Search results for: halal integrity
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 753

Search results for: halal integrity

483 Inter Religion Harmony and World Peace: Theory from Shah Wali Ullah's Philosophy

Authors: Muhammad Usman Ghani

Abstract:

Religious tolerance is essential for the establishment of peace in the world. In the system created by Almighty Allah where a lot of diversity is found, still, this world holds unity itself. In today's world, human beings have been divided into clashes of civilizations or divided on the basis of religions or lingual differences. A religious scholar of Indo- Pak subcontinent describes four ethics, on the basis of which all religions of the world can unite. He says in his philosophy of religion that, there is a number of elements common in all religions but four are very common and they are: cleanliness, nobel deeds, relation to Almighty (existence of Almighty) and justice. He says that this universe also holds its integrity in itself. All humans are different in their attributes but to be a human being is common in them. Similarly, all species of the universe are different in their nature, but to be the creature of God is commonly shared by all of them.

Keywords: inter-religious relation, peace and harmony, unity, four common ethics/virtues

Procedia PDF Downloads 310
482 Calculus of Turbojet Performances for Ideal Case

Authors: S. Bennoud, S. Hocine, H. Slme

Abstract:

Developments in turbine cooling technology play an important role in increasing the thermal efficiency and the power output of recent gas turbines, in particular the turbojets. Advanced turbojets operate at high temperatures to improve thermal efficiency and power output. These temperatures are far above the permissible metal temperatures. Therefore, there is a critical need to cool the blades in order to give theirs a maximum life period for safe operation. The focused objective of this work is to calculate the turbojet performances, as well as the calculation of turbine blades cooling. The developed application able the calculation of turbojet performances to different altitudes in order to find a point of optimal use making possible to maintain the turbine blades at an acceptable maximum temperature and to limit the local variations in temperatures in order to guarantee their integrity during all the lifespan of the engine.

Keywords: brayton cycle, turbine blades cooling, turbojet cycle, turbojet performances

Procedia PDF Downloads 197
481 Shariah Perspective on Legal Framework and Practice of Margin Financing in Pakistan

Authors: Anees Tahir

Abstract:

Margin financing plays a significant role in Pakistan's stock market (PSX), offering investors the opportunity to maximize profits by borrowing funds from financiers to purchase marginable stocks. However, this financial practice raises several Shariah-related concerns. The study follows legal doctrinal research methodology. It explains and analyzes the law of margin financing prevailing in PSX and compares it with the principles of Shariah. It also examines and investigates the practices of margin financing from the perspective of Shariah. As part of the study, the researcher has conducted structured interviews with the Shariah advisors of the finance industry, academicians, market practitioners, and regulators. Thus, the study analyzes the findings of interviews. This article explores the legal framework and practice of margin financing in Pakistan from a Shariah perspective. The article investigates various issues relating to margin financing, including the fundamental concern of interest-based lending, which contravenes Islamic principles. It also highlights the problematic subject matter of margin financing, often involving non-Shariah compliant securities. Additionally, the article addresses the restriction on proprietary rights and the problematic element of speculation associated with margin financing. To provide a Shariah-compliant alternative, the Securities and Exchange Commission of Pakistan (SECP) introduced Murabahah Shares Financing (MSF) in 2019. However, the focus of the market is still on conventional margin financing. In the opinion of the researcher, the effective implementation of MSF is imperative because in the absence of such an alternative, the faith sensitive investor will remain deprived of a level playing field, and he is unable to get required financing opportunities through a halal and Shariah-compliant manner. This article argues that margin financing in its current form is incompatible with Shariah principles and should be discontinued. It is recommended that the SECP should gradually phase out the use of margin financing and increase reliance on MSF to provide faith-sensitive and committed investors with Shariah-compliant financing options.

Keywords: margin financing, marginable stocks, faith sensitive investor, Murabahah shares financing

Procedia PDF Downloads 39
480 Defense Strategy: Perang Semesta Strategy as a Reliable National Security System of Indonesia

Authors: Erdianta S, Chastiti M. Wulolo, IDK Kerta Widana

Abstract:

Perang Semesta strategy is a national security system used by Republic of Indonesia. It comes from local wisdom, cultural, and hereditary of Indonesia itself. This system involves all people and all nation resources, and it is early prepared by government and conducted totality, integratedly, directly, and continously to enforce a sovereignty of country, teritorial integrity and the safety of the whole nation from threats. This study uses a qualitative content analysis method by studying, recording, and analyzing government policy. The Perang Semesta strategy divided into main, backup, and supporting components. Every component has its function and responsibility in security perspective. So when an attack comes, all people of Indonesia will voluntary to defend the country. Perang Semesta strategy is a national security system which becomes the most reliable strategy toward geography and demography of Indonesia.

Keywords: Indonesia, Perang Semesta strategy, national security, local wisdom

Procedia PDF Downloads 418
479 Preparation of Carbon Monoliths from PET Waste and Their Use in Solar Interfacial Water Evaporation

Authors: Andrea Alfaro Barajas, Arturo I. Martinez

Abstract:

3D photothermal structure of carbon was synthesized using PET bottles waste and sodium chloride through controlled carbonization. Characterization techniques such as X-ray photoelectron spectroscopy, X-ray diffraction, BET, scanning electron microscopy (SEM), transmission electron microscopy (TEM), Raman spectroscopy, spectrophotometry, and mechanical compression were carried out. The carbon showed physical integrity > 90%, an absorbance > 90% between 300-1000nm of the solar spectrum, and a high specific surface area from 450 to 620 m2/g. The X-ray was employed to examine the phase structure; the obtained pattern shows an amorphous material. A higher intensity of band D with respect to band G was confirmed by Raman Spectroscopy. C-OH, COOH, C-O, and C-C bonds were obtained from the deconvolution of the high-resolution C1s orbital. Macropores of 160 to 180µm and micropores of 0.5 to 2nm were observed by SEM and TEM images, respectively. Such combined characteristics of carbon confer efficient evaporation of water under 1 sun irradiation > 60%.

Keywords: solar-absorber, carbon, water-evaporation, interfacial

Procedia PDF Downloads 124
478 Efficient and Timely Mutual Authentication Scheme for RFID Systems

Authors: Hesham A. El Zouka, Mustafa M. Hosni ka

Abstract:

The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.

Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature

Procedia PDF Downloads 229
477 Electronic-Word of Mouth(e-WoM): Preliminary Study of Malaysian Undergrad Students Smartphone Online Review

Authors: Norshakirah Ab.Aziz, Nurul Atiqah Jamaluddin

Abstract:

Consequently, electronic word-of-mouth (e-WoM) becomes one of the resources in the decision making process and considered a valuable marketing channel for consumers and organizations. Admittedly, there is increasing concern on the accuracy and genuine of e-WoM content because consumers prefer to look out product or service information available online. Thus, the focus of this study is to propose a model and guidelines how to select trusted online review content according to domain chosen –undergrad students smartphone online review. Undeniable, mobile devices like smartphone has now become a necessity in today are daily life to complete our daily chores. The model and guideline focused on product competency review and the message integrity. In other words, this study aims to enable consumers to identify trusted online review content, which helps them in buying decisions.

Keywords: electronic word of mouth, e-WoM, WoM, online review

Procedia PDF Downloads 305
476 Integrated Model for Enhancing Data Security Performance in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 451
475 Study of Low Loading Heavier Phase in Horizontal Oil-Water Liquid-Liquid Pipe Flow

Authors: Aminu J. A. Koguna, Aliyu M. Aliyu, Olawale T. Fajemidupe, Yahaya D. Baba

Abstract:

Production fluids are transported from the platform to tankers or process facilities through transfer pipelines. Water being one of the heavier phases tends to settle at the bottom of pipelines especially at low flow velocities and this has adverse consequences for pipeline integrity. On restart after a shutdown this could result in corrosion and issues for process equipment, thus the need to have the heavier liquid dispersed into the flowing lighter fluid. This study looked at the flow regime of low water cut and low flow velocity oil and water flow using conductive film thickness probes in a large diameter 4-inch pipe to obtain oil and water interface height and the interface structural velocity. A wide range of 0.1–1.0 m/s oil and water mixture velocities was investigated for 0.5–5% water cut. Two fluid model predictions were used to compare with the experimental results.

Keywords: interface height, liquid, velocity, flow regime, dispersed, water cut

Procedia PDF Downloads 359
474 Progressive Structural Capacity Loss Assessment

Authors: M. Zain, Thaung H. Aung, Naveed Anwar

Abstract:

During the service life, a structure may experience extreme loading conditions. The current study proposes a new methodology that covers the effect of uncertainty involved in gravity loadings on key structural elements of new and complex structures by emphasizing on a very realistic assumption that allows the 'Performance-Based Assessment' to be executed on the structure against the gravity loadings. The methodology does not require the complete removal of an element, instead, it permits the incremental reduction in the capacity of key structural elements and preserves the same stiffness of the member in each case of capacity loss. To demonstrate the application of the proposed methodology, a 13 story complex structure is selected that comprises of a diverse structural configuration. The results ensure the structural integrity against the applied gravity loadings, as well as the effectiveness of the proposed methodology.

Keywords: force-deformation relationship, gravity loading, incremental capacity reduction, multi-linear plastic link element, SAP2000, stiffness

Procedia PDF Downloads 427
473 Factors Affecting Weld Line Movement in Tailor Welded Blank

Authors: Sanjay Patil, Shakil A. Kagzi, Harit K. Raval

Abstract:

Tailor Welded Blanks (TWB) are utilized in automotive industries widely because of their advantage of weight and cost reduction and maintaining required strength and structural integrity. TWB consist of two or more sheet having dissimilar or similar material and thickness; welded together to form a single sheet before forming it to desired shape. Forming of the tailor welded blank is affected by ratio of thickness of blanks, ratio of their strength, etc. mainly due to in-homogeneity of material. In the present work the relative effect of these parameters on weld line movement is studied during deep drawing of TWB using FE simulation using HYPERWORKS. The simulation is validated with results from the literature. Simulations were than performed based on Taguchi orthogonal array followed by the ANOVA analysis to determine the significance of these parameters on forming of TWB.

Keywords: ANOVA, deep drawing, Tailor Welded Blank (TWB), weld line movement

Procedia PDF Downloads 286
472 Need for Shariah Screening of Companies in Nigeria: Lessons from Other Jurisdictions

Authors: Aishat Abdul-Qadir Zubair

Abstract:

Background: The absence of Shari’ah screening methodology for companies in Nigeria has further engineered the uncertainty surrounding the acceptability of investing in certain companies by people professing the religion of Islam due to the nature of the activities carried out by these companies. There are some existing shariah screening indices in other jurisdictions whose criteria can be used to check if a company or business is shariah-compliant or not. Examples such as FTSE, DJIM, Standard and Poor to mention just a few. What these indices have tried to do is to ensure that there are benchmarks to check with before investing in companies that carry out mixed activities in their business, wherein some are halal and others may be haram. Purpose: There have been numerous studies on the need to adopt certain screening methodologies as well as call for new methods in screening companies for shariah compliance in order to suit the investments needs of Muslims in other jurisdictions. It is, however, unclear how suitable these methodologies will be to Nigeria. This paper, therefore, seeks to address this gap to consider an appropriate screening methodology to be employed in Nigeria, drawing from the experience of other jurisdictions. Methods: This study employs a triangulation of both quantitative and qualitative methods to analyze the need for Shari’ah screening of companies in Nigeria. The qualitative method is used by way of ijtihad, and this study tries to apply some Islamic Principles of Maqasid al-shari’ah as well as Qawaid al-Fiqiyyah to analyze activities of companies in order to ensure that they are indeed Shari’ah compliant. In addition, using the quantitative data gathered from the interview survey, the perspective of the investors with regards to the need for Shari’ah screening of companies in Nigeria is further analyzed. Results: The result of the study shows that there is a lack of awareness from the teeming Muslim population in Nigeria on the need for Shari’ah screening of companies in Nigeria. The result further shows that there is the need to take into cognizance the peculiar nature of company activities in Nigeria before any particular Shari’ah screening methodology is adopted and setting the necessary benchmarks. Conclusion and Implications: The study concludes that there is the need to ensure that the conscious Muslims in Nigeria screen companies for Shari’ah compliance so that they can easily identify the companies to invest in. The paper, therefore, recommends that the Nigerian government need to come up with a screening methodology that will suit the peculiar nature of companies in Nigeria. The study thus has a direct implication on the Investment regulatory bodies in Nigeria such as the Securities and Exchange Commission (SEC), Central Bank of Nigeria (CBN) as well as the investor Muslims.

Keywords: Shari'ah screening, Muslims, investors, companies

Procedia PDF Downloads 138
471 An Investigation of the University Council’s Image: A Case of Suan Sunandha Rajabhat University

Authors: Phitsanu Phunphetchphan

Abstract:

The purposes of this research was to investigate opinions of Rajabhat University staff towards performance of the university council committee by focusing on (1) personal characteristics of the committees; (2) duties designated by the university council; and (3) relationship between university council and staff. The population of this study included all high level of management from Suan Sunandha Rajabhat University which made a total of 200 respondents. Data analysis included frequency, percentage, mean and standard deviation. The findings revealed that the majority of staff rated the performance of university council at a high level. The 'overall appropriate qualification of the university council' was rated as the highest score while 'good governance' was rated as the lowest mean score. Moreover, the findings also revealed that the relationship between university council’s members and the staff was rated at a high level while 'the integrity of policy implementation' was rated as the lowest score.

Keywords: investigation, performance, university council, management

Procedia PDF Downloads 218
470 Management of Mycotoxin Production and Fungicide Resistance by Targeting Stress Response System in Fungal Pathogens

Authors: Jong H. Kim, Kathleen L. Chan, Luisa W. Cheng

Abstract:

Control of fungal pathogens, such as foodborne mycotoxin producers, is problematic as effective antimycotic agents are often very limited. Mycotoxin contamination significantly interferes with the safe production of foods or crops worldwide. Moreover, expansion of fungal resistance to commercial drugs or fungicides is a global human health concern. Therefore, there is a persistent need to enhance the efficacy of commercial antimycotic agents or to develop new intervention strategies. Disruption of the cellular antioxidant system should be an effective method for pathogen control. Such disruption can be achieved with safe, redox-active compounds. Natural phenolic derivatives are potent redox cyclers that inhibit fungal growth through destabilization of the cellular antioxidant system. The goal of this study is to identify novel, redox-active compounds that disrupt the fungal antioxidant system. The identified compounds could also function as sensitizing agents to conventional antimycotics (i.e., chemosensitization) to improve antifungal efficacy. Various benzo derivatives were tested against fungal pathogens. Gene deletion mutants of the yeast Saccharomyces cerevisiae were used as model systems for identifying molecular targets of benzo analogs. The efficacy of identified compounds as potent antifungal agents or as chemosensitizing agents to commercial drugs or fungicides was examined with methods outlined by the Clinical Laboratory Standards Institute or the European Committee on Antimicrobial Susceptibility Testing. Selected benzo derivatives possessed potent antifungal or antimycotoxigenic activity. Molecular analyses by using S. cerevisiae mutants indicated antifungal activity of benzo derivatives was through disruption of cellular antioxidant or cell wall integrity system. Certain benzo analogs screened overcame tolerance of Aspergillus signaling mutants, namely mitogen-activated protein kinase mutants, to fludioxonil fungicide. Synergistic antifungal chemosensitization greatly lowered minimum inhibitory or fungicidal concentrations of test compounds, including inhibitors of mitochondrial respiration. Of note, salicylaldehyde is a potent antimycotic volatile that has some practical application as a fumigant. Altogether, benzo derivatives targeting cellular antioxidant system of fungi (along with cell wall integrity system) effectively suppress fungal growth. Candidate compounds possess the antifungal, antimycotoxigenic or chemosensitizing capacity to augment the efficacy of commercial antifungals. Therefore, chemogenetic approaches can lead to the development of novel antifungal intervention strategies, which enhance the efficacy of established microbe intervention practices and overcome drug/fungicide resistance. Chemosensitization further reduces costs and alleviates negative side effects associated with current antifungal treatments.

Keywords: antifungals, antioxidant system, benzo derivatives, chemosensitization

Procedia PDF Downloads 226
469 The Influence of Fiber Fillers on the Bonding Safety of Structural Adhesives: A Fracture Analytical Evaluation

Authors: Brandtner-Hafner Martin

Abstract:

Adhesives have established themselves as an innovative joining technology in the industry. Their strengths lie in joining different materials, avoiding structural weakening as in welding or screwing, and enabling lightweight construction methods. Now there are a variety of ways to improve the efficiency and effectiveness of bonded joints. One way is to add fiber fillers. This leads to an improvement in adhesion and cohesion (structural integrity). In this study, the effectiveness of fiber-modified adhesives for bonding different construction materials is reviewed. A series of experimental tests were performed using the fracture analytical GF principle to study the adhesive bonding safety and performance of the joint. Three different structural adhesive systems based on epoxy, CA/A hybrid, and PUR were modified with different fiber materials on different substrates. The results show that significant performance improvements can be achieved and that bonding reliability can be sustainably increased.

Keywords: fiber-modified adhesives, bonding safety, GF-principle, fracture analysis

Procedia PDF Downloads 144
468 Impact of Very Small Power Producers (VSPP) on Control and Protection System in Distribution Networks

Authors: Noppatee Sabpayakom, Somporn Sirisumrannukul

Abstract:

Due to incentive policies to promote renewable energy and energy efficiency, high penetration levels of very small power producers (VSPP) located in distribution networks have imposed technical barriers and established new requirements for protection and control of the networks. Although VSPPs have economic and environmental benefit, they may introduce negative effects and cause several challenges on the issue of protection and control system. This paper presents comprehensive studies of possible impacts on control and protection systems based on real distribution systems located in a metropolitan area. A number of scenarios were examined primarily focusing on state of islanding, and un-disconnected VSPP during faults. It is shown that without proper measures to address the issues, the system would be unable to maintain its integrity of electricity power supply for disturbance incidents.

Keywords: control and protection systems, distributed generation, renewable energy, very small power producers

Procedia PDF Downloads 451
467 Networked Radar System to Increase Safety of Urban Railroad Crossing

Authors: Sergio Saponara, Luca Fanucci, Riccardo Cassettari, Ruggero Piernicola, Marco Righetto

Abstract:

The paper presents an innovative networked radar system for detection of obstacles in a railway level crossing scenario. This Monitoring System (MS) is able to detect moving or still obstacles within the railway level crossing area automatically, avoiding the need of human presence for surveillance. The MS is also connected to the National Railway Information and Signaling System to communicate in real-time the level crossing status. The architecture is compliant with the highest Safety Integrity Level (SIL4) of the CENELEC standard. The number of radar sensors used is configurable at set-up time and depends on how large the level crossing area can be. At least two sensors are expected and up four can be used for larger areas. The whole processing chain that elaborates the output sensor signals, as well as the communication interface, is fully-digital, was designed in VHDL code and implemented onto a Xilinx Virtex 6.

Keywords: radar for safe mobility, railroad crossing, railway, transport safety

Procedia PDF Downloads 446
466 Towards a Security Model against Denial of Service Attacks for SIP Traffic

Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla

Abstract:

Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.

Keywords: Denial-of-Service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities

Procedia PDF Downloads 170
465 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 323
464 A Blockchain-Based Privacy-Preserving Physical Delivery System

Authors: Shahin Zanbaghi, Saeed Samet

Abstract:

The internet has transformed the way we shop. Previously, most of our purchases came in the form of shopping trips to a nearby store. Now, it’s as easy as clicking a mouse. But with great convenience comes great responsibility. We have to be constantly vigilant about our personal information. In this work, our proposed approach is to encrypt the information printed on the physical packages, which include personal information in plain text, using a symmetric encryption algorithm; then, we store that encrypted information into a Blockchain network rather than storing them in companies or corporations centralized databases. We present, implement and assess a blockchain-based system using Ethereum smart contracts. We present detailed algorithms that explain the details of our smart contract. We present the security, cost, and performance analysis of the proposed method. Our work indicates that the proposed solution is economically attainable and provides data integrity, security, transparency, and data traceability.

Keywords: blockchain, Ethereum, smart contract, commit-reveal scheme

Procedia PDF Downloads 121
463 Geotechnical Distress Evaluation of a Damaged Structure

Authors: Zulfiqar Ali, Umar Saleem, Muhammad Junaid, Rizwan Tahir

Abstract:

Gulzar Mahal is a heritage site located in the city of Bahawalpur, Pakistan. The site is under a process of degradation, as cracks are appearing on the walls, roofs, and floor around the building due to differential settlement. To preserve the integrity of the structure, a geotechnical distress evaluation was carried out to evaluate the causal factors and recommend remediation measures. The research involved the characterization of the problematic soil and analysis of the observed distress with respect to the geotechnical properties. Both conventional lab and field tests were used in conjunction with the unconventional techniques like; Electrical Resistivity Tomography (ERT) and FEA. The temporal, geophysical and geotechnical evaluations have concluded that the foundation soil over the past was subjected to variations in the land use, poor drainage patterns, overloading and fluctuations in groundwater table all contributing to the differential settlements manifesting in the form of the visible shear crack across the length and breadth of the building.

Keywords: differential settlement, distress evaluation, finite element analysis, Gulzar Mahal

Procedia PDF Downloads 93
462 Adsorption and Desorption of Emerging Water Contaminants on Activated Carbon Fabrics

Authors: S. Delpeux-Ouldriane, M. Gineys, S. Masson, N. Cohaut, L. Reinert, L. Duclaux, F. Béguin

Abstract:

Nowadays, a wide variety of organic contaminants are present at trace concentrations in wastewater effluents. In order to face these pollution problems, the implementation of the REACH European regulation has defined lists of targeted pollutants to be eliminated selectively in water. It therefore implies the development of innovative and more efficient remediation techniques. In this sense, adsorption processes can be successfully used to achieve the removal of organic compounds in waste water treatment processes, especially at low pollutant concentration. Especially, activated carbons possessing a highly developed porosity demonstrate high adsorption capacities. More specifically, carbon cloths show high adsorption rates, an easily handling, a good mechanical integrity and regeneration potentialities. When loaded with pollutants, these materials can be indeed regenerated using an electrochemical polarization.

Keywords: nanoporous carbons, activated carbon cloths, adsorption, micropollutants, emerging contaminants, regeneration, electrochemistry

Procedia PDF Downloads 369
461 A Study of Lurking Behavior: The Desire Perspective

Authors: Hsiu-Hua Cheng, Chi-Wei Chen

Abstract:

Lurking behaviour is common in information-seeking oriented communities. Transferring users with lurking behaviour to be contributors can assist virtual communities to obtain competitive advantages. Based on the ecological cognition framework, this study proposes a model to examine the antecedents of lurking behaviour in information-seeking oriented virtual communities. This study argues desire for emotional support, desire for information support, desire for performance-approach, desire for performance -avoidance, desire for mastery-approach, desire for mastery-avoidance, desire for ability trust, desire for benevolence trust, and desire for integrity trust effect on lurking behaviour. This study offers an approach to understanding the determinants of lurking behaviour in online contexts.

Keywords: lurking behaviour, the ecological cognition framework, Information-seeking oriented virtual communities, desire

Procedia PDF Downloads 247
460 Survey on Data Security Issues Through Cloud Computing Amongst Sme’s in Nairobi County, Kenya

Authors: Masese Chuma Benard, Martin Onsiro Ronald

Abstract:

Businesses have been using cloud computing more frequently recently because they wish to take advantage of its advantages. However, employing cloud computing also introduces new security concerns, particularly with regard to data security, potential risks and weaknesses that could be exploited by attackers, and various tactics and strategies that could be used to lessen these risks. This study examines data security issues on cloud computing amongst sme’s in Nairobi county, Kenya. The study used the sample size of 48, the research approach was mixed methods, The findings show that data owner has no control over the cloud merchant's data management procedures, there is no way to ensure that data is handled legally. This implies that you will lose control over the data stored in the cloud. Data and information stored in the cloud may face a range of availability issues due to internet outages; this can represent a significant risk to data kept in shared clouds. Integrity, availability, and secrecy are all mentioned.

Keywords: data security, cloud computing, information, information security, small and medium-sized firms (SMEs)

Procedia PDF Downloads 55
459 Surface Integrity Improvement for Selective Laser Melting (SLM) Additive Manufacturing of C300 Parts Using Ball Burnishing

Authors: Adrian Travieso Disotuar, J. Antonio Travieso Rodriguez, Ramon Jerez Mesa, Montserrat Vilaseca

Abstract:

The effect of the non-vibration-assisted and vibration-assisted ball burnishing on both the surface and mechanical properties of C300 obtained by Selective Laser Melting additive manufacturing technology is studied in this paper. Different vibration amplitudes preloads, and burnishing strategies were tested. A topographical analysis was performed to determine the surface roughness of the different conditions. Besides, micro tensile tests were carried out in situ on Scanning Electron Microscopy to elucidate the post-treatment effects on damaging mechanisms. Experiments show that vibration-assisted ball burnishing significantly enhances mechanical properties compared to the non-vibration-assisted method. Moreover, it was found that the surface roughness was significantly improved with respect to the reference surface.

Keywords: additive manufacturing, ball burnishing, mechanical properties, metals, surface roughness

Procedia PDF Downloads 41
458 Research of Acoustic Propagation within Marine Riser in Deepwater Drilling

Authors: Xiaohui Wang, Zhichuan Guan, Roman Shor, Chuanbin Xu

Abstract:

Early monitoring and real-time quantitative description of gas intrusion under the premise of ensuring the integrity of the drilling fluid circulation system will greatly improve the accuracy and effectiveness of deepwater gas-kick monitoring. Therefore, in order to study the propagation characteristics of ultrasonic waves in the gas-liquid two-phase flow within the marine riser, in this paper, a numerical simulation method of ultrasonic propagation in the annulus of the riser was established, and the credibility of the numerical analysis was verified by the experimental results of the established gas intrusion monitoring simulation experimental device. The numerical simulation can solve the sound field in the gas-liquid two-phase flow according to different physical models, and it is easier to realize the single factor control. The influence of each parameter on the received signal can be quantitatively investigated, and the law with practical guiding significance can be obtained.

Keywords: gas-kick detection, ultrasonic, void fraction, coda wave velocity

Procedia PDF Downloads 126
457 Non-Steroidal Microtubule Disrupting Analogues Induce Programmed Cell Death in Breast and Lung Cancer Cell Lines

Authors: Marcel Verwey, Anna M. Joubert, Elsie M. Nolte, Wolfgang Dohle, Barry V. L. Potter, Anne E. Theron

Abstract:

A tetrahydroisoquinolinone (THIQ) core can be used to mimic the A,B-ring of colchicine site-binding microtubule disruptors such as 2-methoxyestradiol in the design of anti-cancer agents. Steroidomimeric microtubule disruptors were synthesized by introducing C'2 and C'3 of the steroidal A-ring to C'6 and C'7 of the THIQ core and by introducing a decorated hydrogen bond acceptor motif projecting from the steroidal D-ring to N'2. For this in vitro study, four non-steroidal THIQ-based analogues were investigated and comparative studies were done between the non-sulphamoylated compound STX 3450 and the sulphamoylated compounds STX 2895, STX 3329 and STX 3451. The objective of this study was to investigate the modes of cell death induced by these four THIQ-based analogues in A549 lung carcinoma epithelial cells and metastatic breast adenocarcinoma MDA-MB-231 cells. Cytotoxicity studies to determine the half maximal growth inhibitory concentrations were done using spectrophotometric quantification via crystal violet staining and lactate dehydrogenase (LDH) assays. Microtubule integrity and morphologic changes of exposed cells were investigated using polarization-optical transmitted light differential interference contrast microscopy, transmission electron microscopy and confocal microscopy. Flow cytometric quantification was used to determine apoptosis induction and the effect that THIQ-based analogues have on cell cycle progression. Signal transduction pathways were elucidated by quantification of the mitochondrial membrane integrity, cytochrome c release and caspase 3, -6 and -8 activation. Induction of autophagic cell death by the THIQ-based analogues was investigated by morphological assessment of fluorescent monodansylcadaverine (MDC) staining of acidic vacuoles and by quantifying aggresome formation via flow cytometry. Results revealed that these non-steroidal microtubule disrupting analogues inhibited 50% of cell growth at nanomolar concentrations. Immunofluorescence microscopy indicated microtubule depolarization and the resultant mitotic arrest was further confirmed through cell cycle analysis. Apoptosis induction via the intrinsic pathway was observed due to depolarization of the mitochondrial membrane, induction of cytochrome c release as well as, caspase 3 activation. Potential involvement of programmed cell death type II was observed due to the presence of acidic vacuoles and aggresome formation. Necrotic cell death did not contribute significantly, indicated by stable LDH levels. This in vitro study revealed the induction of the intrinsic apoptotic pathway as well as possible involvement of autophagy after exposure to these THIQ-based analogues in both MDA-MB-231- and A549 cells. Further investigation of this series of anticancer drugs still needs to be conducted to elucidate the temporal, mechanistic and functional crosstalk mechanisms between the two observed programmed cell deaths pathways.

Keywords: apoptosis, autophagy, cancer, microtubule disruptor

Procedia PDF Downloads 223
456 Consideration of Failed Fuel Detector Location through Computational Flow Dynamics Analysis on Primary Cooling System Flow with Two Outlets

Authors: Sanghoon Bae, Hanju Cha

Abstract:

Failed fuel detector (FFD) in research reactor is a very crucial instrument to detect the anomaly from failed fuels in the early stage around primary cooling system (PCS) outlet prior to the decay tank. FFD is considered as a mandatory sensor to ensure the integrity of fuel assemblies and mitigate the consequence from a failed fuel accident. For the effective function of FFD, the location of them should be determined by contemplating the effect from coolant flow around two outlets. For this, the analysis on computational flow dynamics (CFD) should be first performed how the coolant outlet flow including radioactive materials from failed fuels are mixed and discharged through the outlet plenum within certain seconds. The analysis result shows that the outlet flow is well mixed regardless of the position of failed fuel and ultimately illustrates the effect of detector location.

Keywords: computational flow dynamics (CFD), failed fuel detector (FFD), fresh fuel assembly (FFA), spent fuel assembly (SFA)

Procedia PDF Downloads 222
455 Intrusion Detection In MANET Using Game Theory

Authors: S. B. Kumbalavati, J. D. Mallapur, K. Y. Bendigeri

Abstract:

A mobile Ad-hoc network (MANET) is a multihop wireless network where nodes communicate each other without any pre-deployed infrastructure. There is no central administrating unit. Hence, MANET is generally prone to many of the attacks. These attacks may alter, release or deny data. These attacks are nothing but intrusions. Intrusion is a set of actions that attempts to compromise integrity, confidentiality and availability of resources. A major issue in the design and operation of ad-hoc network is sharing the common spectrum or common channel bandwidth among all the nodes. We are performing intrusion detection using game theory approach. Game theory is a mathematical tool for analysing problems of competition and negotiation among the players in any field like marketing, e-commerce and networking. In this paper mathematical model is developed using game theory approach and intruders are detected and removed. Bandwidth utilization is estimated and comparison is made between bandwidth utilization with intrusion detection technique and without intrusion detection technique. Percentage of intruders and efficiency of the network is analysed.

Keywords: ad-hoc network, IDS, game theory, sensor networks

Procedia PDF Downloads 355
454 Antimicrobial Properties of Copper in Gram-Negative and Gram-Positive Bacteria

Authors: Travis J. Meyer, Jasodra Ramlall, Phyo Thu, Nidhi Gadura

Abstract:

For centuries humans have used the antimicrobial properties of copper to their advantage. Yet, after all these years the underlying mechanisms of copper mediated cell death in various microbes remain unclear. We had explored the hypothesis that copper mediated increased levels of lipid peroxidation in the membrane fatty acids is responsible for increased killing inEscherichia coli. In this study we show that in both gram positive (Staphylococcus aureus) and gram negative (Pseudomonas aeruginosa) bacteria there is a strong correlation between copper mediated cell death and increased levels of lipid peroxidation. Interestingly, the non-spore forming gram positive bacteria as well as gram negative bacteria show similar patterns of cell death, increased levels of lipid peroxidation, as well as genomic DNA degradation, however there is some difference inloss in membrane integrity upon exposure to copper alloy surface.

Keywords: antimicrobial, copper, gram positive, gram negative

Procedia PDF Downloads 446