Search results for: Message Authentication Code (MAC)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1882

Search results for: Message Authentication Code (MAC)

1162 Assessing the Impact of Construction Projects on Disabled Accessibility and Inclusion

Authors: Yasser Aboel-Magd

Abstract:

This research addresses the critical issue of accessibility for individuals with special needs and the broader implications of disability on one's ability to lead an independent and integrated life within society. It highlights the consequences of injury, illness, or disability not only on the physical level but also on psychological, social, educational, economic, and functional aspects of life. The study emphasizes the importance of inclusive design in urban spaces, reflecting on how a society's treatment of individuals with disabilities serves as a measure of its progress. The research delves into the challenges faced by people with special needs in the Kingdom, where, despite advancements in various sectors, there is a noticeable lack of accommodating public opportunities for this significant demographic. It argues for the necessity of a Saudi building code that considers the needs of a diverse population during the design phase. The paper discusses the role of urban space as a fundamental element in urban formation and its impact on the societal integration of individuals with special needs. The study explores a variety of inclusive design principles, ranging from physical features like ramps and tactile paving to digital and cognitive accessibility measures such as screen readers, closed captions, plain language, and visual aids. It also considers the impact of wayfinding and appropriate lighting design on the orientation and assistance of individuals within urban spaces at the lowest cost. The researchers connect inclusive design with sustainable practices, advocating for environments that are not only environmentally friendly but also adaptable and lasting. The paper concludes with the assertion that the integration of accessibility, universal design, and sustainability signifies a society's commitment to inclusivity and the empowerment of all individuals, paving the way for a future where everyone can participate fully and independently in society.

Keywords: accessibility, inclusive design, Saudi building code, disability inclusion, socioeconomic progress

Procedia PDF Downloads 76
1161 Iran’s Dual Geopolitical Approach towards African States

Authors: Dragos Ardeleanu, Silviu-Valentin Petre

Abstract:

Written to satisfy the needs of Western powers, classical geopolitics bore the stint of Eurocentrism. Both Mackinder’s heartland and Nicholas Spykman’s rimland were intellectual creations set for the purpose of the Anglophone nations dealing with Eurasia. However, while today’s world is moving towards multipolarity, other emerging regional actors are following their own interests using a different geospatial map. Such is the case of Iran which has developed an engagement pattern in Africa, directed mostly towards costal states, in order to break the rimland grip of Arab states and also the international pressure established against Tehran’s nascent nuclear program. Capitalizing on literature review and analysing statements from key public figures, our paper argues that Iranian African geopolitics displays a dual message: on the one hand, it uses tiers-mondiste rhetoric to garner the support of different coastal African states and, on the other hand, it employs Shiism to gain a foothold in strategic parts of the black continent.

Keywords: African geopolitics, Iran, Shiism, tiers-mondisme

Procedia PDF Downloads 205
1160 Two Dimensional Numerical Analysis for the Seismic Response of the Geosynthetic-Reinforced Soil Integral Abutments

Authors: Dawei Shen, Ming Xu, Pengfei Liu

Abstract:

The joints between simply supported bridge decks and abutments need to be regularly repaired, which would greatly increase the cost during the service life of the bridge. Simply supported girder bridges suffered the most severe damage during earthquakes. Another type of bridge, the integral bridge, of which the superstructure and abutment are rigidly connected, was also used in some European countries. Because no bearings or joints exit in the integral bridge, this type of bridge could significantly reduce maintenance requirements and costs. However, conventional integral bridge usually result in high earth pressure on the abutment and surface settlement in the backfill. To solve these problems, a new type of integral bridge, geosynthetic-reinforced soil (GRS) integral bridge, was come up in recent years. This newly invented bridge has not been used in engineering practices. There was a lack of research on the seismic behavior of the conventional and new type of integral abutments. In addition, no common design code could be found for the calculation of seismic pressure of soil behind the abutment. This paper developed a dynamic constitutive model, which can consider the soil behaviors under cyclic loading. Numerical analyses of the seismic response of a full height integral bridge and GRS integral bridge were carried out using the two-dimensional numerical code, FLAC. A parametric study was also performed to investigate the soil-structure interaction. The results are presented below. The seismic responses of GRS integral bridge together with conventional simply supported bridge, GRS conventional bridge and conventional integral bridge were investigated. The results show that the GRS integral bridge holds the highest seismic stability, followed by conventional integral bridge, GRS simply supported bridge and conventional simply supported bridge. Compared with the integral bridge with 1 m thick abutments, the GRS integral bridge with 0.4 m thick abutments is subjected to a smaller bending moment, and the natural frequency and horizontal displacement remains almost the same. Geosynthetic-reinforcement will be more effective when the abutment becomes thinner or the abutment is higher.

Keywords: geosynthetic-reinforced soil integral bridge, nonlinear hysteretic model, numerical analysis, seismic response

Procedia PDF Downloads 459
1159 A Mimetic Textuality in Robert Frost's 'Nothing Gold Can Stay'

Authors: Kurt S. Candilas

Abstract:

This study is a critical analysis of the work of Robert Frost, 'Nothing Gold Can Stay'. It subjects the literary piece into a qualitative analysis using the critical theory of mimesis. In effect, this study is proposed to find out and shed light on the mimetic feature of the poem’s textuality. Generally, it aims to analyze the poem’s deeper meaning in the context of the reality of life from birth to death. For the most part, this critical analysis discerns, investigates, and highlights the features which present the imitation of life in detail and from a deeper view. Based on the result of analysis, it shows that Frost has portrayed the cycle of life from birth to midst life as about proving oneself to others as far as achievements and accomplishments are concerned; secondly, at some point of one’s life, successes and achievements are just one’s perfect signature of living. As Frost discloses his poem, his message of the reality of life from birth to death is clear enough, that nothing is going to last forever.

Keywords: Nothing Gold Can Stay, mimesis, birth, death

Procedia PDF Downloads 461
1158 Recognition and Enforcement of Foreign Decree Divorces in India with Special Reference to the Hindu Marriage Act, 1955

Authors: Poonamdeep kaur

Abstract:

With the increase in number of Non-Resident Indian marriages there is also increase in foreign decree divorces which inevitably causes the problem of recognition and enforcement of foreign judgments in India. The Hindus in India are governed by the Hindu Marriage Act, 1956. According to the said Act the courts in India have jurisdiction to try the matrimonial dispute if the marriage is performed in India or the parties to the marriage have domicile in India irrespective of their nationality status. But, sometimes one of the parties to the marriage whose marriage is solemnized in India obtains divorce in foreign courts and prays for the recognition and enforcement of such divorce in India. In such case section 13 of the Indian Civil Procedure Code, 1908, comes into play for the recognition and enforcement of foreign divorces in India. The section makes a foreign judgment conclusive in India subject to the fulfilment of certain conditions. Even if a foreign decree divorce is given on personal connecting factors of the parties to the matrimonial dispute like domicile, such divorce may still be refused recognition in India by virtue of section 13 of the Indian Civil Procedure Code, 1908. It is a universal truth that municipal law of countries is not the same throughout the world. Comity plays an important role in recognition and enforcing a foreign judgment, but, now in India the principle is not applied mechanically as the divorce matter is dealt strictly with regard to Indian Law. So in this paper there will be deep analysis of Indian case laws relating to recognition and enforcement of foreign divorces and based on this a comparative study will be made with the laws of Canada and England on the same subject to find out whether the Indian law on recognition and Enforcement of foreign judgment are in line with the laws of Canada and England and whether in recent years the Indian courts have evolved some new principles of private international law to deal with limping marriages. At last conclusions will be drawn out from the comparative study and suggestions would be given to make the rules of recognition and enforcement of foreign judgments on divorce more certain.

Keywords: divorce, foreign decree, private international law, recognition and enforcement of foreign judgment

Procedia PDF Downloads 187
1157 Golden Dawn's Rhetoric on Social Networks: Populism, Xenophobia and Antisemitism

Authors: Georgios Samaras

Abstract:

New media such as Facebook, YouTube and Twitter introduced the world to a new era of instant communication. An era where online interactions could replace a lot of offline actions. Technology can create a mediated environment in which participants can communicate (one-to-one, one-to-many, and many-to-many) both synchronously and asynchronously and participate in reciprocal message exchanges. Currently, social networks are attracting similar academic attention to that of the internet after its mainstream implementation into public life. Websites and platforms are seen as the forefront of a new political change. There is a significant backdrop of previous methodologies employed to research the effects of social networks. New approaches are being developed to be able to adapt to the growth of social networks and the invention of new platforms. Golden Dawn was the first openly neo-Nazi party post World War II to win seats in the parliament of a European country. Its racist rhetoric and violent tactics on social networks were rewarded by their supporters, who in the face of Golden Dawn’s leaders saw a ‘new dawn’ in Greek politics. Mainstream media banned its leaders and members of the party indefinitely after Ilias Kasidiaris attacked Liana Kanelli, a member of the Greek Communist Party, on live television. This media ban was seen as a treasonous move by a significant percentage of voters, who believed that the system was desperately trying to censor Golden Dawn to favor mainstream parties. The shocking attack on live television received international coverage and while European countries were condemning this newly emerged neo-Nazi rhetoric, almost 7 percent of the Greek population rewarded Golden Dawn with 18 seats in the Greek parliament. Many seem to think that Golden Dawn mobilised its voters online and this approach played a significant role in spreading their message and appealing to wider audiences. No strict online censorship existed back in 2012 and although Golden Dawn was openly used neo-Nazi symbolism, it was allowed to use social networks without serious restrictions until 2017. This paper used qualitative methods to investigate Golden Dawn’s rise in social networks from 2012 to 2019. The focus of the content analysis was set on three social networking platforms: Facebook, Twitter and YouTube, while the existence of Golden Dawn’s website, which was used as a news sharing hub, was also taken into account. The content analysis included text and visual analyses that sampled content from their social networking pages to translate their political messaging through an ideological lens focused on extreme-right populism. The absence of hate speech regulations on social network platforms in 2012 allowed the free expression of those heavily ultranationalist and populist views, as they were employed by Golden Dawn in the Greek political scene. On YouTube, Facebook and Twitter, the influence of their rhetoric was particularly strong. Official channels and MPs profiles were investigated to explore the messaging in-depth and understand its ideological elements.

Keywords: populism, far-right, social media, Greece, golden dawn

Procedia PDF Downloads 141
1156 Some Trace and Toxic Metal Content of Crude Ethanol Leaf Extract of Globimetula Oreophila (Hook. F) Danser Azadirachta Indica Using Atomic Absorption Spectroscopy

Authors: Dauda G., Bila Ha Sani Y. M., Magaji M. G., Musa A. M., Hassan H. S.

Abstract:

Introduction: Globimetula oreophila is a parasitic plant with a known therapeutic value that is widely used in the treatment of various ailments, including malaria, hypertension, cancer, diabetes, epilepsy and as a diuretic agent. Objectives: The present study is aimed at analyzing and documenting the level of trace and toxic metals in the crude ethanol leaf extract of G. oreophila. Methods: After collection and authentication, the leaves were air-dried, mashed into powder, weighed and extracted using aqueous ethanol (70%). The crude extract (0.5g) was digested with HNO₃: HCl (3:1); then heated to 2000C and analyzed for its metal content by atomic absorption spectroscopy (AAS). Results: Fe had the highest concentration (32.73mg/kg), while Pb was not detected. The concentrations of Co, Cu, Ni, Zn and Cd detected were 5.97, 10.8, 8.01 and 0.9mg/kg, respectively. The concentration of Cd, Fe and Ni were above the permissible limit of FAO/WHO. Conclusion: The results also show that the analyzed plant is a beneficial source of appropriate and essential trace metals. However, the leaf of G. oreophila in the present study was probably unsafe for long-term use because of the level of Fe, Ni, and Cd concentration.

Keywords: Globimetula oreophila, minerals, trace element, crude extract

Procedia PDF Downloads 146
1155 Identity-Based Encryption: A Comparison of Leading Classical and Post-Quantum Implementations in an Enterprise Setting

Authors: Emily Stamm, Neil Smyth, Elizabeth O'Sullivan

Abstract:

In Identity-Based Encryption (IBE), an identity, such as a username, email address, or domain name, acts as the public key. IBE consolidates the PKI by eliminating the repetitive process of requesting public keys for each message encryption. Two of the most popular schemes are Sakai-Kasahara (SAKKE), which is based on elliptic curve pairings, and the Ducas, Lyubashevsky, and Prest lattice scheme (DLP- Lattice), which is based on quantum-secure lattice cryptography. In or- der to embed the schemes in a standard enterprise setting, both schemes are implemented as shared system libraries and integrated into a REST service that functions at the enterprise level. The performance of both schemes as libraries and services is compared, and the practicalities of implementation and application are discussed. Our performance results indicate that although SAKKE has the smaller key and ciphertext sizes, DLP-Lattice is significantly faster overall and we recommend it for most enterprise use cases.

Keywords: identity-based encryption, post-quantum cryptography, lattice-based cryptography, IBE

Procedia PDF Downloads 118
1154 Identifying Coloring in Graphs with Twins

Authors: Souad Slimani, Sylvain Gravier, Simon Schmidt

Abstract:

Recently, several vertex identifying notions were introduced (identifying coloring, lid-coloring,...); these notions were inspired by identifying codes. All of them, as well as original identifying code, is based on separating two vertices according to some conditions on their closed neighborhood. Therefore, twins can not be identified. So most of known results focus on twin-free graph. Here, we show how twins can modify optimal value of vertex-identifying parameters for identifying coloring and locally identifying coloring.

Keywords: identifying coloring, locally identifying coloring, twins, separating

Procedia PDF Downloads 140
1153 Difference Expansion Based Reversible Data Hiding Scheme Using Edge Directions

Authors: Toshanlal Meenpal, Ankita Meenpal

Abstract:

A very important technique in reversible data hiding field is Difference expansion. Secret message as well as the cover image may be completely recovered without any distortion after data extraction process due to reversibility feature. In general, in any difference expansion scheme embedding is performed by integer transform in the difference image acquired by grouping two neighboring pixel values. This paper proposes an improved reversible difference expansion embedding scheme. We mainly consider edge direction for embedding by modifying the difference of two neighboring pixels values. In general, the larger difference tends to bring a degraded stego image quality than the smaller difference. Image quality in the range of 0.5 to 3.7 dB in average is achieved by the proposed scheme, which is shown through the experimental results. However payload wise it achieves almost similar capacity in comparisons with previous method.

Keywords: information hiding, wedge direction, difference expansion, integer transform

Procedia PDF Downloads 475
1152 Group Attachment Based Intervention® Reduces Toddlers' Fearfulness

Authors: Kristin Lewis, Howard Steele, Anne Murphy, Miriam Steele, Karen Bonuck, Paul Meissner

Abstract:

The present study examines data collected during the randomized control trial (RCT) of the Group Attachment-Based Intervention (GABI©), a trauma-informed, attachment-based intervention aimed at promoting healthy parent-child relationships that support child development. Families received treatment at Treatment Center and were randomly assigned to either the GABI condition or the treatment as usual condition, a parenting class called Systematic Training for Effective Parenting (STEP). Significant improvements in the parent-child relationship have been reported for families participating in GABI, but not in the STEP control group relying on Coding Interactive Behavior (CIB) as applied to 5-minute video-films of mothers and their toddlers in a free play context. This report considers five additional attachment-relevant 'clinical codes' that were also applied to the 5-minute free play sessions. Seventy-two parent-child dyads (38 in GABI and 34 in STEP) were compared to one another at intake and end-of-treatment, on these five-point dimensions: two-parent codes—the dissociation and ignoring; two child codes—simultaneous display of contradictory behavior and fear; and one parent-child code, i.e., role reversal. Overall, scores were low for these clinical codes; thus, a binary measure was computed contrasting no evidence with some evidence of each clinical code. Crosstab analyses indicate that child fear at end-of-treatment was significantly lower among children who participated in GABI (7% or 3 children) as compared to those whose mothers participated in STEP (29% or 10 children) Chi Sq= 6.57 (1), p < .01. Discussion focuses on the potential for GABI to reduce childhood fearfulness and so enhance the child's health.

Keywords: coding interactive behavior, clinical codes, group attachment based intervention, GABI, attachment, fear

Procedia PDF Downloads 113
1151 Accounting as Addressed in the Qur’aan

Authors: Shahriar M. Saadullah, Abdul-Quddoos Abdul-Basith, Zaki K. Abushawish

Abstract:

As a part of academic research in Islamic Accounting it is important to know how the word Accounting is discussed in the Qur’aan. This paper identifies and analyzes the word Accounting in the Qur’aan, which is significant to know and understand. The paper uses a methodology of identifying the root word of Accounting Hasaba (حسب) in the Qur’aan with the help of Islam 360 software and analyzes the use of the relevant words derived from the root word. Then the paper attempts to connect the findings to the contemporary Accounting issues. The paper finds that the root word of Accounting Hasaba (حسب) appears in the Qur’aan 109 times but it is only used in the sense Account, Accountable, or Accounting 45 times. These words appear in 44 different verses in the Qur’aan, appearing twice in one of the verses. The paper divides these verses into 8 different themes namely, Day of Accounting, without any Accounting, Accounting of Time, Self-Accounting, Swift in Accounting, Accounting is only with God, Awareness and the Good Accounting, and Heedlessness and the Bad Accounting. The way the words Account, Accounting, and Accountable is discussed in the Qur’aan links to the contemporary accounting issues including Ethics, Agency Theory, and Internal Control. The links discovered in the paper clearly shows the timeless nature of the message of the Qur’aan.

Keywords: accounting, contemporary accounting issues, Qur'aan, root word of accounting hasaba

Procedia PDF Downloads 413
1150 The Last National Anthem of the Ottoman Empire: Musical Code, Sociopolitical Control and Historical Realities

Authors: Nuray Ocakli

Abstract:

19th century was the era of changes and transformations for the Ottoman Empire. The first sultan of this century, Mahmud II (1808-1839), was the architect of Ottoman modernization and fundamental changes. The most radical of these was abolishing the Janissary corps and the traditional Ottoman military band, Mehteran. Mahmud II introduced modernized military corps as well as western style royal and military music. Mahmut II invited the Italian composer Giuseppe Donizetti to establish a modern military band for the new army and to compose the Sultan’s royal anthem. In 1828, Donizetti composed the first western-style Ottoman anthem, Mahmudiyye anthem. During the 19th and early 20th century, four other western style Ottoman anthems (Aziziyye, Mecidiyye, Hamidiyye, and Resadiyye) were composed but the last anthem adopted in the reign of Mehmet VI (r. 1918-1922) was again Mahmudiyye anthem. This paper aims to analyze the Mahmudiyye anthem composed as royal anthem in 1828 but adopted as national anthem in 1918. Research questions of this paper are as follows: What were the characteristics of the Mahmudiyye anthem making it the best choice of the last sultan for the last national anthem? Are there specific reasons of the last sultan to adopt Mahmudiyye anthem or not to adopt any of the other four anthems? The musical characteristics of the anthem are analyzed based on the Cerulo’s empirical research. Cerulo examined the musical structures of 124 western style anthems from 150 countries in the 1580-1976 period. Cerulo’s research categorizes musical codes of the anthems as basic and embellished related with the level of sociopolitical control. Musical analysis of the anthem indicates that the basic musical code of the anthem implies a high level of socio-political control during the reign of both Mahmut II and Mehmet VI. Historical analysis of each sultans’ reign shows that both sultans were autocratic. Mahmut II designed authoritarian government policies to suppress possible reactions against his reforms. On the other hand, authoritarian policies of Mehmet VI are related with the domestic and international political conditions following the World War I. Historical analysis of the research questions show that compared to the other western style Ottoman anthems, Mahmudiyye anthem remained the only neutral anthem symbolizing modernization and westernization of the empire. Other anthems were all the symbols of failed ideologies such as Ottomanism, pan-Islamism, and pan-Turkism. In the early 20th century, there were a few common things remained among the diverse communities of the Ottoman Empire: The land they shared as homeland and the idea of modernization to save the homeland. For this reason, the last sultan Mehmet VI adopted Mahmudiyye anthem as the memory of a unified empire under the rule of a powerful and modernist sultan. The last sultan’s reign lasted just for four years, and the Ottoman Empire disintegrated in 1922, but his adaptation of the Mahmudiyye anthem indicates his unifying policies, his attitudes to save the empire and the caliphate.

Keywords: Mahmudiyye anthem, musical code, national anthem, Ottoman Empire, royal anthem

Procedia PDF Downloads 196
1149 Prototype of an Interactive Toy from Lego Robotics Kits for Children with Autism

Authors: Ricardo A. Martins, Matheus S. da Silva, Gabriel H. F. Iarossi, Helen C. M. Senefonte, Cinthyan R. S. C. de Barbosa

Abstract:

This paper is the development of a concept of the man/robot interaction. More accurately in developing of an autistic child that have more troubles with interaction, here offers an efficient solution, even though simple; however, less studied for this public. This concept is based on code applied thought out the Lego NXT kit, built for the interpretation of the robot, thereby can create this interaction in a constructive way for children suffering with Autism.

Keywords: lego NXT, interaction, BricX, autismo, ANN (Artificial Neural Network), MLP back propagation, hidden layers

Procedia PDF Downloads 561
1148 Dwelling in the Built Environment: The Resilience by Design in Modular Thinking toward an Adaptive Alternatives

Authors: Tzen-Ying Ling

Abstract:

Recently, the resilience of dwellings in urban areas has been deliberated, as to accommodate the growing demand for changing the demography and rapid urbanization. The need to incorporate sustainability and cleaner production thinking have intensified to mitigate climate risks and satisfy the demand for housing. The modular thinking satisfies both the pressing call for fast-tracked housing stocks; while meeting the goal of more sustainable production. In the other side, the importance of the dwelling as a podium for well-being and social connectedness are sought to explore the key human/environment design thinking for the modular system in dwelling. We argue the best practice incorporates the concept of systemic components thinking. The fieldwork reported in this paper illustrates the process of the case study in a modular dwelling unit prototype development; focusing on the systemic frame system design process and adjustment recommendation hereafter. Using a case study method, the study identified that: (1) inclusive human dimensional factoring through systemic design thinking results in affordable implementations possibilities. (2) The environmental dimension encourages the place-based solution suited for the locality and the increasing demand for dwelling in the urban system. (3) Prototype design consideration avails module system component as dwelling construction alternative. (4) Building code often acts as an inhibitor for such dwelling units by the restriction in lot sizes and units placement. The demand for fast-track dwelling construction and cleaner production decisively outweighs the code inhibition; we further underscored the sustainability implication of the alternative prototype as the core of this study. The research suggests that modular thinking results in a resilient solution suited for the locality and the increasing demand for dwelling in the urban system.

Keywords: system prototype, urban resilience, human/environment dimension, modular thinking, dwelling alternative

Procedia PDF Downloads 167
1147 Study on Construction of 3D Topography by UAV-Based Images

Authors: Yun-Yao Chi, Chieh-Kai Tsai, Dai-Ling Li

Abstract:

In this paper, a method of fast 3D topography modeling using the high-resolution camera images is studied based on the characteristics of Unmanned Aerial Vehicle (UAV) system for low altitude aerial photogrammetry and the need of three dimensional (3D) urban landscape modeling. Firstly, the existing high-resolution digital camera with special design of overlap images is designed by reconstructing and analyzing the auto-flying paths of UAVs, which improves the self-calibration function to achieve the high precision imaging by software, and further increased the resolution of the imaging system. Secondly, several-angle images including vertical images and oblique images gotten by the UAV system are used for the detail measure of urban land surfaces and the texture extraction. Finally, the aerial photography and 3D topography construction are both developed in campus of Chang-Jung University and in Guerin district area in Tainan, Taiwan, provide authentication model for construction of 3D topography based on combined UAV-based camera images from system. The results demonstrated that the UAV system for low altitude aerial photogrammetry can be used in the construction of 3D topography production, and the technology solution in this paper offers a new, fast, and technical plan for the 3D expression of the city landscape, fine modeling and visualization.

Keywords: 3D, topography, UAV, images

Procedia PDF Downloads 298
1146 Battling the Final Stages of Genocide in Bosnia and Herzegovina: Denial and Triumphalism

Authors: Ehlimana Memisevic

Abstract:

Genocide denial is considered the final stage of genocide, which in the words of Gregory H. Stanton, represents "one of the most certain indicators of future genocides”. Genocide denial in Bosnia and Herzegovina started in 1992, almost simultaneously with the genocide itself. Over the course of the three decades, different forms of genocide and war crimes denial have been developed by state officials, politicians, journalists, and civilians, both in Republika Srpska – the Serb-dominated entity within Bosnia and Herzegovina – and Serbia. Moreover, genocide and war crimes are not only denied but also glorified and celebrated, which was described as "triumphalism" by the Australian-Bosnian scholar Hariz Halilovich who suggested it be added as the 11th phase of Gregory Stanton's "10 stages of genocide." Since 2007, there have been a number of attempts to criminalize genocide denial at the state level in Bosnia and Herzegovina. However, all of them were unsuccessful due to the opposition of representatives of Republika Srpska. On July 23, 2021, the High Representative in Bosnia and Herzegovina, Valentin Inzko, used his power as the final authority in overseeing the civil implementation of the Dayton Peace Accords to impose amendments to Bosnia and Herzegovina's criminal code to ban the denial and glorification of genocide, crimes against humanity and war crimes. However, immediately after the OHR's decision was announced, Milorad Dodik, a Serb member of Bosnia's tripartite presidency, held a press conference, publicly denied the genocide, and announced that this law would never be accepted in Republika Srpska. Denial remains explicit and public and is promulgated through official channels in Bosnia and Herzegovina. This paper will analyze the forms of genocide and other war crimes denial and glorification in the period after the amendments to the Criminal Code of Bosnia and Herzegovina were introduced, which include incrimination of public condoning, denial, gross trivialization or justification of a crime of genocide, crimes against humanity or a war crime established by a final adjudication of the international and domestic courts. We aim to determine the effect of the imposed law and the impact of the denial committed by high-ranking public officials on the denial and celebration of genocide and war crimes committed by ordinary citizens.

Keywords: genocide, denial, triumphalism, incrimination

Procedia PDF Downloads 72
1145 Numerical Modelling of Shear Zone and Its Implications on Slope Instability at Letšeng Diamond Open Pit Mine, Lesotho

Authors: M. Ntšolo, D. Kalumba, N. Lefu, G. Letlatsa

Abstract:

Rock mass damage due to shear tectonic activity has been investigated largely in geoscience where fluid transport is of major interest. However, little has been studied on the effect of shear zones on rock mass behavior and its impact on stability of rock slopes. At Letšeng Diamonds open pit mine in Lesotho, the shear zone composed of sheared kimberlite material, calcite and altered basalt is forming part of the haul ramp into the main pit cut 3. The alarming rate at which the shear zone is deteriorating has triggered concerns about both local and global stability of pit the walls. This study presents the numerical modelling of the open pit slope affected by shear zone at Letšeng Diamond Mine (LDM). Analysis of the slope involved development of the slope model by using a two-dimensional finite element code RS2. Interfaces between shear zone and host rock were represented by special joint elements incorporated in the finite element code. The analysis of structural geological mapping data provided a good platform to understand the joint network. Major joints including shear zone were incorporated into the model for simulation. This approach proved successful by demonstrating that continuum modelling can be used to evaluate evolution of stresses, strain, plastic yielding and failure mechanisms that are consistent with field observations. Structural control due to geological shear zone structure proved to be important in its location, size and orientation. Furthermore, the model analyzed slope deformation and sliding possibility along shear zone interfaces. This type of approach can predict shear zone deformation and failure mechanism, hence mitigation strategies can be deployed for safety of human lives and property within mine pits.

Keywords: numerical modeling, open pit mine, shear zone, slope stability

Procedia PDF Downloads 292
1144 Hot Face of Cold War: 007 James Bond

Authors: Günevi Uslu Evren

Abstract:

Propaganda is one of the most effective methods for changing individual and mass opinions. Propaganda tries to get the message across to people or masses to effect rather than to provide objective information. There are many types of propaganda. Especially, political propaganda is a very powerful method that is used by states during in both war and peace. The aim of this method is to create a reaction against them by showing within the framework of internal and external enemies. Propaganda can be practiced by many different methods. Especially during the Cold War Era, the US and USSR have tried to create an ideological effect by using the mass media intensively. Cinema, which is located at the beginning of these methods, is the most powerful weapon to influence the masses. In this study, the historical process of the Cold War is examined. Especially, these propagandas that had been used by United States and The Soviet Union were investigated. The purposes of propaganda and construction methods were presented. Cold War events and relations between the US and the USSR during the Cold War will be discussed. Outlooks of two countries to each other during the Cold War, propaganda techniques used defectively during Cold War and how to use the cinema as a propaganda tool will be examined. The film "From Russia with Love, James Bond 007" that was filmed in Cold War were examined to explain how cinema was used as a propaganda tool in this context.

Keywords: cinema, cold war, James Bond, propaganda

Procedia PDF Downloads 515
1143 The Impact of Corporate Governance Mechanisms on Earnings Management Practices: Evidence from Jordan

Authors: Lara Al-Haddad, Mark Whittington

Abstract:

This paper aims to examine the impact of two influential internal corporate governance mechanisms, namely board characteristics and ownership structure on the use of real activities-based and accrual-based earnings management by Jordanian public firms. Using panel data from Jordanian public firms after the introduction of the Jordanian Corporate Governance Code (JCGC) in 2009, the study finds both institutional ownership and managerial ownership constrain the use of real and accrual earnings manipulations. On the other side, both independent directors and largest shareholders are found to exaggerate the incidence of using real and accrual earnings management. The study also examines the trade-off between real and accrual earnings management and found that Jordanian firms use a combination of real and accrual-based earnings management to obtain the greatest effect on earnings reporting strategies. For the purpose of this study, three types of real earnings management are considered: sales manipulation, overproduction, and the abnormal reduction of discretionary expenditures. The abnormal discretionary accrual is considered for accruals management. While for the internal corporate governance mechanisms; board characteristics are examined by using board independence, board size, and CEO-duality; and ownership structure is examined by using managerial ownership, institutional ownership, foreign ownership and largest shareholder ownership. To the best knowledge of the researchers, this study is the first to examine the relationship between board characteristics and real earnings management in Jordan. Further, it is the first to examine the relationship between corporate governance mechanisms and discretionary accruals after the introduction of the Jordanian Corporate Governance Code in 2009. Thus, the findings of this study have important policy implications for policymakers, regulators, standard setters, audit professional, and investors in their attempts to constrain the practice of earnings management, whether real or accrual, and to improve the financial reporting quality in Jordan.

Keywords: board characteristics, Jordan, ownership structure, real earnings management

Procedia PDF Downloads 336
1142 Development of a Data Security Model Using Steganography

Authors: Terungwa Simon Yange, Agana Moses A.

Abstract:

This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each.

Keywords: steganography, cryptography, encryption, decryption, secrecy

Procedia PDF Downloads 256
1141 Manual to Automated Testing: An Effort-Based Approach for Determining the Priority of Software Test Automation

Authors: Peter Sabev, Katalina Grigorova

Abstract:

Test automation allows performing difficult and time consuming manual software testing tasks efficiently, quickly and repeatedly. However, development and maintenance of automated tests is expensive, so it needs a proper prioritization what to automate first. This paper describes a simple yet efficient approach for such prioritization of test cases based on the effort needed for both manual execution and software test automation. The suggested approach is very flexible because it allows working with a variety of assessment methods, and adding or removing new candidates at any time. The theoretical ideas presented in this article have been successfully applied in real world situations in several software companies by the authors and their colleagues including testing of real estate websites, cryptographic and authentication solutions, OSGi-based middleware framework that has been applied in various systems for smart homes, connected cars, production plants, sensors, home appliances, car head units and engine control units (ECU), vending machines, medical devices, industry equipment and other devices that either contain or are connected to an embedded service gateway.

Keywords: automated testing, manual testing, test automation, software testing, test prioritization

Procedia PDF Downloads 329
1140 Infrared Spectroscopy Fingerprinting of Herbal Products- Application of the Hypericum perforatum L. Supplements

Authors: Elena Iacob, Marie-Louise Ionescu, Elena Ionescu, Carmen Elena Tebrencu, Oana Teodora Ciuperca

Abstract:

Infrared spectroscopy (FT-IR) is an advanced technique frequently used to authenticate both raw materials and final products using their specific fingerprints and to determine plant extracts biomarkers based on their functional groups. In recent years the market for Hypericum has grown rapidly and also has grown the cases of adultery/replacement, especially for Hypericum perforatum L.specie. Presence/absence of same biomarkers provides preliminary identification of Hypericum species in safe use in the manufacture of food supplements. The main objective of the work was to characterize the main biomarkers of Hypericum perforatum L. (St. John's wort) and identify this species in herbal food supplements after specific FT-IR fingerprint. An experimental program has been designed in order to test: (1) raw material (St. John's wort); (2)intermediate raw materials (St. John's wort dry extract ); (3) the finished products: tablets based on powders, on extracts, on powder and extract, hydroalcoholic solution from herbal mixture based on St. John's wort. The analyze using FTIR infrared spectroscopy were obtained raw materials, intermediates and finished products spectra, respectively absorption bands corresponding and similar with aliphatic and aromatic structures; examination was done individually and through comparison between Hypericum perforatum L. plant species and finished product The tests were done in correlation with phytochemical markers for authenticating the specie Hypericum perforatum L.: hyperoside, rutin, quercetin, isoquercetin, luteolin, apigenin, hypericin, hyperforin, chlorogenic acid. Samples were analyzed using a Shimatzu FTIR spectrometer and the infrared spectrum of each sample was recorded in the MIR region, from 4000 to 1000 cm-1 and then the fingerprint region was selected for data analysis. The following functional groups were identified -stretching vibrations suggests existing groups in the compounds of interest (flavones–rutin, hyperoside, polyphenolcarboxilic acids - chlorogenic acid, naphtodianthrones- hypericin): oxidril groups (OH) free alcohol type: rutin, hyperoside, chlorogenic acid; C = O bond from structures with free carbonyl groups of aldehyde, ketone, carboxylic, ester: hypericin; C = O structure with the free carbonyl of the aldehyde groups, ketone, carboxylic acid, esteric/C = O free bonds present in chlorogenic acid; C = C bonds of the aromatic ring (condensed aromatic hydrocarbons, heterocyclic compounds) present in all compounds of interest; OH phenolic groups: present in all compounds of interest, C-O-C groups from glycoside structures: rutin, hyperoside, chlorogenic acid. The experimental results show that: (I)The six fingerprint region analysis indicated the presence of specific functional groups: (1) 1000 - 1130 cm-1 (C-O–C of glycoside structures); (2) 1200-1380 cm-1 (carbonyl C-O or O-H phenolic); (3) 1400-1450 cm-1 (C=C aromatic); (4) 1600- 1730 cm-1 (C=O carbonyl); (5) 2850 - 2930 cm-1 (–CH3, -CH2-, =CH-); (6) 338-3920 cm-1 (OH free alcohol type); (II)Comparative FT-IR spectral analysis indicate the authenticity of the finished products ( tablets) in terms of Hypericum perforatum L. content; (III)The infrared spectroscopy is an adequate technique for identification and authentication of the medicinal herbs , intermediate raw material and in the food supplements less in the form of solutions where the results are not conclusive.

Keywords: Authentication, FT-IR fingerprint, Herbal supplements, Hypericum perforatum L.

Procedia PDF Downloads 366
1139 An Approach of Computer Modalities for Exploration of Hieroglyphics Substantial in an Investigation

Authors: Aditi Chauhan, Neethu S. Mohan

Abstract:

In the modern era, the advancement and digitalization in technology have taken place during an investigation of crime scene. The rapid enhancement and investigative techniques have changed the mean of identification of suspect. Identification of the person is one of the significant aspects, and personal authentication is the key of security and reliability in society. Since early 90 s, people have relied on comparing handwriting through its class and individual characteristics. But in today’s 21st century we need more reliable means to identify individual through handwriting. An approach employing computer modalities have lately proved itself auspicious enough in exploration of hieroglyphics substantial in investigating the case. Various software’s such as FISH, WRITEON, and PIKASO, CEDAR-FOX SYSTEM identify and verify the associated quantitative measure of the similarity between two samples. The research till date has been confined to identify the authorship of the concerned samples. But prospects associated with the use of computational modalities might help to identify disguised writing, forged handwriting or say altered or modified writing. Considering the applications of such modal, similar work is sure to attract plethora of research in immediate future. It has a promising role in national security too. Documents exchanged among terrorist can also be brought under the radar of surveillance, bringing forth their source of existence.

Keywords: documents, identity, computational system, suspect

Procedia PDF Downloads 172
1138 Fully Coupled Porous Media Model

Authors: Nia Mair Fry, Matthew Profit, Chenfeng Li

Abstract:

This work focuses on the development and implementation of a fully implicit-implicit, coupled mechanical deformation and porous flow, finite element software tool. The fully implicit software accurately predicts classical fundamental analytical solutions such as the Terzaghi consolidation problem. Furthermore, it can capture other analytical solutions less well known in the literature, such as Gibson’s sedimentation rate problem and Coussy’s problems investigating wellbore stability for poroelastic rocks. The mechanical volume strains are transferred to the porous flow governing equation in an implicit framework. This will overcome some of the many current industrial issues, which use explicit solvers for the mechanical governing equations and only implicit solvers on the porous flow side. This can potentially lead to instability and non-convergence issues in the coupled system, plus giving results with an accountable degree of error. The specification of a fully monolithic implicit-implicit coupled porous media code sees the solution of both seepage-mechanical equations in one matrix system, under a unified time-stepping scheme, which makes the problem definition much easier. When using an explicit solver, additional input such as the damping coefficient and mass scaling factor is required, which are circumvented with a fully implicit solution. Further, improved accuracy is achieved as the solution is not dependent on predictor-corrector methods for the pore fluid pressure solution, but at the potential cost of reduced stability. In testing of this fully monolithic porous media code, there is the comparison of the fully implicit coupled scheme against an existing staggered explicit-implicit coupled scheme solution across a range of geotechnical problems. These cases include 1) Biot coefficient calculation, 2) consolidation theory with Terzaghi analytical solution, 3) sedimentation theory with Gibson analytical solution, and 4) Coussy well-bore poroelastic analytical solutions.

Keywords: coupled, implicit, monolithic, porous media

Procedia PDF Downloads 133
1137 A Biometric Template Security Approach to Fingerprints Based on Polynomial Transformations

Authors: Ramon Santana

Abstract:

The use of biometric identifiers in the field of information security, access control to resources, authentication in ATMs and banking among others, are of great concern because of the safety of biometric data. In the general architecture of a biometric system have been detected eight vulnerabilities, six of them allow obtaining minutiae template in plain text. The main consequence of obtaining minutia templates is the loss of biometric identifier for life. To mitigate these vulnerabilities several models to protect minutiae templates have been proposed. Several vulnerabilities in the cryptographic security of these models allow to obtain biometric data in plain text. In order to increase the cryptographic security and ease of reversibility, a minutiae templates protection model is proposed. The model aims to make the cryptographic protection and facilitate the reversibility of data using two levels of security. The first level of security is the data transformation level. In this level generates invariant data to rotation and translation, further transformation is irreversible. The second level of security is the evaluation level, where the encryption key is generated and data is evaluated using a defined evaluation function. The model is aimed at mitigating known vulnerabilities of the proposed models, basing its security on the impossibility of the polynomial reconstruction.

Keywords: fingerprint, template protection, bio-cryptography, minutiae protection

Procedia PDF Downloads 165
1136 Multimodal Database of Emotional Speech, Video and Gestures

Authors: Tomasz Sapiński, Dorota Kamińska, Adam Pelikant, Egils Avots, Cagri Ozcinar, Gholamreza Anbarjafari

Abstract:

People express emotions through different modalities. Integration of verbal and non-verbal communication channels creates a system in which the message is easier to understand. Expanding the focus to several expression forms can facilitate research on emotion recognition as well as human-machine interaction. In this article, the authors present a Polish emotional database composed of three modalities: facial expressions, body movement and gestures, and speech. The corpora contains recordings registered in studio conditions, acted out by 16 professional actors (8 male and 8 female). The data is labeled with six basic emotions categories, according to Ekman’s emotion categories. To check the quality of performance, all recordings are evaluated by experts and volunteers. The database is available to academic community and might be useful in the study on audio-visual emotion recognition.

Keywords: body movement, emotion recognition, emotional corpus, facial expressions, gestures, multimodal database, speech

Procedia PDF Downloads 346
1135 Analysis of Building Response from Vertical Ground Motions

Authors: George C. Yao, Chao-Yu Tu, Wei-Chung Chen, Fung-Wen Kuo, Yu-Shan Chang

Abstract:

Building structures are subjected to both horizontal and vertical ground motions during earthquakes, but only the horizontal ground motion has been extensively studied and considered in design. Most of the prevailing seismic codes assume the vertical component to be 1/2 to 2/3 of the horizontal one. In order to understand the building responses from vertical ground motions, many earthquakes records are studied in this paper. System identification methods (ARX Model) are used to analyze the strong motions and to find out the characteristics of the vertical amplification factors and the natural frequencies of buildings. Analysis results show that the vertical amplification factors for high-rise buildings and low-rise building are 1.78 and 2.52 respectively, and the average vertical amplification factor of all buildings is about 2. The relationship between the vertical natural frequency and building height was regressed to a suggested formula in this study. The result points out an important message; the taller the building is, the greater chance of resonance of vertical vibration on the building will be.

Keywords: vertical ground motion, vertical amplification factor, natural frequency, component

Procedia PDF Downloads 312
1134 Comparison of Water Equivalent Ratio of Several Dosimetric Materials in Proton Therapy Using Monte Carlo Simulations and Experimental Data

Authors: M. R. Akbari , H. Yousefnia, E. Mirrezaei

Abstract:

Range uncertainties of protons are currently a topic of interest in proton therapy. Two of the parameters that are often used to specify proton range are water equivalent thickness (WET) and water equivalent ratio (WER). Since WER values for a specific material is nearly constant at different proton energies, it is a more useful parameter to compare. In this study, WER values were calculated for different proton energies in polymethyl methacrylate (PMMA), polystyrene (PS) and aluminum (Al) using FLUKA and TRIM codes. The results were compared with analytical, experimental and simulated SEICS code data obtained from the literature. In FLUKA simulation, a cylindrical phantom, 1000 mm in height and 300 mm in diameter, filled with the studied materials was simulated. A typical mono-energetic proton pencil beam in a wide range of incident energies usually applied in proton therapy (50 MeV to 225 MeV) impinges normally on the phantom. In order to obtain the WER values for the considered materials, cylindrical detectors, 1 mm in height and 20 mm in diameter, were also simulated along the beam trajectory in the phantom. In TRIM calculations, type of projectile, energy and angle of incidence, type of target material and thickness should be defined. The mode of 'detailed calculation with full damage cascades' was selected for proton transport in the target material. The biggest difference in WER values between the codes was 3.19%, 1.9% and 0.67% for Al, PMMA and PS, respectively. In Al and PMMA, the biggest difference between each code and experimental data was 1.08%, 1.26%, 2.55%, 0.94%, 0.77% and 0.95% for SEICS, FLUKA and SRIM, respectively. FLUKA and SEICS had the greatest agreement (≤0.77% difference in PMMA and ≤1.08% difference in Al, respectively) with the available experimental data in this study. It is concluded that, FLUKA and TRIM codes have capability for Bragg curves simulation and WER values calculation in the studied materials. They can also predict Bragg peak location and range of proton beams with acceptable accuracy.

Keywords: water equivalent ratio, dosimetric materials, proton therapy, Monte Carlo simulations

Procedia PDF Downloads 315
1133 Harmonic Data Preparation for Clustering and Classification

Authors: Ali Asheibi

Abstract:

The rapid increase in the size of databases required to store power quality monitoring data has demanded new techniques for analysing and understanding the data. One suggested technique to assist in analysis is data mining. Preparing raw data to be ready for data mining exploration take up most of the effort and time spent in the whole data mining process. Clustering is an important technique in data mining and machine learning in which underlying and meaningful groups of data are discovered. Large amounts of harmonic data have been collected from an actual harmonic monitoring system in a distribution system in Australia for three years. This amount of acquired data makes it difficult to identify operational events that significantly impact the harmonics generated on the system. In this paper, harmonic data preparation processes to better understanding of the data have been presented. Underlying classes in this data has then been identified using clustering technique based on the Minimum Message Length (MML) method. The underlying operational information contained within the clusters can be rapidly visualised by the engineers. The C5.0 algorithm was used for classification and interpretation of the generated clusters.

Keywords: data mining, harmonic data, clustering, classification

Procedia PDF Downloads 238