845 research outputs found

    Decolourization of Acid Orange 7 Dye from Aqueous Solution by Adsorption on NaOH Treated Eggshells in Continuous Fixed Bed Reactor Application using Response Surface Methodology: Optimization by Box–Behnken Design.

    Get PDF
    NaOH Treated Eggshells   (TES) was investigated for the removal of Acide Orange 7 (AO7) from aqueous solution using the continuous method was modeled by response surface methodology (RSM) and was optimized using Box–Behnken design (BBD) . Fixed bed adsorption has become a frequently used in wastewater treatment processes. Various low cost adsorbents have been studied for their applicability in treatment of different types of effluents.  In this work, the intention of the study was to explore the efficacy and feasibility for azo dye, AO7 adsorption onto fixed bed column of TES. The effect of operating parameters such as flow rate, initial dye concentration, and bed height were exploited in this study. The studies confirmed that the breakthrough curves were dependent on flow rate, initial dye concentration solution of AO7 and bed depth.The precision of the equation obtained by Box–Behnken design (BBD) utility for modeling and optimization by response surface methodology RSM was confirmed by the analysis of variance (ANOVA) and calculation of correlation coefficient relating the predicted and the experimental values of removal of dye. The results revealed a good agreement between the predicted values, as obtained by the model, and the experimental values for AO7. The optimum conditions proposed by Box–Behnken design (BBD) to reach the maximum dye removal through adsorption process. Under the optimum conditions, the removal efficiency of AO7 were 89.89%.The application of response surface methodology in order to optimize using Box–Behnken design (BBD) . The research on modeling adsorption by RSM has been highly developed and The TES was shown to be suitable adsorbent for adsorption of AO7 using fixed-bed adsorption column

    FETI DDM methodologies for the simulation of high gain Ka-band Transmit arrays (single and dual band)

    Get PDF
    This paper is presenting Finite Element Tearing and Interconnecting (FETI) simulation results of large scale single and dual Ka-band lens transmit-arrays obtained on massively parallel clusters. The computation times observed with the FETI method allow us to consider using it in the optimization phase of such transmit-arrays.info:eu-repo/semantics/publishedVersio

    Differential expression of molecular rust resistance components have distinctive profiles in Coffea arabica - Hemileia vastatrix interactions.

    Get PDF
    Countering the economic hurdle caused by coffee leaf rust disease is most appealing at this time as it has posed a major threat to coffee production around the world. Establishing differential expression profiles at different times following pathogen invasion in both innate and acquired immunities unlocks the molecular components of resistance and susceptibility. Suppression subtractive hybridization (SSH) was used to identify genes differentially over-expressed and repressed during incompatible and compatible interactions between Coffea arabica and Hemileia vastatrix. From 433 clones of expressed sequence tags (ESTs) sequenced, 352 were annotated and categorized of which the proportion of genes expressed during compatible interaction were relatively smaller. The result showed upregulation and downregulation of various genes at 12 and 24 h after pathogen inoculation in both interactions. The use of four different databases in searching for gene homology resulted in different number of similar sequences. BLASTx against EMBL-EBI (European Molecular Biology Laboratory-European Bioinformatics Institute) database being with the maximum (100%) hits for all the annotated sequences. RT-qPCR analysis of seven resistance-signaling genes showed similar expression patterns for most of the genes in both interactions, indicating these genes are involved in basal (nonspecific) defense during which immune reactions are similar. Using SSH, we identified different types of resistance related genes that could be used for further studies towards resistant cultivar development. The potential role of some of the resistance related proteins found were also discussed

    Trustworthy Federated Learning: A Survey

    Full text link
    Federated Learning (FL) has emerged as a significant advancement in the field of Artificial Intelligence (AI), enabling collaborative model training across distributed devices while maintaining data privacy. As the importance of FL increases, addressing trustworthiness issues in its various aspects becomes crucial. In this survey, we provide an extensive overview of the current state of Trustworthy FL, exploring existing solutions and well-defined pillars relevant to Trustworthy . Despite the growth in literature on trustworthy centralized Machine Learning (ML)/Deep Learning (DL), further efforts are necessary to identify trustworthiness pillars and evaluation metrics specific to FL models, as well as to develop solutions for computing trustworthiness levels. We propose a taxonomy that encompasses three main pillars: Interpretability, Fairness, and Security & Privacy. Each pillar represents a dimension of trust, further broken down into different notions. Our survey covers trustworthiness challenges at every level in FL settings. We present a comprehensive architecture of Trustworthy FL, addressing the fundamental principles underlying the concept, and offer an in-depth analysis of trust assessment mechanisms. In conclusion, we identify key research challenges related to every aspect of Trustworthy FL and suggest future research directions. This comprehensive survey serves as a valuable resource for researchers and practitioners working on the development and implementation of Trustworthy FL systems, contributing to a more secure and reliable AI landscape.Comment: 45 Pages, 8 Figures, 9 Table

    An example of secondary fault activity along the North Anatolian Fault on the NE Marmara Sea Shelf, NW Turkey

    Full text link
    Seismic data on the NE Marmara Sea Shelf indicate that a NNE-SSW-oriented buried basin and ridge system exist on the sub-marine extension of the Paleozoic Rocks delimited by the northern segment of the North Anatolian Fault (NS-NAF), while seismic and multi-beam bathymetric data imply that four NW-SE-oriented strike-slip faults also exist on the shelf area. Seismic data indicate that NW-SE-oriented strike-slip faults are the youngest structures that dissect the basin-ridge system. One of the NW-SE-oriented faults (F1) is aligned with a rupture of the North Anatolian Fault (NAF) cutting the northern slope of the Cinarcik Basin. This observation indicates that these faults have similar characteristics with the NS-NAF along the Marmara Sea. Therefore, they may have a secondary relation to the NAF since the principle deformation zone of the NAF follows the Marmara Trough in that region. The seismic energy recorded on these secondary faults is much less than that on the NAF in the Marmara Sea. These faults may, however, produce a large earthquake in the long term

    Efeitos da quitosana no desenvolvimento in vitro de videiras cv. merlot e no crescimento micelial do fungo elsinoe ampelina.

    Get PDF
    Objetivou-se, neste trabalho, avaliar o efeito da quitosana no desenvolvimento in vitro de plântulas de videira cv. Merlot e sua atividade antifúngica sobre Elsinoe ampelina. No primeiro experimento, explantes da cultivar Merlot foram transferidos para meio de cultura DSD1, acrescido das concentrações 0; 25; 50,100; 150 e 200 mg L-1 de quitosana. Após 90 dias de cultivo in vitro, as plântulas foram avaliadas quanto ao número de raízes e de folhas, porcentagem de enraizamento e brotação, comprimento de raízes e de parte aérea, massa fresca da planta. No segundo experimento, incorporou-se às concentrações 0, 60, 120, 180, 240 e 300 mg L-1 de quitosana ao meio BDA, onde inoculou-se o fungo. Posteriormente, avaliou-se o crescimento micelial aos 6 e 9 dias de incubação a 25º C no escuro. No primeiro experimento para as variáveis comprimento médio da parte aérea, massa fresca da planta inteira, porcentagem de enraizamento e porcentagem de estacas brotadas houve decréscimo linear em função das concentrações de quitosana. No segundo experimento, houve efeito linear negativo em função das concentrações crescentes de quitosana, sendo que a inibição do crescimento micelial foi de 81,7%, demonstrando o grande potencial do uso de quitosana no controle da antracnose da videira

    3-D sediment-basement tomography of the Northern Marmara trough by a dense OBS network at the nodes of a grid of controlled source profiles along the North Anatolian fault

    Get PDF
    A 3-D tomographic inversion of first arrival times of shot profiles recorded by a dense 2-D OBS network provides an unprecedented constraint on the P-wave velocities heterogeneity of the upper-crustal part of the North Marmara Trough (NMT), over a region of 180 km long by 50 km wide. One of the specific aims of this controlled source tomography is to provide a 3-D initial model for the local earthquake tomography (LET). Hence, in an original way, the controlled source inversion has been performed by using a code dedicated to LET. After several tests to check the results trade-off with the inversion parameters, we build up a 3-D a priori velocity model, in which the sea-bottom topography, the acoustic and the crystalline basements and the Moho interfaces have been considered. The reliability of the obtained features has been checked by checkerboard tests and also by their comparison with the deep-penetration multichannel seismic profiles, and with the wide-angle reflection and refraction modelled profiles. This study provides the first 3-D view of the basement topography along the active North Anatolian fault beneath the Marmara Sea, even beneath the deepest part of three sedimentary basins of NMT. Clear basement depressions reaching down 6 km depth below the sea level (bsl) have been found beneath these basins. The North Imralı Basin located on the southern continental shelf is observed with a similar sedimentary thickness as its northern neighbours. Between Central and Çınarcık basins, the Central High rises up to 3 km depth below (bsl). Its crest position is offset by 10 km northwestward relatively to the bathymetric crest. On the contrary, Tekirdağ and Central basins appear linked, forming a 60-km-long basement depression. Beneath the bathymetric relief of Western High low velocities are observed down to 6 km depth (bsl) and no basement high have been found. The obtained 3-D Vp heterogeneity model allows the consideration of the 3-D supracrustal heterogeneity into the future earthquake relocations in this region. The topographic map of the pre-kinematic basement offers the possibility to take into account the locking depth variations in future geohazard estimations by geomechanical modelling in this region

    On the Security of Delegation in Access Control Systems

    Full text link
    Abstract. Delegation is a mechanism that allows a user A to act on another user B’s behalf by making B’s access rights available to A. It is well recognized as an important mechanism to provide resiliency and flexibility in access control systems, and has gained popularity in the research community. However, most existing literature focuses on modeling and managing delegations. Little work has been done on understanding the impact of delegation on the security of existing access control systems. In particular, no formal notion of security with respect to delegation has been proposed. Many existing access control systems are designed without having delegation in mind. Simply incorporating a delegation module into those systems may cause security breaches. This paper focuses on the security aspect of delegation in access control systems. We first give examples on how colluding users may abuse the delegation sup-port of access control systems to circumvent security policies, such as separation of duty. As a major contribution, we propose a formal notion of security with respect to delegation in access control systems. After that, we discuss potential mechanisms to enforce security. In particular, we design a novel source-based en-forcement mechanism for workflow authorization systems so as to achieve both security and efficiency.
    corecore