). In this research, our goal is to make blockchain programmers and I.T. students aware of the vulnerabilities of blockchains. In summary, we develop a framework that will (1) improve students' skills and awareness of blockchain source code vulnerabilities, detection tools, and mitigation techniques (2) integrate concepts of blockchain vulnerabilities for IT students, (3) improve future IT workers’ ability to master the concepts of blockchain attacks.Keywords: software vulnerability detection, hands-on lab, static analysis tools, vulnerabilities, blockchain, active learning
Procedia PDF Downloads 99537 Theoretical Method for Full Ab-Initio Calculation of Rhenium Carbide Compound
Abstract:
First principles calculations are carried out to investigate the structural, electronic, and elastic properties of the utraincompressible materials, namely, noble metal carbide of Rhenium carbide (ReC) in four phases, the rocksalt (NaCl-B1), zinc blende (ZB-B2), the tungsten carbide(Bh) (WC), and the nickel arsenide (NiAs-B8).The ground state properties such as the equilibrium lattice constant, elastic constants, the bulk modulus its pressure derivate, and the hardness of ReC in these phases are systematically predicted by calculations from first–principles. The corresponding calculated bulk modulus is comparable with that of diamond, especially for the B8 –type rhenium carbide (ReC), the incompressibility along the c axis is demonstrated to exceed the linear incompressibility of diamond. Our calculations confirm in the nickel arsenide (B8) structure the ReC is found to be stable with a large bulk modulus B=440 GPa and the tungsten carbide (WC) structure becomes the most more favourable with to respect B3 and B1 structures, which ReC- WC is meta-stable. Furthermore, the highest bulk modulus values in the zinc blende (B3), rock salt (B1), tungsten carbide (WC), and the nickel arsenide (B8) structures (294GPa, 401GPa, 415GPa and 447 GPa, respectively) indicates that ReC is a hard material, and is superhard compound H(B8)= 36 GPa compared with the H(diamond)=96 GPa and H(c BN)=63.10 GPa.Keywords: DFT, FP-LMTO, mechanical properties, elasticity, high pressure, thermodynamic properties, hard material
Procedia PDF Downloads 441536 Capsaicin Derivatives Enhanced Activity of α1β2γ2S-Aminobutyric Acid Type a Receptor Expressed in Xenopus laevis Oocytes
Authors: Jia H. Wong, Jingli Zhang, Habsah Mohamad, Iswatun H. Abdullah Ripain, Muhammad Bilal, Amelia J. Lloyd, Abdul A. Mohamed Yusoff, Jafri M. Abdullah
Abstract:
Epilepsy is one of the most common neurological diseases affecting more than 50 million of people worldwide. Epilepsy is a state of recurrent, spontaneous seizures with multiple syndromes and symptoms of different causes of brain dysfunction, prognosis, and treatments; characterized by transient, occasional and stereotyped interruptions of behavior whereby the excitatory-inhibitory activities within the central nervous system (CNS) are thrown out of balance due to various kinds of interferences. The goal of antiepileptic treatment is to enable patients to be free from seizures or to achieve control of seizures through surgical treatment and/or pharmacotherapy. Pharmacotherapy through AED plays an important role especially in countries with epilepsy treatment gap due to costs and availability of health facilities, skills and resources, yet there are about one-third of the people with epilepsy have drug-resistant seizures. Hence, this poses considerable challenges to the healthcare system and the effort in providing cost-effective treatment as well as the search for alternatives to treatment and management of epilepsy. Enhancement of γ-aminobutyric acid (GABA)-mediated inhibitory neurotransmission is one of the key mechanisms of actions of antiepileptic drugs. GABA type > a receptors (GABAAR) are ligand-gated ion channels that mediate rapid inhibitory neurotransmission upon the binding of GABA with a heteropentameric structure forming a central pore that is permeable to the influx of chloride ions in its activated state. The major isoform of GABAA receptors consists of two α1, two β2, and one γ2 subunit. It is the most abundantly expressed combinations in the brain and the most commonly researched through Xenopus laevis oocytes. With the advancing studies on ethnomedicine and traditional treatments using medicinal plants, increasing evidence reveal that spice and herb plants with medicinal properties play an important role in the treatment of ailments within communities across different cultures. Capsaicin is the primary natural capsaicinoid in hot peppers of plant genus Capsicum, consist of an aromatic ring, an amide linkage and a hydrophobic side chain. The study showed that capsaicins conferred neuroprotection in status epilepticus mouse models through anti-ictogenic, hypothermic, antioxidative, anti-inflammatory, and anti-apoptotic actions in a dose-dependent manner. In this study, five capsaicin derivatives were tested for their ability to increase the GABA-induced chloride current on α1β2γ2S of GABAAR expressed on Xenopus laevis oocytes using the method of two-microelectrode voltage clamp. Two of the capsaicin derivatives, IS5 (N-(4-hydroxy-3-methoxybenzyl)-3-methylbutyramide) and IS10 (N-(4-hydroxy-3-methoxybenzyl)-decanamide) at a concentration of 30µM were able to significantly increase the GABA-induced chloride current with p=0.002 and p=0.026 respectively. This study were able to show the enhancement effect of two capsaicin derivatives with moderate length of hydrocarbon chain on this receptor subtype, revealing the promising inhibitory activity of capsaicin derivatives through enhancement of GABA-induced chloride current and further investigations should be carried out to verify its antiepileptic effects in animal models.Keywords: α1β2γ2 GABAA receptors, α1β2γ2S, antiepileptic, capsaicin derivatives, two-microelectrode voltage clamp, Xenopus laevis oocytes
Procedia PDF Downloads 362535 Test of Moisture Sensor Activation Speed
Authors: I. Parkova, A. Vališevskis, A. Viļumsone
Abstract:
Nocturnal enuresis or bed-wetting is intermittent incontinence during sleep of children after age 5 that may precipitate wide range of behavioural and developmental problems. One of the non-pharmacological treatment methods is the use of a bed-wetting alarm system. In order to improve comfort conditions of nocturnal enuresis alarm system, modular moisture sensor should be replaced by a textile sensor. In this study behaviour and moisture detection speed of woven and sewn sensors were compared by analysing change in electrical resistance after solution (salt water) was dripped on sensor samples. Material of samples has different structure and yarn location, which affects solution detection rate. Sensor system circuit was designed and two sensor tests were performed: system activation test and false alarm test to determine the sensitivity of the system and activation threshold. Sewn sensor had better result in system’s activation test – faster reaction, but woven sensor had better result in system’s false alarm test – it was less sensitive to perspiration simulation. After experiments it was found that the optimum switching threshold is 3V in case of 5V input voltage, which provides protection against false alarms, for example – during intensive sweating.Keywords: conductive yarns, moisture textile sensor, industry, material
Procedia PDF Downloads 246534 The Influence of Advertising in the Respect of the Right to Adequate Food: Some Notes regarding the Portuguese Legal Framework
Authors: Susana Almeida
Abstract:
The right to adequate food is a human right protected under several international human rights treaties of universal or regional application. In addition, this social right is – as we intend to demonstrate – guaranteed under the Portuguese Constitution. Therefore, in order to assure the protection of this right, the Portuguese State must not only abstain from interfering with this human right (negative obligation) but also take action to secure the human right to adequate food (positive obligation). In this context, the Portuguese State has developed several governmental policies, such as taxing sugary drinks, setting the maximum amount of salt in the bread or creating the National Program for the Promotion of Healthy Food. Nevertheless, we intend to demonstrate that special attention should be given to advertising, as advertisements have an extreme influence on the consumers' decisions and hence on the food decisions. In this paper, besides explaining the cross construction of the human right to adequate food, we aim to examine the Advertising Portuguese Code and to study the several provisions that could be held by the Portuguese consumer to challenge some advertisements due to the violation of the right to health and the right to adequate food. Moreover, having in mind the influence of advertising on the food decisions and the serious problems that unhealthy food may bring (e.g., child obesity), one should ask if this legal framework should not be reviewed in order to lay out some restrictions on advertising, namely setting advices like in alcohol advertisements.Keywords: advertising code, consumer law, right to adequate food, social human right
Procedia PDF Downloads 169533 Production of Spherical Cementite within Bainitic Matrix Microstructures in High Carbon Powder Metallurgy Steels
Authors: O. Altuntaş, A. Güral
Abstract:
The hardness-microstructure relationships of spherical cementite in bainitic matrix obtained by a different heat treatment cycles carried out to high carbon powder metallurgy (P/M) steel were investigated. For this purpose, 1.5 wt.% natural graphite powder admixed in atomized iron powders and the mixed powders were compacted under 700 MPa at room temperature and then sintered at 1150 °C under a protective argon gas atmosphere. The densities of the green and sintered samples were measured via the Archimedes method. A density of 7.4 g/cm3 was obtained after sintering and a density of 94% was achieved. The sintered specimens having primary cementite plus lamellar pearlitic structures were fully quenched from 950 °C temperature and then over-tempered at 705 °C temperature for 60 minutes to produce spherical-fine cementite particles in the ferritic matrix. After by this treatment, these samples annealed at 735 °C temperature for 3 minutes were austempered at 300 °C salt bath for a period of 1 to 5 hours. As a result of this process, it could be able to produced spherical cementite particle in the bainitic matrix. This microstructure was designed to improve wear and toughness of P/M steels. The microstructures were characterized and analyzed by SEM and micro and macro hardness.Keywords: powder metallurgy steel, bainite, cementite, austempering and spheroidization heat treatment
Procedia PDF Downloads 161532 Effect of Temperature on the Water Retention Capacity of Liner Materials
Authors: Ahmed M. Al-Mahbashi, Mosleh A. Al-Shamrani, Muawia Dafalla
Abstract:
Mixtures of sand and clay are frequently used to serve for specific purposes in several engineering practices. In environmental engineering, liner layers and cover layers are common for controlling waste disposal facilities. These layers are exposed to moisture and temperature fluctuation specially when existing in unsaturated condition. The relationship between soil suction and water content for these materials is essential for understanding their unsaturated behavior and properties such as retention capacity and unsaturated follow (hydraulic conductivity). This study is aimed at investigating retention capacity for two sand-natural expansive clay mixtures (15% (C15) and 30% (C30) expansive clay) at two ambient temperatures within the range of 5 -50 °C. Soil water retention curves (SWRC) for these materials were determined at these two ambient temperatures using different salt solutions for a wide range of suction (up to 200MPa). The results indicate that retention capacity of C15 mixture underwent significant changes due to temperature variations. This effect tends to be less visible when the clay fraction is doubled (C30). In addition, the overall volume change is marginally affected by high temperature within the range considered in this study.Keywords: soil water retention curve, sand-expansive clay liner, suction, temperature
Procedia PDF Downloads 139531 Eradication of Gram-Positive Bacteria by Photosensitizers Immobilized in Polymers
Authors: Marina Nisnevitch, Anton Valkov, Faina Nakonechny, Kate Adar Raik, Yamit Mualem
Abstract:
Photosensitizers are dye compounds belonging to various chemical groups that in all the cases have a developed structure of conjugated double bonds. Under illumination with visible light, the photosensitizers are excited and transfer the absorbed energy to the oxygen dissolved in an aqueous phase, leading to production of a reactive oxygen species which cause irreversible damage to bacterial cells. When immobilized onto a solid phase, photosensitizers preserve their antibacterial properties. In the present study, photosensitizers were immobilized in polyethylene or propylene and tested for antimicrobial activity against Gram-positive S. aureus, S. epidermidis and Streptococcus sp. For this purpose, water-soluble photosensitizers, Rose Bengal sodium salt, and methylene blue as well as water-insoluble hematoporphyrin and Rose Bengal lactone, were immobilized by dissolution in melted polymers to yield 3 mm diameter rods and 3-5 mm beads. All four photosensitizers were found to be effective in the eradication of Gram-positive bacteria under illumination by a white luminescent lamp or sunlight. The immobilized photosensitizers can be applied for continuous water disinfection; they can be easily removed at the end of the treatment and reused.Keywords: antimicrobial polymers, gram-positive bacteria, immobilization of photosensitizers, photodynamic antibacterial activity
Procedia PDF Downloads 241530 A New Design of Vacuum Membrane Distillation Module for Water Desalination
Authors: Adnan Alhathal Alanezi
Abstract:
The performance of vacuum membrane distillation (VMD) process for water desalination was investigated utilizing a new design membrane module using two commercial polytetrafluoroethylene (PTFE) and polyvinylidene fluoride (PVDF) flat sheet hydrophobic membranes. The membrane module's design demonstrated its suitability for achieving a high heat transfer coefficient of the order of 103 (W/m2K) and a high Reynolds number (Re). The heat and mass transport coefficients within the membrane module were measured using VMD experiments. The permeate flux has been examined in relation to process parameters such as feed temperature, feed flow rate, vacuum degree, and feed concentration. Because the feed temperature, feed flow rate, and vacuum degree all play a role in improving the performance of the VMD process, optimizing all of these parameters is the best method to achieve a high permeate flux. In VMD desalination, the PTFE membrane outperformed the PVDF membrane. When compared to previous studies, the obtained water flux is relatively high, reaching 43.8 and 52.6 (kg/m2h) for PVDF and PTFE, respectively. For both membranes, the salt rejection of NaCl was greater than 99%.Keywords: desalination, vacuum membrane distillation, PTFE and PVDF, hydrophobic membranes, O-ring membrane module
Procedia PDF Downloads 89529 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques
Authors: John Onyima, Ikechukwu Ezepue
Abstract:
Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection
Procedia PDF Downloads 305528 Impoliteness Principle in Online Chatroom Discourses
Authors: Christiana Darkoah
Abstract:
This study investigated impolite behaviour in online chatroom conversations, looking at its expressions, origins, online chatroom participant responses, impacts, and possible interventions. Online impoliteness has become a major worry as technology improvements move public conversation online, causing communication breakdowns and escalating conflict. The study used a qualitative methodology, including observation and thematic analysis to examine interactions from Facebook, Instagram, and WhatsApp. The findings showed that in online chatrooms, face-threatening behaviours and disputes can be sparked by political remarks, conversational humour, picture interpretations, and personal disclosures. Depending on the situation, the interpreter's job, and the accepted standards, the same statement could be interpreted as disrespectful or courteous. Impolite behaviour in online chatrooms and the possibility of misinterpretation are evident in the furious reactions that can arise from seemingly harmless posts. According to the study's findings, impoliteness is common in online chat rooms, where disputes over politics and personal grievances frequently turn into written attacks. Creating unambiguous community norms in partnership with social media businesses and putting digital literacy campaigns into action are among the recommendations.Keywords: impoliteness, online chatroom, discourses, conflicts
Procedia PDF Downloads 24527 Seed Germination, Seedling Emergence and Response to Herbicides of Papaver Species (Papaver rhoeas and P. dubium)
Authors: Faezeh Zaefarian1, Sajedeh Golmohammadzadeh, Mohammad Rezvani
Abstract:
Weed management decisions for weed species can be derived from knowledge of seed germination biology. Experiments were conducted in laboratory and greenhouse to determine the effects of light, temperature, salt and water stress, seed burial depth on seed germination and seedling emergence of Papaver rhoeas and P.dubium and to assay the response of these species to commonly available POST herbicides. Germination of the Papaver seeds was influenced by the tested temperatures (day/night temperatures of 20 and 25 °C) and light. The concentrations of sodium chloride, ranging from 0 to 80 mM, influence germination of seeds. The osmotic potential required for 50% inhibition of maximum germination of P. rhoeas was -0.27 MPa and for P. dubium species was 0.25 MPa. Seedling emergence was greatest for the seeds placed at 1 cm and emergence declined with increased burial depth in the soil. No seedlings emerged from a burial depth of 6 cm. The herbicide 2,4-D at 400 g ai ha-1 provided excellent control of both species when applied at the four-leaf and six-leaf stages. However, at the six-leaf stage, percent control was reduced. The information gained from this study could contribute to developing components of integrated weed management strategies for Papaver species.Keywords: germination, papaver species, planting depth, POST herbicides
Procedia PDF Downloads 244526 Escaping the Trauma: A Psychological Study of Jonathan Safran Foer’s Extremely Loud & Incredibly Close
Authors: Mahima Thakur
Abstract:
Trauma rehabilitation requires both repairing physical injury and reconstructing broken narrative systems. The trauma's aftereffects entwine the broken patterns, allowing a cohesive narrative to emerge. In this article, the book Extremely Loud and Incredibly Close by Jonathan Safran Foer is discussed from a psychoanalytic perspective. The paper discusses the 9/11 attacks and their effects on those who suffered and lost family members during the catastrophe. The primary character of the novel, Oskar, along with his grandfather and grandmother, each have unique trauma escape stories that will be examined in light of Cathy Caruth and Geoffery H. Hartman‘s study. The text's numerous horrifying repetitions function as a narration strategy that not only captures the awareness of trauma but also gives the reader the psychological feature to overcome its deadening effects. This article explores the role that communication may have in assisting individuals in overcoming trauma. In addition to more research on traumatic memories, Dominick LaCapra's trauma theory's notions of "working through" and "acting out" highlight the need of communication in overcoming trauma and attempting to live outside of it.Keywords: trauma theory, Cathy Caruth, memories, escapes, communication
Procedia PDF Downloads 21525 Eimeria spp. in Naturally Infected Calves
Authors: Nermin Isik, Ozlem Derinbay Ekici
Abstract:
Bovine coccidiosis is a protozoan disease caused by various species of Eimeria and most signs of disease are chronic or subclinical. The aim of this study was to determine the prevalence of Eimeria spp. in calves in Konya, in Turkey. The study, conducted from January- February 2015, involved 240 faecal samples of calves in the age groups of <1 month, 1-3 months and >3 months in Konya city centre, in Turkey. In a retrospective study from these faecal samples of calves submitted to the University of Selcuk, Faculty of Veterinary Medicine, Laboratory of Parasitology were evaluated regarding the prevalence of Eimeria spp. Faecal samples were examined by Fulleborn saturated salt floatation technique. Eimeria oocysts were found in 8.33% of all samples. The positivity rates in each of the age groups were different. According to the age groups (<1 month, 1-3 months and >3 months), the Eimeria spp. were determined as 0.83, 22.73 and 7.41%, respectively. After examination of stool, detected oocysts were sporulated in 2.5% potassium dichromate at 22º C and species were identified as E. cylindrica, E. zuernii, E. ellipsoidalis, E. subspherica, E. bovis, E. auburnensis, E. canadensis, E. illinoisensis and E. brasiliensis in infected calves. In conclusion, the highest prevalence was observed in the age group of 1-3 months. The presence of Eimeria species in calves demonstrated for the first time in the Konya region in Turkey. Other etiologic agents should also be investigated in calves more seriously. Further molecular epidemiological studies should be performed in this community.Keywords: Eimeria spp., calves, diarrhea, bovine coccidiosis
Procedia PDF Downloads 537524 Heterodimetallic Ferrocenyl Dithiophosphonate Complexes of Nickel(II), Zinc(II) and Cadmium(II) as High Efficiency Co-Sensitizers in Dye-Sensitized Solar Cells
Authors: Tomilola J. Ajayi, Moses Ollengo, Lukas le Roux, Michael N. Pillay, Richard J. Staples, Shannon M. Biros Werner E. van Zyl
Abstract:
The formation, characterization, and dye-sensitized solar cell application of nickel(II), zinc(II) and cadmium(II) ferrocenyl dithiophosphonate complexes were investigated. The multidentate monoanionic ligand [S₂PFc(OH)]¯ (L1) was synthesized from the reaction between ferrocenyl Lawesson’s reagent, [FcP(=S)μ-S]₂ (FcLR), (Fc = ferrocenyl) and water. Ligand L1 could potentially coordinate to metal centers through the S, S’ and O donor atoms. The reaction between metal salt precursors and L1 produced a Ni(II) complex of the type [Ni{S₂P(Fc)(OH)}₂] (1) (molar ratio 1:2), a tetranickel (II) complex of the type [Ni₂{S₂OP(Fc)}₂]₂ (2) (molar ratio (1:1), as well as a Zn(II) complex [Zn{S₂P(Fc)(OH)}₂]₂ (3), and a Cd(II) complex [Cd{S₂P(Fc)(OH)}₂]₂ (4). Complexes 1-4 were characterized by 1H and 31P NMR and FT-IR, and complexes 1 and 2 were additionally analysed by X-Ray crystallography. After co-sensitization, the DSSCs were characterized using UV-Vis, cyclic voltammetry, electrochemical impedance spectroscopy, and photovoltaic measurements (I-V curves). Overall finding shows that co-sensitization of our compounds with ruthenium dye N719 resulted in a better overall solar conversion efficiency than only pure N719 dye under the same experimental conditions. In conclusion, we report the first examples of dye-sensitized solar cells (DSSCs) co-sensitized with ferrocenyl dithiophosphonate complexes.Keywords: dithiophosphonate, dye sensitized solar cell, co-sensitization, solar efficiency
Procedia PDF Downloads 150523 System Survivability in Networks
Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez
Abstract:
We consider the problem of attacks on networks. We define the concept of system survivability in networks in the presence of intelligent threats. Our setting of the problem assumes a flow to be sent from one source node to a destination node. The attacker attempts to disable the network by preventing the flow to reach its destination while the defender attempts to identify the best path-set to use to maximize the chance of arrival of the flow to the destination node. Our concept is shown to be different from the classical concept of network reliability. We distinguish two types of network survivability related to the defender and to the attacker of the network, respectively. We prove that the defender-based-network survivability plays the role of a lower bound while the attacker-based-network survivability plays the role of an upper bound of network reliability. We also prove that both concepts almost never agree nor coincide with network reliability. Moreover, we use the shortest-path problem to determine the defender-based-network survivability and the min-cut problem to determine the attacker-based-network survivability. We extend the problem to a variety of models including the minimum-spanning-tree problem and the multiple source-/destination-network problems.Keywords: defense/attack strategies, information, networks, reliability, survivability
Procedia PDF Downloads 392