The aim of this study is to shed light on the importance of biofuels as an alternative to conventional energy, in addition to the importance of preserving agricultural crops, which are the main source of this fuel, to maintain food security, especially in developing countries. The increase in global oil prices, in addition to the fear of global warming, are among the main factors that draw the world’s attention to searching for alternative sources of traditional energy, which are sustainable on the one hand, and on the other hand reduce carbon emissions. Therefore, the volume of global investment in renewable energy in general, and in liquid biofuels and biomass in particular, has increased. Global fears emerged that the excessive conversion of large farms suitable for growing food to energy production would threaten global food security. In the first ten years of the new millennium, biofuel production increased fivefold, and the largest increase in biofuel production was recorded in 2007-2008, coinciding with a sharp rise in food prices. Compared to the average food prices in the period 2002-2004, the average global prices of cereals, oils and fats traded were 2 to 2.5 times higher in 2008, this continuous increase in the use of food crops to produce biofuels has reflected on global food security. Accordingly, this review article will address previous studies on biofuel production; identify the theoretical framework for the concept of biofuels and its characteristics, and the relationship between biofuels and food security. In this study, we presented biofuels, which are considered one of the important categories in the field of renewable energy and its environmental and economic effects, as well as the experiences of some countries in its production, and the possibility of benefiting from the natural resources available for its production. We will discuss the scientific (chemical) principles of biofuel production.
The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreIn the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur
... Show MoreIn this review, previous studies on the synthesis and characterization of the metal Complexes with paracetamol by elemental analysis, thermal analysis, (IR, NMR and UV-Vis (spectroscopy and conductivity. In reviewing these studies, the authors found that paracetamol can be coordinated through the pair of electrons on the hydroxyl O-atom, carbonyl O-atom, and N-atom of the amide group. If the paracetamol was a monodentate ligand, it will be coordinated by one of the following atoms O-hydroxyl, O-carbonyl or N-amide. But if the paracetamol was bidentate, it is coordinated by atoms (O-carbonyl and N-amide), (O-hydroxyl and N-amide) or (O-carbonyl and O-hydroxyl). The authors also found that free paracetamol and its complexes have antimicrobial
... Show MoreAASAH Enass J Waheed, Shatha MH Obaid, Research Journal of Pharmaceutical, Biological and Chemical Sciences, 2019 - Cited by 5
Enamel White Spot Lesions (EWSLs) are a common dental condition characterized by being opaque or chalky white in appearance. In this review, an overview of the etiology, prevention, and treatment techniques for EWSLs is presented. Enamel demineralization caused by bacteria in dental plaque which releases acids upon the consumption of fermentable carbohydrates causing mineral loss is thought to be the main cause of those lesions, which could be predisposed through orthodontic treatment, poor diet, inadequate oral hygiene and certain medical conditions. So, sustaining an adequate carbohydrate consumption, proper fluoride exposure and good oral hygiene are some of the practices which aid in these lesions’ prevention. Although the suc
... Show MoreDue to the importance of nanotechnology because of its features and applications in various fields, it has become the focus of attention of the world and researchers. In this study, the concept of nanotechnology and nanomaterials was identified, the most important methods of preparing them, as well as the preparation techniques and the most important devices used in their characterization.