19 research outputs found
Silver Nanoparticles’ Biosynthesis and Characterization with the Extract of Jatropha curcas Leaf: Analysis of Corrosion Inhibition Activity
The plant-mediated nanoparticles synthesis process is gaining popularity because of its effective cost, eco-friendliness, and nontoxic nature. The current study presents the silver nanoparticles (AgNPs) which synthesized with AgNO3 as precursor salt and Jatropha curcas leaf extract. J. curcas leaf extract has phytochemicals that could reduce the precursor metal salt to nanoparticles and act as a capping agent surround the nanoparticles to enhance its stability. Phytochemical screening on J. curcas leaf extract showed that alkaloids, saponins, tannins, flavanoids, steroids, philobatannins, phenols, and cardiac glycosides are contained in the sample. The biosynthesized nanoparticles were investigated by UV-visible (UV-vis) spectroscopy, X-ray diffraction (XRD), and Fourier transform infrared spectroscopy (FTIR). UV-vis spectroscopy confirmed the fabrication of AgNPs at 250–400 nm. The solutions’ change of color from pale yellow to reddish brown indicated that AgNPs is formed. XRD analysis revealed that the synthesized AgNPs average crystal size was 36.4 nm. FTIR analysis indicated that the organic residues covered the nanoparticles. The inhibitory properties of the solution of the synthesized nanoparticles and the bulk extract were evaluated using medium carbon steel. The solution of the synthesized nanoparticles (10 ml) showed better corrosion inhibition efficiency of 87.10 % compared with the bulk extract
BIO-SYNTHESIS OF COPPER NANOPARTICLES FROM INDIGOFERA TINCTORIA LEAF
Leaf extracts are known to be rich in phytoconstituent biomolecules, making them a valuable source of medicinal compounds. They also serve as both capping and reducing agents in nanoparticle fabrication. A reaction between CuSO4.5H2O aqueous solution and the Indigofera tinctoria leaf extract results in the formation of stable copper nanoparticles. Phytochemical screening of the Indigofera tinctoria leaf extract revealed the presence of various compounds including carbohydrates, terpenoids, phenol, tannins, flavonoids, saponins, and glycosides in the sample. The biosynthesized copper nanoparticles (CuNPs) were subsequently subjected to various forms of analysis. Techniques used included UV–visible (UV–vis) spectroscopy, Fourier transform infrared spectroscopy (FTIR), and scanning electron microscopy. An observable change in the color of solutions from pale to thick brown indicated the formation of CuNPs. Further confirmation came from UV–vis spectroscopy, which established the production of CuNPs at 500 nm. FTIR analysis revealed that the CuNPs were covered by organic residues. The particles ranged from 210 nm to 260 nm as indicated from the SEM analysis
The role of cybersecurity in facilitating sustainable healthcare solutions: Overcoming challenges to protect sensitive data
This study systematically reviews the intersection of cybersecurity and healthcare, aiming to identify the evolving threats, technological advancements, and the efficacy of current cybersecurity measures. Employing a systematic literature review and content analysis methodology, the research scrutinizes peer-reviewed articles, conference proceedings, and white papers from 2014 to 2023, focusing on the integration of advanced cybersecurity technologies, the impact of standards and regulations, and stakeholder implications in healthcare cybersecurity. Key findings reveal a dynamic cybersecurity landscape characterized by sophisticated threats and the critical role of emerging technologies such as artificial intelligence, blockchain, and machine learning in enhancing security measures. The study underscores the importance of standards and regulations in establishing a unified cybersecurity framework and highlights the multifaceted implications for stakeholders, including healthcare providers, patients, policymakers, and technology developers. The research concludes that while significant advancements have been made in healthcare cybersecurity, challenges remain in integrating emerging technologies, educating healthcare staff, and fostering collaboration among stakeholders. Strategic recommendations for healthcare leaders and policymakers include prioritizing cybersecurity as a core component of healthcare delivery, investing in cybersecurity education, and advocating for robust standards and regulations. This study contributes to the understanding of cybersecurity in healthcare, providing a foundation for future research and strategic planning to safeguard sensitive health information and ensure the resilience of healthcare services against cyber threats.
Keywords: Healthcare Cybersecurity, Emerging Technologies, Standards and Regulations, Stakeholder Implications
Data privacy and security challenges in environmental research: Approaches to safeguarding sensitive information
This study provides a comprehensive examination of data privacy and security within the realm of environmental research, highlighting the evolving challenges and innovative solutions in safeguarding sensitive environmental data. Employing a systematic literature review and content analysis, this research scrutinizes peer-reviewed articles, legal documents, and policy papers published from 2014 to 2024. The study's objectives were to explore fundamental principles, assess key developments and cutting-edge solutions, and understand the impact of international standards and regulatory bodies on data protection in environmental studies. Key findings reveal a growing emphasis on robust data governance frameworks, driven by advancements in digital technologies and the global diffusion of regulations such as the GDPR. Innovations in encryption and anonymization techniques have emerged as critical tools in enhancing data security. However, the study identifies a pressing need for interdisciplinary collaboration and stakeholder engagement to navigate the complex landscape of data privacy and security effectively. The study concludes that the future of environmental research is intricately linked to the strategic integration of data privacy and security measures. It recommends a proactive approach to data protection, emphasizing the importance of compliance with international regulations, the adoption of privacy-by-design principles, and the development of education and training programs. Future research should focus on advancing data security technologies and exploring the socio-ethical implications of data use in environmental studies, ensuring the ethical stewardship of sensitive information.
Keywords: Data Privacy, Environmental Research, Data Security Solutions, International Regulations
Addressing cybersecurity challenges in smart grid technologies: Implications for sustainable energy infrastructure
This study systematically reviews the cybersecurity challenges in smart grid technologies and their implications for sustainable energy infrastructure. The primary objective is to analyze the vulnerabilities inherent in smart grids, evaluate existing cybersecurity measures, and propose strategic recommendations for enhancing security. Employing a systematic literature review and content analysis, this research scrutinizes peer-reviewed articles, technical reports, and standards documents published between 2014 and 2024. The methodology focuses on identifying cybersecurity threats, vulnerabilities, and mitigation strategies within smart grids, alongside exploring the role of standards, regulatory frameworks, and stakeholder responsibilities in enhancing grid security. Key findings reveal that while smart grids offer enhanced efficiency and reliability, they also introduce significant cybersecurity vulnerabilities due to the integration of ICT. Advanced cybersecurity measures, including encryption and real-time intrusion detection, are critical in safeguarding these infrastructures. The study underscores the importance of collaborative efforts among stakeholders and the development of comprehensive cybersecurity standards tailored to smart grid technologies. Finally, the future of smart grid cybersecurity presents both challenges and opportunities, with the potential for leveraging emerging technologies like blockchain and AI to enhance security measures. The study proposes several policy recommendations, including the enforcement of cybersecurity standards and the promotion of threat intelligence sharing. Conclusively, the research highlights the need for innovative security solutions and interdisciplinary research to bridge technical and policy-making domains, ensuring the secure and sustainable development of smart grid technologies.
Keywords: Smart Grid Cybersecurity, Cybersecurity Vulnerabilities, Cybersecurity Measures, Sustainable Energy Infrastructure
GEOPHYSICAL INVESTIGATION FOR POST-FOUNDATION ASSESSMENT WITHIN EKITI STATE UNIVERSITY, ADO EKITI, SOUTHWESTERN NIGERIA
This study has evaluated the post-construction subsoil integrity of a distressed building in Ado-Ekiti, Southwestern Nigeria, to decipher the in-situ lithology and structural disposition. Four traverses of 100 m length were established in approximately E-W direction with an inter-station spacing of 10 m. Two Geophysical methods were deployed including the ground magnetic method using Proton Precession Magnetometer and Electrical Resistivity method utilizing 2D Electrical Imaging and Vertical Electrical Sounding (VES) techniques. Twelve (20) VES station points were acquired within the investigated area using Schlumberger configuration which gave relevant information on layer stratification and geoelectric parameters. The obtained results from the VES showed four geo-electric layers comprises topsoil, clayey layer, weathered layer, fractured bedrock, and fresh basement. Low apparent resistivity was delineated from the 2D imaging exhibiting unfit materials at distance between 50 to 75 m and 80 to 100m. The magnetic results showed a series of bedrock ridges and depressions. The integration of results revealed that the majority of the study areas are unsuitable except for central parts which indicate appreciable competence and stability.</jats:p
Cybersecurity considerations in the implementation of innovative waste management technologies: "A critical review"
This study systematically reviews the intersection of cybersecurity and waste management technologies, aiming to identify current practices, challenges, and future directions for enhancing cybersecurity within this essential sector. Employing a systematic literature review methodology, the research analyzed peer-reviewed articles, conference proceedings, and industry reports published between 2014 to 2024. The methodology involved a structured search strategy, rigorous inclusion and exclusion criteria, and thematic synthesis of findings. Key insights reveal the growing importance of cybersecurity in waste management, driven by the sector's increasing reliance on digital technologies. Significant challenges identified include data breaches, system vulnerabilities, and the absence of standardized cybersecurity practices. The future of cybersecure waste management is characterized by both challenges, such as the rapid pace of technological advancements and opportunities for innovation, including the development of advanced cybersecurity frameworks and the integration of AI for threat detection. Strategic recommendations for industry leaders and policymakers include developing standardized cybersecurity frameworks, investing in advanced technologies, fostering collaboration, enhancing training and awareness, and strengthening regulatory compliance. The study underscores the necessity of robust cybersecurity measures to protect sensitive data, ensure operational continuity, and support environmental sustainability in waste management. This research contributes valuable insights into the critical role of cybersecurity in waste management, offering a foundation for future research and practice enhancements in creating secure, sustainable, and efficient waste management systems.
Keywords: Cybersecurity, Waste Management, Digital Technologies, Systematic Literature Review
Addressing Cybersecurity Challenges in Sustainable Supply Chain Management: A Review of Current Practices and Future Directions
This study investigates the integration of cybersecurity practices within sustainable supply chain management, addressing the dual challenges of securing supply chains against cyber threats while advancing sustainability objectives. The research employs a systematic literature review methodology, sourcing data from peer-reviewed articles published between 2018 and 2023, across databases such as IEEE Xplore, ScienceDirect, and Wiley Online Library. The selection process involved a rigorous screening of titles, abstracts, and full texts based on predefined inclusion and exclusion criteria, focusing on works that explicitly discuss the intersection of cybersecurity and sustainability within supply chains. Key findings reveal that cybersecurity and sustainability, while traditionally viewed in isolation, are increasingly recognized as complementary facets of supply chain management. The study highlights the critical role of emerging technologies, such as blockchain, artificial intelligence, and the Internet of Things, in enhancing supply chain resilience and sustainability. Furthermore, stakeholder engagement is identified as crucial in developing effective cybersecurity strategies that align with sustainability goals. The future landscape of cybersecure sustainable supply chains is characterized by both challenges and opportunities, necessitating continuous innovation and collaboration across industries and with governmental bodies. Strategic recommendations for industry leaders and policymakers emphasize the importance of fostering a culture that values cybersecurity and sustainability, investing in technology sharing, and developing comprehensive regulatory frameworks. In conclusion, this study underscores the necessity of integrating cybersecurity practices within sustainable supply chain management, offering insights into navigating the complexities of this integration to achieve resilient, transparent, and responsible supply networks.
Keywords: Cybersecurity, Supply Chains, Supply Chain Management, Sustainability
Experimental investigation on the mechanical performance of the Al<sub>2</sub>O<sub>3</sub> and ZrO<sub>2</sub> added Al-Mg-Si alloy for structural applications
The present-day structural application requires advanced materials at extreme conditions, and the development of it is not economically feasible. As a result, existing material in the composite form has more visibility to suit the purpose. The material's strengths and qualities must be examined before it can be recommended for use in harsh conditions. In the present study, Al2O3 (3, 6, 9, 12, and 15 wt.%) and ZrO2 particles (2 wt.%) are reinforced with Al-Mg-Si alloy (Al 6061), which possess good isotropic behaviour and better interface bonding. The double stir casting process was adopted for the hybrid composite development, and the samples were cold rolled to reduce grain size and pores in the composites. The developed composites were subjected to mechanical characterisation tests such as hardness, tensile, compression, impact and flexural tests. An increase in reinforcement percentage enhances the mechanical properties. The improvement was attributed to the high thermal mismatch and reduction in the inter-particle distance by cold rolling and the reinforcements. Scanning electron microscope microstructural examination was conducted, and even dispersion of 3 to 15 wt.% Al2O3 reinforcements was observed. Tensile elongation decreases with an increase in reinforcement percentage. High elastic modulus and temperature mismatch between matrix and reinforcements increase the strength of the composites. The fracture behaviour of the composites generally showed dimples which are characteristics of ductile fracture, except at 15 wt.% Al2O3 / 2 wt.% ZrO2 showed a large portion of cleavage planes and grain cracking. The Al-Mg-Si alloy is reinforced with 9 wt%. Al2O3 / 2 wt.% ZrO2 had the best properties suitable for its use in different structural applications. </jats:p
