Search results for: property rights
570 Reviewing the Relation of Language and Minorities' Rights
Authors: Mohsen Davarzani, Ehsan Lame, Mohammad Taghi Hassan Zadeh
Abstract:
Language is considered as a powerful and outstanding feature of ethnicity. However, humiliating and prohibiting using human language is one the most heinous and brutal acts in the form of racism. In other words, racism can be a product of physiological humiliations and discrimination, such as skin color, and can also be resulted from ethnic humiliation and discrimination such as language, customs and so on. Ethnic and racial discrimination is one of the main problems of the world that minorities and occasionally the majority have suffered from. Nowadays, few states can be found in which all individuals and its citizens are of the same race and ethnicity, culture and language. In these countries, referred to as the multinational states, (eg, Iran, Switzerland, India, etc.), there are the communities and groups which have their own linguistic, cultural and historical characteristics. Characteristics of human rights issues, diversity of issues and plurality of meanings indicate that they appear in various aspects. The states are obliged to respect, as per national and international obligations, the rights of all citizens from different angles, especially different groups that require special attention in order of the particular aspects such as ethnicity, religious and political minorities, children, women, workers, unions and in case the states are in breach of any of these items, they are faced with challenges in local, regional or international fields.Keywords: Law, language, minorities, ethnicity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 763569 Foreign Real Estate Investment and the Australian Residential Property Market: A Study on Chinese Investors
Authors: Peng Yew Wong
Abstract:
House prices in the Australian capital cities were at record levels subsequent to Global Financial Crisis (GFC) 2008 and many believed that foreign investors, especially the Chinese investors, were the main reason for the Australian capital cities’ house prices escalation. This research conducted an Australian cross border semi-structured interviews in Shanghai, China to uncover historical evidence and emerging trend supporting the existence of a significant relationship between overseas investors and residential housing markets performance in Australia subsequent to the GFC 2008. Some unique investment strategies of private investors from China which emphasised on non-capitalist factors such as early education were identified, alongside with some insights on the significant China government policies that have incentivised the cross border investments from China. It is believed that this understanding will assist policy makers to effectively manage the overheated Australian residential property market without compromising the steady flow of FREI.
Keywords: Australian housing market, residential property, foreign real estate investment, education, China investor.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1603568 Harrison’s Stolen: Addressing Aboriginal and Indigenous Islanders Human Rights
Authors: M. Shukry
Abstract:
According to the United Nations Declaration of Human Rights in 1948, every human being is entitled to rights in life that should be respected by others and protected by the state and community. Such rights are inherent regardless of colour, ethnicity, gender, religion or otherwise, and it is expected that all humans alike have the right to live without discrimination of any sort. However, that has not been the case with Aborigines in Australia. Over a long period of time, the governments of the State and the Territories and the Australian Commonwealth denied the Aboriginal and Indigenous inhabitants of the Torres Strait Islands such rights. Past Australian governments set policies and laws that enabled them to forcefully remove Indigenous children from their parents, which resulted in creating lost generations living the trauma of the loss of cultural identity, alienation and even their own selfhood. Intending to reduce that population of natives and their Aboriginal culture while, on the other hand, assimilate them into mainstream society, they gave themselves the right to remove them from their families with no hope of return. That practice has led to tragic consequences due to the trauma that has affected those children, an experience that is depicted by Jane Harrison in her play Stolen. The drama is the outcome of a six-year project on lost children and which was first performed in 1997 in Melbourne. Five actors only appear on the stage, playing the role of all the different characters, whether the main protagonists or the remaining cast, present or non-present ones as voices. The play outlines the life of five children who have been taken from their parents at an early age, entailing a disastrous negative impact that differs from one to the other. Unknown to each other, what connects between them is being put in a children’s home. The purpose of this paper is to analyse the play’s text in light of the 1948 Declaration of Human Rights, using it as a lens that reflects the atrocities practiced against the Aborigines. It highlights how such practices formed an outrageous violation of those natives’ rights as human beings. Harrison’s dramatic technique in conveying the children’s experiences is through a non-linear structure, fluctuating between past and present that are linked together within each of the five characters, reflecting their suffering and pain to create an emotional link between them and the audience. Her dramatic handling of the issue by fusing tragedy with humour as well as symbolism is a successful technique in revealing the traumatic memory of those children and their present life. The play has made a difference in commencing to address the problem of the right of all children to be with their families, which renders the real meaning of having a home and an identity as people.
Keywords: Aboriginal, audience, Australia, children, culture, drama, home, human rights, identity, indigenous, Jane Harrison, memory, scenic effects, setting, stage, stage directions, Stolen, trauma.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1685567 Zero-knowledge-like Proof of Cryptanalysis of Bluetooth Encryption
Authors: Eric Filiol
Abstract:
This paper presents a protocol aiming at proving that an encryption system contains structural weaknesses without disclosing any information on those weaknesses. A verifier can check in a polynomial time that a given property of the cipher system output has been effectively realized. This property has been chosen by the prover in such a way that it cannot been achieved by known attacks or exhaustive search but only if the prover indeed knows some undisclosed weaknesses that may effectively endanger the cryptosystem security. This protocol has been denoted zero-knowledge-like proof of cryptanalysis. In this paper, we apply this protocol to the Bluetooth core encryption algorithm E0, used in many mobile environments and thus we suggest that its security can seriously be put into question.
Keywords: Bluetooth encryption, Bluetooth security, Bluetoothprotocol, Stream cipher, Zero-knowledge, Cryptanalysis
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1568566 Secure Multiparty Computations for Privacy Preserving Classifiers
Authors: M. Sumana, K. S. Hareesha
Abstract:
Secure computations are essential while performing privacy preserving data mining. Distributed privacy preserving data mining involve two to more sites that cannot pool in their data to a third party due to the violation of law regarding the individual. Hence in order to model the private data without compromising privacy and information loss, secure multiparty computations are used. Secure computations of product, mean, variance, dot product, sigmoid function using the additive and multiplicative homomorphic property is discussed. The computations are performed on vertically partitioned data with a single site holding the class value.Keywords: Homomorphic property, secure product, secure mean and variance, secure dot product, vertically partitioned data.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 919565 Encapsulation of Satureja khuzestanica Essential Oil in Chitosan Nanoparticles with Enhanced Antifungal Activity
Authors: Amir Amiri, Naghmeh Morakabati
Abstract:
During the recent years the six-fold growth of cancer in Iran has led the production of healthy products to become a challenge in the food industry. Due to the young population in the country, the consumption of fast foods is growing. The chemical cancer-causing preservatives are used to produce these products more than the standard; so using an appropriate alternative seems to be important. On the one hand, the plant essential oils show the high antimicrobial potential against pathogenic and spoilage microorganisms and on the other hand they are highly volatile and decomposed under the processing conditions. The study aims to produce the loaded chitosan nanoparticles with different concentrations of savory essential oil to improve the anti-microbial property and increase the resistance of essential oil to oxygen and heat. The encapsulation efficiency was obtained in the range of 32.07% to 39.93% and the particle size distribution of the samples was observed in the range of 159 to 210 nm. The range of Zeta potential was obtained between -11.9 to -23.1 mV. The essential oil loaded in chitosan showed stronger antifungal activity against Rhizopus stolonifer. The results showed that the antioxidant property is directly related to the concentration of loaded essential oil so that the antioxidant property increases by increasing the concentration of essential oil. In general, it seems that the savory essential oil loaded in chitosan particles can be used as a food processor.
Keywords: Chitosan, encapsulation, essential oil, nanogel.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1550564 Stress Variation around a Circular Hole in Functionally Graded Plate under Bending
Authors: Parveen K. Saini, Mayank Kushwaha
Abstract:
The influence of material property variation on stress concentration factor (SCF) due to the presence of a circular hole in a functionally graded material (FGM) plate is studied in this paper. A numerical method based on complex variable theory of elasticity is used to investigate the problem. To achieve the material property, variation plate is decomposed into a number of rings. In this research work, Young’s modulus is assumed to be varying exponentially and it is found that stress concentration factor can be reduced by increasing Young’s modulus progressively away from the hole.
Keywords: Stress Concentration, Circular Hole, FGM Plate, Bending.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3079563 Chain Extender on Property Relationships of Polyurethane Derived from Soybean Oil
Authors: Flora Elvistia Firdaus
Abstract:
Polyurethane foams (PUF) has been prepared from vegetable; soybean based polyols. They were characterized into flexible and semi rigid polyurethane foam. This work is directed to production of flexible polyurethane foams by a process involving the reaction of mixture of 2,4- and 2,6-Toluene di Isocyanate isomers, with portion of to blends of soy polyols with petroleum polyol in the presence of other ingredients such as blowing agents, silicone surfactants and accelerating agents. Additon of chain extender improves the property then further decreases the properties on further addition of the same. The objective of this work was to study the effect of chain extender and role of phosphoric acid catalyst to the final properties and correlate the morphology image with mechanical properties of these foams.Keywords: polyurethane, soy polyol, chain extender
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4040562 Patents as Indicators of Innovative Environment
Authors: S. Karklina, I. Erins
Abstract:
The main problem is that there is a very low innovation performance in Latvia. Since Latvia is a Member State of European Union, it also shall have to fulfill the set targets and to improve innovative results.Universities are one of the main performers to provide innovative capacity of country. University, industry and government need to cooperate for getting best results.The intellectual property is one of the indicators to determine innovation level in the country or organization, and patents are one of the characteristics of intellectual property.The objective of the article is to determine indicators characterizing innovative environment in Latvia and influence of the development of universities on them.The methods that will be used in the article to achieve the objectives are quantitative and qualitative analysis of the literature, statistical data analysis and graphical analysis methods.
Keywords: HEI, innovations, Latvia, patents.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1882561 Criminal Law Instruments to Counter Corporate Crimes in Poland
Authors: Dorota Habrat
Abstract:
The aim of study was to analyze the functioning the new model of criminal corporate responsibility in Poland. The need to introduce into the Polish legal system liability of corporate (collective entities) has resulted, among others, from the Polish Republic's international commitments, in particular related to membership in the European Union. The study showed that responsibility of collective entities under the Act has a criminal nature. The main question concerns the ability of the collective entity to be brought to guilt under criminal law sense. Polish criminal law knows only the responsibility of individual persons. So far, guilt as a personal feature of action, based on the ability of the offender to feel in his psyche, could be considered only in relation to the individual person, while the said Act destroyed this conviction. Guilt of collective entity must be proven under at least one of the three possible forms: the guilt in the selection or supervision and so called organizational guilt. In addition, research in article has resolved the issue how the principle of proportionality in relation to criminal measures in response of collective entities should be considered. It should be remembered that the legal subjectivity of collective entities, including their rights and freedoms, is an emanation of the rights and freedoms of individual persons which create collective entities and through these entities implement their rights and freedoms. The whole study was proved that the adopted Act largely reflects the international legal regulations but also contains the unknown and original legislative solutions.Keywords: Criminal corporate responsibility, Polish criminal law.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1559560 Signal Transmission Analysis of Differential Pairs Using Semicircle-Shaped Via Structure
Authors: Moonjung Kim, Chang-Ho Hyun, Won-Ho Kim
Abstract:
In this paper, the signal transmission analysis of the semicircle-shaped via structure for the differential pairs is presented in the frequency range up to 10 GHz. In order to improve the signal transmission properties in the differential pairs, single via is separated centrally into two semicircle-shaped sections, which are interconnected with the traces of differential pairs respectively. This via structure make possible to route differential pairs using only one via. In addition, it can improve impedance discontinuity around its region and then enhance the signal transmission properties in the differential pairs. The electrical analysis such as S-parameter calculation and eye diagram simulation has been performed to investigate the improvement of the signal transmission property in the differential pairs with new via structure.Keywords: Differential pairs, signal transmission property, via, S-parameter.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3927559 Scene Adaptive Shadow Detection Algorithm
Authors: Mohammed Ibrahim M, Anupama R.
Abstract:
Robustness is one of the primary performance criteria for an Intelligent Video Surveillance (IVS) system. One of the key factors in enhancing the robustness of dynamic video analysis is,providing accurate and reliable means for shadow detection. If left undetected, shadow pixels may result in incorrect object tracking and classification, as it tends to distort localization and measurement information. Most of the algorithms proposed in literature are computationally expensive; some to the extent of equalling computational requirement of motion detection. In this paper, the homogeneity property of shadows is explored in a novel way for shadow detection. An adaptive division image (which highlights homogeneity property of shadows) analysis followed by a relatively simpler projection histogram analysis for penumbra suppression is the key novelty in our approach.
Keywords: homogeneity, penumbra, projection histogram, shadow correction
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1902558 Jamun Juice Extraction Using Commercial Enzymes and Optimization of the Treatment with the Help of Physicochemical, Nutritional and Sensory Properties
Authors: Payel Ghosh, Rama Chandra Pradhan, Sabyasachi Mishra
Abstract:
Jamun (Syzygium cuminii L.) is one of the important indigenous minor fruit with high medicinal value. The jamun cultivation is unorganized and there is huge loss of this fruit every year. The perishable nature of the fruit makes its postharvest management further difficult. Due to the strong cell wall structure of pectin-protein bonds and hard seeds, extraction of juice becomes difficult. Enzymatic treatment has been commercially used for improvement of juice quality with high yield. The objective of the study was to optimize the best treatment method for juice extraction. Enzymes (Pectinase and Tannase) from different stains had been used and for each enzyme, best result obtained by using response surface methodology. Optimization had been done on the basis of physicochemical property, nutritional property, sensory quality and cost estimation. According to quality aspect, cost analysis and sensory evaluation, the optimizing enzymatic treatment was obtained by Pectinase from Aspergillus aculeatus strain. The optimum condition for the treatment was 44 oC with 80 minute with a concentration of 0.05% (w/w). At these conditions, 75% of yield with turbidity of 32.21NTU, clarity of 74.39%T, polyphenol content of 115.31 mg GAE/g, protein content of 102.43 mg/g have been obtained with a significant difference in overall acceptability.Keywords: Jamun, enzymatic treatment, physicochemical property, sensory analysis, optimization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1554557 Implementation of a Motion Detection System
Authors: Asif Ansari, T.C.Manjunath, C. Ardil
Abstract:
In today-s competitive environment, the security concerns have grown tremendously. In the modern world, possession is known to be 9/10-ths of the law. Hence, it is imperative for one to be able to safeguard one-s property from worldly harms such as thefts, destruction of property, people with malicious intent etc. Due to the advent of technology in the modern world, the methodologies used by thieves and robbers for stealing have been improving exponentially. Therefore, it is necessary for the surveillance techniques to also improve with the changing world. With the improvement in mass media and various forms of communication, it is now possible to monitor and control the environment to the advantage of the owners of the property. The latest technologies used in the fight against thefts and destruction are the video surveillance and monitoring. By using the technologies, it is possible to monitor and capture every inch and second of the area in interest. However, so far the technologies used are passive in nature, i.e., the monitoring systems only help in detecting the crime but do not actively participate in stopping or curbing the crime while it takes place. Therefore, we have developed a methodology to detect the motion in a video stream environment and this is an idea to ensure that the monitoring systems not only actively participate in stopping the crime, but do so while the crime is taking place. Hence, a system is used to detect any motion in a live streaming video and once motion has been detected in the live stream, the software will activate a warning system and capture the live streaming video.
Keywords: Motion, Detection, System, Video, Crime, Matlab, Surveillance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4290556 Thermal Analysis of Tibetan Vernacular Building - Case of Lhasa
Authors: Lingjiang Huang, Fangfang Liu
Abstract:
Vernacular building is considered as sustainable in energy consumption and environment and its thermal performance is more and more concerned by researchers. This paper investigates the thermal property of the vernacular building in Lhasa by theoretical analysis on the aspects of building form, envelope and materials etc. The values of thermal resistance and thermal capacity of the envelope are calculated and compared with the current China building code and modern building case. And it is concluded that Lhasa vernacular building meets the current China building code of thermal standards and have better performance in some aspects, which is achieved by various passive means with close response to local climate conditions.Keywords: Climate, Vernacular Building, Thermal Property, Passive Means
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2495555 Minimal Residual Method for Adaptive Filtering with Finite Termination
Authors: Noor Atinah Ahmad, Shazia Javed
Abstract:
We present a discussion of three adaptive filtering algorithms well known for their one-step termination property, in terms of their relationship with the minimal residual method. These algorithms are the normalized least mean square (NLMS), Affine Projection algorithm (APA) and the recursive least squares algorithm (RLS). The NLMS is shown to be a result of the orthogonality condition imposed on the instantaneous approximation of the Wiener equation, while APA and RLS algorithm result from orthogonality condition in multi-dimensional minimal residual formulation. Further analysis of the minimal residual formulation for the RLS leads to a triangular system which also possesses the one-step termination property (in exact arithmetic)Keywords: Adaptive filtering, minimal residual method, projection method.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1554554 Position of the Constitutional Court of the Russian Federation on the Matter of Restricting Constitutional Rights of Citizens Concerning Banking Secrecy
Authors: A. V. Shashkova
Abstract:
The aim of the present article is to analyze the position of the Constitutional Court of the Russian Federation on the matter of restricting the constitutional rights of citizens to inviolability of professional and banking secrecy in effecting controlling activities. The methodological ground of the present Article represents the dialectic scientific method of the socio-political, legal and organizational processes with the principles of development, integrity, and consistency, etc. The consistency analysis method is used while researching the object of the analysis. Some public-private research methods are also used: the formally-logical method or the comparative legal method, are used to compare the understanding of the ‘secrecy’ concept. The aim of the present article is to find the root of the problem and to give recommendations for the solution of the problem. The result of the present research is the author’s conclusion on the necessity of the political will to improve Russian legislation with the aim of compliance with the provisions of the Constitution. It is also necessary to establish a clear balance between the constitutional rights of the individual and the limit of these rights when carrying out various control activities by public authorities. Attempts by the banks to "overdo" an anti-money laundering law under threat of severe sanctions by the regulators actually led to failures in the execution of normal economic activity. Therefore, individuals face huge problems with payments on the basis of clearing, in addition to problems with cash withdrawals. The Bank of Russia sets requirements for banks to execute Federal Law No. 115-FZ too high. It is high place to attract political will here. As well, recent changes in Russian legislation, e.g. allowing banks to refuse opening of accounts unilaterally, simplified banking activities in the country. The article focuses on different theoretical approaches towards the concept of “secrecy”. The author gives an overview of the practices of Spain, Switzerland and the United States of America on the matter of restricting the constitutional rights of citizens to inviolability of professional and banking secrecy in effecting controlling activities. The Constitutional Court of the Russian Federation basing on the Constitution of the Russian Federation has its special understanding of the issue, which should be supported by further legislative development in the Russian Federation.Keywords: Bank secrecy, banking information, constitutional court, control measures, financial control, money laundering, restriction of constitutional rights.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1171553 Thermoplastic Composites with Reduced Discoloration and Enhanced Fire-Retardant Property
Authors: Peng Cheng, Liqing Wei, Hongyu Chen, Ruomiao Wang
Abstract:
This paper discusses a light-weight reinforced thermoplastic (LWRT) composite with superior fire retardancy. This porous LWRT composite is manufactured using polyolefin, fiberglass, and fire retardant additives via a wet-lay process. However, discoloration of the LWRT can be induced by various mechanisms, which may be a concern in the building and construction industry. It is commonly understood that discoloration is strongly associated with the presence of phenolic antioxidant(s) and NOx. The over-oxidation of phenolic antioxidant(s) is probably the root-cause of the discoloration (pinking/yellowing). Hanwha Azdel, Inc. developed a LWRT with fire-retardant property of ASTM E84-Class A specification, as well as negligible discoloration even under harsh conditions. In addition, this thermoplastic material is suitable for secondary processing (e.g. compression molding) if necessary.Keywords: Discoloration, fire-retardant, thermoplastic composites, wet-lay process.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 791552 Web Log Mining by an Improved AprioriAll Algorithm
Authors: Wang Tong, He Pi-lian
Abstract:
This paper sets forth the possibility and importance about applying Data Mining in Web logs mining and shows some problems in the conventional searching engines. Then it offers an improved algorithm based on the original AprioriAll algorithm which has been used in Web logs mining widely. The new algorithm adds the property of the User ID during the every step of producing the candidate set and every step of scanning the database by which to decide whether an item in the candidate set should be put into the large set which will be used to produce next candidate set. At the meantime, in order to reduce the number of the database scanning, the new algorithm, by using the property of the Apriori algorithm, limits the size of the candidate set in time whenever it is produced. Test results show the improved algorithm has a more lower complexity of time and space, better restrain noise and fit the capacity of memory.
Keywords: Candidate Sets Pruning, Data Mining, ImprovedAlgorithm, Noise Restrain, Web Log
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2280551 A Special Algorithm to Approximate the Square Root of Positive Integer
Authors: Hsian Ming Goo
Abstract:
The paper concerns a special approximate algorithm of the square root of the specific positive integer, which is built by the use of the property of positive integer solution of the Pell’s equation, together with using some elementary theorems of matrices, and then takes it to compare with general used the Newton’s method and give a practical numerical example and error analysis; it is unexpected to find its special property: the significant figure of the approximation value of the square root of positive integer will increase one digit by one. It is well useful in some occasions.
Keywords: Special approximate algorithm, square root, Pell’s equation, Newton’s method, error analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2802550 Correction of Infrared Data for Electrical Components on a Board
Authors: Seong-Ho Song, Ki-Seob Kim, Seop-Hyeong Park, Seon-Woo Lee
Abstract:
In this paper, the data correction algorithm is suggested when the environmental air temperature varies. To correct the infrared data in this paper, the initial temperature or the initial infrared image data is used so that a target source system may not be necessary. The temperature data obtained from infrared detector show nonlinear property depending on the surface temperature. In order to handle this nonlinear property, Taylor series approach is adopted. It is shown that the proposed algorithm can reduce the influence of environmental temperature on the components in the board. The main advantage of this algorithm is to use only the initial temperature of the components on the board rather than using other reference device such as black body sources in order to get reference temperatures.Keywords: Infrared camera, Temperature Data compensation, Environmental Ambient Temperature, Electric Component
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1527549 A Method of Protecting Relational Databases Copyright with Cloud Watermark
Authors: Yong ZHANG, Xiamu NIU, Dongning ZHAO
Abstract:
With the development of Internet and databases application techniques, the demand that lots of databases in the Internet are permitted to remote query and access for authorized users becomes common, and the problem that how to protect the copyright of relational databases arises. This paper simply introduces the knowledge of cloud model firstly, includes cloud generators and similar cloud. And then combined with the property of the cloud, a method of protecting relational databases copyright with cloud watermark is proposed according to the idea of digital watermark and the property of relational databases. Meanwhile, the corresponding watermark algorithms such as cloud watermark embedding algorithm and detection algorithm are proposed. Then, some experiments are run and the results are analyzed to validate the correctness and feasibility of the watermark scheme. In the end, the foreground of watermarking relational database and its research direction are prospected.Keywords: cloud watermark, copyright protection, digitalwatermark, relational database
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1915548 Heat Forging Analysis Method on Blank Consisting of Two Metals
Authors: Takashi Ueda, Shinichi Enoki
Abstract:
Forging parts is used to automobiles; because, they have high strength and it is possible to press them into complicated shape. When itis possible to manufacture hollow forging parts, it leads to reduce weightof the automobiles. But, hollow forging parts are confined to axisymmetrical shape. Hollowforging parts that were pressed to complicated shape are expected. Therefore, we forge a blank that aluminum alloy was inserted in stainless steel. After that, we can providecomplex forging parts that are reduced weight,ifit is possible to be melted the aluminum alloy away by using different of melting points.It is necessary to establish heat forging analysis methodon blank consist of stainless steel and aluminum alloy. Because,this forging is different from conventional forging and this technology is not confirmed. In this study, we compared forging experiment with numerical analysis on the view point of forming load and shape after forming and establish how to set the material temperaturesof two metals and material property of stainless steel on the analysis method. Consequently, temperature difference of stainless steel and aluminum alloy was obtained by experiment. We got material property of stainless steel on forging experimental by compression tests. We had compared numerical analysis that was used the temperature difference of two metals and the material property of stainless steel on forging experimental with forging experiment. Forging analysis method on blankconsist of two metals was established by result of numerical analysis having agreedwith result of forging experiment.
Keywords: Forging, lightweight, analysis, hollow.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1734547 Diffusion Analysis of a Scalable Feistel Network
Authors: Subariah Ibrahim, Mohd Aizaini Maarof
Abstract:
A generalization of the concepts of Feistel Networks (FN), known as Extended Feistel Network (EFN) is examined. EFN splits the input blocks into n > 2 sub-blocks. Like conventional FN, EFN consists of a series of rounds whereby at least one sub-block is subjected to an F function. The function plays a key role in the diffusion process due to its completeness property. It is also important to note that in EFN the F-function is the most computationally expensive operation in a round. The aim of this paper is to determine a suitable type of EFN for a scalable cipher. This is done by analyzing the threshold number of rounds for different types of EFN to achieve the completeness property as well as the number of F-function required in the network. The work focuses on EFN-Type I, Type II and Type III only. In the analysis it is found that EFN-Type II and Type III diffuses at the same rate and both are faster than Type-I EFN. Since EFN-Type-II uses less F functions as compared to EFN-Type III, therefore Type II is the most suitable EFN for use in a scalable cipher.
Keywords: Cryptography, Extended Feistel Network, Diffusion Analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1713546 Preparation and Characterization of Organic Silver Precursors for Conductive Ink
Authors: Wendong Yang, Changhai Wang, Valeria Arrighi
Abstract:
Low ink sintering temperature is desired for flexible electronics, as it would widen the application of the ink on temperature-sensitive substrates where the selection of silver precursor is very critical. In this paper, four types of organic silver precursors, silver carbonate, silver oxalate, silver tartrate and silver itaconate, were synthesized using an ion exchange method, firstly. Various characterization methods were employed to investigate their physical phase, chemical composition, morphologies and thermal decomposition behavior. It was found that silver oxalate had the ideal thermal property and showed the lowest decomposition temperature. An ink was then formulated by complexing the as-prepared silver oxalate with ethylenediamine in organic solvents. Results show that a favorable conductive film with a uniform surface structure consisting of silver nanoparticles and few voids could be produced from the ink at a sintering temperature of 150 °C.Keywords: Conductive ink, electrical property, film, organic silver.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1091545 An Empirical Investigation of Montesquieu’s Theories on Climate
Authors: Lisa J. Piergallini
Abstract:
This project uses panel regression analyses to investigate the relationships between geography, institutions, and economic development, as guided by the theories of the 18th century French philosopher Montesquieu. Contemporary scholars of political economy perpetually misinterpret Montesquieu’s theories on climate, and in doing so they miss what could be the key to resolving the geography vs. institutions debate. There is a conspicuous gap in this literature, in that it does not consider whether geography and institutors might have an interactive, dynamic effect on economic development. This project seeks to bridge that gap. Data are used for all available countries over the years 1980-2013. Two interaction terms between geographic and institutional variables are employed within the empirical analyses, and these offer a unique contribution to the ongoing geography vs. institutions debate within the political economy literature. This study finds that there is indeed an interactive effect between geography and institutions, and that this interaction has a statistically significant effect on economic development. Democracy (as measured by Polity score) and rule of law and property rights (as measured by the Fraser index) have positive effects on economic development (as measured by GDP per capita), yet the magnitude of these effects are stronger in contexts where a low percent of the national population lives in the geographical tropics. This has implications for promoting economic development, and it highlights the importance of understanding geographical context.
Keywords: Montesquieu, geography, institutions, economic development, political philosophy, political economy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2688544 The Women Entrepreneur Support Fund in Bangladesh: Challenges and Prospects
Authors: Chowdhury Dilruba Shoma
Abstract:
Gender is about equal rights that both males and females having access to responsibilities and opportunities in decision making is a fundamental human right. It is also a precondition for, and a mark of, sustainable people-oriented development. In Bangladesh, women have fewer opportunities than men do to access credit from banks and financial institutions. Entrenched patriarchal attitudes, unequal inheritance rights, and male-dominated hierarchies in the financial system, plus high interest rates and a lack of security/collateral, make it harder for women to obtain bank loans. Limited access to institutional credit is a serious restraint on the productivity and income of women entrepreneurs, (and the wider economy). These gender-biased and structural barriers inhibit women’s access to fundamental economic rights. Using a liberal feminist theoretical lens, this study provides some useful insights into the relationship between gender inequality and entrepreneurship, leading to a better understanding of women’s entrepreneurship development in Bangladesh. Recently, the Bangladesh Government, the United Nations Capital Development Fund, and Bangladesh Bank opened up the Women Entrepreneur Support Fund (WESF) ‒ Credit Guarantee Scheme (CGS) pilot project to cover collateral shortfalls for women entrepreneurs in the small and medium enterprise sector. The aim is to improve gender equality and advance women’s rights in relation to receiving credit. This article examines the challenges and prospects of the WESF-CGS, and suggests that implementation of measures in WESF-CGS policymaking, coupled with a combination of legislatory and regulatory reforms that implement the fundamental tenets of liberal feminism, can lead to a comprehensive and effective credit policy to boost women’s agency and economic empowerment. This may ultimately lead to more sustainable development in Bangladesh.
Keywords: Bangladesh, CGS, liberal feminist theory, women entrepreneur support fund.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 732543 New Analysis Methods on Strict Avalanche Criterion of S-Boxes
Authors: Phyu Phyu Mar, Khin Maung Latt
Abstract:
S-boxes (Substitution boxes) are keystones of modern symmetric cryptosystems (block ciphers, as well as stream ciphers). S-boxes bring nonlinearity to cryptosystems and strengthen their cryptographic security. They are used for confusion in data security An S-box satisfies the strict avalanche criterion (SAC), if and only if for any single input bit of the S-box, the inversion of it changes each output bit with probability one half. If a function (cryptographic transformation) is complete, then each output bit depends on all of the input bits. Thus, if it were possible to find the simplest Boolean expression for each output bit in terms of the input bits, each of these expressions would have to contain all of the input bits if the function is complete. From some important properties of S-box, the most interesting property SAC (Strict Avalanche Criterion) is presented and to analyze this property three analysis methods are proposed.Keywords: S-boxes, cryptosystems, strict avalanche criterion, function, analysis methods.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3921542 Target Concept Selection by Property Overlap in Ontology Population
Authors: Seong-Bae Park, Sang-Soo Kim, Sewook Oh, Zooyl Zeong, Hojin Lee, Seong Rae Park
Abstract:
An ontology is widely used in many kinds of applications as a knowledge representation tool for domain knowledge. However, even though an ontology schema is well prepared by domain experts, it is tedious and cost-intensive to add instances into the ontology. The most confident and trust-worthy way to add instances into the ontology is to gather instances from tables in the related Web pages. In automatic populating of instances, the primary task is to find the most proper concept among all possible concepts within the ontology for a given table. This paper proposes a novel method for this problem by defining the similarity between the table and the concept using the overlap of their properties. According to a series of experiments, the proposed method achieves 76.98% of accuracy. This implies that the proposed method is a plausible way for automatic ontology population from Web tables.
Keywords: Ontology population, domain knowledge consolidation, target concept selection, property overlap.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1720541 A Study of Gas Metal Arc Welding Affecting Mechanical Properties of Austenitic Stainless Steel AISI 304
Authors: Sittichai K., Santirat N., Sompong., P
Abstract:
The objective of this research was to study influence parameters affecting to mechanical property of austenitic stainless steel grade 304 (AISI 304) with Gas Metal Arc Welding (GMAW). The research was applying factorial design experiment, which have following interested parameters: welding current at 80, 90, and 100 Amps, welding speeds at 250, 300, and 350 mm/min, and shield gas of 75% Ar + 25% CO2, 70% Ar + 25% CO2 + 5% O2 and 69.5% Ar + 25% CO2 + 5% O2 + 0.5% He gas. The study was done in following aspects: ultimate tensile strength and elongation. A research study of ultimate tensile strength found that main factor effect, which had the highest strength to AISI 304 welding was shield gas of 70% Ar + 25% CO2 + 5% O2 at average of 954.81 N/mm2. Result of the highest elongation was showed significantly different at interaction effect between shield gas of 69.5%Ar+25%CO2+5%O2+.5%He and welding speed at 250 mm/min at 47.94%.Keywords: Austenitic Stainless Steel AISI 304/ Mechanical Property/ Welding Gas Shield/ Gas Shield
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1836