Search results for: elliptic integral
707 Identity-Based Encryption: A Comparison of Leading Classical and Post-Quantum Implementations in an Enterprise Setting
Authors: Emily Stamm, Neil Smyth, Elizabeth O'Sullivan
Abstract:
In Identity-Based Encryption (IBE), an identity, such as a username, email address, or domain name, acts as the public key. IBE consolidates the PKI by eliminating the repetitive process of requesting public keys for each message encryption. Two of the most popular schemes are Sakai-Kasahara (SAKKE), which is based on elliptic curve pairings, and the Ducas, Lyubashevsky, and Prest lattice scheme (DLP- Lattice), which is based on quantum-secure lattice cryptography. In or- der to embed the schemes in a standard enterprise setting, both schemes are implemented as shared system libraries and integrated into a REST service that functions at the enterprise level. The performance of both schemes as libraries and services is compared, and the practicalities of implementation and application are discussed. Our performance results indicate that although SAKKE has the smaller key and ciphertext sizes, DLP-Lattice is significantly faster overall and we recommend it for most enterprise use cases.Keywords: identity-based encryption, post-quantum cryptography, lattice-based cryptography, IBE
Procedia PDF Downloads 134706 Influence of Photophysical Parameters of Photoactive Materials on Exciton Diffusion Length and Diffusion Coefficient in Bulk Heterojunction Organic Solar Cells
Authors: Douglas Yeboah, Jai Singh
Abstract:
It has been experimentally demonstrated that exciton diffusion length in organic solids can be improved by fine-tuning the material parameters that govern exciton transfer. Here, a theoretical study is carried out to support this finding. We have therefore derived expressions for the exciton diffusion length and diffusion coefficient of singlet and triplet excitons using Förster resonance energy transfer and Dexter carrier transfer mechanisms and are plotted as a function of photoluminescence (PL) quantum yield, spectral overlap integral, refractive index and dipole moment of the photoactive material. We found that singlet exciton diffusion length increases with PL quantum yield and spectral overlap integral, and decreases with increase in refractive index. Likewise, the triplet exciton diffusion length increases when PL quantum yield increases and dipole moment decreases. The calculated diffusion lengths in different organic materials are compared with existing experimental values and found to be in reasonable agreement. The results are expected to provide insight in developing new organic materials for fabricating bulk heterojunction (BHJ) organic solar cells (OSCs) with better photoconversion efficiency.Keywords: Dexter carrier transfer, diffusion coefficient, exciton diffusion length, Föster resonance energy transfer, photoactive materials, photophysical parameters
Procedia PDF Downloads 333705 Assessing of Social Comfort of the Russian Population with Big Data
Authors: Marina Shakleina, Konstantin Shaklein, Stanislav Yakiro
Abstract:
The digitalization of modern human life over the last decade has facilitated the acquisition, storage, and processing of data, which are used to detect changes in consumer preferences and to improve the internal efficiency of the production process. This emerging trend has attracted academic interest in the use of big data in research. The study focuses on modeling the social comfort of the Russian population for the period 2010-2021 using big data. Big data provides enormous opportunities for understanding human interactions at the scale of society with plenty of space and time dynamics. One of the most popular big data sources is Google Trends. The methodology for assessing social comfort using big data involves several steps: 1. 574 words were selected based on the Harvard IV-4 Dictionary adjusted to fit the reality of everyday Russian life. The set of keywords was further cleansed by excluding queries consisting of verbs and words with several lexical meanings. 2. Search queries were processed to ensure comparability of results: the transformation of data to a 10-point scale, elimination of popularity peaks, detrending, and deseasoning. The proposed methodology for keyword search and Google Trends processing was implemented in the form of a script in the Python programming language. 3. Block and summary integral indicators of social comfort were constructed using the first modified principal component resulting in weighting coefficients values of block components. According to the study, social comfort is described by 12 blocks: ‘health’, ‘education’, ‘social support’, ‘financial situation’, ‘employment’, ‘housing’, ‘ethical norms’, ‘security’, ‘political stability’, ‘leisure’, ‘environment’, ‘infrastructure’. According to the model, the summary integral indicator increased by 54% and was 4.631 points; the average annual rate was 3.6%, which is higher than the rate of economic growth by 2.7 p.p. The value of the indicator describing social comfort in Russia is determined by 26% by ‘social support’, 24% by ‘education’, 12% by ‘infrastructure’, 10% by ‘leisure’, and the remaining 28% by others. Among 25% of the most popular searches, 85% are of negative nature and are mainly related to the blocks ‘security’, ‘political stability’, ‘health’, for example, ‘crime rate’, ‘vulnerability’. Among the 25% most unpopular queries, 99% of the queries were positive and mostly related to the blocks ‘ethical norms’, ‘education’, ‘employment’, for example, ‘social package’, ‘recycling’. In conclusion, the introduction of the latent category ‘social comfort’ into the scientific vocabulary deepens the theory of the quality of life of the population in terms of the study of the involvement of an individual in the society and expanding the subjective aspect of the measurements of various indicators. Integral assessment of social comfort demonstrates the overall picture of the development of the phenomenon over time and space and quantitatively evaluates ongoing socio-economic policy. The application of big data in the assessment of latent categories gives stable results, which opens up possibilities for their practical implementation.Keywords: big data, Google trends, integral indicator, social comfort
Procedia PDF Downloads 200704 Combination of Plantar Pressure and Star Excursion Balance Test for Evaluation of Dynamic Posture Control on High-Heeled Shoes
Authors: Yan Zhang, Jan Awrejcewicz, Lin Fu
Abstract:
High-heeled shoes force the foot into plantar flexion position resulting in foot arch rising and disturbance of the articular congruence between the talus and tibiofibular mortice, all of which may increase the challenge of balance maintenance. Plantar pressure distribution of the stance limb during the star excursion balance test (SEBT) contributes to the understanding of potential sources of reaching excursions in SEBT. The purpose of this study is to evaluate the dynamic posture control while wearing high-heeled shoes using SEBT in a combination of plantar pressure measurement. Twenty healthy young females were recruited. Shoes of three heel heights were used: flat (0.8 cm), low (4.0 cm), high (6.6 cm). The testing grid of SEBT consists of three lines extending out at 120° from each other, which were defined as anterior, posteromedial, and posterolateral directions. Participants were instructed to stand on their dominant limb with the heel in the middle of the testing grid and hands on hips and to reach the non-stance limb as far as possible towards each direction. The distal portion of the reaching limb lightly touched the ground without shifting weight. Then returned the reaching limb to the beginning position. The excursion distances were normalized to leg length. The insole plantar measurement system was used to record peak pressure, contact area, and pressure-time integral of the stance limb. Results showed that normalized excursion distance decreased significantly as heel height increased. The changes of plantar pressure in SEBT as heel height increased were more obvious in the medial forefoot (MF), medial midfoot (MM), rearfoot areas. At MF, the peak pressure and pressure-time integral of low and high shoes increased significantly compared with that of flat shoes, while the contact area decreased significantly as heel height increased. At MM, peak pressure, contact area, and pressure-time integral of high and low shoes were significantly lower than that of flat shoes. To reduce posture instability, the stance limb plantar loading shifted to medial forefoot. Knowledge of this study identified dynamic posture control deficits while wearing high-heeled shoes and the critical role of the medial forefoot in dynamic balance maintenance.Keywords: dynamic posture control, high-heeled shoes, plantar pressure, star excursion balance test.
Procedia PDF Downloads 134703 Solution for Thick Plate Resting on Winkler Foundation by Symplectic Geometry Method
Authors: Mei-Jie Xu, Yang Zhong
Abstract:
Based on the symplectic geometry method, the theory of Hamilton system can be applied in the analysis of problem solved using the theory of elasticity and in the solution of elliptic partial differential equations. With this technique, this paper derives the theoretical solution for a thick rectangular plate with four free edges supported on a Winkler foundation by variable separation method. In this method, the governing equation of thick plate was first transformed into state equations in the Hamilton space. The theoretical solution of this problem was next obtained by applying the method of variable separation based on the Hamilton system. Compared with traditional theoretical solutions for rectangular plates, this method has the advantage of not having to assume the form of deflection functions in the solution process. Numerical examples are presented to verify the validity of the proposed solution method.Keywords: symplectic geometry method, Winkler foundation, thick rectangular plate, variable separation method, Hamilton system
Procedia PDF Downloads 305702 A Study of Algebraic Structure Involving Banach Space through Q-Analogue
Authors: Abdul Hakim Khan
Abstract:
The aim of the present paper is to study the Banach Space and Combinatorial Algebraic Structure of R. It is further aimed to study algebraic structure of set of all q-extension of classical formula and function for 0 < q < 1.Keywords: integral functions, q-extensions, q numbers of metric space, algebraic structure of r and banach space
Procedia PDF Downloads 579701 Tunable Graphene Metasurface Modeling Using the Method of Moment Combined with Generalised Equivalent Circuit
Authors: Imen Soltani, Takoua Soltani, Taoufik Aguili
Abstract:
Metamaterials crossover classic physical boundaries and gives rise to new phenomena and applications in the domain of beam steering and shaping. Where electromagnetic near and far field manipulations were achieved in an accurate manner. In this sense, 3D imaging is one of the beneficiaries and in particular Denis Gabor’s invention: holography. But, the major difficulty here is the lack of a suitable recording medium. So some enhancements were essential, where the 2D version of bulk metamaterials have been introduced the so-called metasurface. This new class of interfaces simplifies the problem of recording medium with the capability of tuning the phase, amplitude, and polarization at a given frequency. In order to achieve an intelligible wavefront control, the electromagnetic properties of the metasurface should be optimized by means of solving Maxwell’s equations. In this context, integral methods are emerging as an important method to study electromagnetic from microwave to optical frequencies. The method of moment presents an accurate solution to reduce the problem of dimensions by writing its boundary conditions in the form of integral equations. But solving this kind of equations tends to be more complicated and time-consuming as the structural complexity increases. Here, the use of equivalent circuit’s method exhibits the most scalable experience to develop an integral method formulation. In fact, for allaying the resolution of Maxwell’s equations, the method of Generalised Equivalent Circuit was proposed to convey the resolution from the domain of integral equations to the domain of equivalent circuits. In point of fact, this technique consists in creating an electric image of the studied structure using discontinuity plan paradigm and taken into account its environment. So that, the electromagnetic state of the discontinuity plan is described by generalised test functions which are modelled by virtual sources not storing energy. The environmental effects are included by the use of an impedance or admittance operator. Here, we propose a tunable metasurface composed of graphene-based elements which combine the advantages of reflectarrays concept and graphene as a pillar constituent element at Terahertz frequencies. The metasurface’s building block consists of a thin gold film, a dielectric spacer SiO₂ and graphene patch antenna. Our electromagnetic analysis is based on the method of moment combined with generalised equivalent circuit (MoM-GEC). We begin by restricting our attention to study the effects of varying graphene’s chemical potential on the unit cell input impedance. So, it was found that the variation of complex conductivity of graphene allows controlling the phase and amplitude of the reflection coefficient at each element of the array. From the results obtained here, we were able to determine that the phase modulation is realized by adjusting graphene’s complex conductivity. This modulation is a viable solution compared to tunning the phase by varying the antenna length because it offers a full 2π reflection phase control.Keywords: graphene, method of moment combined with generalised equivalent circuit, reconfigurable metasurface, reflectarray, terahertz domain
Procedia PDF Downloads 176700 SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks Using Stateful Public Key Cryptography
Authors: Merad Boudia Omar Rafik, Feham Mohammed
Abstract:
Data aggregation in wireless sensor networks (WSNs) provides a great reduction of energy consumption. The limited resources of sensor nodes make the choice of an encryption algorithm very important for providing security for data aggregation. Asymmetric cryptography involves large ciphertexts and heavy computations but solves, on the other hand, the problem of key distribution of symmetric one. The latter provides smaller ciphertexts and speed computations. Also, the recent researches have shown that achieving the end-to-end confidentiality and the end-to-end integrity at the same is a challenging task. In this paper, we propose (SA-SPKC), a novel security protocol which addresses both security services for WSNs, and where only the base station can verify the individual data and identify the malicious node. Our scheme is based on stateful public key encryption (StPKE). The latter combines the best features of both kinds of encryption along with state in order to reduce the computation overhead. Our analysisKeywords: secure data aggregation, wireless sensor networks, elliptic curve cryptography, homomorphic encryption
Procedia PDF Downloads 297699 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement
Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi
Abstract:
Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle
Procedia PDF Downloads 219698 Rogue Waves Arising on the Standing Periodic Wave in the High-Order Ablowitz-Ladik Equation
Authors: Yanpei Zhen
Abstract:
The nonlinear Schrödinger (NLS) equation models wave dynamics in many physical problems related to fluids, plasmas, and optics. The standing periodic waves are known to be modulationally unstable, and rogue waves (localized perturbations in space and time) have been observed on their backgrounds in numerical experiments. The exact solutions for rogue waves arising on the periodic standing waves have been obtained analytically. It is natural to ask if the rogue waves persist on the standing periodic waves in the integrable discretizations of the integrable NLS equation. We study the standing periodic waves in the semidiscrete integrable system modeled by the high-order Ablowitz-Ladik (AL) equation. The standing periodic wave of the high-order AL equation is expressed by the Jacobi cnoidal elliptic function. The exact solutions are obtained by using the separation of variables and one-fold Darboux transformation. Since the cnoidal wave is modulationally unstable, the rogue waves are generated on the periodic background.Keywords: Darboux transformation, periodic wave, Rogue wave, separating the variables
Procedia PDF Downloads 183697 On Crack Tip Stress Field in Pseudo-Elastic Shape Memory Alloys
Authors: Gulcan Ozerim, Gunay Anlas
Abstract:
In shape memory alloys, upon loading, stress increases around crack tip and a martensitic phase transformation occurs in early stages. In many studies the stress distribution in the vicinity of the crack tip is represented by using linear elastic fracture mechanics (LEFM) although the pseudo-elastic behavior results in a nonlinear stress-strain relation. In this study, the HRR singularity (Hutchinson, Rice and Rosengren), that uses Rice’s path independent J-integral, is tried to formulate the stress distribution around the crack tip. In HRR approach, the Ramberg-Osgood model for the stress-strain relation of power-law hardening materials is used to represent the elastic-plastic behavior. Although it is recoverable, the inelastic portion of the deformation in martensitic transformation (up to the end of transformation) resembles to that of plastic deformation. To determine the constants of the Ramberg-Osgood equation, the material’s response is simulated in ABAQUS using a UMAT based on ZM (Zaki-Moumni) thermo-mechanically coupled model, and the stress-strain curve of the material is plotted. An edge cracked shape memory alloy (Nitinol) plate is loaded quasi-statically under mode I and modeled using ABAQUS; the opening stress values ahead of the cracked tip are calculated. The stresses are also evaluated using the asymptotic equations of both LEFM and HRR. The results show that in the transformation zone around the crack tip, the stress values are much better represented when the HRR singularity is used although the J-integral does not show path independent behavior. For the nodes very close to the crack tip, the HRR singularity is not valid due to the non-proportional loading effect and high-stress values that go beyond the transformation finish stress.Keywords: crack, HRR singularity, shape memory alloys, stress distribution
Procedia PDF Downloads 325696 New Hardy Type Inequalities of Two-Dimensional on Time Scales via Steklov Operator
Authors: Wedad Albalawi
Abstract:
The mathematical inequalities have been the core of mathematical study and used in almost all branches of mathematics as well in various areas of science and engineering. The inequalities by Hardy, Littlewood and Polya were the first significant composition of several science. This work presents fundamental ideas, results and techniques, and it has had much influence on research in various branches of analysis. Since 1934, various inequalities have been produced and studied in the literature. Furthermore, some inequalities have been formulated by some operators; in 1989, weighted Hardy inequalities have been obtained for integration operators. Then, they obtained weighted estimates for Steklov operators that were used in the solution of the Cauchy problem for the wave equation. They were improved upon in 2011 to include the boundedness of integral operators from the weighted Sobolev space to the weighted Lebesgue space. Some inequalities have been demonstrated and improved using the Hardy–Steklov operator. Recently, a lot of integral inequalities have been improved by differential operators. Hardy inequality has been one of the tools that is used to consider integrity solutions of differential equations. Then, dynamic inequalities of Hardy and Coposon have been extended and improved by various integral operators. These inequalities would be interesting to apply in different fields of mathematics (functional spaces, partial differential equations, mathematical modeling). Some inequalities have been appeared involving Copson and Hardy inequalities on time scales to obtain new special version of them. A time scale is an arbitrary nonempty closed subset of the real numbers. Then, the dynamic inequalities on time scales have received a lot of attention in the literature and has become a major field in pure and applied mathematics. There are many applications of dynamic equations on time scales to quantum mechanics, electrical engineering, neural networks, heat transfer, combinatorics, and population dynamics. This study focuses on Hardy and Coposon inequalities, using Steklov operator on time scale in double integrals to obtain special cases of time-scale inequalities of Hardy and Copson on high dimensions. The advantage of this study is that it uses the one-dimensional classical Hardy inequality to obtain higher dimensional on time scale versions that will be applied in the solution of the Cauchy problem for the wave equation. In addition, the obtained inequalities have various applications involving discontinuous domains such as bug populations, phytoremediation of metals, wound healing, maximization problems. The proof can be done by introducing restriction on the operator in several cases. The concepts in time scale version such as time scales calculus will be used that allows to unify and extend many problems from the theories of differential and of difference equations. In addition, using chain rule, and some properties of multiple integrals on time scales, some theorems of Fubini and the inequality of H¨older.Keywords: time scales, inequality of hardy, inequality of coposon, steklov operator
Procedia PDF Downloads 95695 Step Height Calibration Using Hamming Window: Band-Pass Filter
Authors: Dahi Ghareab Abdelsalam Ibrahim
Abstract:
Calibration of step heights with high accuracy is needed for many applications in the industry. In general, step height consists of three bands: pass band, transition band (roll-off), and stop band. Abdelsalam used a convolution of the transfer functions of both Chebyshev type 2 and elliptic filters with WFF of the Fresnel transform in the frequency domain for producing a steeper roll-off with the removal of ripples in the pass band- and stop-bands. In this paper, we used a new method based on the Hamming window: band-pass filter for calibration of step heights in terms of perfect adjustment of pass-band, roll-off, and stop-band. The method is applied to calibrate a nominal step height of 40 cm. The step height is measured first by asynchronous dual-wavelength phase-shift interferometry. The measured step height is then calibrated by the simulation of the Hamming window: band-pass filter. The spectrum of the simulated band-pass filter is simulated at N = 881 and f0 = 0.24. We can conclude that the proposed method can calibrate any step height by adjusting only two factors which are N and f0.Keywords: optical metrology, step heights, hamming window, band-pass filter
Procedia PDF Downloads 83694 University of Bejaia, Algeria
Authors: Geoffrey Sinha
Abstract:
Today’s students are connected to the digital generation and technology is an integral part of their everyday lives. Clearly, this is one social revolution that is here to stay and the language classroom has been no exception. Furthermore, today’s teachers are also expected to connect with technology and online tools in their curriculum. However, it’s often difficult for teachers to know where to start, what resources and tools are available, what students should use, and most importantly, how to effectively use them in the classroom.Keywords: language learning, new media, social media, technology
Procedia PDF Downloads 464693 Methods for Solving Identification Problems
Authors: Fadi Awawdeh
Abstract:
In this work, we highlight the key concepts in using semigroup theory as a methodology used to construct efficient formulas for solving inverse problems. The proposed method depends on some results concerning integral equations. The experimental results show the potential and limitations of the method and imply directions for future work.Keywords: identification problems, semigroup theory, methods for inverse problems, scientific computing
Procedia PDF Downloads 481692 Efficient Semi-Systolic Finite Field Multiplier Using Redundant Basis
Authors: Hyun-Ho Lee, Kee-Won Kim
Abstract:
The arithmetic operations over GF(2m) have been extensively used in error correcting codes and public-key cryptography schemes. Finite field arithmetic includes addition, multiplication, division and inversion operations. Addition is very simple and can be implemented with an extremely simple circuit. The other operations are much more complex. The multiplication is the most important for cryptosystems, such as the elliptic curve cryptosystem, since computing exponentiation, division, and computing multiplicative inverse can be performed by computing multiplication iteratively. In this paper, we present a parallel computation algorithm that operates Montgomery multiplication over finite field using redundant basis. Also, based on the multiplication algorithm, we present an efficient semi-systolic multiplier over finite field. The multiplier has less space and time complexities compared to related multipliers. As compared to the corresponding existing structures, the multiplier saves at least 5% area, 50% time, and 53% area-time (AT) complexity. Accordingly, it is well suited for VLSI implementation and can be easily applied as a basic component for computing complex operations over finite field, such as inversion and division operation.Keywords: finite field, Montgomery multiplication, systolic array, cryptography
Procedia PDF Downloads 294691 Graphical Theoretical Construction of Discrete time Share Price Paths from Matroid
Authors: Min Wang, Sergey Utev
Abstract:
The lessons from the 2007-09 global financial crisis have driven scientific research, which considers the design of new methodologies and financial models in the global market. The quantum mechanics approach was introduced in the unpredictable stock market modeling. One famous quantum tool is Feynman path integral method, which was used to model insurance risk by Tamturk and Utev and adapted to formalize the path-dependent option pricing by Hao and Utev. The research is based on the path-dependent calculation method, which is motivated by the Feynman path integral method. The path calculation can be studied in two ways, one way is to label, and the other is computational. Labeling is a part of the representation of objects, and generating functions can provide many different ways of representing share price paths. In this paper, the recent works on graphical theoretical construction of individual share price path via matroid is presented. Firstly, a study is done on the knowledge of matroid, relationship between lattice path matroid and Tutte polynomials and ways to connect points in the lattice path matroid and Tutte polynomials is suggested. Secondly, It is found that a general binary tree can be validly constructed from a connected lattice path matroid rather than general lattice path matroid. Lastly, it is suggested that there is a way to represent share price paths via a general binary tree, and an algorithm is developed to construct share price paths from general binary trees. A relationship is also provided between lattice integer points and Tutte polynomials of a transversal matroid. Use this way of connection together with the algorithm, a share price path can be constructed from a given connected lattice path matroid.Keywords: combinatorial construction, graphical representation, matroid, path calculation, share price, Tutte polynomial
Procedia PDF Downloads 138690 Subjective Well-being, Beliefs, and Lifestyles of First Year University Students in the UK
Authors: Kaili C. Zhang
Abstract:
Mental well-being is an integral part of university students’ overall well-being and has been a matter of increasing concern in the UK. This study addressed the impact of university experience on students by investigating the changes students experience in their beliefs, lifestyles, and well-being during their first year of study, as well as the factors contributing to such changes. Using a longitudinal two-wave mixed method design, this project identified importantfactors that contribute to or inhibit these changes. Implications for universities across the UK are discussed.Keywords: subjective well-being, beliefs, lifestyles, university students
Procedia PDF Downloads 198689 Degree of Approximation of Functions by Product Means
Authors: Hare Krishna Nigam
Abstract:
In this paper, for the first time, (E,q)(C,2) product summability method is introduced and two quite new results on degree of approximation of the function f belonging to Lip (alpha,r)class and W(L(r), xi(t)) class by (E,q)(C,2) product means of Fourier series, has been obtained.Keywords: Degree of approximation, (E, q)(C, 2) means, Fourier series, Lebesgue integral, Lip (alpha, r)class, W(L(r), xi(t))class of functions
Procedia PDF Downloads 517688 Normative Reflections on the International Court of Justice's Jurisprudence on the Protection of Human Rights in Times of War
Authors: Roger-Claude Liwanga
Abstract:
This article reflects on the normative aspects of the jurisprudence on the protection of human rights in times of war that the International Court of Justice (ICJ) developed in 2005 in the Case Concerning Armed Activities on the Territory of the Congo (Democratic Republic of Congo v. Uganda). The article focuses on theories raised in connection with the Democratic Republic of Congo (DRC)'s claim of the violation of human rights of its populations by Uganda as opposed to the violation of its territorial integrity claims. The article begins with a re-visitation of the doctrine of state extraterritorial responsibility for violations of human rights by suggesting that a state's accountability for the breach of its international obligations is not territorially confined but rather transcends the State's national borders. The article highlights the criteria of assessing the State's extraterritorial responsibility, including the circumstances: (1) where the concerned State has effective control over the territory of another State in the context of belligerent occupation, and (2) when the unlawful actions committed by the State's organs on the occupied territory can be attributable to that State. The article also analyzes the ICJ's opinions articulated in DRC v. Uganda with reference to the relationship between human rights law and humanitarian law, and it contends that the ICJ had revised the traditional interaction between these two bodies of law to the extent that human rights law can no longer be excluded from applying in times of war as both branches are complementary rather than exclusive. The article correspondingly looks at the issue of reparations for victims of human rights violations. It posits that reparations for victims of human rights violations should be integral (including restitution, compensation, rehabilitation, satisfaction, and guarantees of non-repetition). Yet, the article concludes by emphasizing that reparations for victims were not integral in DRC v. Uganda because: (1) the ICJ failed to set a reasonable timeframe for the negotiations between the DRC and Uganda on the amount of compensation, resulting in Uganda paying no financial reparation to the DRC since 2005; and (2) the ICJ did not request Uganda to domestically prosecute the perpetrators of human rights abuses.Keywords: human rights law, humanitarian law, civilian protection, extraterritorial responsibility
Procedia PDF Downloads 137687 Reconstruction and Rejection of External Disturbances in a Dynamical System
Authors: Iftikhar Ahmad, A. Benallegue, A. El Hadri
Abstract:
In this paper, we have proposed an observer for the reconstruction and a control law for the rejection application of unknown bounded external disturbance in a dynamical system. The strategy of both the observer and the controller is designed like a second order sliding mode with a proportional-integral (PI) term. Lyapunov theory is used to prove the exponential convergence and stability. Simulations results are given to show the performance of this method.Keywords: non-linear systems, sliding mode observer, disturbance rejection, nonlinear control
Procedia PDF Downloads 334686 Riemannain Geometries Of Visual Space
Authors: Jacek Turski
Abstract:
The visual space geometries are constructed in the Riemannian geometry framework from simulated iso-disparity conics in the horizontalvisual plane of the binocular system with the asymmetric eyes (AEs). For the eyes fixating at the abathic distance, which depends on the AE’s parameters, the iso-disparity conics are frontal straight lines in physical space. For allother fixations, the iso-disparity conics consist of families of the ellipses or hyperbolas depending on both the AE’s parameters and the bifoveal fixation. However, the iso-disparity conic’s arcs are perceived in the gaze direction asthe frontal lines and are referred to as visual geodesics. Thus, geometriesof physical and visual spaces are different. A simple postulate that combines simulated iso-disparity conics with basic anatomy od the human visual system gives the relative depth for the fixation at the abathic distance that establishes the Riemann matric tensor. The resulting geodesics are incomplete in the gaze direction and, therefore, give thefinite distances to the horizon that depend on the AE’s parameters. Moreover, the curvature vanishes in this eyes posture such that visual space is flat. For all other fixations, only the sign of the curvature canbe inferred from the global behavior of the simulated iso-disparity conics: the curvature is positive for the elliptic iso-disparity curves and negative for the hyperbolic iso-disparity curves.Keywords: asymmetric eye model, iso-disparity conics, metric tensor, geodesics, curvature
Procedia PDF Downloads 145685 Investigating the Concept of Joy in Modern English Fiction
Authors: Zarine Avetisyan
Abstract:
The paradigm of Modern Linguistics incorporates disciplines which allow to analyze both language and discourse units and to demonstrate the multi-layeredness of lingo-cultural consciousness. By implementing lingo-cognitive approach to discourse and communication studies, the present paper tries to create the integral linguistic picture of the concept of joy and to analyze the lexico-semantic groups and relevant lexico-semantic variants of its realization in the context of Modern English fiction.Keywords: concept of joy, lexico-semantic variant, semantic sign, cognition
Procedia PDF Downloads 279684 Palyno-Morphological Characteristics of Gymnosperm Flora of Pakistan and Its Taxonomic Implications with Light Microscope and Scanning Electron Microscopy Methods
Authors: Raees Khan, Sheikh Z. Ul Abidin, Abdul S. Mumtaz, Jie Liu
Abstract:
The present study is intended to assess gymnosperms pollen flora of Pakistan using Light Microscope (LM) and Scanning Electron Microscopy (SEM) for its taxonomic significance in identification of gymnosperms. Pollens of 35 gymnosperm species (12 genera and five families) were collected from its various distributional sites of gymnosperms in Pakistan. LM and SEM were used to investigate different palyno-morphological characteristics. Five pollen types (i.e., Inaperturate, Monolete, Monoporate, Vesiculate-bisaccate, and Polyplicate) were observed. In equatorial view seven types of pollens were observed, in which ten species were sub-angular, nine species were triangular, six species were perprolate, three species were rhomboidal, three species were semi-angular, two species were rectangular and two species were prolate. While five types of pollen were observed in polar view, in which ten species were spheroidal, nine species were angular, eight were interlobate, six species were circular, and two species were elliptic. Eighteen species have rugulate and 17 species has faveolate ornamentation. Eighteen species have verrucate and 17 have gemmate type sculpturing. The data was analysed through cluster analysis. The study showed that these palyno-morphological features have significance value in classification and identification of gymnosperms. Based on these different palyno-morphological features, a taxonomic key was proposed for the accurate and fast identifications of gymnosperms from Pakistan.Keywords: gymnosperms, palynology, Pakistan, taxonomy
Procedia PDF Downloads 221683 Generalization of Tau Approximant and Error Estimate of Integral Form of Tau Methods for Some Class of Ordinary Differential Equations
Authors: A. I. Ma’ali, R. B. Adeniyi, A. Y. Badeggi, U. Mohammed
Abstract:
An error estimation of the integrated formulation of the Lanczos tau method for some class of ordinary differential equations was reported. This paper is concern with the generalization of tau approximants and their corresponding error estimates for some class of ordinary differential equations (ODEs) characterized by m + s =3 (i.e for m =1, s=2; m=2, s=1; and m=3, s=0) where m and s are the order of differential equations and number of overdetermination, respectively. The general result obtained were validated with some numerical examples.Keywords: approximant, error estimate, tau method, overdetermination
Procedia PDF Downloads 606682 Value Clusters of Grade 9 Teachers in the District of Trece Martires City, Division of Cavite: Basis for a Revised Values Education Program (RVEP)"
Authors: Juland D. Salayo
Abstract:
With numerous innovations introduced in the Philippine educational system, the country’s struggle of materializing its national goal of transforming lives ends with great loss. Many agree that the failure to emerge the integral values of the program, framework and the implementers impedes realization. Employing a descriptive-correlational method, it aimed to determine the value clusters of the Grade 9 teachers as assessed by themselves and by the students, the significant difference of the assessed values and the significant difference on the values based on their profile. Respondents were composed of sixty-nine (69) teachers and three hundred forty (340) students using simple random sampling. Through a survey-questionnaire, the study revealed that the teachers have high regards on their self-reliance, honesty and trustworthiness, obedience, politeness and respect and self-discipline and spirituality. In contrast, they have ranked the following values fairly: justice and fairness, courage, responsibility and punctuality and nationalism and patriotism. Having assessed by the students, they have highly regarded their teachers’ self-reliance, responsibility and punctuality, obedience, politeness and respect and fair play and sportsmanship. On the other hand, the student-respondents made a low assessment on the level of the teachers’ justice and fairness, nationalism and patriotism, honesty and trustworthiness and excellence. Using t-test, it showed that there is a significant difference between the assessments of the respondents. Finally, among the demographic profiles, only civil status and age rejected the hypothesis. The following were recommended: provide educators value-enhancement trainings and conferences, organize value-oriented organizations and activities, and make intensive value-campaigns heightening the low-assessed values. Thus, a Revised Values Education Program (RVEP) was made to further meet the objectives of the program, address the needs of its clienteles, and responding to the demands of both education and society towards excellence in service, social and economic revolution, and constructive national goals which are based from integral values.Keywords: values, value clusters, values education program, values education, teachers' assessed values
Procedia PDF Downloads 286681 International Law and Domestic Legal Systems: Incorporation, Transformation, and Persuasion
Authors: Hamid Vahidkia
Abstract:
This article explores advancements in global law and how they interact with domestic legal systems. The article's introduction highlights that nations that gained independence from authoritarian governments tend to be more open to international law. A nation can choose to follow either a monist strategy regarding international law, viewing it as an integral part of its own legal system, or opt for a dualist approach, where it keeps its domestic law distinct from international law. The beginning goes on to recognize the origins of international law, such as treaties and countries' ways of following them, customary international law, and declarations. The introduction ends by acknowledging the growing significance and development of international law.Keywords: international law, customary law, treaties, human right
Procedia PDF Downloads 23680 Comparison of Authentication Methods in Internet of Things Technology
Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud
Abstract:
Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter. Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol
Procedia PDF Downloads 264679 Characteristics-Based Lq-Control of Cracking Reactor by Integral Reinforcement
Authors: Jana Abu Ahmada, Zaineb Mohamed, Ilyasse Aksikas
Abstract:
The linear quadratic control system of hyperbolic first order partial differential equations (PDEs) are presented. The aim of this research is to control chemical reactions. This is achieved by converting the PDEs system to ordinary differential equations (ODEs) using the method of characteristics to reduce the system to control it by using the integral reinforcement learning. The designed controller is applied to a catalytic cracking reactor. Background—Transport-Reaction systems cover a large chemical and bio-chemical processes. They are best described by nonlinear PDEs derived from mass and energy balances. As a main application to be considered in this work is the catalytic cracking reactor. Indeed, the cracking reactor is widely used to convert high-boiling, high-molecular weight hydrocarbon fractions of petroleum crude oils into more valuable gasoline, olefinic gases, and others. On the other hand, control of PDEs systems is an important and rich area of research. One of the main control techniques is feedback control. This type of control utilizes information coming from the system to correct its trajectories and drive it to a desired state. Moreover, feedback control rejects disturbances and reduces the variation effects on the plant parameters. Linear-quadratic control is a feedback control since the developed optimal input is expressed as feedback on the system state to exponentially stabilize and drive a linear plant to the steady-state while minimizing a cost criterion. The integral reinforcement learning policy iteration technique is a strong method that solves the linear quadratic regulator problem for continuous-time systems online in real time, using only partial information about the system dynamics (i.e. the drift dynamics A of the system need not be known), and without requiring measurements of the state derivative. This is, in effect, a direct (i.e. no system identification procedure is employed) adaptive control scheme for partially unknown linear systems that converges to the optimal control solution. Contribution—The goal of this research is to Develop a characteristics-based optimal controller for a class of hyperbolic PDEs and apply the developed controller to a catalytic cracking reactor model. In the first part, developing an algorithm to control a class of hyperbolic PDEs system will be investigated. The method of characteristics will be employed to convert the PDEs system into a system of ODEs. Then, the control problem will be solved along the characteristic curves. The reinforcement technique is implemented to find the state-feedback matrix. In the other half, applying the developed algorithm to the important application of a catalytic cracking reactor. The main objective is to use the inlet fraction of gas oil as a manipulated variable to drive the process state towards desired trajectories. The outcome of this challenging research would yield the potential to provide a significant technological innovation for the gas industries since the catalytic cracking reactor is one of the most important conversion processes in petroleum refineries.Keywords: PDEs, reinforcement iteration, method of characteristics, riccati equation, cracking reactor
Procedia PDF Downloads 91678 Structural and Functional Comparison of Untagged and Tagged EmrE Protein
Authors: S. Junaid S. Qazi, Denice C. Bay, Raymond Chew, Raymond J. Turner
Abstract:
EmrE, a member of the small multidrug resistance protein family in bacteria is considered to be the archetypical member of its family. It confers host resistance to a wide variety of quaternary cation compounds (QCCs) driven by proton motive force. Generally, purification yield is a challenge in all membrane proteins because of the difficulties in their expression, isolation and solubilization. EmrE is extremely hydrophobic which make the purification yield challenging. We have purified EmrE protein using two different approaches: organic solvent membrane extraction and hexahistidine (his6) tagged Ni-affinity chromatographic methods. We have characterized changes present between ligand affinity of untagged and his6-tagged EmrE proteins in similar membrane mimetic environments using biophysical experimental techniques. Purified proteins were solubilized in a buffer containing n-dodecyl-β-D-maltopyranoside (DDM) and the conformations in the proteins were explored in the presence of four QCCs, methyl viologen (MV), ethidium bromide (EB), cetylpyridinium chloride (CTP) and tetraphenyl phosphonium (TPP). SDS-Tricine PAGE and dynamic light scattering (DLS) analysis revealed that the addition of QCCs did not induce higher multimeric forms of either proteins at all QCC:EmrE molar ratios examined under the solubilization conditions applied. QCC binding curves obtained from the Trp fluorescence quenching spectra, gave the values of dissociation constant (Kd) and maximum specific one-site binding (Bmax). Lower Bmax values to QCCs for his6-tagged EmrE shows that the binding sites remained unoccupied. This lower saturation suggests that the his6-tagged versions provide a conformation that prevents saturated binding. Our data demonstrate that tagging an integral membrane protein can significantly influence the protein.Keywords: small multidrug resistance (SMR) protein, EmrE, integral membrane protein folding, quaternary ammonium compounds (QAC), quaternary cation compounds (QCC), nickel affinity chromatography, hexahistidine (His6) tag
Procedia PDF Downloads 378