Search results for: authentication mechanisms
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2712

Search results for: authentication mechanisms

2592 On the Differentiation of Strategic Spatial Planning Mechanisms in New Era: Between Melbourne and Tianjin

Authors: Zhao Liu, Kang Cao

Abstract:

Strategic spatial planning, which is taken as an effective and competitive way for the governors of the city to improve the development and management level of a city, has been blooming in recent years all over the world. In the context of globalization and informatization, strategic spatial planning must transfer its focus on three different levels: global, regional and urban. Internal and external changes in environmental conditions lead to new advances in strategic planning both theoretically and practically. However, such advances or changes respond differently to cities on account of different dynamic mechanisms. This article aims at two cities of Tianjin in China and Melbourne in Australia, through a comparative study on strategic planning, to explore the differentiation of mechanisms in urban planning. By comparison and exploration, the purpose of this article is to exhibit two different planning worlds, western and Chinese, in a new way. The article can be divided into four parts. The first part outlines strategic planning transformations in the new era on three levels, generally analysing the internal and external environmental factors of today. The second part indicates the concepts of strategic planning theoretically, demonstrating briefly its development background and process in western and China, respectively. The third part takes Tianjin and Melbourne urban strategic spatial planning as examples to mainly carry on the contrast research from the aspects of strategic planning mode, competitive mechanism, contents, strategy implementation and management. It is expected to summarize the differences and similarities of the two plans, meanwhile, to explore the inherent factors or mechanisms probably spatial, material, political and etc., which affect cities in the course of urban planning. The final part is a summary of general mechanisms of planning from the perspective of strategic spatial planning.

Keywords: differentiation, strategic planning, Melbourne, Australia, Tianjin, China

Procedia PDF Downloads 525
2591 Optimality of Shapley Value Mechanism under Sybil Strategies

Authors: Bruno Mazorra Roig

Abstract:

In the realm of cost-sharing mechanisms, the vulnerability to Sybil strategies, where agents can create fake identities to manipulate outcomes, has not yet been studied. In this paper, we delve into the intricacies of different cost-sharing mechanisms proposed in the literature, highlighting its non-Sybil-resistance nature. Furthermore, we prove that under mild conditions, a Sybil-proof cost-sharing mechanism for public excludable goods is at least (n/2 + 1)−approximate. This finding reveals an exponential increase in the worst-case social cost in environments where agents are restricted from using Sybil strategies. We introduce the concept of Sybil Welfare Invariant mechanisms, where a mechanism maintains its worst-case welfare under Sybil strategies for every set of prior beliefs with full support even when the mechanism is not Sybil-proof. Finally, we prove that the Shapley value mechanism for public excludable goods holds this property and so deduce that the worst-case social cost of this mechanism is the nth harmonic number Hn under the equilibrium of the game with Sybil strategies, matching the worst-case social cost bound for cost-sharing mechanisms. This finding carries important implications for decentralized autonomous organizations (DAOs), indicating that they are capable of funding public excludable goods efficiently, even when the total number of agents is unknown.

Keywords: game theory, mechanism design, cost sharing, false-name proofness

Procedia PDF Downloads 64
2590 Variance-Aware Routing and Authentication Scheme for Harvesting Data in Cloud-Centric Wireless Sensor Networks

Authors: Olakanmi Oladayo Olufemi, Bamifewe Olusegun James, Badmus Yaya Opeyemi, Adegoke Kayode

Abstract:

The wireless sensor network (WSN) has made a significant contribution to the emergence of various intelligent services or cloud-based applications. Most of the time, these data are stored on a cloud platform for efficient management and sharing among different services or users. However, the sensitivity of the data makes them prone to various confidentiality and performance-related attacks during and after harvesting. Various security schemes have been developed to ensure the integrity and confidentiality of the WSNs' data. However, their specificity towards particular attacks and the resource constraint and heterogeneity of WSNs make most of these schemes imperfect. In this paper, we propose a secure variance-aware routing and authentication scheme with two-tier verification to collect, share, and manage WSN data. The scheme is capable of classifying WSN into different subnets, detecting any attempt of wormhole and black hole attack during harvesting, and enforcing access control on the harvested data stored in the cloud. The results of the analysis showed that the proposed scheme has more security functionalities than other related schemes, solves most of the WSNs and cloud security issues, prevents wormhole and black hole attacks, identifies the attackers during data harvesting, and enforces access control on the harvested data stored in the cloud at low computational, storage, and communication overheads.

Keywords: data block, heterogeneous IoT network, data harvesting, wormhole attack, blackhole attack access control

Procedia PDF Downloads 84
2589 Experimental Verification and Finite Element Analysis of a Sliding Door System Used in Automotive Industry

Authors: C. Guven, M. Tufekci, E. Bayik, O. Gedik, M. Tas

Abstract:

A sliding door system is used in commercial vehicles and passenger cars to allow a larger unobstructed access to the interior for loading and unloading. The movement of a sliding door on vehicle body is ensured by mechanisms and tracks having special cross-section which is manufactured by roll forming and stretch bending process. There are three tracks and three mechanisms which are called upper, central and lower on a sliding door system. There are static requirements as strength on different directions, rigidity for mechanisms, and door drop off, door sag; dynamic requirements as high energy slam opening-closing and durability requirement to validate these products. In addition, there is a kinematic requirement to find out force values from door handle during manual operating. In this study, finite element analysis and physical test results which are realized for sliding door systems will be shared comparatively.

Keywords: finite element analysis, sliding door, experimental, verification, vehicle tests

Procedia PDF Downloads 334
2588 Geometric Model to Study the Mechanism of Machining and Predict the Damage Occurring During Milling of Unidirectional CFRP

Authors: Faisal Islam, J. Ramkumar

Abstract:

The applications of composite materials in aerospace, sporting and automotive industries need high quality machined surfaces and dimensional accuracy. Some studies have been done to understand the fiber failure mechanisms encountered during milling machining of CFRP composites but none are capable of explaining the exact nature of the orientation-based fiber failure mechanisms encountered in the milling machining process. The objective of this work is to gain a better understanding of the orientation-based fiber failure mechanisms occurring on the slot edges during CFRP milling machining processes. The occurrence of damage is predicted by a schematic explanation based on the mechanisms of material removal which in turn depends upon fiber cutting angles. A geometric model based on fiber cutting angle and fiber orientation angle is proposed that defines the critical and safe zone during machining and predicts the occurrence of delamination. Milling machining experiments were performed on composite samples of varying fiber orientations to verify the proposed theory. Mean fiber pulled out length was measured from the microscopic images of the damaged area to quantify the amount of damage produced. By observing the damage occurring for different fiber orientation angles and fiber cutting angles for up-milling and down-milling edges and correlating it with the material removal mechanisms as described earlier, it can be concluded that the damage/delamination mainly depends on the portion of the fiber cutting angles that lies within the critical cutting angle zone.

Keywords: unidirectional composites, milling, machining damage, delamination, carbon fiber reinforced plastics (CFRPs)

Procedia PDF Downloads 530
2587 Relationship between Independence Directors and Performance of Firms During Financial Crisis

Authors: Gladie Lui

Abstract:

The global credit crisis of 2008 aroused renewed interest in the effectiveness of corporate governance mechanisms to safeguard investor interests. In this paper, we measure the effect of the crisis from 2008 to 2009 on the stock performance of 976 Hong Kong-listed companies and examine its link to corporate governance mechanisms. It is evident that the crisis and the economic downturn affected different industries. Empirical results show that firms with an independent board and a high concentration of ownership and management ownership had lower abnormal stock returns, but a lower price volatility during the global financial crisis. These results highlight that no single corporate governance mechanism is fit for all types of financial crises and time frames. To strengthen investors’ confidence in the ability of companies to deal with such swift financial catastrophes, companies should enhance the dynamism and responsiveness of their governance mechanisms in times of turbulence.

Keywords: board of directors, capital market, corporate governance, financial crisis

Procedia PDF Downloads 430
2586 Study of Relation between Corporate Governance Mechanism and Investment Decisions Made by Companies Listed in Tehran Stock Exchange- IRAN

Authors: Roohollah Jamshidpour, Elaheh Ahmadi, Farhad Shah Veisi

Abstract:

Present research seeks to answer this question: Is there any relationship between corporate governance mechanisms and decision on corporate investments? Percentages of institutional, board of director’s, and stockholder’s ownership are among internal mechanisms of corporate governance relationship of which with investment-based decisions are studied by this research. Information on 103 companies during 1388 (2009)- 1393 (2014). Initially, research variables are identified; next, Rah Avard-e Novin software is used to gather Information. SPSS software is employed to test hypotheses with respect to descriptive and inferential statistics like correlation analysis. Research results show that percentage of institutional stockholders’ ownership has a significant direct relationship with investment decisions. For other cases, no significant relationship is observed between corporate governance mechanisms and investment decisions.

Keywords: corporate governance, company size, free floating stock, institutional investors, major shareholders

Procedia PDF Downloads 295
2585 Efficiency of PCR-RFLP for the Identification of Adulteries in Meat Formulation

Authors: Hela Gargouri, Nizar Moalla, Hassen Hadj Kacem

Abstract:

Meat adulteration affecting the safety and quality of food is becoming one of the main concerns of public interest across the world. The drastic consequences on the meat industry highlighted the urgent necessity to control the products' quality and to point out the complexity of both supply and processing circuits. Due to the expansion of this problem, the authentic testing of foods, particularly meat and its products, is deemed crucial to avoid unfair market competition and to protect consumers from fraudulent practices of meat adulteration. The adoption of authentication methods by the food quality-control laboratories is becoming a priority issue. However, in some developing countries, the number of food tests is still insignificant, although a variety of processed and traditional meat products are widely consumed. Little attention has been paid to provide an easy, fast, reproducible, and low-cost molecular test, which could be conducted in a basic laboratory. In the current study, the 359 bp fragment of the cytochrome-b gene was mapped by PCR-RFLP using firstly fresh biological supports (DNA and meat) and then turkey salami as an example of commercial processed meat. This technique has been established through several optimizations, namely: the selection of restriction enzymes. The digestion with BsmAI, SspI, and TaaI succeed to identify the seven included animal species when meat is formed by individual species and when the meat is a mixture of different origin. In this study, the PCR-RFLP technique using universal primer succeed to meet our needs by providing an indirect sequencing method identifying by restriction enzymes the specificities characterizing different species on the same amplicon reducing the number of potential tests.

Keywords: adulteration, animal species, authentication, meat, mtDNA, PCR-RFLP

Procedia PDF Downloads 112
2584 National Standard of Canada for Psychological Health and Safety in the Workplace: A Critical Review

Authors: Lucie Cote, Isabelle Rodier

Abstract:

The main objective of the research was to identify demonstrated mechanisms promoting psychological well-being and psychological health in the workplace, and to take a critical look at the 'National Standard of Canada for Psychological Health and Safety in the Workplace - Prevention, Promotion and Guidance to Staged Implementation (Standard)' as a mechanism to promote the psychological well-being and psychological health in the workplace. A review of the scientific literature was conducted, and a case study was done using data from a Canadian federal department. The following six mechanisms with an efficiency supported by most of the studies reviewed were identified: improving psychological well-being in the workplace literacy; strengthening the resilience of employees; creating an environmentally friendly and healthy workplace; promoting a healthy lifestyle; taking into account psychological characteristics in the drafting of job descriptions and tasks during the hiring process; and offering psychological self-care tools. The Standard offers several mechanisms beyond those previously identified and their implementation can be demanding. Research based on objective data and addressing the magnitude of the effect would be required.

Keywords: critical review, national standard of Canada, psychological health, workplace

Procedia PDF Downloads 238
2583 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022

Authors: Mojtaba Fayaz, Richard Hallal

Abstract:

This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.

Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks

Procedia PDF Downloads 116
2582 Experimental Modelling Gear Contact with TE77 Energy Pulse Setup

Authors: Zainab Mohammed Shukur, Najlaa Ali Alboshmina, Ali Safa Alsaegh

Abstract:

The project was investigated tribological behavior of polyether ether ketone (PEEK1000) against PEEK1000 rolling sliding (non-conformal) configuration with slip ratio 83.3%, were tested applications using a TE77 wear mechanisms and friction coefficient test rig. Under marginal lubrication conditions and the absence of film thick conditions, load 100 N was used to simulate the torque in gears 7 N.m. The friction coefficient and wear mechanisms of PEEK were studied under reciprocating roll/slide conditions with water, ethylene glycol, silicone, and base oil. Tribological tests were conducted on a TE77 high-frequency tribometer, with a disc-on-plate slide/roll (the energy pulse criterion) configuration. An Alicona G5 optical 3D micro-coordinate measurement microscope was used to investigate the surface topography and wear mechanisms. The surface roughness had been a significant effect on the friction coefficient for the PEEK/PEEK the rolling sliding contact test ethylene glycol and on the wear mechanisms. When silicone, ethylene glycol, and oil were used as a lubricant, the steady state of friction coefficient was reached faster than the other lubricant. Results describe the effect of the film thick with slip ratio of 83.3% on the tribological performance.

Keywords: polymer, rolling- sliding, energy pulse, gear contact

Procedia PDF Downloads 142
2581 The Security Trade-Offs in Resource Constrained Nodes for IoT Application

Authors: Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve

Abstract:

The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%.

Keywords: energy consumption, IEEE 802.15.4, IoT security, security cost evaluation

Procedia PDF Downloads 168
2580 Using Printouts as Social Media Evidence and Its Authentication in the Courtroom

Authors: Chih-Ping Chang

Abstract:

Different from traditional objective evidence, social media evidence has its own characteristics with easily tampering, recoverability, and cannot be read without using other devices (such as a computer). Simply taking a screenshot from social network sites must be questioned its original identity. When the police search and seizure digital information, a common way they use is to directly print out digital data obtained and ask the signature of the parties at the presence, without taking original digital data back. In addition to the issue on its original identity, this conduct to obtain evidence may have another two results. First, it will easily allege that is tampering evidence because the police wanted to frame the suspect and falsified evidence. Second, it is not easy to discovery hidden information. The core evidence associated with crime may not appear in the contents of files. Through discovery the original file, data related to the file, such as the original producer, creation time, modification date, and even GPS location display can be revealed from hidden information. Therefore, how to show this kind of evidence in the courtroom will be arguably the most important task for ruling social media evidence. This article, first, will introduce forensic software, like EnCase, TCT, FTK, and analyze their function to prove the identity with another digital data. Then turning back to the court, the second part of this article will discuss legal standard for authentication of social media evidence and application of that forensic software in the courtroom. As the conclusion, this article will provide a rethinking, that is, what kind of authenticity is this rule of evidence chase for. Does legal system automatically operate the transcription of scientific knowledge? Or furthermore, it wants to better render justice, not only under scientific fact, but through multivariate debating.

Keywords: federal rule of evidence, internet forensic, printouts as evidence, social media evidence, United States v. Vayner

Procedia PDF Downloads 290
2579 Nitric Oxide and Potassium Channels but Not Opioid and Cannabinoid Receptors Mediate Tramadol-Induced Peripheral Antinociception in Rat Model of Paw Pressure Withdrawal

Authors: Raquel R. Soares-Santos, Daniel P. Machado, Thiago L. Romero, Igor D. G. Duarte

Abstract:

Tramadol, an analgesic classified as an 'atypical opioid,' exhibits both opioid and non-opioid mechanisms of action. This study aimed to explore these mechanisms, specifically the opioid-, cannabinoid-, nitric oxide-, and potassium channel-based mechanisms, which contribute to the peripheral antinociception effect of tramadol, in an experimental rat model. The nociceptive threshold was determined using paw pressure withdrawal. To examine the mechanisms of action, several substances were administered intraplantarly: naloxone, a non-selective opioid antagonist (50 μg/paw); AM251 (80 μg/paw) and AM630 (100 μg/paw) as the selective antagonists for type 1 and type 2 cannabinoid receptors, respectively; nitric oxide synthase inhibitors L-NOArg, L-NIO, L-NPA, and L-NIL (24 μg/paw); and the enzyme inhibitors of guanylatocyclase and phosphodiesterase of cGMP, ODQ and zaprinast. Additionally, potassium channel blockers glibenclamide, tetraethylammonium, dequalinium, and paxillin were used. The results showed that opioid and cannabinoid receptor antagonists did not reverse tramadol’s effects. L-NOarg, L-NIO, and L-NPA partially reversed antinociception, while ODQ completely reversed, and zaprinast enhanced tramadol’s antinociception effect. Notably, glibenclamide blocked tramadol’s antinociception in a dose-dependent manner. These findings suggest that tramadol’s peripheral antinociception effect is likely mediated by the nitrergic pathway and sensitive ATP potassium channels, rather than the opioid and cannabinoid pathways.

Keywords: tramadol, nitric oxide, potassium channels, peripheral analgesia, opioid

Procedia PDF Downloads 9
2578 Traditional Mechanisms of Conflict Resolution in Africa: A Pathway to Sustainable Peace in Nigeria

Authors: Ejovi Eghwubare Augustine

Abstract:

This study delved into the traditional mechanisms of conflict resolution in Africa, a pathway to sustainable peace in Nigeria. It deployed the quantitative and qualitative methods of data collection and content analysis. The work adopted the Peace Process theory propounded by John Darby and Roger Macunity. It ascertained that disputes or disagreements are unarguably and necessarily an inevitable part of human existence, flowing directly from communication, interaction, and relationships which can occur at individual and national levels, even at international levels in view of the current trend of globalization. The alternative Dispute Resolution (ADR) mechanism is a basket of procedures outside the traditional process of litigation or strict determination of legal rights. It may also be elucidated as a range of procedures that serve as generally involve the intercession and assistance of a neutral and impartial third party. The traditional mechanisms of conflict resolution in Africa are alien to the Western world; this paper is of utmost importance to the Western world and also enriched their pool of literature. Nigeria is a country that is dominated by various ethnic groups anchored on diverse cultures, customs, and traditions. It is, therefore, not surprising to see conflicts arise, and despite the various attempts at resolving these conflicts through litigation, they still remained unabated. The paper investigated the lessons learned from Traditional Mechanisms of Conflict resolution; it also interrogated its impact and the way forward. In light of the lessons that were learned and the impact of the traditional mechanisms of conflict resolution, suggestions on how to attain a sustainable, peaceful society were proffered. In conclusion, the study crystallized reforms on the alternative dispute resolution introduced through the traditional mechanism, which includes, amongst others, that constitutional recognition should be given to traditional institutions of conflict resolution to enable quick dispensation of matters.

Keywords: traditional, conflict, peace, resolution

Procedia PDF Downloads 72
2577 VANETs: Security Challenges and Future Directions

Authors: Jared Oluoch

Abstract:

Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the network is not guaranteed, several attacks can occur, thereby compromising the robustness, reliability, and efficiency of the network. This paper discusses existing security mechanisms and unique properties of connected vehicles. The methodology employed in this work is exploratory. The paper reviews existing security solutions for connected vehicles. More concretely, it discusses various cryptographic mechanisms available, and suggests areas of improvement. The study proposes a combination of symmetric key encryption and public key cryptography to improve security. The study further proposes message aggregation as a technique to overcome message redundancy. This paper offers a comprehensive overview of connected vehicles technology, its applications, its security mechanisms, open challenges, and potential areas of future research.

Keywords: VANET, connected vehicles, 802.11p, WAVE, DSRC, trust, security, cryptography

Procedia PDF Downloads 312
2576 Characterization of the Worn Surfaces of Brake Discs and Friction Materials after Dynobench Tests

Authors: Ana Paula Gomes Nogueira, Pietro Tonolini, Andrea Bonfanti

Abstract:

Automotive braking systems must convert kinetic into thermal energy by friction. Nowadays, the disc brake system is the most widespread configuration on the automotive market, which its specific configuration provides a very efficient heat dissipation. At the same time, both discs and pads wear out. Different wear mechanisms can act during the braking, which makes the understanding of the phenomenon essential for the strategies to be applied when an increased lifetime of the components is required. In this study, a specific characterization approach was conducted to analyze the worn surfaces of commercial pad friction materials and its conterface cast iron disc after dynobench tests. Scanning electronic microscope (SEM), confocal microscope, and focus ion beam microscope (FIB) were used as the main tools of the analysis, and they allowed imaging of the footprint of the different wear mechanisms presenting on the worn surfaces. Aspects such as the temperature and specific ingredients of the pad friction materials are discussed since they play an important role in the wear mechanisms.

Keywords: wear mechanism, surface characterization, brake tests, friction materials, disc brake

Procedia PDF Downloads 53
2575 Drought Stress and the Importance of Osmotic Adjustment

Authors: Hooman Rowshanaie

Abstract:

The majority of green plants have 70%-90% water, this amount depend on age of plants, species, tissues of plants and also the environmental conditions that plants growth and development on it. Because of intense plant demanding to achieve the available water for growing and developing, always plants need a water sources and also mechanisms to retention the water and reduction water loss under critical situation and water deficit conditions otherwise the yield of plants would be decreased. Decreasing the yield depend on genotypes, intense of water deficit and also growth stage. Recently the mechanisms and also compound that have major role to water stress adaption of plants would be consideration. Osmotic adjustment is one of the most important mechanisms in terms of this field that many valuable researches focused on it because the majority of organic and inorganic solutes directly or even indirectly have pivotal role in this phenomenon. The contribution of OA to prevent water loss in response to water deficit and resistance to water stress taken to consideration recently and also the organic and inorganic compounds to OA tended has a high rate of significant.

Keywords: water deficit, drought stress, osmotic adjustment, organic compound, inorganic compound, solute

Procedia PDF Downloads 420
2574 Non-Invasive Techniques of Analysis of Painting in Forensic Fields

Authors: Radka Sefcu, Vaclava Antuskova, Ivana Turkova

Abstract:

A growing market with modern artworks of a high price leads to the creation and selling of artwork counterfeits. Material analysis is an important part of the process of assessment of authenticity. Knowledge of materials and techniques used by original authors is also necessary. The contribution presents possibilities of non-invasive methods of structural analysis in research on paintings. It was proved that unambiguous identification of many art materials is feasible without sampling. The combination of Raman spectroscopy with FTIR-external reflection enabled the identification of pigments and binders on selected artworks of prominent Czech painters from the first half of the 20th century – Josef Čapek, Emil Filla, Václav Špála and Jan Zrzavý. Raman spectroscopy confirmed the presence of a wide range of white pigments - lead white, zinc white, titanium white, barium white and also Freeman's white as a special white pigment of painting. Good results were obtained for red, blue and most of the yellow areas. Identification of green pigments was often impossible due to strong fluorescence. Oil was confirmed as a binding medium on most of the analyzed artworks via FTIR - external reflection. Collected data present the valuable background for the determination of art materials characteristic for each painter (his palette) and its development over time. Obtained results will further serve as comparative material for the authentication of artworks. This work has been financially supported by the project of the Ministry of the Interior of the Czech Republic: The Development of a Strategic Cluster for Effective Instrumental Technological Methods of Forensic Authentication of Modern Artworks (VJ01010004).

Keywords: non-invasive analysis, Raman spectroscopy, FTIR-external reflection, forgeries

Procedia PDF Downloads 172
2573 A Study of the British Security Disembedding Mechanism from a Comparative Political Perspective: Centering on the Bosnia War and the Russian-Ukrainian War

Authors: Yuhong Li, Luyu Mao

Abstract:

Globalization has led to an increasingly interconnected international community and transmitted risks to every corner of the world through the chain of globalization. Security risks arising from international conflicts seem inescapable. Some countries have begun to build their capacity to deal with the globalization of security risks. They establish disembedding security mechanisms that transcend spatial or temporal boundaries and promote security cooperation with countries or regions that are not geographically close. This paper proposes four hypotheses of the phenomenon of "risks and security disembedding" in the post-Cold War international society and uses them to explain The United Kingdom’s behavior in the Bosnian War and the Russo-Ukrainian War. In the Bosnian War, confident in its own security and focused on maintaining European stability, The UK has therefore chosen to be cautious in its use of force in international frameworks such as the EU and to maintain a very limited intervention in Bosnia and Herzegovina's affairs. In contrast, the failure of the EU and NATO’s security mechanism in the Russo-Ukrainian war heightened Britain's anxiety, and the volatile international situation led it to show a strong tendency towards security disembedding, choosing to conclude security communities with extra-territorial states. Analysis suggests that security mechanisms are also the starting point of conflict and that countries will rely more on disembedding mechanisms to counteract the global security risks. The current mechanism of security disembedding occurs as a result of the global proliferation of security perceptions as a symbolic token and the recognition of an expert system of security mechanisms formed by states with similar security perceptions.

Keywords: disembedding mechanism, bosnia war, the russian-ukrainian war, british security strategy

Procedia PDF Downloads 86
2572 Lightweight and Seamless Distributed Scheme for the Smart Home

Authors: Muhammad Mehran Arshad Khan, Chengliang Wang, Zou Minhui, Danyal Badar Soomro

Abstract:

Security of the smart home in terms of behavior activity pattern recognition is a totally dissimilar and unique issue as compared to the security issues of other scenarios. Sensor devices (low capacity and high capacity) interact and negotiate each other by detecting the daily behavior activity of individuals to execute common tasks. Once a device (e.g., surveillance camera, smart phone and light detection sensor etc.) is compromised, an adversary can then get access to a specific device and can damage daily behavior activity by altering the data and commands. In this scenario, a group of common instruction processes may get involved to generate deadlock. Therefore, an effective suitable security solution is required for smart home architecture. This paper proposes seamless distributed Scheme which fortifies low computational wireless devices for secure communication. Proposed scheme is based on lightweight key-session process to upheld cryptic-link for trajectory by recognizing of individual’s behavior activities pattern. Every device and service provider unit (low capacity sensors (LCS) and high capacity sensors (HCS)) uses an authentication token and originates a secure trajectory connection in network. Analysis of experiments is revealed that proposed scheme strengthens the devices against device seizure attack by recognizing daily behavior activities, minimum utilization memory space of LCS and avoids network from deadlock. Additionally, the results of a comparison with other schemes indicate that scheme manages efficiency in term of computation and communication.

Keywords: authentication, key-session, security, wireless sensors

Procedia PDF Downloads 318
2571 Alternative Dispute Resolution in the Settlement of Environmental Disputes in South Africa

Authors: M. van der Bank, C. M. van der Bank

Abstract:

Alternative Dispute Resolution denotes all forms of dispute resolution other than litigation or adjudication through the courts. This definition of Alternative Dispute Resolution, however, makes no mention of a vital consideration. ADR is the generally accepted acronym for alternative dispute resolution. Despite the choice not to proceed before a court or statutory tribunal, ADR will still be regulated by law and by the Constitution. Fairness is one of the core values of the South African constitutional order. Environmental disputes occur frequently, but due to delays and costs, ADR is a mechanism to resolve this kind of disputes which is a resolution of non-judicial mechanism. ADR can be used as a mechanism in environmental disputes that are less expensive and also more expeditious than formal litigation. ADR covers a broad range of mechanisms and processes designed to assist parties in resolving disputes creatively and effectively. In so far as this may involve the selection or design of mechanisms and processes other than formal litigation, these mechanisms and processes are not intended to supplant court adjudication, but rather to supplement it. A variety of ADR methods have been developed to deal with numerous problems encountered during environmental disputes. The research questions are: How can ADR facilitate environmental disputes in South Africa? Are they appropriate? And what improvements should be made?

Keywords: alternative dispute, environmental disputes, non-judicial, resolution and settlement

Procedia PDF Downloads 240
2570 Authentication and Legal Admissibility of 'Computer Evidence from Electronic Voting Machines' in Electoral Litigation: A Qualitative Legal Analysis of Judicial Opinions of Appellate Courts in the USA

Authors: Felix O. Omosele

Abstract:

Several studies have established that electronic voting machines are prone to multi-faceted challenges. One of which is their capacity to lose votes after the ballots might have been cast. Therefore, the international consensus appears to favour the use of electronic voting machines that are accompanied with verifiable audit paper audit trail (VVPAT). At present, there is no known study that has evaluated the impacts (or otherwise) of this verification and auditing on the authentication, admissibility and evidential weight of electronically-obtained electoral data. This legal inquiry is important as elections are sometimes won or lost in courts and on the basis of such data. This gap will be filled by the present research work. Using the United States of America as a case study, this paper employed a qualitative legal analysis of several of its appellate courts’ judicial opinions. This analysis equally unearths the necessary statutory rules and regulations that are important to the research problem. The objective of the research is to highlight the roles played by VVPAT on electoral evidence- as seen from the eyes of the court. The preliminary outcome of this qualitative analysis shows that the admissibility and weight attached to ‘Computer Evidence from e-voting machines (CEEM)’ are often treated with general standards applied to other computer-stored evidence. These standards sometimes fail to embrace the peculiar challenges faced by CEEM, particularly with respect to their tabulation and transmission. This paper, therefore, argues that CEEM should be accorded unique consideration by courts. It proposes the development of a legal standard which recognises verification and auditing as ‘weight enhancers’ for electronically-obtained electoral data.

Keywords: admissibility of computer evidence, electronic voting, qualitative legal analysis, voting machines in the USA

Procedia PDF Downloads 196
2569 White Wine Discrimination Based on Deconvoluted Surface Enhanced Raman Spectroscopy Signals

Authors: Dana Alina Magdas, Nicoleta Simona Vedeanu, Ioana Feher, Rares Stiufiuc

Abstract:

Food and beverages authentication using rapid and non-expensive analytical tools represents nowadays an important challenge. In this regard, the potential of vibrational techniques in food authentication has gained an increased attention during the last years. For wines discrimination, Raman spectroscopy appears more feasible to be used as compared with IR (infrared) spectroscopy, because of the relatively weak water bending mode in the vibrational spectroscopy fingerprint range. Despite this, the use of Raman technique in wine discrimination is in an early stage. Taking this into consideration, the wine discrimination potential of surface-enhanced Raman scattering (SERS) technique is reported in the present work. The novelty of this study, compared with the previously reported studies, concerning the application of vibrational techniques in wine discrimination consists in the fact that the present work presents the wines differentiation based on the individual signals obtained from deconvoluted spectra. In order to achieve wines classification with respect to variety, geographical origin and vintage, the peaks intensities obtained after spectra deconvolution were compared using supervised chemometric methods like Linear Discriminant Analysis (LDA). For this purpose, a set of 20 white Romanian wines from different viticultural Romanian regions four varieties, was considered. Chemometric methods applied directly to row SERS experimental spectra proved their efficiency, but discrimination markers identification found to be very difficult due to the overlapped signals as well as for the band shifts. By using this approach, a better general view related to the differences that appear among the wines in terms of compositional differentiation could be reached.

Keywords: chemometry, SERS, variety, wines discrimination

Procedia PDF Downloads 160
2568 Sustainable Production of Tin Oxide Nanoparticles: Exploring Synthesis Techniques, Formation Mechanisms, and Versatile Applications

Authors: Yemane Tadesse Gebreslassie, Henok Gidey Gebretnsae

Abstract:

Nanotechnology has emerged as a highly promising field of research with wide-ranging applications across various scientific disciplines. In recent years, tin oxide has garnered significant attention due to its intriguing properties, particularly when synthesized in the nanoscale range. While numerous physical and chemical methods exist for producing tin oxide nanoparticles, these approaches tend to be costly, energy-intensive, and involve the use of toxic chemicals. Given the growing concerns regarding human health and environmental impact, there has been a shift towards developing cost-effective and environmentally friendly processes for tin oxide nanoparticle synthesis. Green synthesis methods utilizing biological entities such as plant extracts, bacteria, and natural biomolecules have shown promise in successfully producing tin oxide nanoparticles. However, scaling up the production to an industrial level using green synthesis approaches remains challenging due to the complexity of biological substrates, which hinders the elucidation of reaction mechanisms and formation processes. Thus, this review aims to provide an overview of the various sources of biological entities and methodologies employed in the green synthesis of tin oxide nanoparticles, as well as their impact on nanoparticle properties. Furthermore, this research delves into the strides made in comprehending the mechanisms behind the formation of nanoparticles as documented in existing literature. It also sheds light on the array of analytical techniques employed to investigate and elucidate the characteristics of these minuscule particles.

Keywords: nanotechnology, tin oxide, green synthesis, formation mechanisms

Procedia PDF Downloads 53
2567 Main Tendencies of Youth Unemployment and the Regulation Mechanisms for Decreasing Its Rate in Georgia

Authors: Nino Paresashvili, Nino Abesadze

Abstract:

The modern world faces huge challenges. Globalization changed the socio-economic conditions of many countries. The current processes in the global environment have a different impact on countries with different cultures. However, an alleviation of poverty and improvement of living conditions is still the basic challenge for the majority of countries, because much of the population still lives under the official threshold of poverty. It is very important to stimulate youth employment. In order to prepare young people for the labour market, it is essential to provide them with the appropriate professional skills and knowledge. It is necessary to plan efficient activities for decreasing an unemployment rate and for developing the perfect mechanisms for regulation of a labour market. Such planning requires thorough study and analysis of existing reality, as well as development of corresponding mechanisms. Statistical analysis of unemployment is one of the main platforms for regulation of the labour market key mechanisms. The corresponding statistical methods should be used in the study process. Such methods are observation, gathering, grouping, and calculation of the generalized indicators. Unemployment is one of the most severe socioeconomic problems in Georgia. According to the past as well as the current statistics, unemployment rates always have been the most problematic issue to resolve for policy makers. Analytical works towards to the above-mentioned problem will be the basis for the next sustainable steps to solve the main problem. The results of the study showed that the choice of young people is not often due to their inclinations, their interests and the labour market demand. That is why the wrong professional orientation of young people in most cases leads to their unemployment. At the same time, it was shown that there are a number of professions in the labour market with a high demand because of the deficit the appropriate specialties. To achieve healthy competitiveness in youth employment, it is necessary to formulate regional employment programs with taking into account the regional infrastructure specifications.

Keywords: unemployment, analysis, methods, tendencies, regulation mechanisms

Procedia PDF Downloads 378
2566 Review and Classification of the Indicators and Trends Used in Bridge Performance Modeling

Authors: S. Rezaei, Z. Mirzaei, M. Khalighi, J. Bahrami

Abstract:

Bridges, as an essential part of road infrastructures, are affected by various deterioration mechanisms over time due to the changes in their performance. As changes in performance can have many negative impacts on society, it is essential to be able to evaluate and measure the performance of bridges throughout their life. This evaluation includes the development or the choice of the appropriate performance indicators, which, in turn, are measured based on the selection of appropriate models for the existing deterioration mechanism. The purpose of this article is a statistical study of indicators and deterioration mechanisms of bridges in order to discover further research capacities in bridges performance assessment. For this purpose, some of the most common indicators of bridge performance, including reliability, risk, vulnerability, robustness, and resilience, were selected. The researches performed on each index based on the desired deterioration mechanisms and hazards were comprehensively reviewed. In addition, the formulation of the indicators and their relationship with each other were studied. The research conducted on the mentioned indicators were classified from the point of view of deterministic or probabilistic method, the level of study (element level, object level, etc.), and the type of hazard and the deterioration mechanism of interest. For each of the indicators, a number of challenges and recommendations were presented according to the review of previous studies.

Keywords: bridge, deterioration mechanism, lifecycle, performance indicator

Procedia PDF Downloads 105
2565 Corporate Governance Mechanisms, Whistle-Blowing Policy and Earnings Management Practices of Firms in Malaysia

Authors: Mujeeb Saif Mohsen Al-Absy, Ku Nor Izah Ku Ismail, Sitraselvi Chandren

Abstract:

This study examines whether corporate governance (CG) mechanisms in firms that have a whistle-blowing policy (WHBLP) are more effective in constraining earnings management (EM), than those without. A sample of 288 Malaysian firms for the years 2013 to 2015, amounting to 864 firm-years were grouped into firms with and without WHBLP. Results show that for firms without WHBLP, the board chairman tenure would minimize EM activities. Meanwhile, for firms with WHBLP, board chairman independence, board chairman tenure, audit committee size, audit committee meeting and women in the audit committees are found to be associated with less EM activities. Further, it is found that ownership concentration and Big 4 auditing firms help to reduce EM activities in firms with WHBLP, while not in firms without WHBLP. Hence, functional and effective governance can be achieved by having a WHBLP, which is in line with agency and resource dependent theories. Therefore, this study suggests that firms should have a WHBLP in place, and policymakers should come up with enhanced criteria to strengthen the mechanisms of WHBLP.

Keywords: corporate governance, earnings management, whistle-blowing policy, audit committee, board of directors

Procedia PDF Downloads 135
2564 Argumentative and Enunciative Analysis of Spanish Political Discourse

Authors: Cristina Diez

Abstract:

One of the most important challenges of discourse analysis is to find the linguistic mechanisms of subjectivity. The present article aims to raise the need for an argumentative and enunciative analysis to reach the subjective tissue of language. The intention is to prove that the instructions inscribed in the own language are those that indicate how a statement is to be interpreted and that the argumentative value is implied at the semantic level. For that, the theory of argumentation from Ducrot and Anscombre will be implemented. First, a reflection on the study about subjectivity and enunciation in language will be exposed, followed by concrete proposals on the linguistic mechanisms that speakers use either consciously or unconsciously, to finally focus on those argumentative tools that political discourse uses in order to influence the audience.

Keywords: argumentation, enunciation, discourse analysis, subjectivity

Procedia PDF Downloads 201
2563 Critical Analysis of Different Actuation Techniques for a Micro Cantilever

Authors: B. G. Sheeparamatti, Prashant Hanasi, Vanita Abbigeri

Abstract:

The objective of this work is to carry out a critical comparison of different actuation mechanisms like electrostatic, thermal, piezoelectric, and magnetic with reference to a microcantilever. The relevant parameters like force generated, displacement are compared in actuation methods. With these results, they help in choosing the best actuation method for a particular application. In this study, Comsol/Multiphysics software is used. Modeling and simulation are done by considering the microcantilever of same dimensions as an actuator using all the above-mentioned actuation techniques. In addition to their small size, micro actuators consume very little power and are capable of accurate results. In this work, a comparison of actuation mechanisms is done to decide the efficient system in the micro domain.

Keywords: actuation techniques, microswitch, micro actuator, microsystems

Procedia PDF Downloads 408