Search results for: composite security index
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8080

Search results for: composite security index

7960 Dynamic Response and Damage Modeling of Glass Fiber Reinforced Epoxy Composite Pipes: Numerical Investigation

Authors: Ammar Maziz, Mostapha Tarfaoui, Said Rechak

Abstract:

The high mechanical performance of composite pipes can be adversely affected by their low resistance to impact loads. Loads in dynamic origin are dangerous and cause consequences on the operation of pipes because the damage is often not detected and can affect the structural integrity of composite pipes. In this work, an advanced 3-D finite element (FE) model, based on the use of intralaminar damage models was developed and used to predict damage under low-velocity impact. The performance of the numerical model is validated with the confrontation with the results of experimental tests. The results show that at low impact energy, the damage happens mainly by matrix cracking and delamination. The model capabilities to simulate the low-velocity impact events on the full-scale composite structures were proved.

Keywords: composite materials, low velocity impact, FEA, dynamic behavior, progressive damage modeling

Procedia PDF Downloads 168
7959 Assessment of Body Mass Index among Children of Primary School in Behbahan City

Authors: Hosseini Siahi Zohreh, Sana Mohammad Jafar

Abstract:

With increase in fat and over weight in children and its undesirable effects on different organisms of the body and since many of the sicknesses are due to over weight and with losing weight these sicknesses disappear, and on the other hand with mal nutrition and under weight in children other kind of sicknesses such as derogation of body's security system, frequent infection, insufficient growth, shortness, and delay in maturity etc. are some of the signs of being under weight. Therefore recognition of signs of over weight and under weight and their prevalence in children are important. To determine this difficulty we have used the body mass index as screening tool since it is very prevalent and a good and important guide and has very good relation with body fat in children. In this study 2321 students from primary schools in Behbahan have been chosen randomly and evaluated by height and weight and their body mass index have been calculated and then recorded on the BMI percentile diagram which is for age and gender. The following results obtained: The amount of total fat, over weight and slimness are 9.3, 12.1 and 12.32 percent respectively. Therefore 21.4% of the children were over weighted. It did not show any meaningful statistical relation in fat conditions among boys and girls, but there has been a meaningful statistical relation in slimness among boys and girls.

Keywords: assessment, students, Behbahan, Body Mass Index

Procedia PDF Downloads 513
7958 Examining the Effects of Production Method on Aluminium A356 Alloy and A356-10%SiCp Composite for Hydro Turbine Bucket Application

Authors: Williams S. Ebhota, Freddie L. Inambao

Abstract:

This study investigates the use of centrifugal casting method to fabricate functionally graded aluminium A356 Alloy and A356-10%SiCp composite for hydro turbine bucket application. The study includes the design and fabrication of a permanent mould. The mould was put into use and the buckets of A356 Alloy and A356-10%SiCp composite were cast, cut and machined into specimens. Some specimens were given T6 heat treatment and the specimens were prepared for different examinations accordingly. The SiCp particles were found to be more at inner periphery of the bucket. The maximum hardness of As-Cast A356 and A356-10%SiCp composite was recorded at the inner periphery to be 60 BRN and 95BRN, respectively. And these values were appreciated to 98BRN and 122BRN for A356 alloy and A356-10%SiCp composite, respectively. It was observed that the ultimate tensile stress and yield tensile stress prediction curves show the same trend.

Keywords: A356 alloy, A356-10%SiCp composite, centrifugal casting, Pelton bucket, turbine blade

Procedia PDF Downloads 273
7957 Civic Engagement and Political Participation in Bangladesh

Authors: Syeda Salina Aziz, Tanvir Ahmed Mozumder

Abstract:

Citizenship is an important concept of democracy which broadly defines the relationship between the state and its citizens; at the same time, it analyzes the rights and duties of a citizen. The universal citizenship principle demands that citizens should be aware of the political system, possess democratic attitudes, and join the political activity. Bangladesh presents an interesting case for democracy; the democratic practices in the country have been long introduced, have been interrupted several times, and the democratic values and practices have yet to be established in the country. These transitions have influenced citizens’ ideologies and participation in decision-making and also shaped their expectations differently. In this backdrop, this paper aims to understand and explain the citizenship behavior of Bangladeshi nationals. Based on nationally representative household survey data of 4000 respondents, this paper creates a composite citizenship index which is a combination of three separate indices, including participation index, knowledge and awareness index, and ideology index. The paper then tries to explain the factors that affect the citizenship index. Using fixed effect regression analysis, the paper intends to explore the association between citizenship and socio-demographic variables, including education, location, gender, and exposure to the media of respondents. Additionally, using national election polls, the paper creates a variable to measure long-term support towards the current ruling party and tests whether and how this affects the citizenship variables.

Keywords: citizenship, political participation, Bangladesh, stronghold

Procedia PDF Downloads 76
7956 Study of the Effect of Sewing on Non Woven Textile Waste at Dry and Composite Scales

Authors: Wafa Baccouch, Adel Ghith, Xavier Legrand, Faten Fayala

Abstract:

Textile waste recycling has become a necessity considering the augmentation of the amount of waste generated each year and the ecological problems that landfilling and burning can cause. Textile waste can be recycled into many different forms according to its composition and its final utilization. Using this waste as reinforcement to composite panels is a new recycling area that is being studied. Compared to virgin fabrics, recycled ones present the disadvantage of having lower structural characteristics, when they are eco-friendly and with low cost. The objective of this work is transforming textile waste into composite material with good characteristic and low price. In this study, we used sewing as a method to improve the characteristics of the recycled textile waste in order to use it as reinforcement to composite material. Textile non-woven waste was afforded by a local textile recycling industry. Performances tests were evaluated using tensile testing machine and based on the testing direction for both reinforcements and composite panels; machine and transverse direction. Tensile tests were conducted on sewed and non sewed fabrics, and then they were used as reinforcements to composite panels via epoxy resin infusion method. Rule of mixtures is used to predict composite characteristics and then compared to experimental ones.

Keywords: composite material, epoxy resin, non woven waste, recycling, sewing, textile

Procedia PDF Downloads 581
7955 Security Threats on Wireless Sensor Network Protocols

Authors: H. Gorine, M. Ramadan Elmezughi

Abstract:

In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issues of security in wireless sensor networks in an attempt to encourage more research into this area.

Keywords: wireless sensor networks, network security, light weight encryption, threats

Procedia PDF Downloads 518
7954 Towards Security in Virtualization of SDN

Authors: Wanqing You, Kai Qian, Xi He, Ying Qian

Abstract:

In this paper, the potential security issues brought by the virtualization of a Software Defined Networks (SDN) would be analyzed. The virtualization of SDN is achieved by FlowVisor (FV). With FV, a physical network is divided into multiple isolated logical networks while the underlying resources are still shared by different slices (isolated logical networks). However, along with the benefits brought by network virtualization, it also presents some issues regarding security. By examining security issues existing in an OpenFlow network, which uses FlowVisor to slice it into multiple virtual networks, we hope we can get some significant results and also can get further discussions among the security of SDN virtualization.

Keywords: SDN, network, virtualization, security

Procedia PDF Downloads 417
7953 A Systematic Literature Review on Security and Privacy Design Patterns

Authors: Ebtehal Aljedaani, Maha Aljohani

Abstract:

Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.

Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns

Procedia PDF Downloads 125
7952 Numerical Simulation of Lightning Strike Direct Effects on Aircraft Skin Composite Laminate

Authors: Muhammad Khalil, Nader Abuelfoutouh, Gasser Abdelal, Adrian Murphy

Abstract:

Nowadays, the direct effects of lightning to aircrafts are of great importance because of the massive use of composite materials. In comparison with metallic materials, composites present several weaknesses for lightning strike direct effects. Especially, their low electrical and thermal conductivities lead to severe lightning strike damage. The lightning strike direct effects are burning, heating, magnetic force, sparking and arcing. As the problem is complex, we investigated it gradually. A magnetohydrodynamics (MHD) model is developed to simulate the lightning strikes in order to estimate the damages on the composite materials. Then, a coupled thermal-electrical finite element analysis is used to study the interaction between the lightning arc and the composite laminate and to investigate the material degradation.

Keywords: composite structures, lightning multiphysics, magnetohydrodynamic (MHD), coupled thermal-electrical analysis, thermal plasmas.

Procedia PDF Downloads 363
7951 Simulation of Non-Crimp 3D Orthogonal Carbon Fabric Composite for Aerospace Applications Using Finite Element Method

Authors: Sh. Minapoor, S. Ajeli, M. Javadi Toghchi

Abstract:

Non-crimp 3D orthogonal fabric composite is one of the textile-based composite materials that are rapidly developing light-weight engineering materials. The present paper focuses on geometric and micro mechanical modeling of non-crimp 3D orthogonal carbon fabric and composites reinforced with it for aerospace applications. In this research meso-finite element (FE) modeling employs for stress analysis in different load conditions. Since mechanical testing of expensive textile carbon composites with specific application isn't affordable, simulation composite in a virtual environment is a helpful way to investigate its mechanical properties in different conditions.

Keywords: woven composite, aerospace applications, finite element method, mechanical properties

Procedia PDF Downloads 456
7950 A Holistic Approach to Institutional Cyber Security

Authors: Mehmet Kargaci

Abstract:

It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions.

Keywords: cyber defence, information, critical infrastructure, security

Procedia PDF Downloads 533
7949 Brainwave Classification for Brain Balancing Index (BBI) via 3D EEG Model Using k-NN Technique

Authors: N. Fuad, M. N. Taib, R. Jailani, M. E. Marwan

Abstract:

In this paper, the comparison between k-Nearest Neighbor (kNN) algorithms for classifying the 3D EEG model in brain balancing is presented. The EEG signal recording was conducted on 51 healthy subjects. Development of 3D EEG models involves pre-processing of raw EEG signals and construction of spectrogram images. Then, maximum PSD values were extracted as features from the model. There are three indexes for the balanced brain; index 3, index 4 and index 5. There are significant different of the EEG signals due to the brain balancing index (BBI). Alpha-α (8–13 Hz) and beta-β (13–30 Hz) were used as input signals for the classification model. The k-NN classification result is 88.46% accuracy. These results proved that k-NN can be used in order to predict the brain balancing application.

Keywords: power spectral density, 3D EEG model, brain balancing, kNN

Procedia PDF Downloads 481
7948 Quality of Age Reporting from Tanzania 2012 Census Results: An Assessment Using Whipple’s Index, Myer’s Blended Index, and Age-Sex Accuracy Index

Authors: A. Sathiya Susuman, Hamisi F. Hamisi

Abstract:

Background: Many socio-economic and demographic data are age-sex attributed. However, a variety of irregularities and misstatement are noted with respect to age-related data and less to sex data because of its biological differences between the genders. Noting the misstatement/misreporting of age data regardless of its significance importance in demographics and epidemiological studies, this study aims at assessing the quality of 2012 Tanzania Population and Housing Census Results. Methods: Data for the analysis are downloaded from Tanzania National Bureau of Statistics. Age heaping and digit preference were measured using summary indices viz., Whipple’s index, Myers’ blended index, and Age-Sex Accuracy index. Results: The recorded Whipple’s index for both sexes was 154.43; male has the lowest index of about 152.65 while female has the highest index of about 156.07. For Myers’ blended index, the preferences were at digits ‘0’ and ‘5’ while avoidance were at digits ‘1’ and ‘3’ for both sexes. Finally, Age-sex index stood at 59.8 where sex ratio score was 5.82 and age ratio scores were 20.89 and 21.4 for males and female respectively. Conclusion: The evaluation of the 2012 PHC data using the demographic techniques has qualified the data inaccurate as the results of systematic heaping and digit preferences/avoidances. Thus, innovative methods in data collection along with measuring and minimizing errors using statistical techniques should be used to ensure accuracy of age data.

Keywords: age heaping, digit preference/avoidance, summary indices, Whipple’s index, Myer’s index, age-sex accuracy index

Procedia PDF Downloads 469
7947 Magnetic Nano-Composite of Self-Doped Polyaniline Nanofibers for Magnetic Dispersive Micro Solid Phase Extraction Applications

Authors: Hatem I. Mokhtar, Randa A. Abd-El-Salam, Ghada M. Hadad

Abstract:

An improved nano-composite of self-doped polyaniline nanofibers and silica-coated magnetite nanoparticles were prepared and evaluated for suitability to magnetic dispersive micro solid-phase extraction. The work focused on optimization of the composite capacity to extract four fluoroquinolones (FQs) antibiotics, ciprofloxacin, enrofloxacin, danofloxacin, and difloxacin from water and improvement of composite stability towards acid and atmospheric degradation. Self-doped polyaniline nanofibers were prepared by oxidative co-polymerization of aniline with anthranilic acid. Magnetite nanopariticles were prepared by alkaline co-precipitation and coated with silica by silicate hydrolysis on magnetite nanoparticles surface at pH 6.5. The composite was formed by self-assembly by mixing self-doped polyaniline nanofibers with silica-coated magnetite nanoparticles dispersions in ethanol. The composite structure was confirmed by transmission electron microscopy (TEM). Self-doped polyaniline nanofibers and magnetite chemical structures were confirmed by FT-IR while silica coating of the magnetite was confirmed by Energy Dispersion X-ray Spectroscopy (EDS). Improved stability of the composite magnetic component was evidenced by resistance to degrade in 2N HCl solution. The adsorption capacity of self-doped polyaniline nanofibers based composite was higher than previously reported corresponding composite prepared from polyaniline nanofibers instead of self-doped polyaniline nanofibers. Adsorption-pH profile for the studied FQs on the prepared composite revealed that the best pH for adsorption was in range of 6.5 to 7. Best extraction recovery values were obtained at pH 7 using phosphate buffer. The best solvent for FQs desorption was found to be 0.1N HCl in methanol:water (8:2; v/v) mixture. 20 mL of Spiked water sample with studied FQs were preconcentrated using 4.8 mg of composite and resulting extracts were analysed by HPLC-UV method. The prepared composite represented a suitable adsorbent phase for magnetic dispersive micro-solid phase application.

Keywords: fluoroquinolones, magnetic dispersive micro extraction, nano-composite, self-doped polyaniline nanofibers

Procedia PDF Downloads 119
7946 Ferroelectricity in Fused Potassium Nitrate-Polymer Composite Films

Authors: Navneet Dabra, Baljinder Kaur, Lakhbir Singh, V. Annapu Reddy, R. Nath, Dae-Yong Jeong, Jasbir S. Hundal

Abstract:

The ferroelectric properties of fused potassium nitrate (KNO3)- polyvinyl alcohol (PVA) composite films have been investigated. The composite films of KNO3-PVA have been prepared by solvant cast technique and then fused over the brass substrate. The ferroelectric hysteresis loops (P-E) have been obtained at room temperature using modified Sawyer-Tower circuit. Percentage of back switching and differential dielectric constant has been derived from P-V loops. The x-ray diffraction (XRD) studies confirm the formation of ferroelectric phase (phase III) in these composite films. The AFM and FE-SEM studies have been used to study the surface morphology of these composite films. The values of remanemt polarization, coercive field, back switching, crystallite size, lattice parameters, and surface roughness have been estimated and correlated.

Keywords: ferroelectric polymer composite, remanemt polarization, back switching, crystallite size, lattice parameters and surface roughness

Procedia PDF Downloads 389
7945 On the Fatigue Behavior of a Triphasic Composite

Authors: G. Minak, D. Ghelli, A. Zucchelli

Abstract:

This paper presents the results of an experimental characterization of a glass fibre-epoxy composite. The behavior of the traditional two-phase composite has been compared with the one of a new three-phase composite where the epoxy matrix was modified by addition of a 3% weight fraction of montmorillonite nano-particles. Two different types of nano-clays, Cloisite® 30B and RXG7000, produced by Southern Clay Products Inc., have been considered. Three-point bending tests, both monotonic and cyclic, were carried out. A strong reduction of the ultimate flexural strength upon nano-modification has been observed in quasi-static tests. Fatigue tests yielded a smaller strength loss. In both quasi-static and fatigue tests a more pronounced tendency to delamination has been noticed in three-phase composites, especially in the case of 30B nano-clay, with respect to the standard two-phase glass fiber composite.

Keywords: bending fatigue, epoxy resin, glass fiber, montmorillonite

Procedia PDF Downloads 445
7944 Development and Utilization of Keratin-Fibrin-Gelatin Composite Films as Potential Material for Skin Tissue Engineering Application

Authors: Sivakumar Singaravelu, Giriprasath Ramanathan, M. D. Raja, Uma Tirichurapalli Sivagnanam

Abstract:

The goal of the present study was to develop and evaluate composite film for tissue engineering application. The keratin was extracted from bovine horn and used for preparation of keratin (HK), physiologically clotted fibrin (PCF) and gelatin (G) blend films in different stoichiometric ratios (1:1:1, 1:1:2 and 1:1:3) by using solvent casting method. The composite films (HK-PCF-G) were characterized physiochemically using Fourier Transform Infrared Spectroscopy (FTIR), Differential Scanning Calorimetry (DSC), Thermogravimetric Analysis (TGA) and Scanning Electron Microscopy (SEM). The mechanical properties of the composite films were analyzed. The results of tensile strength show that ultimate strength and elongation were 10.72 Mpa and 4.83 MPA respectively for 1:1:3 ratio combination. The SEM image showed a slight smooth surface for 1:1:3 ratio combination compared to other films. In order to impart antibacterial activities, the composite films were loaded with Mupirocin (MP) to act against infection. The composite films acted as a suitable carrier to protect and release the drug in a controlled manner. This developed composite film would be a suitable alternative material for tissue engineering application.

Keywords: bovine horn, keratin, fibrin, gelatin, tensile strength

Procedia PDF Downloads 445
7943 Developing a Viral Artifact to Improve Employees’ Security Behavior

Authors: Stefan Bauer, Josef Frysak

Abstract:

According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security loss events. Therefore, organizations implement information security awareness programs to increase employees’ awareness to further prevention of loss events. However, in many cases these information security awareness programs consist of conventional delivery methods like posters, leaflets, or internal messages to make employees aware of information security policies. We assume that a viral information security awareness video might be more effective medium than conventional methods commonly used by organizations. The purpose of this research is to develop a viral video artifact to improve employee security behavior concerning information technology.

Keywords: information security awareness, delivery methods, viral videos, employee security behavior

Procedia PDF Downloads 539
7942 Developing Cyber Security Asset Mangement Framework for UK Rail

Authors: Shruti Kohli

Abstract:

The sophistication and pervasiveness of cyber-attacks are constantly growing, driven partly by technological progress, profitable applications in organized crime and state-sponsored innovation. The modernization of rail control systems has resulted in an increasing reliance on digital technology and increased the potential for security breaches and cyber-attacks. This research track showcases the need for developing a secure reusable scalable framework for enhancing cyber security of rail assets. A cyber security framework has been proposed that is being developed to detect the tell-tale signs of cyber-attacks against industrial assets.

Keywords: cyber security, rail asset, security threat, cyber ontology

Procedia PDF Downloads 425
7941 Enhancing the Network Security with Gray Code

Authors: Thomas Adi Purnomo Sidhi

Abstract:

Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.

Keywords: network, network security, grey code, physical layer

Procedia PDF Downloads 496
7940 The Nexus between Downstream Supply Chain Losses and Food Security in Nigeria: Empirical Evidence from the Yam Industry

Authors: Alban Igwe, Ijeoma Kalu, Alloy Ezirim

Abstract:

Food insecurity is a global problem, and the search for food security has assumed a central stage in the global development agenda as the United Nations currently placed zero hunger as a goal number in its sustainable development goals. Nigeria currently ranks 107th out of 113 countries in the global food security index (GFSI), a metric that defines a country's ability to furnish its citizens with food and nutrients for healthy living. Paradoxically, Nigeria is a global leader in food production, ranking 1st in yam (over 70% of global output), beans (over 41% of global output), cassava (20% of global output) and shea nuts, where it commands 53% of global output. Furthermore, it ranks 2nd in millet, sweet potatoes, and cashew nuts. It is Africa's largest producer of rice. So, it is apparent that Nigeria's food insecurity woes must relate to a factor other than food production. We investigated the nexus between food security and downstream supply chain losses in the yam industry with secondary data from the Food and Agricultural Organization (FAOSTAT) and the National Bureau of Statics for the decade 2012-2021. In analyzing the data, multiple regression techniques were used, and findings reveal that downstream losses have a strong positive correlation with food security (r = .763*) and a 58.3% variation in food security is explainable by post-downstream supply chain food losses. The study discovered that yam supply chain losses within the period under review averaged 50.6%, suggestive of the fact that downstream supply chain losses are the drainpipe and the major source of food insecurity in Nigeria. Therefore, the study concluded that there is a significant relationship between downstream supply chain losses and food insecurity and recommended the establishment of food supply chain structures and policies to enhance food security in Nigeria.

Keywords: food security, downstream supply chain losses, yam, nigeria, supply chain

Procedia PDF Downloads 85
7939 Human Security as a Tool of Protecting International Human Rights Law

Authors: Arenca Trashani

Abstract:

20 years after its first entrance in a General Assembly of the United Nation’s Resolution, human security has became a very important tool in a global debate affecting directly the whole main rules and regulations in international law and more closely in international human rights law. This paper will cover a very important issue of today at how the human security has its impact to the development of international human rights law, not as far as a challenge as it is seen up now but a tool of moving toward development and globalization. In order to analyze the impact of human security to the global agenda, we need to look to the main pillars of the international legal order which are affected by the human security in itself and its application in the policy making for this international legal order global and regional ones. This paper will focus, also, on human security, as a new and very important tool of measuring development, stability and the level of democratic consolidation and the respect for human rights especially in developing countries such as Albania. The states are no longer capable to monopolize the use of human security just within their boundaries and separated from the other principles of a functioning democracy. In this context, human security would be best guaranteed under the respect of the rule of law and democratization. During the last two decades the concept security has broadly developed, from a state-centric to a more human-centric approach: from state security to respect for human rights, to economic security, to environmental security as well. Last but not least we would see that human rights could be affected by human security not just at their promotion but also at their enforcement and mainly at the international institutions, which are entitled to promote and to protect human rights.

Keywords: human security, international human rights law, development, Albania, international law

Procedia PDF Downloads 753
7938 Composite Materials from Epoxidized Linseed Oil and Lignin

Authors: R. S. Komartin, B. Balanuca, R. Stan

Abstract:

the last decades, studies about the use of polymeric materials of plant origin, considering environmental concerns, have captured the interest of researchers because these represent an alternative to petroleum-derived materials. Vegetable oils are one of the preferred alternatives for petroleum-based raw materials having long aliphatic chains similar to hydrocarbons which means that can be processed using conventional chemistry. Epoxidized vegetable oils (EVO) are among the most interesting products derived from oil both for their high reactivity (epoxy group) and for the potential to react with compounds from various classes. As in the case of epoxy resins starting from petrochemical raw materials, those obtained from EVO can be crosslinked with different agents to build polymeric networks and can also be reinforced with various additives to improve their thermal and mechanical performances. Among the multitude of known EVO, the most common in industrial practice are epoxidized linseed oils (ELO) and epoxidized soybean oils (ESO), the first with an iodine index over 180, the second having a lower iodine index but being cheaper. On the other hand, lignin (Ln) is the second natural organic material as a spread, whose use has long been hampered because of the high costs associated with its isolation and purification. In this context, our goal was to obtain new composite materials with satisfactory intermediate properties in terms of stiffness and elasticity using the characteristics of ELO and Ln and choosing the proper curing procedure. In the present study linseed oil (LO) epoxidation was performed using peracetic acid generated in situ. The obtained bio-based epoxy resin derived from linseed oil was used further to produce the new composites byloading Ln in various mass ratios. The resulted ELO-Ln blends were subjected to a dual-curing protocol, namely photochemical and thermal. The new ELO-Ln composites were investigated by FTIR spectrometry, thermal stability, water affinity, and morphology. The positive effect of lignin regarding the thermal stability of the composites could be proved. The results highlight again the still largely unexplored potential of lignin in industrial applications.

Keywords: composite materials, dual curing, epoxidized linseed oil, lignin

Procedia PDF Downloads 151
7937 Polymer-Ceramic Composite Film Fabrication and Characterization for Harsh Environment Applications

Authors: Santiranjan Shannigrahi, Mohit Sharma, Ivan Tan Chee Kiang, Yong Anna Marie

Abstract:

Polymer-ceramics composites are gaining importance due to their high specific strength, corrosion resistance, and high mechanical properties, as well as low cost. As a result, polymer composites are suitable for various industrial applications, like automobiles, aerospace, and biomedical areas. The present work comprises the development of polymer-ceramic composite films and is tested for the harsh environment including weatherability and UV barrier property. The polymer composite films are kept in weather chamber for a fixed period of time followed by tested for their physical, mechanical and chemical properties. The composite films are fabricated using compounding followed by hot pressing. UV-visible spectroscopy results reveal that the pure polymer polyethylene (PE) films are transparent in the visible range and do not absorb UV. However, polymer ceramic composite films start absorbing UV completely even at very low filler loading amount of 5 wt.%. The changes in tensile properties of the various composite films before and after UV illuminations for 40 hrs at 60 degC are analyzed. The tensile strength of neat PE film has been observed 8% reduction, whereas the remarkable increase in tensile strength has been observed (18% improvement for 10 wt. % filled composites films). The UV exposure leads to strengthen the crosslinking among PE polymer chains in the filled composite films, which contributes towards the incremented tensile strength properties.

Keywords: polymer ceramic composite, processing, harsh environment, mechanical properties

Procedia PDF Downloads 377
7936 The Law of Treaties and National Security of Islamic Republic of Iran

Authors: S. M. Tavakoli Sani, M. Sabbet Moghadam, Y. Khorram Farhadi, Iraj Rezayi Nejad

Abstract:

The concept of national security in Iran is a permanently effective factor in acceptance or rejection of many international obligations. These obligations had been defined according to the type of legislation of Iran in many aspects. Therefore, there are several treaties at international level which requires Iran’s security to come in contact with obligations in these treaties in a way that an obstacle to join to them and their passage in parliament. This issue is a typical category which every country pays attention to be accepted in treaties or to include their national security in that treaties and also they can see the related treaties from this perspective, but this issue that 'what is the concept of Iran’s national security', and 'To what extent it is changed in recent years, especially after Islamic Revolution' are important issues that can be criticized. Thus, this study is trying to assess singed treaties from the perspective of Iran’s national security according of the true meaning of treaty and to investigate how the international treaties may be in conflict with Iran’s national security.

Keywords: treaties, national security, Iran, Islamic Revolution

Procedia PDF Downloads 463
7935 On Estimating the Headcount Index by Using the Logistic Regression Estimator

Authors: Encarnación Álvarez, Rosa M. García-Fernández, Juan F. Muñoz, Francisco J. Blanco-Encomienda

Abstract:

The problem of estimating a proportion has important applications in the field of economics, and in general, in many areas such as social sciences. A common application in economics is the estimation of the headcount index. In this paper, we define the general headcount index as a proportion. Furthermore, we introduce a new quantitative method for estimating the headcount index. In particular, we suggest to use the logistic regression estimator for the problem of estimating the headcount index. Assuming a real data set, results derived from Monte Carlo simulation studies indicate that the logistic regression estimator can be more accurate than the traditional estimator of the headcount index.

Keywords: poverty line, poor, risk of poverty, Monte Carlo simulations, sample

Procedia PDF Downloads 417
7934 Experimental Study Damage in a Composite Structure by Vibration Analysis- Glass / Polyester

Authors: R. Abdeldjebar, B. Labbaci, L. Missoum, B. Moudden, M. Djermane

Abstract:

The basic components of a composite material made him very sensitive to damage, which requires techniques for detecting damage reliable and efficient. This work focuses on the detection of damage by vibration analysis, whose main objective is to exploit the dynamic response of a structure to detect understand the damage. The experimental results are compared with those predicted by numerical models to confirm the effectiveness of the approach.

Keywords: experimental, composite, vibration analysis, damage

Procedia PDF Downloads 672
7933 The Implementation of Information Security Audits in Public Sector: Perspective from Indonesia

Authors: Nur Imroatun Sholihat, Gresika Bunga Sylvana

Abstract:

Currently, cyber attack became an incredibly serious problem due to its increasing trend all over the world. Therefore, information security becomes prominent for every organization including public sector organization. In Indonesia, unfortunately, Ministry of Finance (MoF) is the only public sector organization that has already formally established procedure to assess its information security adequacy by performing information security audits (November 2017). We assess the implementation of information security audits in the MoF using qualitative data obtained by interviewing IT auditors and by analysis of related documents. For this reason, information security audit practice in the MoF could become the acceptable benchmark for all other public sector organizations in Indonesia. This study is important because, to the best of the author’s knowledge, our research into information security audits practice in Indonesia’s public sector have not been found yet. Results showed that information security audits performed mostly by doing pentest (penetration testing) to MoF’s critical applications.

Keywords: information security audit, information technology, Ministry of Finance of Indonesia, public sector organization

Procedia PDF Downloads 227
7932 Mechanical and Chemical Properties of Zn-Ni-Al2O3 Nano Composite Coatings

Authors: Soroor Ghaziof, Wei Gao

Abstract:

Zn alloy and composite coatings are widely used in buildings and structures, automobile and fasteners industries to protect steel component from corrosion. In this paper, Zn-Ni-Al2O3 nano-composite coatings were electrodeposited on mild steel using a novel sol enhanced electroplating method. In this method, transparent Al2O3 sol was added into the acidic Zn-Ni bath to produced Zn-Ni-Al2O3 nano-composite coatings. The effect of alumina sol on the electrodeposition process, and coating properties was investigated using cyclic voltammetry, XRD, ESEM and Tafel test. Results from XRD tests showed that the structure of all coatings was single γ-Ni5Zn21 phase. Cyclic voltammetry results showed that the electrodeposition overpotential was lower in the presence of alumina sol in the bath, and caused the reduction potential of Zn-Ni to shift to more positive values. Zn-Ni-Al2O3 nano composite coatings produced more uniform and compact deposits, with fine grained microstructure when compared to Zn-Ni coatings. The corrosion resistance of Zn-Ni coatings was improved significantly by incorporation of alumina nano particles into the coatings.

Keywords: Zn-Ni-Al2O3 composite coatings, steel, sol-enhanced electroplating, corrosion resistance

Procedia PDF Downloads 389
7931 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 728