116 research outputs found

    The effect of blanching and storage on the chemical composition of dates

    Get PDF
    The changes during storage of dates. (Phoenix dactylifera L.) at room temperature and at -13° were studied. The effect of blanching in boiling water and by microwave heating before storage was also studied. Moisture, pH, acidity, total soluble solids, sugar, colour, soluble leucoanthocyanidin tannin, insoluble leucoanthocyanidin tannin, total soluble phenolic compounds and the activities of polyphenolase and peroxidase enzymes were investigated. The dates stored at room temperature showed darkening, and decrease in the amount of insoluble leucoanthocyanidin tannin. The dates stored at -13° showed darkening, decrease in the total soluble phenolic compounds, increase in the insoluble leucoanthacyanidin tannin and increase in the total soluble solids. [Continues.

    The Sinus Venosus Veno-Venous Bridge: Not a septal defect

    Get PDF
    This review provides an update on the morphology of the sinus venosus defect. It was earlier believed that a 'common wall' separated the right pulmonary veins from the superior caval vein. In the sinus venosus defects, this wall was absent. Current evidence shows that the superior rim of the oval fossa, rather than forming a second septum or representing a common wall, is an infolding between the walls of the caval veins and the right pulmonary veins. The sinus venosus defect is caused by the anomalous connection of one or more pulmonary veins to a systemic vein. However, the pulmonary vein(s) retain their left atrial connections, leading to a veno-venous bridge that allows interatrial shunting outside the oval fossa. True atrial septal defects are located within the oval fossa or in the anteo-inferior buttress, while sinus venosus defects, ostium defects and coronary sinus defects are morphologically distinct from them. Keywords: Heart Septal Defects, Atrial; Diagnostic Imaging; Sinoatrial Node; Vena Cava, Superior

    Image encryption techniques: A comprehensive review

    Get PDF
    This paper presents an exhaustive review of research within the field of image encryption techniques. It commences with a general introduction to image encryption, providing an overview of the fundamentals. Subsequently, it explores a comprehensive exploration of chaos-based image encryption, encompassing various methods and approaches within this domain. These methods include full encryption techniques as well as selective encryption strategies, offering insights into their principles and applications. The authors place significant emphasis on surveying prior research contributions, shedding light on noteworthy developments within the field. Additionally, the paper addresses emerging challenges and issues that have arisen as a consequence of these advancements

    Image encryption framework based on multi-chaotic maps and equal pixel values quantization

    Get PDF
    Abstract The importance of image encryption has considerably increased, especially after the dramatic evolution of the internet and network communications, due to the simplicity of capturing and transferring digital images. Although there are several encryption approaches, chaos-based image encryption is considered the most appropriate approach for image applications because of its sensitivity to initial conditions and control parameters. Confusion and diffusion methods have been used in conventional image encryption methods, but the ideal encrypted image has not yet been achieved. This research aims to generate an encrypted image free of statistical information to make cryptanalysis infeasible. Additionally, the motivation behind this work lies in addressing the shortcomings of conventional image encryption methods, which have not yet achieved the ideal encrypted image. The proposed framework aims to overcome these challenges by introducing a new method, Equal Pixel Values Quantization (EPVQ), along with enhancing the confusion and diffusion processes using chaotic maps and additive white Gaussian noise. Key security, statistical properties of encrypted images, and withstanding differential attacks are the most important issues in the field of image encryption. Therefore, a new method, Equal Pixel Values Quantization (EPVQ), was introduced in this study in addition to the proposed confusion and diffusion methods to achieve an ideal image encryption framework. Generally, the confusion method uses Sensitive Logistic Map (SLM), Henon Map, and additive white Gaussian noise to generate random numbers for use in the pixel permutation method. However, the diffusion method uses the Extended Bernoulli Map (EBM), Tinkerbell, Burgers, and Ricker maps to generate the random matrix. Internal Interaction between Image Pixels (IIIP) was used to implement the XOR (Exclusive OR) operator between the random matrix and scrambled image. Basically, the EPVQ method was used to idealize the histogram and information entropy of the ciphered image. The correlation between adjacent pixels was minimized to have a very small value (×10−3). Besides, the key space was extended to be very large (2450) considering the key sensitivity to hinder brute force attacks. Finally, a histogram was idealized to be perfectly equal in all occurrences, and the resulting information entropy was equal to the ideal value (8), which means that the resulting encrypted image is free of statistical properties in terms of the histogram and information entropy. Based on the findings, the high randomness of the generated random sequences of the proposed confusion and diffusion methods is capable of producing a robust image encryption framework against all types of cryptanalysis attacks

    Development aid and international migration to Italy: Does aid reduce irregular flows?

    Get PDF
    In recent years, donors have claimed to tackle the root causes of migration from low‐income countries using aid. While others have studied the effects of aid on regular migration, we test whether aid deters irregular migration to Italy using two innovative dependent variables: asylum applications and apprehensions at border. For asylum applications, the largest significant effect size implies we should expect one extra application for an additional 162,000inbilateralaid.Forbordercrossings,theonlysignificanteffectimpliesthemarginalcostinbilateralaidis162,000 in bilateral aid. For border crossings, the only significant effect implies the marginal cost in bilateral aid is 1.8 million per deterred migrant. The conclusion that effect sizes are small is robust to different types of aid, measures of migration and various controls. We find robust evidence that irregular migration flows are significantly affected by conflict, poverty, and the pre‐existing stocks from that country. Comparing our results to the existing aid‐migration literature, we find similar effect sizes. The cost per deterred (regular) migrant is in the range $4‐7 million. Statistically significant estimates for the effect of aid on regular migration are only found for sub‐samples or specific specifications. In short, aid does not deter regular or irregular migration, so should be used for other purposes

    Libya and Europe: imperialism, crisis and migration

    Get PDF
    This article examines the recent dynamics of European imperialism in Libya in the light of Marx’s theory of the global reserve army of labour. It analyses the limited advance of Western imperialism in Libya in the decade before the 2011 uprisings, the interactions between local, regional and international forces during and after the North Atlantic Treaty Organization (NATO) intervention, and, finally, the evolving migratory patterns from Libya. In this light, the instability along the southern and eastern Mediterranean coastline – a product of the uprisings and the forms of political reactions they unleashed – is simultaneously a security threat and a channel of migratory movements to European capitalism
    corecore