Processing Technology for Extraction of Scandium(III) from Secondary Sources – A Comprehensive Approach

2019 ◽  
pp. 85-113
Author(s):  
Pankaj Kumar Parhi ◽  
Saroj Sekhar Behera ◽  
Debadutta Das ◽  
Pramila Kumari Misra
Author(s):  
K. Sampath ◽  
E.J. Onesto

Abstract A comprehensive approach is presented for facilitating the implementation of advanced plasma spray processing technology in the manufacture, repair, and refurbishment of industrial components. This approach employs an integrated methodology for combining several advanced computer-based methods, including: 1) an interactive multimedia-based education and training tool to effectively store and retrieve plasma spray processing information in a variety of formats; 2) an expert system to select plasma spray feedstock material for a specific coating function; 3) a one-dimensional plasma spray process model that allows simulation of plasma spray processing conditions for identifying operational envelopes for a selected feedstock material; 4) an interface fracture model for identifying appropriate acceptance criteria for reduced cracking along the coating/substrate interface; and 5) a set of computer-based nondestructive test methods for performing quality assurance and control. This comprehensive approach and the integrated methodology provide an advanced engineering tool for the selection, optimization and implementation of specific advances in plasma spray processing technologies. A major outcome is the reduced need for expensive and time-consuming trial-and-error methods in evaluating the application of plasma spray coatings for the manufacture, repair, and refurbishment of specific industrial components. This comprehensive approach and integrated methodology can be extended to include other thermal spray processing technologies as well.


2021 ◽  
Vol 1 (2) ◽  
pp. 85-94
Author(s):  
Maisudan Mukhtar Bello

This paper is geared toward analyzing the patterns and dynamics of the Boko Haram attacks and the challenges they caused to the country's security. The report uses the assumptions of the instrumental approach, which states that the purpose of terrorism is to bring about insecurity in an actor's environment. The pattern of terrorism follows an action-reaction process. Thereby it responds to what Government does. It also utilizes the data collected from secondary sources and qualitatively analyses it. The paper discovered that Boko Haram, a proscribed international terrorist organization, is continuously posing serious security challenges to Nigeria that have resulted in the loss of over 30.000 lives and the destruction of public and private properties worth billions of US dollars. The group has committed itself to asymmetric warfare. Since its re-emergence, it had tried to mimic and adopt the tactics and strategies of global Salafist movements, which manifested in armed assaults, bombings, and abductions. The paper recommended that a comprehensive approach be adopted that would take care of both kinetic and non-kinetic measures to end the menace of terrorism in Nigeria. Training and retraining of security personnel on asymmetric warfare are required to balance the increasing adaptability of the terrorists.


Author(s):  
Klaus-Ruediger Peters

Differential hysteresis processing is a new image processing technology that provides a tool for the display of image data information at any level of differential contrast resolution. This includes the maximum contrast resolution of the acquisition system which may be 1,000-times higher than that of the visual system (16 bit versus 6 bit). All microscopes acquire high precision contrasts at a level of <0.01-25% of the acquisition range in 16-bit - 8-bit data, but these contrasts are mostly invisible or only partially visible even in conventionally enhanced images. The processing principle of the differential hysteresis tool is based on hysteresis properties of intensity variations within an image.Differential hysteresis image processing moves a cursor of selected intensity range (hysteresis range) along lines through the image data reading each successive pixel intensity. The midpoint of the cursor provides the output data. If the intensity value of the following pixel falls outside of the actual cursor endpoint values, then the cursor follows the data either with its top or with its bottom, but if the pixels' intensity value falls within the cursor range, then the cursor maintains its intensity value.


PsycCRITIQUES ◽  
2007 ◽  
Vol 52 (1) ◽  
Author(s):  
Juanita N. Baker

Sign in / Sign up

Export Citation Format

Share Document