120 research outputs found
The effect of blanching and storage on the chemical composition of dates
The changes during storage of dates. (Phoenix
dactylifera L.) at room temperature and at -13° were
studied. The effect of blanching in boiling water and
by microwave heating before storage was also studied.
Moisture, pH, acidity, total soluble solids, sugar,
colour, soluble leucoanthocyanidin tannin, insoluble
leucoanthocyanidin tannin, total soluble phenolic
compounds and the activities of polyphenolase and
peroxidase enzymes were investigated.
The dates stored at room temperature showed darkening,
and decrease in the amount of insoluble leucoanthocyanidin
tannin.
The dates stored at -13° showed darkening, decrease
in the total soluble phenolic compounds, increase in the
insoluble leucoanthacyanidin tannin and increase in the total
soluble solids. [Continues.
The Sinus Venosus Veno-Venous Bridge: Not a septal defect
This review provides an update on the morphology of the sinus venosus defect. It was earlier believed that a 'common wall' separated the right pulmonary veins from the superior caval vein. In the sinus venosus defects, this wall was absent. Current evidence shows that the superior rim of the oval fossa, rather than forming a second septum or representing a common wall, is an infolding between the walls of the caval veins and the right pulmonary veins. The sinus venosus defect is caused by the anomalous connection of one or more pulmonary veins to a systemic vein. However, the pulmonary vein(s) retain their left atrial connections, leading to a veno-venous bridge that allows interatrial shunting outside the oval fossa. True atrial septal defects are located within the oval fossa or in the anteo-inferior buttress, while sinus venosus defects, ostium defects and coronary sinus defects are morphologically distinct from them.
Keywords: Heart Septal Defects, Atrial; Diagnostic Imaging; Sinoatrial Node; Vena Cava, Superior
Image encryption techniques: A comprehensive review
This paper presents an exhaustive review of research within the field of image encryption techniques. It commences with a general introduction to image encryption, providing an overview of the fundamentals. Subsequently, it explores a comprehensive exploration of chaos-based image encryption, encompassing various methods and approaches within this domain. These methods include full encryption techniques as well as selective encryption strategies, offering insights into their principles and applications. The authors place significant emphasis on surveying prior research contributions, shedding light on noteworthy developments within the field. Additionally, the paper addresses emerging challenges and issues that have arisen as a consequence of these advancements
Image encryption framework based on multi-chaotic maps and equal pixel values quantization
Abstract The importance of image encryption has considerably increased, especially after the dramatic evolution of the internet and network communications, due to the simplicity of capturing and transferring digital images. Although there are several encryption approaches, chaos-based image encryption is considered the most appropriate approach for image applications because of its sensitivity to initial conditions and control parameters. Confusion and diffusion methods have been used in conventional image encryption methods, but the ideal encrypted image has not yet been achieved. This research aims to generate an encrypted image free of statistical information to make cryptanalysis infeasible. Additionally, the motivation behind this work lies in addressing the shortcomings of conventional image encryption methods, which have not yet achieved the ideal encrypted image. The proposed framework aims to overcome these challenges by introducing a new method, Equal Pixel Values Quantization (EPVQ), along with enhancing the confusion and diffusion processes using chaotic maps and additive white Gaussian noise. Key security, statistical properties of encrypted images, and withstanding differential attacks are the most important issues in the field of image encryption. Therefore, a new method, Equal Pixel Values Quantization (EPVQ), was introduced in this study in addition to the proposed confusion and diffusion methods to achieve an ideal image encryption framework. Generally, the confusion method uses Sensitive Logistic Map (SLM), Henon Map, and additive white Gaussian noise to generate random numbers for use in the pixel permutation method. However, the diffusion method uses the Extended Bernoulli Map (EBM), Tinkerbell, Burgers, and Ricker maps to generate the random matrix. Internal Interaction between Image Pixels (IIIP) was used to implement the XOR (Exclusive OR) operator between the random matrix and scrambled image. Basically, the EPVQ method was used to idealize the histogram and information entropy of the ciphered image. The correlation between adjacent pixels was minimized to have a very small value (×10−3). Besides, the key space was extended to be very large (2450) considering the key sensitivity to hinder brute force attacks. Finally, a histogram was idealized to be perfectly equal in all occurrences, and the resulting information entropy was equal to the ideal value (8), which means that the resulting encrypted image is free of statistical properties in terms of the histogram and information entropy. Based on the findings, the high randomness of the generated random sequences of the proposed confusion and diffusion methods is capable of producing a robust image encryption framework against all types of cryptanalysis attacks
Enhancing the Efficacy of Adsorption-Based Carbon Storage Systems: A Finite Element Analysis Approach
Received: 19 January 2024. Revised: 14 March 2024. Accepted: 20 March 2024. Available online: 31 March 2024.In light of the International Energy Agency's (IEA) 2020 special report, which estimates the global capacity for carbon dioxide (CO2) storage to range between 8,000 and 55,000 gigatons, the imperative to enhance carbon storage efficiency and develop superior distribution systems has never been more critical. This investigation focuses on the optimization of adsorption-based carbon storage units through a comprehensive systems analysis, employing the finite element method within the COMSOL Multi-physics™ framework to devise a two-dimensional axisymmetric model that integrates energy, mass, and momentum conservation principles in accordance with thermodynamic constraints. The analysis entails examining the charging and discharging processes of the storage unit under a designated pressure of 9 MPa and an initial temperature of 302 K, with refrigeration provided by ice water. Findings from the simulation underscore the significance of observing pressure and temperature fluctuations during operational phases, revealing higher temperatures in the central region of the tank at the end of the charging cycle, contrasted with lower temperatures upon discharge completion. Moreover, a gradient in velocity is observed, diminishing from the entry point along the tank's axis. The study underscores the feasibility of storing significantly more CO2 than the 100 Gt projected by the IEA's "sustainable development" scenario by 2055, with land-based storage potential notably surpassing offshore capacities. The research advances by developing a predictive model for a novel CO2 adsorbent throughout the adsorption-desorption cycle, encompassing all relevant transport phenomena. This model is validated against extant data for H2 storage, facilitating predictions of pressure and temperature variations across different tank locations. This work not only contributes to the field by enhancing the understanding of thermal effects within carbon storage units but also emphasizes the role of advanced modeling techniques in bolstering environmental protection efforts through improved liquid carbon storage solutions
Development aid and international migration to Italy: Does aid reduce irregular flows?
In recent years, donors have claimed to tackle the root causes of migration from low‐income countries using aid. While others have studied the effects of aid on regular migration, we test whether aid deters irregular migration to Italy using two innovative dependent variables: asylum applications and apprehensions at border. For asylum applications, the largest significant effect size implies we should expect one extra application for an additional 1.8 million per deterred migrant. The conclusion that effect sizes are small is robust to different types of aid, measures of migration and various controls. We find robust evidence that irregular migration flows are significantly affected by conflict, poverty, and the pre‐existing stocks from that country. Comparing our results to the existing aid‐migration literature, we find similar effect sizes. The cost per deterred (regular) migrant is in the range $4‐7 million. Statistically significant estimates for the effect of aid on regular migration are only found for sub‐samples or specific specifications. In short, aid does not deter regular or irregular migration, so should be used for other purposes
Libya and Europe: imperialism, crisis and migration
This article examines the recent dynamics of European imperialism in Libya in the light of Marx’s theory of the global reserve army of labour. It analyses the limited advance of Western imperialism in Libya in the decade before the 2011 uprisings, the interactions between local, regional and international forces during and after the North Atlantic Treaty Organization (NATO) intervention, and, finally, the evolving migratory patterns from Libya. In this light, the instability along the southern and eastern Mediterranean coastline – a product of the uprisings and the forms of political reactions they unleashed – is simultaneously a security threat and a channel of migratory movements to European capitalism
- …