4,410 results
Search Results
2. Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the Models
- Author
-
David Gerault
- Subjects
ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Bounding overwatch ,Computer science ,Short paper ,Terrorism ,Rfid authentication ,Key (cryptography) ,ComputingMilieux_COMPUTERSANDSOCIETY ,Adversary ,Gas meter prover ,Computer security ,computer.software_genre ,computer - Abstract
Terrorist fraud is an attack against distance bounding protocols, whereby a malicious prover allows an adversary to authenticate on their behalf without revealing their secret key. In this paper, we propose new attack strategies that lead to successful terrorist frauds on proven-secure protocols.
- Published
- 2021
3. Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption
- Author
-
L. Jean Camp, Sanchari Das, and Andrew Kim
- Subjects
Authentication ,Knowledge management ,Work (electrical) ,business.industry ,Computer science ,Short paper ,Control (management) ,Organizational security ,Survey data collection ,Multi-factor authentication ,business ,Security awareness - Abstract
Multi-factor authentication (MFA) is a useful measure for strengthening authentication. Despite its security effectiveness, the adoption of MFA tools remains low. To create more human-centric authentication solutions, we designed and evaluated the efficacy of a risk-reduction-based incentivization model and implemented our proposed model in a large-scale organization with more than 92, 025 employees, and collected survey data from 287 participants and interviewed 41 participants. We observed negative perceptions and degraded understandings of MFA technology due to the absence of proper risk and benefit communication in the control group. Meanwhile, the experimental group employees showed positive perceptions of MFA use for their work and personal accounts. Our analysis and implementation strategy are critical for reducing users’ risks, creating positive security tool usage experiences, and motivating users to enhance their security practices.
- Published
- 2021
4. Paper Creative Limited v. Orient Star Transporting LLTD. et al
- Author
-
Martin Davies and Jiang Lin
- Published
- 2022
5. China Shipping Container Lines Co., Ltd. v. Zhejiang Guangming Paper Co., Ltd. et al
- Author
-
Martin Davies and Jiang Lin
- Published
- 2022
6. Hostile Blockchain Takeovers (Short Paper)
- Author
-
Joseph Bonneau
- Subjects
Blockchain ,Computer science ,Process (engineering) ,05 social sciences ,Short paper ,Face (sociological concept) ,02 engineering and technology ,Adversary ,Computer security ,computer.software_genre ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,computer ,Protocol (object-oriented programming) ,050203 business & management - Abstract
Most research modelling Bitcoin-style decentralised consensus protocols has assumed profit-motivated participants. Complementary to this analysis, we revisit the notion of attackers with an extrinsic motivation to disrupt the consensus process (Goldfinger attacks). We outline several routes for obtaining a majority of decision-making power in the consensus protocol (a hostile takeover). Our analysis suggests several fundamental differences between proof-of-work and proof-of-stake systems in the face of such an adversary.
- Published
- 2019
7. White Paper on Joint Replacement
- Author
-
Hans-Holger Bleß and Miriam Kip
- Subjects
musculoskeletal diseases ,medicine.medical_specialty ,Joint replacement ,business.industry ,medicine.medical_treatment ,MEDLINE ,Osteoarthritis ,medicine.disease ,Arthroplasty ,Hip arthroplasty ,medicine.anatomical_structure ,White paper ,medicine ,Physical therapy ,business ,Femoral neck - Abstract
This open access White Paper details the status of hip and knee arthroplasty care in Germany. Hip and knee replacements are amongst the most frequently performed procedures and usually become necessarily due to age-related wear of the joint, osteoarthritis and fractures of the femoral neck. In light of demographic change, demands with regard to standards of care and the procedures are likely to rise.
- Published
- 2018
8. Short Paper: Ballot Secrecy for Liquid Democracy
- Author
-
Nan Yang, Jeremy Clark, and Mahdi Nejadgholi
- Subjects
Ballot ,Secret ballot ,Delegate ,Computer science ,Presumption ,media_common.quotation_subject ,Secrecy ,Direct democracy ,Voter fatigue ,Democracy ,Law and economics ,media_common - Abstract
Certain advances in election technology, such as online voting, promise to reduce the administrative overhead of running an election. This has breathed new life into the idea of direct democracy, where voters play a more active role in setting legislation. However it is anticipated that a steady stream of referendums would generate voter fatigue. To combat this fatigue, voters could be allowed to delegate their votes to other (more knowledgeable) voters. This idea is old but has been recently reinvented under the name liquid democracy. In this paper, we consider how ballot secrecy should be defined for liquid democracy. We first show that a natural definition of full secrecy leads to several undesirable outcomes. We then show that these are very difficult to address without enabling voter coercion and vote buying. The purpose of the paper is not to affirm liquid democracy; rather, it is to raise awareness of unseen complexity hiding under our initial presumption that liquid democracy could effortlessly support a secret ballot.
- Published
- 2021
9. Geometric Figures on Grid Paper
- Author
-
Heinz Klaus Strick
- Subjects
Discrete mathematics ,Computer science ,Grid - Abstract
In this chapter, we will first deal with rectangles on grid paper, which we will then modify step-by-step. Then we are going to explore an easy way of calculating the area of figures whose vertices lie on grid points.
- Published
- 2021
10. Estimating Profitability of Alternative Cryptocurrencies (Short Paper)
- Author
-
Danny Yuxing Huang, Kirill Levchenko, and Alex C. Snoeren
- Subjects
Market capitalization ,Cryptocurrency ,Opportunity cost ,Computer science ,Financial economics ,Short paper ,020206 networking & telecommunications ,02 engineering and technology ,Work (electrical) ,Digital currency ,0202 electrical engineering, electronic engineering, information engineering ,Liberian dollar ,020201 artificial intelligence & image processing ,Profitability index - Abstract
Digital currencies have flourished in recent years, buoyed by the tremendous success of Bitcoin. These blockchain-based currencies, called altcoins, are associated with a few thousand to millions of dollars of market capitalization. Altcoins have attracted enthusiasts who enter the market by mining or buying them, but the risks and rewards could potentially be significant, especially when the market is volatile. In this work, we estimate the potential profitability of mining and speculating 18 altcoins using real-world blockchain and trade data. Using opportunity cost as a metric, we estimate the mining cost for an altcoin with respect to a more popular but stable coin. For every dollar invested in mining or buying a coin, we compute the potential returns under various conditions, such as time of market entry and hold positions. While some coins offer the potential for spectacular returns, many follow a simple bubble-and-crash scenario, which highlights the extreme risks—and potential gains—in altcoin markets.
- Published
- 2018
11. Attacks Against GSMA’s M2M Remote Provisioning (Short Paper)
- Author
-
Ben Smyth, Elizabeth A. Quaglia, and Maxime Meyer
- Subjects
Subscriber identity module ,021110 strategic, defence & security studies ,Service (systems architecture) ,business.industry ,Computer science ,Short paper ,0211 other engineering and technologies ,020207 software engineering ,Provisioning ,02 engineering and technology ,Adversary ,law.invention ,law ,0202 electrical engineering, electronic engineering, information engineering ,Cellular network ,Architecture ,business ,Computer network - Abstract
GSMA is developing and standardizing specifications for embedded SIM cards with remote provisioning, called eUICCs, which are expected to revolutionize the cellular network subscription model. We study GSMA’s “Remote Provisioning Architecture for Embedded UICC” specification, which focuses on M2M devices, and we analyze the security of remote provisioning. Our analysis reveals weaknesses in the specification that would result in eUICCs being vulnerable to attacks: we demonstrate how a network adversary can exhaust an eUICC’s memory, and we identify three classes of attacks by malicious insiders that prevent service. We disclosed our findings to GSMA; GSMA confirmed the validity of these attacks and acknowledged their potential to disrupt the cellular industry. We propose fixes, which GSMA is incorporating into its specification. Thus, we improve security of next generation telecommunication networks.
- Published
- 2018
12. Short Paper: Debt Representation in UTXO Blockchains
- Author
-
Michael Chiu and Uros Kalabic
- Subjects
Flexibility (engineering) ,Microeconomics ,Transparency (market) ,Loan ,Computer science ,Debt ,media_common.quotation_subject ,Aggregate (data warehouse) ,Scalability ,Reverse mortgage ,Representation (mathematics) ,media_common - Abstract
We provide a UTXO model of blockchain transactions that is able to represent both credit and debt on the same blockchain. Ordinarily, the UTXO model is solely used to represent credit and the representation of credit and debit together is achieved using the account model because of its support for balances. However, the UTXO model provides superior privacy, safety, and scalability when compared to the account model. In this work, we introduce a UTXO model that has the flexibility of balances with the usual benefits of the UTXO model. This model extends the conventional UTXO model, which represents credits as unmatched outputs, by representing debts as unmatched inputs. We apply our model to solving the problem of transparency in reverse mortgage markets, in which some transparency is necessary for a healthy market but complete transparency leads to adverse outcomes. Here the pseudonymous properties of the UTXO model protect the privacy of loan recipients while still allowing an aggregate view of the loan market. We present a prototype of our implementation in Tendermint and discuss the design and its benefits.
- Published
- 2021
13. Are Payment Card Contracts Unfair? (Short Paper)
- Author
-
Steven J. Murdoch, Ingolf Becker, Ross Anderson, M. Angela Sasse, N Bohm, Gianluca Stringhini, Alice Hutchings, and Ruba Abu-Salma
- Subjects
060201 languages & linguistics ,Card security code ,Computer science ,business.industry ,Short paper ,Internet privacy ,Usability ,06 humanities and the arts ,02 engineering and technology ,Directive ,Test (assessment) ,Payment card ,0602 languages and literature ,0202 electrical engineering, electronic engineering, information engineering ,Strong authentication ,020201 artificial intelligence & image processing ,Payment service provider ,business - Abstract
Fraud victims are often refused a refund by their bank on the grounds that they failed to comply with their bank’s terms and conditions about PIN safety. We, therefore, conducted a survey of how many PINs people have, and how they manage them. We found that while only a third of PINs are ever changed, almost half of bank customers write at least one PIN down. We also found bank conditions that are too vague to test, or even contradictory on whether PINs could be shared across cards. Yet, some hazardous practices are not forbidden by many banks: of the 22.9% who re-use PINs across devices, half also use their bank PINs on their mobile phones. We conclude that many bank contracts fail a simple test of reasonableness, and ‘strong authentication’, as required by the Payment Services Directive II, should include usability testing.
- Published
- 2017
14. Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption (Short Paper)
- Author
-
David J. Pym, Christos Ioannidis, and Tristan Caulfield
- Subjects
Discrete choice ,Computer science ,business.industry ,05 social sciences ,Short paper ,Usability ,Technological evolution ,02 engineering and technology ,Encryption ,Social relation ,Lead (geology) ,Work (electrical) ,Risk analysis (engineering) ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,050211 marketing ,020201 artificial intelligence & image processing ,business - Abstract
We introduce a model for examining the factors that lead to the adoption of new encryption technologies. Building on the work of Brock and Durlauf, the model describes how agents make choices, in the presence of social interaction, between competing technologies given their relative cost, functionality, and usability. We apply the model to examples about the adoption of encryption in communication (email and messaging) and storage technologies (self-encrypting drives) and also consider our model’s predictions for the evolution of technology adoption over time.
- Published
- 2017
15. European Union Transport White Paper
- Author
-
Josias Zietsman, Greg Marsden, Henrik Gudmundsson, and Ralph P. Hall
- Subjects
business.industry ,Political union ,Technical standard ,Context (language use) ,International trade ,White paper ,Political science ,European integration ,Sustainability ,media_common.cataloged_instance ,European union ,business ,Free trade ,media_common - Abstract
This case study examines the European Transport White Paper of 2011 as an example of a planning domain application. The European Union is an economic and political union of some 28 states in Europe. Some of the key premises of the European Union have been to open up markets to free trade within the region and to seek to harmonise technical standards, laws, and processes to facilitate the free movement of people and goods. It is interesting that sustainability is also emphasized as an overarching goal for all areas of European policy making. The European Union employs a wide range of assessment and monitoring mechanisms to track progress on the implementation and performance of policies in the transport area, which is seen as a keystone for the so-called Single European Market. These mechanisms clearly reflect tensions between the different goals and pose challenges for the interpretation of indicators on transportation trends. Also the sheer size and complexity of the Union raises challenges for the effective application of indicator based evidence. The chapter will place the indicator- and application rich example of the ex ante assessment of the European Transport Policy White Paper in the wider context European Union policy making.
- Published
- 2016
16. A Practical Guide to Writing (and Understanding) a Scientific Paper: Clinical Studies
- Author
-
Pietro Randelli, Corrado Bait, Riccardo Compagnoni, Kristian Samuelsson, Alberto Grassi, Alessandra Menon, and Stefano Zaffagnini
- Subjects
Medical education ,Medical knowledge ,Process (engineering) ,education ,Psychology ,Patient care - Abstract
Writing a scientific paper is a relevant part of the activities of medical doctors and is increasingly important for the progress of medical knowledge. Clinical outcomes can only be improved through research, education, and patient care. All these experiences are shared with the global community, primarily through peer-reviewed research papers, systematic review articles, and meta-analyses. Considering that not that much time is spent on training medical students to write a research manuscript, it, however, appears to be an intimidating process for many medical doctors.
- Published
- 2019
17. How to Prepare a Paper Presentation?
- Author
-
Timothy Lording and Jacques Menetrey
- Subjects
Structure (mathematical logic) ,Presentation ,Work (electrical) ,Anticipation (artificial intelligence) ,media_common.quotation_subject ,Premise ,Engineering ethics ,Relevance (information retrieval) ,Psychology ,media_common - Abstract
Presenting your paper at a meeting is an important part of sharing your research with the orthopaedic community. Presentations are generally short and sharp, and careful preparation is key to ensure that the premise, findings, and relevance of your work are successfully conveyed. For most conference papers, the structure will mirror that of a scientific manuscript, with an introduction, materials and methods, results, discussion, and conclusions. Anticipation of potential questions will help to clarify your research for the audience.
- Published
- 2019
18. How to Review a Clinical Research Paper?
- Author
-
Volker Musahl, Neel Patel, Marco Yeung, and Kanto Nagai
- Subjects
Clinical Practice ,Section (archaeology) ,Computer science ,media_common.quotation_subject ,Medical school ,Engineering ethics ,Review process ,Quality (business) ,media_common - Abstract
Critical evaluation of each section of a paper is needed in order to properly assess the purpose and quality of the paper and to understand the degree to which the results can influence clinical practice. Reviewing a paper is a skill that is best honed by practice, but there is no real formal training during medical school or residency on what to evaluate during a review and what the review process involves for a journal. Thus, this chapter will highlight the major points to review in each section of a paper and will provide a guide for young investigators to use while interpreting the findings of a paper. Additionally, the components of a review submission to a journal will be outlined.
- Published
- 2019
19. Water Recovery in the Paper Industry, Membranes for
- Author
-
M. Concepcion Monte and Angeles Blanco
- Subjects
Membrane ,Chemistry ,Water recovery ,Pulp and paper industry - Published
- 2016
20. Policy-Paper: 'Ein zukunftsfähiger Gesellschaftsvertrag mit der Landwirtschaft: Plädoyer für eine neue Agrarpolitik'
- Author
-
Kai P. Purnhagen, Claudia Pahl-Wostl, Andrea Früh-Müller, Volkmar Wolters, Fabian Thomas, Christine Krämer, Peter H. Feindt, Caroline van Bers, and Alois Heißenhuber
- Abstract
Dieses Policy-Paper ist das wichtigste Ergebnis des ZA-NExUS-Projekts, das wissenschaftlich basierte Optionen fur die kunftige Ausgestaltung der Agrarpolitik aus der Perspektive des Natur- und Umweltschutzes formulieren sollte. Es wurde im Januar 2017 auf einer Pressekonferenz mit der damaligen Bundesministerin Dr. Barbara Hendricks der Offentlichkeit vorgestellt. Ausgehend vom Konzept eines zukunftsfahigen Gesellschaftsvertrags mit der Landwirtschaft wird eine neue Architektur der Agrarpolitik mit folgenden Kernelementen vorgeschlagen: Pramien fur Landschaftsvielfalt und fur Basismasnahmen im Agrarumwelt- und Klimaschutz, regionale Agrarumwelt- und Klimaschutzprogramme, ein Kooperationsprogramm Natur und Landwirtschaft sowie ein effektives Ordnungsrecht. Hinzu kommt ein Innovationsprogramm zur Entwicklung von Mehrwertmarkten fur umweltfreundliche Produkte durch Verbraucherkommunikation, praxisorientierte Forschung und Beratung.
- Published
- 2019
21. White Paper der Päpstlichen Akademie für das Leben
- Author
-
Thomas Sitte
- Abstract
Palliativversorgung steigt national und auf globaler Ebene stetig. Auch der Vatikan hat die Brisanz der bestehenden Versorgungslucke erkannt und setzte 2017 eine internationale, religions- und kirchenunabhangige Expertengroup zur Beratung ein, sie wird von einem der Autoren mitorganisiert. Die Gruppe veroffentlichte im Namen der Papstlichen Akademie fur das Leben in 2018 ein White Paper, das in den Kernaussagen, die sich an alle gesellschaftlichen Gruppen wenden, hier veroffentlicht wird. Moge es Ihnen, dem Leser, als Impuls dienen, zu den Veranderungen auch uber die eigentliche Patientenversorgung hinaus beizutragen.
- Published
- 2019
22. A Short Paper on the Incentives to Share Private Information for Population Estimates
- Author
-
Jens Grossklags, Patrick Loiseau, and Michela Chessa
- Subjects
Population estimate ,Incentive ,Analytics ,business.industry ,Computer science ,Internet privacy ,Short paper ,Data analysis ,business ,Computer security ,computer.software_genre ,Private information retrieval ,computer - Abstract
Consumers are often willing to contribute their personal data for analytics projects that may create new insights into societal problems. However, consumers also have justified privacy concerns about the release of their data.
- Published
- 2015
23. Water Recovery in Paper Industry by Membrane Operations
- Author
-
Mari Kallioinen
- Subjects
Membrane ,Environmental science ,Water recovery ,Pulp and paper industry - Published
- 2015
24. How to Write a Clinical Paper
- Author
-
Brendan Coleman
- Subjects
Writing style ,Structure (mathematical logic) ,Publishing ,business.industry ,Computer science ,Process (engineering) ,Engineering ethics ,business ,GeneralLiterature_MISCELLANEOUS - Abstract
Publishing the results of your research is a fulfilling experience, both from a personal viewpoint, but also helping advance the orthopaedic knowledge. This chapter discusses the process from completing the study to formulating the final manuscript that is ready for submission, providing a structure to follow in preparation of the manuscript and tips on improving your writing style.
- Published
- 2019
25. A Practical Guide to Writing (and Understanding) a Scientific Paper: Meta-Analyses
- Author
-
Corrado Bait, Riccardo Compagnoni, Alberto Grassi, Stefano Zaffagnini, Pietro Randelli, and Kristian Samuelsson
- Subjects
Data extraction ,Point (typography) ,Process (engineering) ,Computer science ,Statistical analyses ,Meta-analysis ,media_common.quotation_subject ,Quality (business) ,Data science ,Critical condition ,Systematic search ,media_common - Abstract
Meta-analyses represent an unbiased way of summarising the evidence on a specific topic. A meta-analysis is a formal process for gathering and evaluating literature to answer a specific question, using statistics to combine the data from randomised controlled trials. However, their use is controversial, as there are several critical conditions and methodological considerations that could produce misleading conclusions. A wide and extensive systematic search, clear-cut inclusion criteria and appropriate data extraction are mandatory when it comes to obtaining all the evidence relating to the investigated topic. Statistical analyses should be performed carefully and all sources of heterogeneity should be explored to avoid dangerous bias. The design and the quality of the included studies should be clearly presented to show the reader the overall quality of the evidence that is presented in the meta-analysis. Finally, the results should be interpreted critically from both a clinical and a statistical point of view.
- Published
- 2019
26. Article 7 TEU and the rule of law mechanism: A dissuasive weapon or a paper tiger?
- Author
-
Inger Österdahl
- Subjects
Vienna Convention on the Law of Treaties ,Political science ,Member state ,media_common.cataloged_instance ,Constitutional law ,European union ,Treaty on European Union ,Economic Justice ,Mechanism (sociology) ,Law and economics ,Rule of law ,media_common - Abstract
This contribution deals with the ability or not of the European Union (EU) to act in situations of serious systemic violations of the rule of law in a Member State. It does this by looking at the different available mechanisms including Article 7 in the Treaty on European Union (TEU) and the new Rule of Law Framework and excluding infringement procedures before the Court of Justice of the EU. The contribution also discusses whether as a result of a serious breach of the TEU a Member State could be expelled from the organisation. The TEU contains no provision on expulsion, but the Vienna Convention on the Law of Treaties potentially does. In conclusion, the contribution finds that neither mechanism can be likened to a weapon, nor are they probably dissuasive, but they might be persuasive thanks to a persistent and protracted dialogue. The EU has no realistic choice but to be a gentle civiliser of Member States.
- Published
- 2019
27. Studies on Artistic Style of Chinese Ink Deckle-Edged Paper-Cutting Animation
- Author
-
Xiaoli Dong
- Subjects
Style (visual arts) ,Painting ,media_common.quotation_subject ,Chinese traditional ,Beauty ,Art ,Animation ,The arts ,GeneralLiterature_MISCELLANEOUS ,ComputingMethodologies_COMPUTERGRAPHICS ,Theme (narrative) ,media_common ,Visual arts - Abstract
This article elaborates processes of the production and development of ink deckle-edged paper-cutting animation and summarizes its artistic style. The overall style of ink deckle-edged paper-cutting animation has the unique beauty of artistic conception of Chinese traditional arts, modeling of character is featured on fine and delicate, and has characteristic of shading in Chinese ink painting. Its theme is refined and rich in philosophy. At the same time, this article also explores problems existed and future development of ink deckle-edged paper-cutting animation.
- Published
- 2018
28. A Bibliometric Analysis on the Published Papers in Journal of Technology Enhanced Foreign Language Education (TEFLE) from Year 2006 to 2015
- Author
-
Xiu-Yan Zhong
- Subjects
Classroom teaching ,Foreign language learning ,Evaluation system ,Bibliometric analysis ,business.industry ,Political science ,Foreign language ,Public relations ,China ,business ,Research method ,Qualitative research - Abstract
This Paper presents a bibliometric analysis of the papers published in the journal of Technology Enhanced Foreign Language Education (TEFLE), a core professional academic journal in China, during the years from 2006 to 2015. Our result aims to provide a clear view of the evolution of literature in the research field of technology enhanced foreign language learning over the past decade, intending to put forward a preliminary framework for TEFLE to improve its publication quality and at the same time foster better technology enhanced foreign language education in China. Bibliometric indicators of paper amount, author information, total citations, and frequency of keywords have been analyzed with the use of tools of BICOMB and SPSS and methods of co-word and cluster analysis, which indicates that, over the past decade, both of the quality of the published papers and the paper evaluation system has been improved. The statistics also reveal that the authors in TEFLE are mainly from eastern China, a research group that has been formed with more researchers constantly joining in, and a number of papers have been highly cited, bringing further interest in the related disciplines. Currently, the reform of foreign language classroom teaching with technological aids appears the hotspot topic in the related applied field. An effort is made to demonstrate that the research method has shifted to a new way that places equal emphasis on both quantitative and qualitative study in technology enhanced learning (TEL) and technologies have a bigger influence on foreign language learning in China, but in the meantime, there is an imbalance in the distribution of authors from different national geographic areas in TEL research.
- Published
- 2018
29. What is the Best Way to Allocate Teacher’s Efforts: How Accurately Should We Write on the Board? When Marking Comments on Student Papers?
- Author
-
Olga Kosheleva and Karen Villaverde
- Subjects
Multimedia ,Computer science ,Handwriting ,computer.software_genre ,Legibility ,computer - Abstract
Writing on the board is an important part of a lecture. Lecturers’ handwriting is not always perfect. Usually, a lecturer can write slower and more legibly, this will increase understandability but slow down the lecture. In this chapter, we analyze an optimal trade-off between speed and legibility.
- Published
- 2017
30. A Short Paper on Blind Signatures from Knowledge Assumptions
- Author
-
Lucjan Hanzlik and Kamil Kluczniak
- Subjects
Theoretical computer science ,Computer science ,String (computer science) ,0102 computer and information sciences ,02 engineering and technology ,Okamoto–Uchiyama cryptosystem ,Approx ,computer.software_genre ,01 natural sciences ,Signature (logic) ,Random oracle ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Blind signature ,020201 artificial intelligence & image processing ,Data mining ,Impossibility ,computer ,Standard model (cryptography) - Abstract
This paper concerns blind signature schemes. We focus on two moves constructions, which imply concurrent security. There are known efficient blind signature schemes based on the random oracle model and on the common reference string model. However, constructing two move blind signatures in the standard model is a challenging task, as shown by the impossibility results of Fischlin et al. The recent construction by Garg et al. (Eurocrypt’14) bypasses this result by using complexity leveraging, but it is impractical due to the signature size (\(\approx \) 100 kB). Fuchsbauer et al. (Crypto’15) presented a more practical construction, but with a security argument based on interactive assumptions. We present a blind signature scheme that is two-move, setup-free and comparable in terms of efficiency with the results of Fuchsbauer et al. Its security is based on a knowledge assumption.
- Published
- 2017
31. Private eCash in Practice (Short Paper)
- Author
-
Sébastien Gambs, Solenn Brunet, Nicolas Desmoulins, Jacques Traore, Saïd Gharout, and Amira Barki
- Subjects
Scheme (programming language) ,Subscriber identity module ,Computer science ,media_common.quotation_subject ,020302 automobile design & engineering ,02 engineering and technology ,Computer security ,computer.software_genre ,Payment ,Security token ,law.invention ,ecash ,0203 mechanical engineering ,law ,0202 electrical engineering, electronic engineering, information engineering ,Blind signature ,020201 artificial intelligence & image processing ,Use case ,computer ,computer.programming_language ,media_common ,Anonymity - Abstract
Most electronic payment systems for applications, such as eTicketing and eToll, involve a single entity acting as both merchant and bank. In this paper, we propose an efficient privacy-preserving post-payment eCash system suitable for this particular use case that we refer to, afterwards, as private eCash. To this end, we introduce a new partially blind signature scheme based on a recent Algebraic MAC scheme due to Chase et al. Unlike previous constructions, it allows multiple presentations of the same signature in an unlinkable way. Using it, our system is the first versatile private eCash system where users must only hold a sole reusable token (i.e. a reusable coin spendable to a unique merchant). It also enables identity and token revocations as well as flexible payments. Indeed, our payment tokens are updated in a partially blinded way to collect refunds without invading user’s privacy. By implementing it on a Global Platform compliant SIM card, we show its efficiency and suitability for real-world use cases, even for delay-sensitive applications and on constrained devices as a transaction can be performed in only 205 ms.
- Published
- 2017
32. Modelling to Contain Pandemic Influenza A (H1N1) with Stochastic Membrane Systems: A Work−in−Progress Paper
- Author
-
Lei Xu
- Subjects
Risk analysis (engineering) ,Stochastic modelling ,Computer science ,Event (computing) ,Pandemic influenza ,virus diseases ,Work in process ,Membrane computing - Abstract
Pandemic influenza A (H1N1) has spread rapidly across the globe. In the event of pandemic influenza A (H1N1), decision-makers are required to act in the face of substantial uncertainties. Simulation models can be used to project the effectiveness of mitigation strategies. Since nature is very complex, the perfect model that explains it will be complex too. Membrane system (P system) can be a perfect model modelling ecological system. This paper briefly describes stochastic membrane systems for modelling spread of pandemic influenza A (H1N1) in an isolated geographical region. The model is based on a discrete and stochastic modelling framework in the area of Membrane Computing. This model can be a useful tool for the prediction of infectious diseases within predefined areas, and the evaluation of intervention strategies.
- Published
- 2016
33. Application of Rasch Model in Test Paper Quality Analysis—With the Case of Reading Literacy Pilot Test Paper for Grade 5–6 Students in Guangxi
- Author
-
Dehong Luo and Jing Gong
- Subjects
Wright ,Rasch model ,Reading (process) ,media_common.quotation_subject ,Mathematics education ,Pilot test ,General knowledge ,Dimension (data warehouse) ,Psychology ,Function (engineering) ,media_common ,Test (assessment) - Abstract
The methods of applying Rasch Model in the analysis of test paper quality are as follows: Wright Map which shows the reader a general knowledge of the whole survey, Multidimensionality Investigations which is used to examine whether test paper measures the latent trait (reading dimension of subjects), Item Fit Order, Bubble Diagram, and so on. Analysis result shows that the reading literacy pilot test paper for Grades 5–6 students in Guangxi meets the requirement generally. Specifically speaking, with covering different ability students and making up reasonably difficulty items, the test items reach the expected test effect. For better and higher application efficiency, the suggestion for usage is that the choice of Rasch Model function and result analysis methods be based on different test goals.
- Published
- 2015
34. DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (Short Paper)
- Author
-
Ahmad-Reza Sadeghi, Stephan Heuser, Marco Negro, and Praveen Kumar Pendyala
- Subjects
Logic bomb ,Computer science ,business.industry ,020206 networking & telecommunications ,Access control ,02 engineering and technology ,Static analysis ,Computer security ,computer.software_genre ,Application layer ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Dynamic program analysis ,Android (operating system) ,business ,computer ,Mobile device ,Privilege escalation - Abstract
Smart mobile devices process and store a vast amount of security- and privacy-sensitive data. To protect this data from malicious applications mobile operating systems, such as Android, adopt fine-grained access control architectures. However, related work has shown that these access control architectures are susceptible to application-layer privilege escalation attacks. Both automated static and dynamic program analysis promise to proactively detect such attacks. Though while state-of-the-art static analysis frameworks cannot adequately address native and highly obfuscated code, dynamic analysis is vulnerable to malicious applications using logic bombs to avoid early detection.
- Published
- 2017
35. KBID: Kerberos Bracelet Identification (Short Paper)
- Author
-
Michael Rushanan, Joseph Carrigan, and Paul D. Martin
- Subjects
Password ,Authentication ,Service (systems architecture) ,computer.internet_protocol ,Computer science ,010401 analytical chemistry ,Wearable computer ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,01 natural sciences ,0104 chemical sciences ,Password strength ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Identification (information) ,Ticket ,0202 electrical engineering, electronic engineering, information engineering ,Kerberos ,computer - Abstract
The most common method for a user to gain access to a system, service, or resource is to provide a secret, often a password, that verifies her identity and thus authenticates her. Password-based authentication is considered strong only when the password meets certain length and complexity requirements, or when it is combined with other methods in multi-factor authentication. Unfortunately, many authentication systems do not enforce strong passwords due to a number of limitations; for example, the time taken to enter complex passwords. We present an authentication system that addresses these limitations by prompting a user for credentials once and then storing an authentication ticket in a wearable device that we call Kerberos Bracelet Identification (KBID).
- Published
- 2017
36. Papers and Cases
- Author
-
Klaus-Dieter Gronwald
- Subjects
Background information ,Reading (process) ,media_common.quotation_subject ,ComputingMilieux_COMPUTERSANDEDUCATION ,Mathematics education ,Organizational commitment ,Psychology ,Intercultural communication ,media_common - Abstract
This chapter includes complementary reading material as detailed background information to specific topics which can be used for an in-depth analysis by instructors and students. Reference to these articles is given at the end of each corresponding chapter.
- Published
- 2017
37. Quick Diagnosis of Alkaptonuria by Homogentisic Acid Determination in Urine Paper Spots
- Author
-
Annalisa Santucci, Lia Millucci, Vanna Micheli, Gabriella Jacomelli, and Giulia Bernardini
- Subjects
030203 arthritis & rheumatology ,Pathology ,medicine.medical_specialty ,business.industry ,010401 analytical chemistry ,Symptom development ,Diagnostic marker ,Urine ,medicine.disease ,01 natural sciences ,Article ,Alkaptonuria ,0104 chemical sciences ,Excretion ,03 medical and health sciences ,chemistry.chemical_compound ,Joint disease ,0302 clinical medicine ,chemistry ,Medicine ,Homogentisic acid ,business ,Homogentisate 1,2-dioxygenase - Abstract
Two methods are described for homogentisic acid (HGA) determination in dried urine spots (DUS) on paper from Alkaptonuria (AKU) patients, devised for quick early diagnosis. AKU is a rare autosomal recessive disorder caused by deficiency of homogentisate 1,2-dioxygenase, yielding in accumulation of HGA. Its massive excretion causes urine darkening by exposure to air or alkalinization, and is a diagnostic marker. The deposition of polymers produced after HGA oxidation within the connective tissues causes ochronotic arthritis, a degenerative joint disease manifesting in adulthood and only rarely in childhood. No early diagnosis is usually accomplished, awareness following symptom development.Two methods were designed for HGA determination in DUS: (1) a rapid semi-quantitative reliable method based on colour development in alkali and quantification by comparison with dried paper spots from HGA solutions of known concentration and (2) a quantitative and sensitive HPLC-linked method, previously devised for purine and pyrimidine analysis in urine and plasma.Colour intensity developed by DUS after alkali addition was proportional to HGA concentration, and calculated amounts were in good agreement with quantitative analysis performed by RP-HPLC on DUS and on urines as such.DUS, often used for different diagnostic purpose, are easily prepared and safely delivered. The simple and quick colour method proposed provides reliable HGA assessment and is fit for large screening. HGA concentration determined in 10 AKU patient DUS by both methods 1 and 2 was in agreement with direct urine assay and in the range reported by literature.A reliable HGA quantification based on colour development in paper urine spots is validated by HPLC-linked HGA quantification, and proposed as a quick diagnostic tool for AKU patients.
- Published
- 2016
38. Cryptographic Assumptions: A Position Paper
- Author
-
Shafi Goldwasser and Yael Tauman Kalai
- Subjects
Cryptographic primitive ,Theoretical computer science ,business.industry ,Cryptography ,0102 computer and information sciences ,02 engineering and technology ,Cryptographic protocol ,Computer security ,computer.software_genre ,Mathematical proof ,01 natural sciences ,Computational hardness assumption ,Field (computer science) ,Random oracle ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Security of cryptographic hash functions ,business ,computer ,Mathematics - Abstract
The mission of theoretical cryptography is to define and construct provably secure cryptographic protocols and schemes. Without proofs of security, cryptographic constructs offer no guarantees whatsoever and no basis for evaluation and comparison. As most security proofs necessarily come in the form of a reduction between the security claim and an intractability assumption, such proofs are ultimately only as good as the assumptions they are based on. Thus, the complexity implications of every assumption we utilize should be of significant substance, and serve as the yard stick for the value of our proposals. Lately, the field of cryptography has seen a sharp increase in the number of new assumptions that are often complex to define and difficult to interpret. At times, these assumptions are hard to untangle from the constructions which utilize them. We believe that the lack of standards of what is accepted as a reasonable cryptographic assumption can be harmful to the credibility of our field. Therefore, there is a great need for measures according to which we classify and compare assumptions, as to which are safe and which are not. In this paper, we propose such a classification and review recently suggested assumptions in this light. This follows the footsteps of Naor Crypto 2003. Our governing principle is relying on hardness assumptions that are independent of the cryptographic constructions.
- Published
- 2015
39. Fabrication and Characterization of Carbon Nanotube/Cellulose Composite Paper
- Author
-
Masanori Imai, Eiichi Sano, and Tomo Tanaka
- Subjects
Permittivity ,Materials science ,Composite number ,chemistry.chemical_element ,Carbon nanotube ,Conductivity ,law.invention ,Cellulose fiber ,chemistry ,Electrical resistivity and conductivity ,law ,Electromagnetic shielding ,Composite material ,Carbon - Abstract
Carbon nanotube (CNT)/cellulose composite materials were fabricated in a papermaking process optimized to form a CNT network on cellulose fibers. The measured electrical conductivity ranged from 0.05 to 671 S/m for a CNT content of 0.5–16.7 wt%, which was higher than that for other polymer composites. The measured temperature dependences of electrical conductivity were described with the fluctuation-induced tunneling model. The real permittivities were the highest in the microwave region. The unique CNT network structure is thought to be the reason for the high conductivity and permittivity values. Our CNT/cellulose composite material exhibited improved parameters without any decrease in mechanical strength, compared to other carbon materials. The near-field electromagnetic shielding effectiveness (EMI SE) measured using a microstrip line method depended on the sheet conductivity and qualitatively matched the results of electromagnetic field simulations using a finite-difference time-domain simulator. A high near-field EMI SE of 50 dB was achieved in the 5–10-GHz frequency region with 4.8-wt% composite paper. The far-field EMI SE was measured using a free-space method. Fairly good agreement was obtained between the measured and calculated results. Approximately 10-wt% CNT is required to achieve composite paper with 20-dB far-field EMI SE.
- Published
- 2015
40. ScienceWISE: A Web-Based Interactive Semantic Platform for Paper Annotation and Ontology Editing
- Author
-
Alexey Boyarsky, Roman Prokofyev, Anton Astafiev, Oleg Ruchayskiy, and Christophe Guéret
- Subjects
Ontology Inference Layer ,Information retrieval ,business.industry ,Computer science ,Ontology-based data integration ,Linked data ,computer.file_format ,Ontology (information science) ,World Wide Web ,Annotation ,Simple Knowledge Organization System ,Web application ,Upper ontology ,business ,computer - Abstract
The ScienceWISE system is a collaborative ontology editor and paper annotation tool designed to help researchers in their discovery. In this paper, we describe the system currently deployed at sciencewise.info and the exposition of its data as Linked Data. During the “RDFization” process, we faced issues to encode the knowledge base in SKOS and find resources to link to on the LOD. We discuss these issues and the remaining open challenges to implement some target features.
- Published
- 2015
41. Augmentation Strategies for Paper-Based Content Integrated with Digital Learning Supports Using Smartphones
- Author
-
Nian-Shing Chen, Wei-Chieh Fang, and I-Chun Hung
- Subjects
Multimedia ,business.industry ,Computer science ,media_common.quotation_subject ,Digital content ,Context (language use) ,Collaborative learning ,computer.software_genre ,Constructive ,Blended learning ,Reading (process) ,The Internet ,Digital learning ,business ,computer ,media_common - Abstract
Up to the twenty-first century, paper is still widely adopted for recording and reading. However, paper-based materials are fully capable of presenting abstract concepts and complicated knowledge with static text and figures. Learners usually need timely and adequate supports when encountering difficulties during learning. With a consideration of applying technologies, the learning tool must have a certain mobility and accessibility for acquiring facilitative resources. Using the networking capability of smartphone to access digital content from the Internet to enrich conventional paper-based learning activities is worth investigating. This chapter introduces an augmentation-enhanced learning context with an integration of digital content into paper-based materials in order to facilitate learning. Constructive feedback, scaffolding questioning, and procedural scaffolding are three strategies applied into the instructional designs and learning system. Quasi-experiments for personal learning and collaborative learning were also conducted to evaluate the effects on learning performance. The results suggest that the three instructional designs had significantly positive effects on individual’s learning performance. Team’s learning performance and team’s discourse levels were promoted as well. This chapter lays out a strong foundation for researchers to further explore how to better design different learning strategies for different learning subjects in the augmentation-enhanced learning context using smartphones. It is hoped that educational practitioners are able to obtain concrete ideas and solutions on how to better leverage the benefits of both paper-based content and digital learning materials in a real blended learning environment.
- Published
- 2014
42. Paper Currency Denomination Recognition Based on GA and SVM
- Author
-
Ou Jin, Hua-Min Zhang, Jianbiao He, Jun Liang, and Li Xi
- Subjects
Banknote ,business.industry ,Computer science ,Process (computing) ,Pattern recognition ,Function (mathematics) ,Support vector machine ,symbols.namesake ,ComputingMethodologies_PATTERNRECOGNITION ,Computer Science::Computer Vision and Pattern Recognition ,Pattern recognition (psychology) ,Genetic algorithm ,Gaussian function ,symbols ,Artificial intelligence ,business ,Statistic - Abstract
SVM is a new general learning method based on the statistic learning system which can be used as an effective means to process small sample, nonlinear and high dimensional pattern recognition. This paper did research on the learning algorithm of support vector machine, extracted characteristic data of banknote which is on account of PCA according to the characteristics of the support vector machine (SVM), and proposed to put support vector machine (SVM) into banknotes denomination recognition by combining SMO training algorithm with one-to-many multi-value classification algorithm. Besides, this article used genetic algorithm in parameters optimization such as the punishment coefficient C of soft margin SVM and the width parameter of Gaussian kernel function. The ultimate purpose is to recognize the denomination of banknote efficiently and accurately. The experimental results verified that this kind of recognition method increases the recognition accuracy up to 90% or more.
- Published
- 2015
43. Special issue on best papers from the 'BPM 2012' workshops
- Author
-
Marcello La Rosa and Pnina Soffer
- Subjects
Scope (project management) ,Computer science ,business.industry ,Process (engineering) ,Business process ,InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS ,media_common.quotation_subject ,Control (management) ,process mining ,Information technology ,business process management ,process model collection ,Organizational performance ,GeneralLiterature_MISCELLANEOUS ,Business process management ,Engineering management ,process modeling ,business ,Function (engineering) ,080600 INFORMATION SYSTEMS ,Information Systems ,media_common - Abstract
Business Process Management (BPM) (Dumas et al. 2013) investigates how organizations function and can be improved on the basis of their business processes. The starting point for BPM is that organizational performance is a function of process performance. Thus, BPM proposes a set of methods, techniques and tools to discover, analyze, implement, monitor and control business processes, with the ultimate goal of improving these processes. Most importantly, BPM is not just an organizational management discipline. BPM also studies how technology, and particularly information technology, can effectively support the process improvement effort. In the past two decades the field of BPM has been the focus of extensive research, which spans an increasingly growing scope and advances technology in various directions. The main international forum for state-of-the-art research in this field is the International Conference on Business Process Management, or “BPM” for short—an annual meeting of the aca ...
- Published
- 2015
44. Scientific Papers
- Author
-
Pieter H. Joubert and Silvia M. Rogers
- Published
- 2015
45. Social Media on a Piece of Paper: A Study of Hybrid and Sustainable Media Using Active Infrared Vision
- Author
-
Thitirat Siriborvornratanakul
- Subjects
Engineering ,Active infrared ,Multimedia ,business.industry ,Social media ,computer.software_genre ,business ,computer ,Boom - Abstract
In this world of digital and social media booms, a number of people spend their valuable times burying heads in smartphones, resulting in unintentional increased gaps in physical relationship with people nearby. A hybrid digital-physical medium is a possible solution for this problem by means of externalizing social media data and integrating them into a physical medium somehow. In this way, using social media will simultaneously connect us with both virtual and physical worlds.
- Published
- 2015
46. Hyperdata: Update APIs for RDF Data Sources (Vision Paper)
- Author
-
Jacek Kopecký
- Subjects
World Wide Web ,Structure (mathematical logic) ,Metadata ,Open data ,Information retrieval ,Named graph ,Computer science ,Hyperdata ,Linked data ,computer.file_format ,Hyperlink ,RDF ,computer - Abstract
The Linked Data effort has been focusing on how to publish open data sets on the Web, and it has had great results. However, mechanisms for updating linked data sources have been neglected in research. We propose a structure for Linked Data resources into named graphs, connected through hyperlinks and self described with light metadata, that is a natural match for using standard HTTP methods to implement application-specific (high-level) public update APIs.
- Published
- 2015
47. Identifying damage on a bridge using rotation-based Bridge Weigh-In-Motion
- Author
-
James M. W. Brownjohn, Farhad Huseynov, Miguel Casero, Eugene J. O'Brien, David Hester, Huseynov, F. [0000-0002-5927-2444], Apollo - University of Cambridge Repository, and Huseynov, F [0000-0002-5927-2444]
- Subjects
Ambient traffic ,Traverse ,Rotation ,Computer science ,0211 other engineering and technologies ,020101 civil engineering ,02 engineering and technology ,Bridge (interpersonal) ,0201 civil engineering ,Robustness (computer science) ,021105 building & construction ,11. Sustainability ,Range (statistics) ,Sensitivity (control systems) ,Safety, Risk, Reliability and Quality ,Bridge ,Civil and Structural Engineering ,Original Paper ,B-WIM ,business.industry ,Structural engineering ,Damage detection ,Bridge weigh-in-motion ,Axle ,WIM ,Weigh in motion ,business ,Rotation (mathematics) - Abstract
Bridge Weigh-in-Motion (B-WIM) systems use the bridge response under a traversing vehicle to estimate its axle weights. The information obtained from B-WIM systems has been used for a wide range of applications such as pre-selection for weight enforcement, traffic management/planning and for bridge and pavement design. However, it is less often used for bridge condition assessment purposes which is the main focus of this study. This paper presents a bridge damage detection concept using information provided by B-WIM systems. However, conventional B-WIM systems use strain measurements which are not sensitive to local damage. In this paper the authors present a B-WIM formulation that uses rotation measurements obtained at the bridge supports. There is a linear relationship between support rotation and axle weight and, unlike strain, rotation is sensitive to damage anywhere in the bridge. Initially, the sensitivity of rotation to damage is investigated using a hypothetical simply supported bridge model. Having seen that rotation is damage-sensitive, the influence of bridge damage on weight predictions is analysed. It is shown that if damage occurs, a rotation-based B-WIM system will continuously overestimate the weight of traversing vehicles. Finally, the statistical repeatability of ambient traffic is studied using real traffic data obtained from a Weigh-in-Motion site in the U.S. under the Federal Highway Administration’s Long-Term Pavement Performance programme and a damage indicator is proposed as the change in the mean weights of ambient traffic data. To test the robustness of the proposed damage detection methodology numerical analysis are carried out on a simply supported bridge model and results are presented within the scope of this study.
- Published
- 2020
48. Diving behaviour of albatrosses: implications for foraging ecology and bycatch susceptibility
- Author
-
Andrea Manica, L. K. Bentley, Yan Ropert-Coudert, Akiko Kato, Richard A. Phillips, Bentley, L. K. [0000-0002-0365-6385], Kato, A. [0000-0002-8947-3634], Ropert-Coudert, Y. [0000-0001-6494-5300], Manica, A. [0000-0003-1895-450X], Apollo - University of Cambridge Repository, Department of Zoology [Cambridge], University of Cambridge [UK] (CAM), British Antarctic Survey (BAS), Natural Environment Research Council (NERC), Centre d'Études Biologiques de Chizé - UMR 7372 (CEBC), Université de La Rochelle (ULR)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche pour l’Agriculture, l’Alimentation et l’Environnement (INRAE), Bentley, LK [0000-0002-0365-6385], Kato, A [0000-0002-8947-3634], Ropert-Coudert, Y [0000-0001-6494-5300], and Manica, A [0000-0003-1895-450X]
- Subjects
0106 biological sciences ,Original Paper ,Ecology ,biology ,010604 marine biology & hydrobiology ,Foraging ,3103 Ecology ,Albatross ,15. Life on land ,Aquatic Science ,biology.organism_classification ,010603 evolutionary biology ,01 natural sciences ,Predation ,Phoebetria palpebrata ,Bycatch ,3109 Zoology ,[SDE]Environmental Sciences ,14. Life underwater ,Ecology, Evolution, Behavior and Systematics ,Chrysostoma ,31 Biological Sciences - Abstract
Diving is an ecologically important behaviour that provides air-breathing predators with opportunities to capture prey, but that also increases their exposure to incidental mortality (bycatch) in commercial fisheries. In this study, we characterised the diving behaviour of 26 individuals of three species, the black-browed albatross Thalassarche melanophris, grey-headed albatross T. chrysostoma and light-mantled albatross Phoebetria palpebrata, breeding at Bird Island, South Georgia. Individuals were tracked using Global Location Sensor (GLS)-immersion loggers and time-depth recorders (TDRs) and, for two species, Global Positioning System (GPS) loggers. Although the TDRs recorded 589 dives (defined in this paper as submersion > 1 m), average dive depths and durations were just 1.30–1.49 m and 2.5–3.3 s, respectively, for the three species. In addition, many individuals (22% of black-browed, 20% of grey-headed, and 57% of light-mantled albatrosses; total n = 9, 10 and 7 individuals, respectively) did not dive at all. Most dives occurred at the distal end of foraging trips and were rare during the commuting phase. No dives took place in darkness, despite long periods spent on water at night. The limited and shallow dive activity contrasts with impressions from a previous study using capillary-tube depth gauges (which are less accurate than TDRs) and has implications for the susceptibility of albatrosses to bycatch on longlines. This study provides further support for regulations requiring night setting and increased sink rates of baited hooks to help mitigate albatross bycatch.
- Published
- 2021
49. From Wood to Pulp - Cellulose
- Author
-
Arno Behr and Thomas Seidensticker
- Subjects
Pulp (paper) ,education ,technology, industry, and agriculture ,Paper production ,Ether ,engineering.material ,Pulp and paper industry ,complex mixtures ,chemistry.chemical_compound ,chemistry ,engineering ,Composition (visual arts) ,Cellulose ,Derivatization - Abstract
Chapter Timetable You will learn the composition of wood and how to extract cellulose from wood. The paper production as the most important use of cellulose is explained. We discuss the derivatization of cellulose to fibers, esters and ether.
- Published
- 2020
50. Migration and cultural integration in the early medieval cemetery of Finglesham, Kent, through stable isotopes
- Author
-
Sam Leggett and Apollo - University of Cambridge Repository
- Subjects
Mobility ,Archeology ,Original Paper ,Foodways ,Identity (social science) ,Community integration ,mobility ,Diet ,Geography ,Isotopes ,4301 Archaeology ,Early medieval ,Identity ,Anthropology ,Ethnology ,Narrative ,early medieval ,diet ,Kent ,4303 Historical Studies ,43 History, Heritage and Archaeology ,identity ,isotopes ,Social status - Abstract
Funder: Cambridge Philosophical Society; doi: http://dx.doi.org/10.13039/100013858, Debate over migrations to Britain during the fifth and sixth centuries AD is still rampant in archaeological discourse. Stable carbon, nitrogen and oxygen isotope values from multiple tissues in individuals buried at Finglesham in Kent during the first millennium AD demonstrate not only migration of individuals to the region but also highlight community integration through foodways and refute previous models of ‘invasion’ and replacement. This case study community suggests gendered differences in mobility into early medieval England, with males more likely to be migrants from cooler regions than women. It also challenges traditional narratives of social status in these furnished cemeteries being linked to diet or migrant status with no clear correlations found between funerary treatment and isotopic signatures. This multi-tissue and multi-isotope study tracks dietary changes in this multi-origin community throughout their lives and shows that they may have even changed their diets to adapt to Christianising influences in the region.
- Published
- 2021
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.