Search results for: authentication mechanisms
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2709

Search results for: authentication mechanisms

2469 Ending Communal Conflicts in Africa: The Relevance of Traditional Approaches to Conflict Resolution

Authors: Kindeye Fenta Mekonnen, Alagaw Ababu Kifle

Abstract:

The failure of international responses to armed conflict to address local preconditions for national stability has recently attracted what has been called the ‘local turn’ in peace building. This ‘local turn’ in peace building amplified a renewed interest in traditional/indigenous methods of conflict resolution, a field that has been hitherto dominated by anthropologists with their focus on the procedures and rituals of such approaches. This notwithstanding, there is still limited empirical work on the relevance of traditional methods of conflict resolution to end localized conflicts vis-à-vis hybrid and modern approaches. The few exceptions to this generally draw their conclusion from very few (almost all successful) cases that make it difficult to judge the validity and cross-case application of their results. This paper seeks to fill these gaps by undertaking a quantitative analysis of the trend and applications of different communal conflict resolution initiatives, their potential to usher in long-term peace, and the extent to which their outcomes are influenced by the intensity and scope of a conflict. The paper makes the following three tentative conclusions. First, traditional mechanisms and traditional actors still dominate the communal conflict resolution landscape, either individually or in combination with other methods. Second, traditional mechanisms of conflict resolution tend to be more successful in ending a conflict and preventing its re-occurrence compared to hybrid and modern arrangements. This notwithstanding and probably due to the scholarly call for local turn in peace building, contemporary communal conflict resolution approaches are becoming less and less reliant on traditional mechanisms alone and (therefore) less effective. Third, there is yet inconclusive evidence on whether hybridization is an asset or a liability in the resolution of communal conflicts and the extent to which this might be mediated by the intensity of a conflict.

Keywords: traditional conflict resolution, hybrid conflict resolution, communal conflict, relevance, conflict intensity

Procedia PDF Downloads 82
2468 Remote Electroacupuncture Analgesia at Contralateral LI4 Acupoint in Complete Freund's Adjuvant-Induced Inflammatory Hindpaw Pain

Authors: Tong-Chien Wu, Ching-Liang Hsieh, Yi-Wen Lin

Abstract:

There are accumulating evidences surrounding the therapeutic effect of electroacupuncture (EA). Local EA can reliably attenuate inflammatory pain in mouse with unclear mechanisms. However, the effect of EA on distal and contralateral acupoint for pain control has been rarely studied and the result was controversial. Here in our study, we found that inflammatory hindpaw pain in mouth, which was induced by injecting the complete Freund’s adjuvant (CFA) 2 days ago can be alleviated immediately after 2Hz 15mins EA treatment at contralateral forefoot acupoint LI4 through both mechanic and thermal behavior test, while sham acupoint group is not. The efficacy was observed to be more obvious after the second round of EA treatment on the following day. This analgesic effect is produced by applying EA to a site remote from the painful area. The present study provides a powerful experimental animal model that can be used for investigating the unique physiological mechanisms involved in acupuncture analgesia.

Keywords: remote electroacupuncture, distal EA, pain control, anti-inflammation

Procedia PDF Downloads 187
2467 Microscopic and Mesoscopic Deformation Behaviors of Mg-2Gd Alloy with or without Li Addition

Authors: Jing Li, Li Jin, Fulin Wang, Jie Dong, Wenjiang Ding

Abstract:

Mg-Li dual-phase alloy exhibits better combination of yield strength and elongation than the Mg single-phase alloy. To exploit its deformation behavior, the deformation mechanisms of Mg-2Gd alloy with or without Li addition, i.e., Mg-6Li-2Gd and Mg-2Gd alloy, have been studied at both microscale and mesoscale. EBSD-assisted slip trace, twin trace, and texture evolution analysis show that the α-Mg phase of Mg-6Li-2Gd alloy exhibits different microscopic deformation mechanisms with the Mg-2Gd alloy, i.e., mainly prismatic slip in the former one, while basal slip, prismatic slip and extension twin in the latter one. Further Schmid factor analysis results attribute this different intra-phase deformation mechanisms to the higher critical resolved shear stress (CRSS) value of extension twin and lower ratio of CRSSprismatic /CRSSbasal in the α-Mg phase of Mg-6Li-2Gd alloy. Additionally, Li addition can induce dual-phase microstructure in the Mg-6Li-2Gd alloy, leading to the formation of hetero-deformation induced (HDI) stress at the mesoscale. This can be evidenced by the hysteresis loops appearing during the loading-unloading-reloading (LUR) tensile tests and the activation of multiple slip activity in the α-Mg phase neighboring β-Li phase. The Mg-6Li-2Gd alloy shows higher yield strength is due to the harder α-Mg phase arising from solid solution hardening of Li addition, as well asthe strengthening of soft β-Li phase by the HDI stress during yield stage. Since the strain hardening rate of Mg-6Li-2Gd alloy is lower than that of Mg-2Gd alloy after ~2% strain, which is partly due to the weak contribution of HDI stress, Mg-6Li-2Gd alloy shows no obvious increase of uniform elongation than the Mg-2Gd alloy.But since the β-Li phase is effective in blunting the crack tips, the Mg-6Li-2Gd alloy shows ununiform elongation, which, thus, leads to the higher total elongation than the Mg-2Gd alloy.

Keywords: Mg-Li-Gd dual-phase alloy, phase boundary, HDI stress, dislocation slip activity, mechanical properties

Procedia PDF Downloads 202
2466 The Development of Encrypted Near Field Communication Data Exchange Format Transmission in an NFC Passive Tag for Checking the Genuine Product

Authors: Tanawat Hongthai, Dusit Thanapatay

Abstract:

This paper presents the development of encrypted near field communication (NFC) data exchange format transmission in an NFC passive tag for the feasibility of implementing a genuine product authentication. We propose a research encryption and checking the genuine product into four major categories; concept, infrastructure, development and applications. This result shows the passive NFC-forum Type 2 tag can be configured to be compatible with the NFC data exchange format (NDEF), which can be automatically partially data updated when there is NFC field.

Keywords: near field communication, NFC data exchange format, checking the genuine product, encrypted NFC

Procedia PDF Downloads 280
2465 Major Mechanisms of Atmospheric Moisture Transport and Their Role in Precipitation Extreme Events in the Amazonia

Authors: Luis Gimeno, Rosmeri da Rocha, Raquel Nieto, Tercio Ambrizzi, Alex Ramos, Anita Drumond

Abstract:

The transport of moisture from oceanic sources to the continents represents the atmospheric branch of the water cycle, forming the connection between evaporation from the ocean and precipitation over the continents. In this regard two large scale dynamical/meteorological structures appear to play a key role, namely Low Level Jet (LLJ) systems and Atmospheric Rivers (ARs). The former are particularly important in tropical and subtropical regions; the latter is mostly confined to extratropical regions. A key question relates to the anomalies in the transport of moisture observed during natural hazards related to extremes of precipitation (i.e., drought or wet spells). In this study we will be focused on these two major atmospheric moisture transport mechanisms (LLJs and ARs) and its role in precipitation extreme events (droughts and wet spells) in the Amazonia paying particular attention to i) intensification (decreasing) of moisture transport by them and its role in wet spells (droughts), and ii) changes in their positions and occurrence with associated flooding and wet spells.

Keywords: droughts, wet spells, amazonia, LLJs, atmospheric rivers

Procedia PDF Downloads 302
2464 An Analysis System for Integrating High-Throughput Transcript Abundance Data with Metabolic Pathways in Green Algae

Authors: Han-Qin Zheng, Yi-Fan Chiang-Hsieh, Chia-Hung Chien, Wen-Chi Chang

Abstract:

As the most important non-vascular plants, algae have many research applications, including high species diversity, biofuel sources, adsorption of heavy metals and, following processing, health supplements. With the increasing availability of next-generation sequencing (NGS) data for algae genomes and transcriptomes, an integrated resource for retrieving gene expression data and metabolic pathway is essential for functional analysis and systems biology in algae. However, gene expression profiles and biological pathways are displayed separately in current resources, and making it impossible to search current databases directly to identify the cellular response mechanisms. Therefore, this work develops a novel AlgaePath database to retrieve gene expression profiles efficiently under various conditions in numerous metabolic pathways. AlgaePath, a web-based database, integrates gene information, biological pathways, and next-generation sequencing (NGS) datasets in Chlamydomonasreinhardtii and Neodesmus sp. UTEX 2219-4. Users can identify gene expression profiles and pathway information by using five query pages (i.e. Gene Search, Pathway Search, Differentially Expressed Genes (DEGs) Search, Gene Group Analysis, and Co-Expression Analysis). The gene expression data of 45 and 4 samples can be obtained directly on pathway maps in C. reinhardtii and Neodesmus sp. UTEX 2219-4, respectively. Genes that are differentially expressed between two conditions can be identified in Folds Search. Furthermore, the Gene Group Analysis of AlgaePath includes pathway enrichment analysis, and can easily compare the gene expression profiles of functionally related genes in a map. Finally, Co-Expression Analysis provides co-expressed transcripts of a target gene. The analysis results provide a valuable reference for designing further experiments and elucidating critical mechanisms from high-throughput data. More than an effective interface to clarify the transcript response mechanisms in different metabolic pathways under various conditions, AlgaePath is also a data mining system to identify critical mechanisms based on high-throughput sequencing.

Keywords: next-generation sequencing (NGS), algae, transcriptome, metabolic pathway, co-expression

Procedia PDF Downloads 407
2463 Using A Blockchain-Based, End-to-End Encrypted Communication System Between Mobile Terminals to Improve Organizational Privacy

Authors: Andrei Bogdan Stanescu, Robert Stana

Abstract:

Creating private and secure communication channels between employees has become a critical aspect in order to ensure organizational integrity and avoid leaks of sensitive information. With the widespread use of modern methods of disrupting communication between users, real use-cases of advanced encryption mechanisms have emerged to avoid cyber-attackers that are willing to intercept private conversations between critical employees in an organization. This paper aims to present a custom implementation of a messaging application named “Whisper” that uses end-to-end encryption (E2EE) mechanisms and blockchain-related components to protect sensitive conversations and mitigate the risks of information breaches inside organizations. The results of this research paper aim to expand the areas of applicability of E2EE algorithms and integrations with private blockchains in chat applications as a viable method of enhancing intra-organizational communication privacy.

Keywords: end-to-end encryption, mobile communication, cryptography, communication security, data privacy

Procedia PDF Downloads 89
2462 A New Protocol Ensuring Users' Privacy in Pervasive Environment

Authors: Mohammed Nadir Djedid, Abdallah Chouarfia

Abstract:

Transparency of the system and its integration into the natural environment of the user are some of the important features of pervasive computing. But these characteristics that are considered as the strongest points of pervasive systems are also their weak points in terms of the user’s privacy. The privacy in pervasive systems involves more than the confidentiality of communications and concealing the identity of virtual users. The physical presence and behavior of the user in the pervasive space cannot be completely hidden and can reveal the secret of his/her identity and affect his/her privacy. This paper shows that the application of major techniques for protecting the user’s privacy still insufficient. A new solution named Shadow Protocol is proposed, which allows the users to authenticate and interact with the surrounding devices within an ubiquitous computing environment while preserving their privacy.

Keywords: pervasive systems, identification, authentication, privacy

Procedia PDF Downloads 482
2461 Influence of Smoking on Fine And Ultrafine Air Pollution Pm in Their Pulmonary Genetic and Epigenetic Toxicity

Authors: Y. Landkocz, C. Lepers, P.J. Martin, B. Fougère, F. Roy Saint-Georges. A. Verdin, F. Cazier, F. Ledoux, D. Courcot, F. Sichel, P. Gosset, P. Shirali, S. Billet

Abstract:

In 2013, the International Agency for Research on Cancer (IARC) classified air pollution and fine particles as carcinogenic to humans. Causal relationships exist between elevated ambient levels of airborne particles and increase of mortality and morbidity including pulmonary diseases, like lung cancer. However, due to a double complexity of both physicochemical Particulate Matter (PM) properties and tumor mechanistic processes, mechanisms of action remain not fully elucidated. Furthermore, because of several common properties between air pollution PM and tobacco smoke, like the same route of exposure and chemical composition, potential mechanisms of synergy could exist. Therefore, smoking could be an aggravating factor of the particles toxicity. In order to identify some mechanisms of action of particles according to their size, two samples of PM were collected: PM0.03 2.5 and PM0.33 2.5 in the urban-industrial area of Dunkerque. The overall cytotoxicity of the fine particles was determined on human bronchial cells (BEAS-2B). Toxicological study focused then on the metabolic activation of the organic compounds coated onto PM and some genetic and epigenetic changes induced on a co-culture model of BEAS-2B and alveolar macrophages isolated from bronchoalveolar lavages performed in smokers and non-smokers. The results showed (i) the contribution of the ultrafine fraction of atmospheric particles to genotoxic (eg. DNA double-strand breaks) and epigenetic mechanisms (eg. promoter methylation) involved in tumor processes, and (ii) the influence of smoking on the cellular response. Three main conclusions can be discussed. First, our results showed the ability of the particles to induce deleterious effects potentially involved in the stages of initiation and promotion of carcinogenesis. The second conclusion is that smoking affects the nature of the induced genotoxic effects. Finally, the in vitro developed cell model, using bronchial epithelial cells and alveolar macrophages can take into account quite realistically, some of the existing cell interactions existing in the lung.

Keywords: air pollution, fine and ultrafine particles, genotoxic and epigenetic alterations, smoking

Procedia PDF Downloads 347
2460 Juridically Secure Trade Mechanisms for Alternative Dispute Resolution in Transnational Business Negotiations

Authors: Linda Frazer

Abstract:

A pluralistic methodology focuses on promoting an understanding that an alternative juridical framework for the regulation of transnational business negotiations (TBN) between private business parties is fundamentally required. This paper deals with the evolving assessment of the doctoral research of the author which demonstrated that due to insufficient juridical tools, negotiations are commonly misunderstood within the complexity of pluralistic and conflicting legal regimes. This inadequacy causes uncertainty in the enforcement of legal remedies, leaving business parties surprised. Consequently, parties cannot sufficiently anticipate when and how legal rights and obligations are created, often counting on oral or incomplete agreements which may lead to the misinterpretation of the extent of their legal rights and obligations. This uncertainty causes threats to business parties for fear of creating unintended legal obligations or, conversely, that law will not enforce intended agreements for failure to pass the tests of contractual validity. A need to find a manner to set default standards of communications and standards of conduct to monitor our evolving global trade would aid law to provide the security, predictability and foreseeability during alternative dispute resolution required by TBN parties. The conclusion of this study includes a proposal of new trade mechanisms, termed 'Bills of Negotiations' (BON) to enhance party autonomy and promote the ability for TBN parties to self-regulate within the boundaries of law. BON will be guided by a secure juridical institutionalized setting that caters to guiding communications during TBN and resolving disputes that arise along the negotiation processes on a fast track basis.

Keywords: alternative resolution disputes, ADR, good faith, good faith, juridical security, legal regulation, trade mechanisms, transnational business negotiations

Procedia PDF Downloads 143
2459 HPTLC Based Qualitative and Quantitative Evaluation of Uraria picta Desv: A Dashmool Species

Authors: Hari O. Saxena, Ganesh

Abstract:

In the present investigation, chemical fingerprints of methanolic extracts of roots, stem and leaves of Uraria picta were developed using HPTLC technique. These fingerprints will be useful for authentication as well as in differentiating the species from adulterants. These will also serve as a biochemical marker for this valuable species in pharmaceutical industries and plant systemic studies. Roots, stem and leaves of Uraria picta were further evaluated for quantification of an active ingredient lupeol to find out alternatives to roots. Results showed more content of lupeol in stem (0.048%, dry wt.) as compare to roots (0.017%, dry wt.) suggesting the utilization of stem in place of roots. It will avoid uprooting of this prestigious plant which ultimately will promote its conservation.

Keywords: chemical fingerprints, lupeol, quantification, Uraria picta

Procedia PDF Downloads 255
2458 Standard and Processing of Photodegradable Polyethylene

Authors: Nurul-Akidah M. Yusak, Rahmah Mohamed, Noor Zuhaira Abd Aziz

Abstract:

The introduction of degradable plastic materials into agricultural sectors has represented a promising alternative to promote green agriculture and environmental friendly of modern farming practices. Major challenges of developing degradable agricultural films are to identify the most feasible types of degradation mechanisms, composition of degradable polymers and related processing techniques. The incorrect choice of degradable mechanisms to be applied during the degradation process will cause premature losses of mechanical performance and strength. In order to achieve controlled process of agricultural film degradation, the compositions of degradable agricultural film also important in order to stimulate degradation reaction at required interval of time and to achieve sustainability of the modern agricultural practices. A set of photodegradable polyethylene based agricultural film was developed and produced, following the selective optimization of processing parameters of the agricultural film manufacturing system. Example of agricultural films application for oil palm seedlings cultivation is presented.

Keywords: photodegradable polyethylene, plasticulture, processing schemes

Procedia PDF Downloads 518
2457 Effects of Ascophyllum nodosum in Tomato in the Tropical Caribbean Climate: Effects and Molecular Insights into Mechanisms

Authors: Omar Ali, Adesh Ramsubhag, Jayaraj Jayaraman

Abstract:

Seaweed extracts have been reported as plant biostimulants which could be a safer, organic alternative to harsh pesticides. The incentive to use seaweed-based biostimulants is becoming paramount in sustainable agriculture. The current study, therefore, screened a commercial extract of A. nodosum in tomatoes, cultivated in Trinidad to showcase the multiple beneficial effects. Foliar treatment with an A. nodosum commercial extract led to significant increases in fruit yield and a significant reduction of incidence of bacterial spots and early blight diseases under both greenhouse and field conditions. Investigations were carried out to reveal the possible mechanisms of action of this biostimulant through defense enzyme assays and transcriptome profiling via RNA sequencing of tomato. Studies into disease control mechanisms by A. nodosum showed that the extract stimulated the activity of enzymes such as peroxidase, phenylalanine ammonia-lyase, chitinase, polyphenol oxidase, and β-1,3-glucanase. Additionally, the transcriptome survey revealed the upregulation and enrichment of genes responsible for the biosynthesis of growth hormones, defense enzymes, PR proteins and defense-related secondary metabolites, as well as genes involved in the nutrient mobilization, photosynthesis and primary and secondary metabolic pathways. The results of the transcriptome study also demonstrated the cross-talks between growth and defense responses, confirming the bioelicitor and biostimulant value of seaweed extracts in plants. These effects could potentially implicate the benefits of seaweed extract and validate its usage in sustainable crop production.

Keywords: A. nodosum, biostimulants, elicitor, enzymes, growth responses, seaweeds, tomato, transcriptome analysis

Procedia PDF Downloads 162
2456 Emerging Threats and Adaptive Defenses: Navigating the Future of Cybersecurity in a Hyperconnected World

Authors: Olasunkanmi Jame Ayodeji, Adebayo Adeyinka Victor

Abstract:

In a hyperconnected world, cybersecurity faces a continuous evolution of threats that challenge traditional defence mechanisms. This paper explores emerging cybersecurity threats like malware, ransomware, phishing, social engineering, and the Internet of Things (IoT) vulnerabilities. It delves into the inadequacies of existing cybersecurity defences in addressing these evolving risks and advocates for adaptive defence mechanisms that leverage AI, machine learning, and zero-trust architectures. The paper proposes collaborative approaches, including public-private partnerships and information sharing, as essential to building a robust defence strategy to address future cyber threats. The need for continuous monitoring, real-time incident response, and adaptive resilience strategies is highlighted to fortify digital infrastructures in the face of escalating global cyber risks.

Keywords: cybersecurity, hyperconnectivity, malware, adaptive defences, zero-trust architecture, internet of things vulnerabilities

Procedia PDF Downloads 20
2455 The Correlation between Governance Mechanism and Changing Trends in the Ownership of Mongolian Companies

Authors: Ernest Nweke

Abstract:

This paper examines the changing trend in ownership of Mongolian companies and how this trend has influenced corporate governance mechanisms in Mongolian companies. A study of this magnitude is essential as it x-rays the systematic transformation of Mongolia’s corporate world from the public to private ownership and the tremendous impact it has had on firm governance mechanisms. Owing to Mongolia’s Soviet past, much of the companies in Mongolia were state-owned, state-directed and state-controlled resulting in serious inefficiencies in these companies. This scenario is antithetical to the economic growth and development of any nation as it is grossly at variance with the fundamental principles of good corporate governance that drive prosperity. Consequently, the Mongolian government has in the past decades fine-tuned government policy to prioritize private ownership, establishing various frameworks that will strengthen corporate governance structures in Mongolia. These efforts have paid off and gone a long way in changing the trend in the ownership of companies in Mongolia reversing the old order. The expectation locally and internationally is that companies in post-socialist Mongolia will be more closely aligned to generally accepted corporate governance mechanisms, generally improving company performance and ultimately returns to shareholders. To achieve the research objectives, the survey research method was employed utilizing a sample of seventy randomly selected listed companies representing 22% of Mongolian Stock Exchange listings. Research hypotheses formulated to guide the conduct of the study were tested using Chi-Square analysis, and results show that ownership trend has drastically changed in the post-socialist Mongolia leading to better corporate governance practices in Mongolian companies. This result has important policy implications.

Keywords: corporate disclosure, free market, private ownership, Mongolia

Procedia PDF Downloads 143
2454 A Neuroscience-Based Learning Technique: Framework and Application to STEM

Authors: Dante J. Dorantes-González, Aldrin Balsa-Yepes

Abstract:

Existing learning techniques such as problem-based learning, project-based learning, or case study learning are learning techniques that focus mainly on technical details, but give no specific guidelines on learner’s experience and emotional learning aspects such as arousal salience and valence, being emotional states important factors affecting engagement and retention. Some approaches involving emotion in educational settings, such as social and emotional learning, lack neuroscientific rigorousness and use of specific neurobiological mechanisms. On the other hand, neurobiology approaches lack educational applicability. And educational approaches mainly focus on cognitive aspects and disregard conditioning learning. First, authors start explaining the reasons why it is hard to learn thoughtfully, then they use the method of neurobiological mapping to track the main limbic system functions, such as the reward circuit, and its relations with perception, memories, motivations, sympathetic and parasympathetic reactions, and sensations, as well as the brain cortex. The authors conclude explaining the major finding: The mechanisms of nonconscious learning and the triggers that guarantee long-term memory potentiation. Afterward, the educational framework for practical application and the instructors’ guidelines are established. An implementation example in engineering education is given, namely, the study of tuned-mass dampers for earthquake oscillations attenuation in skyscrapers. This work represents an original learning technique based on nonconscious learning mechanisms to enhance long-term memories that complement existing cognitive learning methods.

Keywords: emotion, emotion-enhanced memory, learning technique, STEM

Procedia PDF Downloads 91
2453 Corporate Governance Development in Mongolia: The Role of Professional Accountants

Authors: Ernest Nweke

Abstract:

The work of Professional Accountants and Corporate governance are synonymous and cannot be divorced from each other. Organizations, profit and non-profit alike cannot implement sound corporate practices without inputs from Professional Accountants. In today’s dynamic corporate world, good corporate governance practice is a sine qua non. More so, following the corporate failures of the past decades like Enron and WorldCom, governments around the world, including Mongolia are becoming more proactive in ensuring sound corporate governance mechanisms. In the past fifteen years, the Mongolian government has taken several measures to establish and strengthen internal corporate governance structures in firms. This paper highlights the role of professional accountants and auditors play in ensuring that good corporate governance mechanisms are entrenched in listed companies in Mongolia. Both primary and secondary data are utilized in this research. In collection of primary data, Delphi method was used, securing responses from only knowledgeable senior employees, top managers, and some CEOs. Using this method, a total of 107 top-level company employees and executives randomly selected from 22 companies were surveyed; maximum of 5 and minimum of 4 from each company. These companies cut across several sectors. It was concluded that Professional Accountants play key roles in setting and maintaining firm governance. They do this by ensuring full compliance with all the requirements of good and sound corporate governance, establishing reporting, monitoring and evaluating standards, assisting in the setting up of proper controls, efficient and effective audit systems, sound fraud risk management and putting in place an overall vision for the enterprise. Companies with effective corporate governance mechanisms are usually strong and fraud-resilient. It was also discovered that companies with big 4 audit firms tend to have better governance structures in Mongolia.

Keywords: accountants, corporate disclosure, corporate failure, corporate governance

Procedia PDF Downloads 278
2452 Proposed Terminal Device for End-to-End Secure SMS in Cellular Networks

Authors: Neetesh Saxena, Narendra S. Chaudhari

Abstract:

Nowadays, SMS is a very popular mobile service and even the poor, illiterate people and those living in rural areas use SMS service very efficiently. Although many mobile operators have already started 3G and 4G services, 2G services are still being used by the people in many countries. In 2G (GSM), only encryption provided is between the MS and the BTS, there is no end-to-end encryption available. Sometimes we all need to send some confidential message to other person containing bank account number, some password, financial details, etc. Normally, a message is sent in plain text only to the recipient and it is not an acceptable standard for transmitting such important and confidential information. Authors propose an end-to-end encryption approach by proposing a terminal for sending/receiving a secure message. An asymmetric key exchange algorithm is used in order to transmit secret shared key securely to the recipient. The proposed approach with terminal device provides authentication, confidentiality, integrity and non-repudiation.

Keywords: AES, DES, Diffie-Hellman, ECDH, A5, SMS

Procedia PDF Downloads 415
2451 Evaluation of Environmental and Social Management System of Green Climate Fund's Accredited Entities: A Qualitative Approach Applied to Environmental and Social System

Authors: Sima Majnooni

Abstract:

This paper discusses the Green Climate Fund's environmental and social management framework (GCF). The environmental and social management framework ensures the accredited entity considers the GCF's accreditation standards and effectively implements each of the GCF-funded projects. The GCF requires all accredited entities to meet basic transparency and accountability standards as well as environmental and social safeguards (ESMS). In doing so, the accredited entity sets up different independent units. One of these units is called the Grievance Mechanism. When allegations of environmental and social harms are raised in association with GCF-funded activities, affected parties can contact the entity’s grievance unit. One of the most challenging things about the accredited entity's grievance unit is the lack of available information and resources on the entities' websites. Many AEs have anti-corruption or anti-money laundering unit, but they do not have the environmental and social unit for affected people. This paper will argue the effectiveness of environmental and social grievance mechanisms of AEs by using a qualitative approach to indicate how many of AEs have a poor or an effective GRM. Some ESMSs seem highly effective. On the other hand, other mechanisms lack basic requirements such as a clear, transparent, uniform procedure and a definitive timetable. We have looked at each AE mechanism not only in light of how the website goes into detail regarding the process of grievance mechanism but also in light of their risk category. Many mechanisms appear inadequate for the lower level risk category entities (C) and, even surprisingly, for many higher-risk categories (A). We found; in most cases, the grievance mechanism of AEs seems vague.

Keywords: grievance mechanism, vague environmental and social policies, green climate fund, international climate finance, lower and higher risk category

Procedia PDF Downloads 124
2450 The Problem of Child Exploitation on Twitter: A Socio-Anthropological Perspective on Content Filtering Gaps

Authors: Samig Ibayev

Abstract:

This research addresses the problem of illegal child abuse content on the Twitter platform bypassing filtering systems and appearing before users from a social-anthropological perspective. Although the wide access opportunities provided by social media platforms to their users are beneficial in many ways, it is seen that they contain gaps that pave the way for the spread of harmful and illegal content. The aim of the study is to examine the inadequacies of the current content filtering mechanisms of the Twitter platform, to understand the psychological effects of young users unintentionally encountering such content and the social dimensions of this situation. The research was conducted with a qualitative approach and was conducted using digital ethnography, content analysis and user experiences on the Twitter platform. Digital ethnography was used to observe the frequency of child abuse content on the platform and how these contents were presented. The content analysis method was used to reveal the gaps in Twitter's current filtering mechanisms. In addition, detailed information was collected on the extent of psychological effects and how the perception of trust in social media changed through interviews with young users exposed to such content. The main contributions of the research are to highlight the weaknesses in the content moderation and filtering mechanisms of social media platforms, to reveal the negative effects of illegal content on users, and to offer suggestions for preventing the spread of such content. As a result, it is suggested that platforms such as Twitter should improve their content filtering policies in order to increase user security and fulfill their social responsibilities. This research aims to create significant awareness about social media content management and ethical responsibilities on digital platforms.

Keywords: Twitter, child exploitation, content filtering, digital ethnography, social anthropology

Procedia PDF Downloads 9
2449 Multi-Level Security Measures in Cloud Computing

Authors: Shobha G. Ranjan

Abstract:

Cloud computing is an emerging, on-demand and internet- based technology. Varieties of services like, software, hardware, data storage and infrastructure can be shared though the cloud computing. This technology is highly reliable, cost effective and scalable in nature. It is a must only the authorized users should access these services. Further the time granted to access these services should be taken into account for proper accounting purpose. Currently many organizations do the security measures in many different ways to provide the best cloud infrastructure to their clients, but that’s not the limitation. This paper presents the multi-level security measure technique which is in accordance with the OSI model. In this paper, details of proposed multilevel security measures technique are presented along with the architecture, activities, algorithms and probability of success in breaking authentication.

Keywords: cloud computing, cloud security, integrity, multi-tenancy, security

Procedia PDF Downloads 501
2448 Designing Agile Product Development Processes by Transferring Mechanisms of Action Used in Agile Software Development

Authors: Guenther Schuh, Michael Riesener, Jan Kantelberg

Abstract:

Due to the fugacity of markets and the reduction of product lifecycles, manufacturing companies from high-wage countries are nowadays faced with the challenge to place more innovative products within even shorter development time on the market. At the same time, volatile customer requirements have to be satisfied in order to successfully differentiate from market competitors. One potential approach to address the explained challenges is provided by agile values and principles. These agile values and principles already proofed their success within software development projects in the form of management frameworks like Scrum or concrete procedure models such as Extreme Programming or Crystal Clear. Those models lead to significant improvements regarding quality, costs and development time and are therefore used within most software development projects. Motivated by the success within the software industry, manufacturing companies have tried to transfer agile mechanisms of action to the development of hardware products ever since. Though first empirical studies show similar effects in the agile development of hardware products, no comprehensive procedure model for the design of development iterations has been developed for hardware development yet due to different constraints of the domains. For this reason, this paper focusses on the design of agile product development processes by transferring mechanisms of action used in agile software development towards product development. This is conducted by decomposing the individual systems 'product development' and 'agile software development' into relevant elements and symbiotically composing the elements of both systems in respect of the design of agile product development processes afterwards. In a first step, existing product development processes are described following existing approaches of the system theory. By analyzing existing case studies from industrial companies as well as academic approaches, characteristic objectives, activities and artefacts are identified within a target-, action- and object-system. In partial model two, mechanisms of action are derived from existing procedure models of agile software development. These mechanisms of action are classified in a superior strategy level, in a system level comprising characteristic, domain-independent activities and their cause-effect relationships as well as in an activity-based element level. Within partial model three, the influence of the identified agile mechanism of action towards the characteristic system elements of product development processes is analyzed. For this reason, target-, action- and object-system of the product development are compared with the strategy-, system- and element-level of agile mechanism of action by using the graph theory. Furthermore, the necessity of existence of activities within iteration can be determined by defining activity-specific degrees of freedom. Based on this analysis, agile product development processes are designed in form of different types of iterations within a last step. By defining iteration-differentiating characteristics and their interdependencies, a logic for the configuration of activities, their form of execution as well as relevant artefacts for the specific iteration is developed. Furthermore, characteristic types of iteration for the agile product development are identified.

Keywords: activity-based process model, agile mechanisms of action, agile product development, degrees of freedom

Procedia PDF Downloads 207
2447 Effects of Reversible Watermarking on Iris Recognition Performance

Authors: Andrew Lock, Alastair Allen

Abstract:

Fragile watermarking has been proposed as a means of adding additional security or functionality to biometric systems, particularly for authentication and tamper detection. In this paper we describe an experimental study on the effect of watermarking iris images with a particular class of fragile algorithm, reversible algorithms, and the ability to correctly perform iris recognition. We investigate two scenarios, matching watermarked images to unmodified images, and matching watermarked images to watermarked images. We show that different watermarking schemes give very different results for a given capacity, highlighting the importance of investigation. At high embedding rates most algorithms cause significant reduction in recognition performance. However, in many cases, for low embedding rates, recognition accuracy is improved by the watermarking process.

Keywords: biometrics, iris recognition, reversible watermarking, vision engineering

Procedia PDF Downloads 456
2446 A Realist Review of Influences of Community-Based Interventions on Noncommunicable Disease Risk Behaviors

Authors: Ifeyinwa Victor-Uadiale, Georgina Pearson, Sophie Witter, D. Reidpath

Abstract:

Introduction: Smoking, alcohol misuse, unhealthy diet, and physical inactivity are the primary drivers of noncommunicable diseases (NCD), including cardiovascular diseases, cancers, respiratory diseases, and diabetes, worldwide. Collectively, these diseases are the leading cause of all global deaths, most of which are premature, affecting people between 30 and 70 years. Empirical evidence suggests that these risk behaviors can be modified by community-based interventions (CBI). However, there is little insight into the mechanisms and contextual factors of successful community interventions that impact risk behaviours for chronic diseases. This study examined “Under what circumstances, for whom, and how, do community-based interventions modify smoking, alcohol use, unhealthy diet, and physical inactivity among adults”. Adopting the Capability (C), Opportunity (O), Motivation (M), Behavior (B) (COM-B) framework for behaviour change, it sought to: (1) identify the mechanisms through which CBIs could reduce tobacco use and alcohol consumption and increase physical activity and the consumption of healthy diets and (2) examine the contextual factors that trigger the impact of these mechanisms on these risk behaviours among adults. Methods: Pawson’s realist review method was used to examine the literature. Empirical evidence and theoretical understanding were combined to develop a realist program theory that explains how CBIs influence NCD risk behaviours. Documents published between 2002 and 2020 were systematically searched in five electronic databases (CINAHL, Cochrane Library, Medline, ProQuest Central, and PsycINFO). They were included if they reported on community-based interventions aimed at cardiovascular diseases, cancers, respiratory diseases, and diabetes in a global context; and had an outcome targeted at smoking, alcohol, physical activity, and diet. Findings: Twenty-nine scientific documents were retrieved and included in the review. Over half of them (n = 18; 62%) focused on three of the four risk behaviours investigated in this review. The review identified four mechanisms: capability, opportunity, motivation, and social support that are likely to change the dietary and physical activity behaviours in adults given certain contexts. There were weak explanations of how the identified mechanisms could likely change smoking and alcohol consumption habits. In addition, eight contextual factors that may affect how these mechanisms impact physical activity and dietary behaviours were identified: suitability to work and family obligations, risk status awareness, socioeconomic status, literacy level, perceived need, availability and access to resources, culture, and group format. Conclusion: The findings suggest that CBIs are likely to improve the physical activity and dietary habits of adults if the intervention function seeks to educate, incentivize, change the environment, and model the right behaviours. The review applies and advances theory, realist research, and the design and implementation of community-based interventions for NCD prevention.

Keywords: community-based interventions, noncommunicable disease, realist program theory, risk behaviors

Procedia PDF Downloads 93
2445 The Application of Raman Spectroscopy in Olive Oil Analysis

Authors: Silvia Portarena, Chiara Anselmi, Chiara Baldacchini, Enrico Brugnoli

Abstract:

Extra virgin olive oil (EVOO) is a complex matrix mainly composed by fatty acid and other minor compounds, among which carotenoids are well known for their antioxidative function that is a key mechanism of protection against cancer, cardiovascular diseases, and macular degeneration in humans. EVOO composition in terms of such constituents is generally the result of a complex combination of genetic, agronomical and environmental factors. To selectively improve the quality of EVOOs, the role of each factor on its biochemical composition need to be investigated. By selecting fruits from four different cultivars similarly grown and harvested, it was demonstrated that Raman spectroscopy, combined with chemometric analysis, is able to discriminate the different cultivars, also as a function of the harvest date, based on the relative content and composition of fatty acid and carotenoids. In particular, a correct classification up to 94.4% of samples, according to the cultivar and the maturation stage, was obtained. Moreover, by using gas chromatography and high-performance liquid chromatography as reference techniques, the Raman spectral features further allowed to build models, based on partial least squares regression, that were able to predict the relative amount of the main fatty acids and the main carotenoids in EVOO, with high coefficients of determination. Besides genetic factors, climatic parameters, such as light exposition, distance from the sea, temperature, and amount of precipitations could have a strong influence on EVOO composition of both major and minor compounds. This suggests that the Raman spectra could act as a specific fingerprint for the geographical discrimination and authentication of EVOO. To understand the influence of environment on EVOO Raman spectra, samples from seven regions along the Italian coasts were selected and analyzed. In particular, it was used a dual approach combining Raman spectroscopy and isotope ratio mass spectrometry (IRMS) with principal component and linear discriminant analysis. A correct classification of 82% EVOO based on their regional geographical origin was obtained. Raman spectra were obtained by Super Labram spectrometer equipped with an Argon laser (514.5 nm wavelenght). Analyses of stable isotope content ratio were performed using an isotope ratio mass spectrometer connected to an elemental analyzer and to a pyrolysis system. These studies demonstrate that RR spectroscopy is a valuable and useful technique for the analysis of EVOO. In combination with statistical analysis, it makes possible the assessment of specific samples’ content and allows for classifying oils according to their geographical and varietal origin.

Keywords: authentication, chemometrics, olive oil, raman spectroscopy

Procedia PDF Downloads 332
2444 The Relevance of the Generalist Judge’s Discretionary Limits in the Institutional Debate

Authors: Antonio Sepúlveda, Camila Marques, Carlos Bolonha, Igor De Lazari, Henrique Rangel

Abstract:

The judicial practice faces a tension between normative discretion and institutional capacities. There are clarity graduations of the statutory text that might induce different specialization levels of the judges. A major problem stemming from that tension is a greater discretion without a proportional specialization. The normative clarity, although its absence can be overcome through specialization, avoids problems related to disproportionate discretion and judicial dissonance. When judicial interpretation deals with the lack of legal clarity, a significant juridical insecurity frame is verified. Decisional uniformity mechanisms are created in order to surpass these problems. Brazil brings great examples, such as the súmulas, the enunciados, and the súmulas vinculantes. Despite of the resistance presented to the latter, mainly based on judges’ independence, even countries of the Common Law tradition develop such mechanisms. The British Guidelines face the lack of legal clarity problem and promote a decisional consonance system.

Keywords: generalist judges, institutional capacities, normative clarity, normative discretion

Procedia PDF Downloads 480
2443 The Different Improvement of Numerical Magnitude and Spatial Representation of Numbers to Symbolic Approximate Arithmetic: A Training Study of Preschooler

Authors: Yu Liang, Wei Wei

Abstract:

Spatial representation of numbers and numerical magnitude are important for preschoolers’ mathematical ability. Mental number line, a typical index to measure numbers spatial representation, and numerical comparison are both related to arithmetic obviously. However, they seem to rely on different mechanisms and probably influence arithmetic through different mechanisms. In line with this idea, preschool children were trained with two tasks to investigate which one is more important for approximate arithmetic. The training of numerical processing and number line estimation were proved to be effective. They both improved the ability of approximate arithmetic. When the difficulty of approximate arithmetic was taken into account, the performance in number line training group was not significantly different among three levels. However, two harder levels achieved significance in numerical comparison training group. Thus, comparing spatial representation ability, symbolic approximation arithmetic relies more on numerical magnitude. Educational implications of the study were discussed.

Keywords: approximate arithmetic, mental number line, numerical magnitude, preschooler

Procedia PDF Downloads 251
2442 An Evaluation Method of Accelerated Storage Life Test for Typical Mechanical and Electronic Products

Authors: Jinyong Yao, Hongzhi Li, Chao Du, Jiao Li

Abstract:

Reliability of long-term storage products is related to the availability of the whole system, and the evaluation of storage life is of great necessity. These products are usually highly reliable and little failure information can be collected. In this paper, an analytical method based on data from accelerated storage life test is proposed to evaluate the reliability index of the long-term storage products. Firstly, singularities are eliminated by data normalization and residual analysis. Secondly, with the pre-processed data, the degradation path model is built to obtain the pseudo life values. Then by life distribution hypothesis, we can get the estimator of parameters in high stress levels and verify failure mechanisms consistency. Finally, the life distribution under the normal stress level is extrapolated via the acceleration model and evaluation of the true average life available. An application example with the camera stabilization device is provided to illustrate the methodology we proposed.

Keywords: accelerated storage life test, failure mechanisms consistency, life distribution, reliability

Procedia PDF Downloads 388
2441 DFT Insights into CO₂ Capture Mechanisms and Kinetics in Diamine-Appended Grafted Mg₂ (dobpdc) Metal- Organic Frameworks

Authors: Mao-Sheng Su, Santhanamoorthi Nachimuthu, Jyh-Chiang Jiang

Abstract:

Climate change is widely recognized as a global crisis, with anthropogenic CO₂ emissions from fossil fuel combustion and industrial processes being major contributors. To address this challenge, carbon capture and sequestration (CCS) technology has emerged as a key strategy for selectively capturing CO₂ from flue gas streams. Among the various solid adsorbents, metal–organic frameworks (MOFs) are notable for their extensive surface area and controllable pore chemistry. The porous MOF structure is comprised of metal ions or clusters coordinated to organic linker compounds. In particular, the pore parameters of MOFs are readily tunable, making them promising materials for CO₂ capture applications. Among these, amine-functionalized MOFs have demonstrated exceptional CO₂ capture abilities because their high uptake capacity and selectivity. In this study, we have investigated the CO₂ capture abilities and adsorption mechanisms of the diamine-appended framework N-Ethylethylenediamine-Mg₂(4,4’-dioxidobiphenyl-3,3’-dicarboxylate) (e-2-Mg₂(dobpdc)) using density functional theory (DFT) calculations. Previous studies have suggested that CO₂ can be captured via both outer- and inner-amine binding sites. Our findings reveal that CO₂ adsorption at the outer amine site is kinetically more favorable compared to the inner amine site, with a lower energy barrier of 1.34 eV for CO₂ physisorption to chemisorption compared to the inner amine, which has an activation barrier of 1.60 eV. Furthermore, we find that CO₂ adsorption is significantly enhanced in an alkaline environment, as deprotonation of the diamine molecule reduces the energy barrier to 0.24 eV. This theoretical study provides detailed insights into CO₂ adsorption in diamine-appended e-2-Mg₂(dobpdc) MOF, offering a deeper understanding of CO₂ capture mechanisms and valuable information for the advancement of effective CO₂ sequestration technologies.

Keywords: DFT, MOFs, CO₂ capture, catalyst

Procedia PDF Downloads 27
2440 The Effect of Ultrasound on Permeation Flux and Changes in Blocking Mechanisms during Dead-End Microfiltration of Carrot Juice

Authors: A. Hemmati, H. Mirsaeedghazi, M. Aboonajmi

Abstract:

Carrot juice is one of the most nutritious foods that are consumed around the world. Large particles in carrot juice causing turbid appearance make some problems in the concentration process such as off-flavor due to the large particles burnt on the walls of evaporators. Microfiltration (MF) is a pressure driven membrane separation method that can clarify fruit juices without enzymatic treatment. Fouling is the main problem in the membrane process causing reduction of permeate flux. Ultrasound as a cleaning technique was applied at 20 kHz to reduce fouling in membrane clarification of carrot juice using dead-end MF system with polyvinylidene fluoride (PVDF) membrane. Results showed that application of ultrasound waves reduce diphasic characteristic of carrot juice and permeate flux increased. Evaluation of different membrane fouling mechanisms showed that application of ultrasound waves changed creation time of each fouling mechanism. Also, its behavior was changed with varying transmembrane pressure.

Keywords: Carrot juice, Dead end, Microfiltration, Ultrasound

Procedia PDF Downloads 319