CINXE.COM
Search results for: Dalia Michel Reyes Villeda
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: Dalia Michel Reyes Villeda</title> <meta name="description" content="Search results for: Dalia Michel Reyes Villeda"> <meta name="keywords" content="Dalia Michel Reyes Villeda"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="Dalia Michel Reyes Villeda" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="Dalia Michel Reyes Villeda"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 253</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: Dalia Michel Reyes Villeda</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">253</span> Selective Adsorption of Anionic Textile Dyes with Sustainable Composite Materials Based on Physically Activated Carbon and Basic Polyelectrolytes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mari%20Carmen%20Reyes%20Angeles">Mari Carmen Reyes Angeles</a>, <a href="https://publications.waset.org/abstracts/search?q=Dalia%20Michel%20Reyes%20Villeda"> Dalia Michel Reyes Villeda</a>, <a href="https://publications.waset.org/abstracts/search?q=Ana%20Mar%C3%ADa%20Herrera%20Gonz%C3%A1lez"> Ana María Herrera González</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This work reports the design and synthesis of two composite materials based on physically activated carbon and basic polyelectrolytes useful in the adsorption of textile dyes present in aqueous solutions and wastewater. The synthesis of basic polyelectrolytes poly(2-vinylpyridine) (P2VP) and poly(4-vinylpyridine) (P4VP) was made by means of free radical polymerization. The carbon made from prickly pear peel (CarTunaF) was thermally activated in the presence of combustion gases. Composite materials CarTunaF2VP and CarTunaF4VP were obtained from CarTunaF and polybasic polyelectrolytes P2VP and P4VP with a ratio of 67:33 wt. The structure of each polyelectrolyte, P2VP, and P4VP, was elucidated by means of the FTIR and 1H NMR spectrophotometric techniques. Their thermal stability was evaluated using TGA. The characterization of CarTunaF and composite materials CarTunaF2VP and CarTunaF4VP was made by means of FTIR, TGA, SEM, and N2 adsorption. The adsorptive capacities of the polyelectrolytes and the composite materials were evaluated by adsorption of direct dyes present in aqueous solutions. The polyelectrolytes removed between 90 and 100% of the dyes, and the composite materials removed between 68 and 93% of the dyes. Using the four adsorbents P2VP, P4VP, CarTuna2VP, and CarTuna4VP, it was observed that the dyes studied, Direct Blue 80, Direct Turquoise 86, and Direct Orange 26, were adsorbed in the range between 46.1 and 188.7mg∙g-1 by means of electrostatic interactions between the anionic groups in the dyes with the cationic groups in the adsorbents. By using adsorbent materials in the treatment of wastewater from the textile industry, an improvement in the quality of the water was observed by decreasing its pH, COD, conductivity, and color considerably <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=adsorption" title="adsorption">adsorption</a>, <a href="https://publications.waset.org/abstracts/search?q=anionic%20dyes" title=" anionic dyes"> anionic dyes</a>, <a href="https://publications.waset.org/abstracts/search?q=composite" title=" composite"> composite</a>, <a href="https://publications.waset.org/abstracts/search?q=polyelectrolytes" title=" polyelectrolytes"> polyelectrolytes</a> </p> <a href="https://publications.waset.org/abstracts/152027/selective-adsorption-of-anionic-textile-dyes-with-sustainable-composite-materials-based-on-physically-activated-carbon-and-basic-polyelectrolytes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152027.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">99</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">252</span> Zoonotic Risk Practices in Rural Households in the Penka-Michel Health District (West Cameroon)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Namekong%20Fokeng%20Armand">Namekong Fokeng Armand</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Zoonoses are nowadays a serious public health problem in both developing and developed countries. They contribute to increase the economic burden. In case of emergence, rural populations are the most affected, hence the need to investigate risk practices in rural households of Penka-Michel (West Cameroon). Methods: This cross-sectional study was conducted from October to November 2021 among 200 heads of households living in the Penka-Michel health district (West Cameroon). It was done using a pre-tested and validated questionnaire, allowing to obtain socio-demographic, economic data, and data on zoonotic risk practices. Results: The participants [women (56%), men (44%)] worked mainly in the informal private sector (53%) and practiced agriculture secondarily (90%). Their highest level of education, for the most part, was a secondary school (50%); the average household size was 06 persons with a monthly income > 36270 FCFA (72%). 74% of household heads thought that animals can transmit diseases, and 17% had heard about zoonotic diseases through the media (65%). Rats caught in households (60%) were consumed there (74%), as was bush meat (61%) or dog meat (18%). For family food (90%), animals were slaughtered within the household (97%), rarely preceded by a veterinary inspection (6%). 87% of households practiced traditional rites with animal blood, 65% shared the same habitat as their animals, 41% did not systematically wash their hands after handling animals. More than 50% of households owned one or more dogs, usually strays (41%) and 48% of which were vaccinated (rabies). Many households had at least one: poultry (98%); pig (50%); dog (57%), cat (52%). 25% of households slaughtered sick animals for consumption, and 27% ate dead animals. Conclusion: This study identified numerous zoonotic risk practices in households in the Penka-Michel health district (West Cameroon). Concerted, multisectoral communication / awareness-raising actions are needed to break with these practices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=zoonoses" title="zoonoses">zoonoses</a>, <a href="https://publications.waset.org/abstracts/search?q=risky%20practices" title=" risky practices"> risky practices</a>, <a href="https://publications.waset.org/abstracts/search?q=rural%20households" title=" rural households"> rural households</a>, <a href="https://publications.waset.org/abstracts/search?q=penka-michel" title=" penka-michel"> penka-michel</a>, <a href="https://publications.waset.org/abstracts/search?q=cameroon" title=" cameroon"> cameroon</a> </p> <a href="https://publications.waset.org/abstracts/145267/zoonotic-risk-practices-in-rural-households-in-the-penka-michel-health-district-west-cameroon" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145267.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">170</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">251</span> Prediction of Structural Response of Reinforced Concrete Buildings Using Artificial Intelligence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Juan%20Boj%C3%B3rquez">Juan Bojórquez</a>, <a href="https://publications.waset.org/abstracts/search?q=Henry%20E.%20Reyes"> Henry E. Reyes</a>, <a href="https://publications.waset.org/abstracts/search?q=Ed%C3%A9n%20Boj%C3%B3rquez"> Edén Bojórquez</a>, <a href="https://publications.waset.org/abstracts/search?q=Alfredo%20Reyes-Salazar"> Alfredo Reyes-Salazar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper addressed the use of Artificial Intelligence to obtain the structural reliability of reinforced concrete buildings. For this purpose, artificial neuronal networks (ANN) are developed to predict seismic demand hazard curves. In order to have enough input-output data to train the ANN, a set of reinforced concrete buildings (low, mid, and high rise) are designed, then a probabilistic seismic hazard analysis is made to obtain the seismic demand hazard curves. The results are then used as input-output data to train the ANN in a feedforward backpropagation model. The predicted values of the seismic demand hazard curves found by the ANN are then compared. Finally, it is concluded that the computer time analysis is significantly lower and the predictions obtained from the ANN were accurate in comparison to the values obtained from the conventional methods. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=structural%20reliability" title="structural reliability">structural reliability</a>, <a href="https://publications.waset.org/abstracts/search?q=seismic%20design" title=" seismic design"> seismic design</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20neural%20network" title=" artificial neural network"> artificial neural network</a>, <a href="https://publications.waset.org/abstracts/search?q=probabilistic%20seismic%20hazard%20analysis" title=" probabilistic seismic hazard analysis"> probabilistic seismic hazard analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=seismic%20demand%20hazard%20curves" title=" seismic demand hazard curves"> seismic demand hazard curves</a> </p> <a href="https://publications.waset.org/abstracts/141596/prediction-of-structural-response-of-reinforced-concrete-buildings-using-artificial-intelligence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141596.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">196</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">250</span> The Links between Cardiovascular Risk and Psychological Wellbeing in Elderly</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Laura%20Sapranaviciute-Zabazlajeva">Laura Sapranaviciute-Zabazlajeva</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdonas%20Tamosiunas"> Abdonas Tamosiunas</a>, <a href="https://publications.waset.org/abstracts/search?q=Dalia%20Luksiene"> Dalia Luksiene</a>, <a href="https://publications.waset.org/abstracts/search?q=Dalia%20Virviciute"> Dalia Virviciute</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The cardiovascular diseases (CVD) is the leading cause of death in the EU, especially in the middle aged and elderly population. Psychological wellbeing (PWB) has been linked with better cardiovascular health and survival in the elderly. The aim of the study is to evaluate associations between CVD risk and PWB in middle-aged and elderly population. 10,940 middle aged and older Lithuanians of age 45-74 years, were invited to participate in the study. A study sample was a random and stratified by gender and age. In 2006-2008 7,087 responders participated in the survey, so the response rate was 64.8%. A follow-up study was conducted from 2006 till 2015. New CVD cases and deaths from CVD were evaluated using the Kaunas population-based CVD register and death register of Kaunas. Study results revealed that good PWB predicts longer life in female participants (Log Rank = 13.7, p < 0.001). In the fully adjusted model for socio-demographic, social and CVD risk factors, hazard ratio for CVD mortality risk was lower amongst women with good PWB (HR = 0.28, 95% CI 0.11-0.72), but not significantly for men. Our study concludes, that lower CVD mortality rates is being associated with better PWB in female aged 45-74 years. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=psychological%20well-being" title="psychological well-being">psychological well-being</a>, <a href="https://publications.waset.org/abstracts/search?q=cardiovascular%20disease" title=" cardiovascular disease"> cardiovascular disease</a>, <a href="https://publications.waset.org/abstracts/search?q=elderly" title=" elderly"> elderly</a>, <a href="https://publications.waset.org/abstracts/search?q=survival" title=" survival"> survival</a> </p> <a href="https://publications.waset.org/abstracts/52070/the-links-between-cardiovascular-risk-and-psychological-wellbeing-in-elderly" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/52070.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">360</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">249</span> An Effect of Organic Supplements on Stimulating Growth of Vanda and Mokara Seedlings in Tissue Culture</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kullanart%20Obsuwan">Kullanart Obsuwan</a>, <a href="https://publications.waset.org/abstracts/search?q=Chockpisit%20Thepsithar"> Chockpisit Thepsithar </a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study aimed to investigate effect of different organic supplements on growth of Vanda and Mokara seedlings. Vanda and Mokara seedlings approximately 0.2 and 0.3 cm. in height were sub-cultured onto VW supplemented with 150 ml/L coconut water, 100 g/L potato extract, 100 g/L ‘Gros Michel’ banana (AAA group) and 100 g/L ‘Namwa’ banana (ABB group). The explants were sub-cultured onto the same medium every month for 3 months. The best medium increased stem height to 0.52 and 0.44 Cm. in Vanda and Mokara respectively was supplemented with coconut water. The maximum fresh weight of Vanda (0.59 g) was found on medium supplemented with ‘Gros Michel’ banana while Mokara cultured on medium supplemented with Potato extract had the maximum fresh weight (0.27 g) and number of roots (5.20 roots/shoot) statistically different (p≤ 0.05) to other treatments. However, Vanda cultured on medium supplemented with ‘Namwa’ banana had the maximum number of roots (3.80 roots/shoot). Our results suggested that growth of different orchid genera was responded diversely to different organic supplements. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=orchid" title="orchid">orchid</a>, <a href="https://publications.waset.org/abstracts/search?q=in%20vitro%20propagation" title=" in vitro propagation"> in vitro propagation</a>, <a href="https://publications.waset.org/abstracts/search?q=fresh%20weight" title=" fresh weight"> fresh weight</a>, <a href="https://publications.waset.org/abstracts/search?q=plant%20height" title=" plant height"> plant height</a> </p> <a href="https://publications.waset.org/abstracts/6169/an-effect-of-organic-supplements-on-stimulating-growth-of-vanda-and-mokara-seedlings-in-tissue-culture" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6169.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">370</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">248</span> Healing to Be a Man or Living in the Truth: Comparison on the Concept of Healing between Foucault and Chan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jing%20Li%20Hong">Jing Li Hong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study compared Michel Foucault’s thoughts and the Chan School’s thoughts on the idea of healing. Healing is not an unfamiliar idea in Buddhist thoughts. The paired concepts of illness and medicine are often used as a metaphor to describe the relationship between people and truth. Foucault investigated the topic of care of self in his later studies and dedicated a large portion of his final semester course at the Collège de France in 1984 to discuss the meaning of Socrates’s offering of a sacrifice to the god of medicine in Phaedo. Foucault indicated a key preposition in ancient philosophy, namely healing. His idea of healing also addressed the relationship between subject and truth. From this relationship, Foucault unraveled his novel study on truth, namely the technologies of the self, with an emphasis on the care of self. Whereas numerous philosophers ask obvious questions such as ‘what is truth’ and ‘how to learn about truth,’ Foucault proposed distinct questions such as ‘what is our relationship to truth’ and ‘how does our relationship with truth turn us into who we are now?’ Thus, healing in both Buddhist and Foucault’s thoughts is related to the relationship between being and truth. This study first reviews Buddhist and Foucault’s ideas of healing to explicate what is illness and what is medicine. Because Buddhist thoughts cover an extensive scope, this study focuses on the thoughts of the Chan School. The second part is a discussion on medicine (treatment), specifically what is used as the medicine for the illness in both thoughts, and how can this medicine treat the illness. This part includes a description and comparison of the use of concepts of negation in these two thought groups. Finally, the subjects that practice the technologies of the self in both groups are compared from the idea of care of self; in other words, the differences between the subjects formed by the different relationships between being and truth are analyzed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chan" title="Chan">Chan</a>, <a href="https://publications.waset.org/abstracts/search?q=heterogeneous" title=" heterogeneous"> heterogeneous</a>, <a href="https://publications.waset.org/abstracts/search?q=living%20style" title=" living style"> living style</a>, <a href="https://publications.waset.org/abstracts/search?q=language%20of%20paradox" title=" language of paradox"> language of paradox</a>, <a href="https://publications.waset.org/abstracts/search?q=Michel%20Foucault" title=" Michel Foucault"> Michel Foucault</a>, <a href="https://publications.waset.org/abstracts/search?q=negation" title=" negation"> negation</a>, <a href="https://publications.waset.org/abstracts/search?q=parrhesia" title=" parrhesia"> parrhesia</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20care%20of%20self" title=" the care of self"> the care of self</a> </p> <a href="https://publications.waset.org/abstracts/99548/healing-to-be-a-man-or-living-in-the-truth-comparison-on-the-concept-of-healing-between-foucault-and-chan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/99548.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">181</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">247</span> A Secure Digital Signature Scheme with Fault Tolerance Based on the Improved RSA System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20El-Kamchouchi">H. El-Kamchouchi</a>, <a href="https://publications.waset.org/abstracts/search?q=Heba%20Gaber"> Heba Gaber</a>, <a href="https://publications.waset.org/abstracts/search?q=Fatma%20Ahmed"> Fatma Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Dalia%20H.%20El-Kamchouchi"> Dalia H. El-Kamchouchi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20signature" title="digital signature">digital signature</a>, <a href="https://publications.waset.org/abstracts/search?q=fault%20tolerance" title=" fault tolerance"> fault tolerance</a>, <a href="https://publications.waset.org/abstracts/search?q=RSA" title=" RSA"> RSA</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20analysis" title=" security analysis"> security analysis</a> </p> <a href="https://publications.waset.org/abstracts/51269/a-secure-digital-signature-scheme-with-fault-tolerance-based-on-the-improved-rsa-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51269.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">476</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">246</span> Foucault and the Archaeology of Transhumanism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Michel%20Foucault">Michel Foucault</a>, <a href="https://publications.waset.org/abstracts/search?q=Friedrich%20Nietzsche"> Friedrich Nietzsche</a>, <a href="https://publications.waset.org/abstracts/search?q=Max%20More"> Max More</a>, <a href="https://publications.waset.org/abstracts/search?q=Natasha%20Vita-More"> Natasha Vita-More</a>, <a href="https://publications.waset.org/abstracts/search?q=Francesca%20Ferrando"> Francesca Ferrando</a> </p> <p class="card-text"><strong>Abstract:</strong></p> During the early part of his intellectual and academic career (1950s and 1960s), Michel Foucault developed an interest for what we can call the ‘anthropological question’, or how our modernity deals with human nature from an epistemological standpoint. The great originality of Foucault’s thought here lies in the fact that he approaches this question not from the perspective of this ‘sovereign subject’ (that has characterized the History of Western thought) he wishes to disclose and ‘denounce’, but rather at the level of discourses and the way they constitute who we are, so to speak. This led him, in turn, to formulate a series of though-provoking statements during his so-called ‘archaeological period’ of the 1960s concerning what we call ‘man’ in the West, such as that he is an ‘invention of recent date’ (as a proper object of concern and reflection), and, perhaps more importantly, that he might disappear in the near future, ‘like a face drawn in sand at the edge of the sea’. Foucault is following on the footsteps of Nietzsche in that regard, who had famously announced in the 19th ce. the ‘death of God’ and the need for the future generations to surpass (so to speak) the traditional ‘Christian-centred’ Western conception of the human. While Foucault exposed such insights more than half a century ago, they appear to be more actual than ever today with the development and rise in popularity of intellectual movements such as Transhumanism and Posthumanism, which seek to question and propose an alternative to the concepts of ‘man’ or ‘human nature’ in our culture. They rely for that on the same assumption as Foucault and Nietzsche that those concepts (and the meaning we attribute to them) have become ‘obsolete’ as it is and thus must be overcome (at a conceptual, but also a more practical level). Hence, those movements not only echo the important Foucauldian reflection of the 1950s and 1960s on the ‘anthropological question’ but seem to have been literally announced by it, so to speak. The aim of this paper will therefore be to show the relevance of Foucault (and in particular his archaeological method) in understanding the nature of Transhumanism (and Posthumanism), for instance, by analysing and assessing it as a form of discourse that is literally reshaping the way we understand ourselves as human beings in our (post)modern age, drawing for that on a number of key texts including from the early productions of Foucault. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=foucault" title="foucault">foucault</a>, <a href="https://publications.waset.org/abstracts/search?q=nietzsche" title=" nietzsche"> nietzsche</a>, <a href="https://publications.waset.org/abstracts/search?q=archaeology" title=" archaeology"> archaeology</a>, <a href="https://publications.waset.org/abstracts/search?q=transhumanism" title=" transhumanism"> transhumanism</a>, <a href="https://publications.waset.org/abstracts/search?q=posthumanism" title=" posthumanism"> posthumanism</a> </p> <a href="https://publications.waset.org/abstracts/168078/foucault-and-the-archaeology-of-transhumanism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168078.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">70</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">245</span> Poisson Type Spherically Symmetric Spacetimes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gonzalo%20Garc%C3%ADa-Reyes">Gonzalo García-Reyes</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Conformastat spherically symmetric exact solutions of Einstein's field equations representing matter distributions made of fluid both perfect and anisotropic from given solutions of Poisson's equation of Newtonian gravity are investigated. The approach is used in the construction of new relativistic models of thick spherical shells and three-component models of galaxies (bulge, disk, and dark matter halo), writing, in this case, the metric in cylindrical coordinates. In addition, the circular motion of test particles (rotation curves) along geodesics on the equatorial plane of matter configurations and the stability of the orbits against radial perturbations are studied. The models constructed satisfy all the energy conditions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=general%20relativity" title="general relativity">general relativity</a>, <a href="https://publications.waset.org/abstracts/search?q=exact%20solutions" title=" exact solutions"> exact solutions</a>, <a href="https://publications.waset.org/abstracts/search?q=spherical%20symmetry" title=" spherical symmetry"> spherical symmetry</a>, <a href="https://publications.waset.org/abstracts/search?q=galaxy" title=" galaxy"> galaxy</a>, <a href="https://publications.waset.org/abstracts/search?q=kinematics%20and%20dynamics" title=" kinematics and dynamics"> kinematics and dynamics</a>, <a href="https://publications.waset.org/abstracts/search?q=dark%20matter" title=" dark matter"> dark matter</a> </p> <a href="https://publications.waset.org/abstracts/151913/poisson-type-spherically-symmetric-spacetimes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/151913.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">87</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">244</span> Microwave Security System in Museums: Design and Implementation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dalia%20Elsheakh">Dalia Elsheakh</a>, <a href="https://publications.waset.org/abstracts/search?q=Hala%20Elsadek"> Hala Elsadek</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The objective of this paper is to propose a competitive microwave security system that can be applied with reasonable price at museums in Egypt, considering the priceless elements in 23 Egyptian museums countrywide and the lack of good recent security systems even in big ones. The system main goal is to detect valuable targets to ensure their presence in the pre-defined positions in order to protect them from being stolen. The system is based on real time microwave scanning for the required space volume through transmitting RF waves at consecutive angles and detecting the back scattered waves from required objects to detect their existence at pre-specified locations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=microwave%20security%20system" title="microwave security system">microwave security system</a>, <a href="https://publications.waset.org/abstracts/search?q=object%20locating%20system" title=" object locating system"> object locating system</a>, <a href="https://publications.waset.org/abstracts/search?q=real%20time%20locating%20system%20%28RTLS%29" title=" real time locating system (RTLS)"> real time locating system (RTLS)</a>, <a href="https://publications.waset.org/abstracts/search?q=antenna%20array" title=" antenna array"> antenna array</a>, <a href="https://publications.waset.org/abstracts/search?q=array%20electronic%20scanning" title=" array electronic scanning"> array electronic scanning</a> </p> <a href="https://publications.waset.org/abstracts/5673/microwave-security-system-in-museums-design-and-implementation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/5673.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">349</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">243</span> Implementing Fault Tolerance with Proxy Signature on the Improvement of RSA System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20El-Kamchouchi">H. El-Kamchouchi</a>, <a href="https://publications.waset.org/abstracts/search?q=Heba%20Gaber"> Heba Gaber</a>, <a href="https://publications.waset.org/abstracts/search?q=Fatma%20Ahmed"> Fatma Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Dalia%20H.%20El-Kamchouchi"> Dalia H. El-Kamchouchi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Fault tolerance and data security are two important issues in modern communication systems. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on the improved RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fault%20tolerance" title="fault tolerance">fault tolerance</a>, <a href="https://publications.waset.org/abstracts/search?q=improved%20RSA" title=" improved RSA"> improved RSA</a>, <a href="https://publications.waset.org/abstracts/search?q=key%20agreement" title=" key agreement"> key agreement</a>, <a href="https://publications.waset.org/abstracts/search?q=proxy%20signature" title=" proxy signature"> proxy signature</a> </p> <a href="https://publications.waset.org/abstracts/51456/implementing-fault-tolerance-with-proxy-signature-on-the-improvement-of-rsa-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51456.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">425</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">242</span> Synchronization of Semiconductor Laser Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=R.%20M.%20L%C3%B3pez-Guti%C3%A9rrez">R. M. López-Gutiérrez</a>, <a href="https://publications.waset.org/abstracts/search?q=L.%20Cardoza-Avenda%C3%B1o"> L. Cardoza-Avendaño</a>, <a href="https://publications.waset.org/abstracts/search?q=H.%20Cervantes-de%20%C3%81vila"> H. Cervantes-de Ávila</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20A.%20Michel-Macarty"> J. A. Michel-Macarty</a>, <a href="https://publications.waset.org/abstracts/search?q=C.%20Cruz-Hern%C3%A1ndez"> C. Cruz-Hernández</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Arellano-Delgado"> A. Arellano-Delgado</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Carmona-Rodr%C3%ADguez"> R. Carmona-Rodríguez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, synchronization of multiple chaotic semiconductor lasers is achieved by appealing to complex system theory. In particular, we consider dynamical networks composed by semiconductor laser, as interconnected nodes, where the interaction in the networks are defined by coupling the first state of each node. An interesting case is synchronized with master-slave configuration in star topology. Nodes of these networks are modeled for the laser and simulated by Matlab. These results are applicable to private communication. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=chaotic%20laser" title="chaotic laser">chaotic laser</a>, <a href="https://publications.waset.org/abstracts/search?q=network" title=" network"> network</a>, <a href="https://publications.waset.org/abstracts/search?q=star%20topology" title=" star topology"> star topology</a>, <a href="https://publications.waset.org/abstracts/search?q=synchronization" title=" synchronization"> synchronization</a> </p> <a href="https://publications.waset.org/abstracts/34528/synchronization-of-semiconductor-laser-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34528.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">566</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">241</span> Residents’ Perceptions towards the Application of Vertical Landscape in Cairo, Egypt </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yomna%20Amr%20Ahmed%20Lotfi%20Koraim">Yomna Amr Ahmed Lotfi Koraim</a>, <a href="https://publications.waset.org/abstracts/search?q=Dalia%20Moati%20Rasmi%20Elkhateeb"> Dalia Moati Rasmi Elkhateeb</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Vertical landscape is introduced in this study as an alternative innovative technology for urban sustainable developments for its diverse environmental, economic, and psycho-social advantages. The main aim is to investigate the social acceptance of vertical landscape in Cairo, Egypt. The study objectives were to explore the perceptions of residents concerning this certain phenomenon and their opinions about its implementation. Survey questionnaires were administrated to 60 male and female residents from the Greater Cairo area. Despite the various concerns expressed about the application of vertical landscape, there was a clear majority of approval about its suitability. This is quite encouraging for the prospect of vertical landscape implementation in Cairo, Egypt. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=vertical%20landscape" title="vertical landscape">vertical landscape</a>, <a href="https://publications.waset.org/abstracts/search?q=green%20facades" title=" green facades"> green facades</a>, <a href="https://publications.waset.org/abstracts/search?q=vertical%20greening" title=" vertical greening"> vertical greening</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20acceptance" title=" social acceptance"> social acceptance</a>, <a href="https://publications.waset.org/abstracts/search?q=sustainable%20urban%20development" title=" sustainable urban development"> sustainable urban development</a> </p> <a href="https://publications.waset.org/abstracts/72224/residents-perceptions-towards-the-application-of-vertical-landscape-in-cairo-egypt" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72224.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">355</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">240</span> Michel Foucault’s Docile Bodies and The Matrix Trilogy: A Close Reading Applied to the Human Pods and Growing Fields in the Films</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Julian%20Iliev">Julian Iliev</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The recent release of The Matrix Resurrections persuaded many film scholars that The Matrix trilogy had lost its appeal and its concepts were largely outdated. This study examines the human pods and growing fields in the trilogy. Their functionality is compared to Michel Foucault’s concept of docile bodies: linking fictional and contemporary worlds. This paradigm is scrutinized through surveillance literature. The analogy brings to light common elements of hidden surveillance practices in technologies. The comparison illustrates the effects of body manipulation portrayed in the movies and their relevance with contemporary surveillance practices. Many scholars have utilized a close reading methodology in film studies (J.Bizzocchi, J.Tanenbaum, P.Larsen, S. Herbrechter, and Deacon et al.). The use of a particular lens through which media text is examined is an indispensable factor that needs to be incorporated into the methodology. The study spotlights both scenes from the trilogy depicting the human pods and growing fields. The functionality of the pods and the fields compare directly with Foucault’s concept of docile bodies. By utilizing Foucault’s study as a lens, the research will unearth hidden components and insights into the films. Foucault recognizes three disciplines that produce docile bodies: 1) manipulation and the interchangeability of individual bodies, 2) elimination of unnecessary movements and management of time, and 3) command system guaranteeing constant supervision and continuity protection. These disciplines can be found in the pods and growing fields. Each body occupies a single pod aiding easier manipulation and fast interchangeability. The movement of the bodies in the pods is reduced to the absolute minimum. Thus, the body is transformed into the ultimate object of control – minimum movement correlates to maximum energy generation. Supervision is exercised by wiring the body with numerous types of cables. This ultimate supervision of body activity reduces the body’s purpose to mere functioning. If a body does not function as an energy source, then it’s unplugged, ejected, and liquefied. The command system secures the constant supervision and continuity of the process. To Foucault, the disciplines are distinctly different from slavery because they stop short of a total takeover of the bodies. This is a clear difference from the slave system implemented in the films. Even though their system might lack sophistication, it makes up for it in the elevation of functionality. Further, surveillance literature illustrates the connection between the generation of body energy in The Matrix trilogy to the generation of individual data in contemporary society. This study found that the three disciplines producing docile bodies were present in the portrayal of the pods and fields in The Matrix trilogy. The above comparison combined with surveillance literature yields insights into analogous processes and contemporary surveillance practices. Thus, the constant generation of energy in The Matrix trilogy can be equated to the consistent data generation in contemporary society. This essay shows the relevance of the body manipulation concept in the Matrix films with contemporary surveillance practices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=docile%20bodies" title="docile bodies">docile bodies</a>, <a href="https://publications.waset.org/abstracts/search?q=film%20trilogies" title=" film trilogies"> film trilogies</a>, <a href="https://publications.waset.org/abstracts/search?q=matrix%20movies" title=" matrix movies"> matrix movies</a>, <a href="https://publications.waset.org/abstracts/search?q=michel%20foucault" title=" michel foucault"> michel foucault</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20loss" title=" privacy loss"> privacy loss</a>, <a href="https://publications.waset.org/abstracts/search?q=surveillance" title=" surveillance"> surveillance</a> </p> <a href="https://publications.waset.org/abstracts/152464/michel-foucaults-docile-bodies-and-the-matrix-trilogy-a-close-reading-applied-to-the-human-pods-and-growing-fields-in-the-films" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152464.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">93</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">239</span> A Proof of the N. Davydov Theorem for Douglis Algebra Valued Functions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jean-Marie%20Vilaire">Jean-Marie Vilaire</a>, <a href="https://publications.waset.org/abstracts/search?q=Ricardo%20Abreu-Blaya"> Ricardo Abreu-Blaya</a>, <a href="https://publications.waset.org/abstracts/search?q=Juan%20Bory-Reyes"> Juan Bory-Reyes</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The classical Beltrami system of elliptic equations generalizes the Cauchy Riemann equation in the complex plane and offers the possibility to consider homogeneous system with no terms of zero order. The theory of Douglis-valued functions, called Hyper-analytic functions, is special case of the above situation. In this note, we prove an analogue of the N. Davydov theorem in the framework of the theory of hyperanalytic functions. The used methodology contemplates characteristic methods of the hypercomplex analysis as well as the singular integral operators and elliptic systems of the partial differential equations theories. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Beltrami%20equation" title="Beltrami equation">Beltrami equation</a>, <a href="https://publications.waset.org/abstracts/search?q=Douglis%20algebra-valued%20function" title=" Douglis algebra-valued function"> Douglis algebra-valued function</a>, <a href="https://publications.waset.org/abstracts/search?q=Hypercomplex%20Cauchy%20type%20integral" title=" Hypercomplex Cauchy type integral"> Hypercomplex Cauchy type integral</a>, <a href="https://publications.waset.org/abstracts/search?q=Sokhotski-Plemelj%20formulae" title=" Sokhotski-Plemelj formulae"> Sokhotski-Plemelj formulae</a> </p> <a href="https://publications.waset.org/abstracts/92078/a-proof-of-the-n-davydov-theorem-for-douglis-algebra-valued-functions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/92078.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">250</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">238</span> An Efficient Proxy Signature Scheme Over a Secure Communications Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20El-Kamchouchi">H. El-Kamchouchi</a>, <a href="https://publications.waset.org/abstracts/search?q=Heba%20Gaber"> Heba Gaber</a>, <a href="https://publications.waset.org/abstracts/search?q=Fatma%20Ahmed"> Fatma Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Dalia%20H.%20El-Kamchouchi"> Dalia H. El-Kamchouchi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy signer, and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on the discrete logarithm problem. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=proxy%20signature" title="proxy signature">proxy signature</a>, <a href="https://publications.waset.org/abstracts/search?q=warrant%20partial%20delegation" title=" warrant partial delegation"> warrant partial delegation</a>, <a href="https://publications.waset.org/abstracts/search?q=key%20agreement" title=" key agreement"> key agreement</a>, <a href="https://publications.waset.org/abstracts/search?q=discrete%20logarithm" title=" discrete logarithm"> discrete logarithm</a> </p> <a href="https://publications.waset.org/abstracts/51599/an-efficient-proxy-signature-scheme-over-a-secure-communications-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51599.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">345</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">237</span> Automatic Threshold Search for Heat Map Based Feature Selection: A Cancer Dataset Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Carlos%20Huertas">Carlos Huertas</a>, <a href="https://publications.waset.org/abstracts/search?q=Reyes%20Juarez-Ramirez"> Reyes Juarez-Ramirez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Public health is one of the most critical issues today; therefore, there is great interest to improve technologies in the area of diseases detection. With machine learning and feature selection, it has been possible to aid the diagnosis of several diseases such as cancer. In this work, we present an extension to the Heat Map Based Feature Selection algorithm, this modification allows automatic threshold parameter selection that helps to improve the generalization performance of high dimensional data such as mass spectrometry. We have performed a comparison analysis using multiple cancer datasets and compare against the well known Recursive Feature Elimination algorithm and our original proposal, the results show improved classification performance that is very competitive against current techniques. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=biomarker%20discovery" title="biomarker discovery">biomarker discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=cancer" title=" cancer"> cancer</a>, <a href="https://publications.waset.org/abstracts/search?q=feature%20selection" title=" feature selection"> feature selection</a>, <a href="https://publications.waset.org/abstracts/search?q=mass%20spectrometry" title=" mass spectrometry"> mass spectrometry</a> </p> <a href="https://publications.waset.org/abstracts/46310/automatic-threshold-search-for-heat-map-based-feature-selection-a-cancer-dataset-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46310.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">338</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">236</span> Make Up Flash: Web Application for the Improvement of Physical Appearance in Images Based on Recognition Methods</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Stefania%20Arguelles%20Reyes">Stefania Arguelles Reyes</a>, <a href="https://publications.waset.org/abstracts/search?q=Octavio%20Jos%C3%A9%20Salcedo%20Parra"> Octavio José Salcedo Parra</a>, <a href="https://publications.waset.org/abstracts/search?q=Alberto%20Acosta%20L%C3%B3pez"> Alberto Acosta López</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents a web application for the improvement of images through recognition. The web application is based on the analysis of picture-based recognition methods that allow an improvement on the physical appearance of people posting in social networks. The basis relies on the study of tools that can correct or improve some features of the face, with the help of a wide collection of user images taken as reference to build a facial profile. Automatic facial profiling can be achieved with a deeper study of the Object Detection Library. It was possible to improve the initial images with the help of MATLAB and its filtering functions. The user can have a direct interaction with the program and manually adjust his preferences. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Matlab" title="Matlab">Matlab</a>, <a href="https://publications.waset.org/abstracts/search?q=make%20up" title=" make up"> make up</a>, <a href="https://publications.waset.org/abstracts/search?q=recognition%20methods" title=" recognition methods"> recognition methods</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20application" title=" web application"> web application</a> </p> <a href="https://publications.waset.org/abstracts/108091/make-up-flash-web-application-for-the-improvement-of-physical-appearance-in-images-based-on-recognition-methods" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/108091.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">144</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">235</span> Predicting Survival in Cancer: How Cox Regression Model Compares to Artifial Neural Networks? </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dalia%20Rimawi">Dalia Rimawi</a>, <a href="https://publications.waset.org/abstracts/search?q=Walid%20Salameh"> Walid Salameh</a>, <a href="https://publications.waset.org/abstracts/search?q=Amal%20Al-Omari"> Amal Al-Omari</a>, <a href="https://publications.waset.org/abstracts/search?q=Hadeel%20AbdelKhaleq"> Hadeel AbdelKhaleq</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Predication of Survival time of patients with cancer, is a core factor that influences oncologist decisions in different aspects; such as offered treatment plans, patients’ quality of life and medications development. For a long time proportional hazards Cox regression (ph. Cox) was and still the most well-known statistical method to predict survival outcome. But due to the revolution of data sciences; new predication models were employed and proved to be more flexible and provided higher accuracy in that type of studies. Artificial neural network is one of those models that is suitable to handle time to event predication. In this study we aim to compare ph Cox regression with artificial neural network method according to data handling and Accuracy of each model. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cox%20regression" title="Cox regression">Cox regression</a>, <a href="https://publications.waset.org/abstracts/search?q=neural%20networks" title=" neural networks"> neural networks</a>, <a href="https://publications.waset.org/abstracts/search?q=survival" title=" survival"> survival</a>, <a href="https://publications.waset.org/abstracts/search?q=cancer." title=" cancer."> cancer.</a> </p> <a href="https://publications.waset.org/abstracts/124526/predicting-survival-in-cancer-how-cox-regression-model-compares-to-artifial-neural-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/124526.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">200</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">234</span> A Secure Proxy Signature Scheme with Fault Tolerance Based on RSA System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20El-Kamchouchi">H. El-Kamchouchi</a>, <a href="https://publications.waset.org/abstracts/search?q=Heba%20Gaber"> Heba Gaber</a>, <a href="https://publications.waset.org/abstracts/search?q=Fatma%20Ahmed"> Fatma Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Dalia%20H.%20El-Kamchouchi"> Dalia H. El-Kamchouchi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Due to the rapid growth in modern communication systems, fault tolerance and data security are two important issues in a secure transaction. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a secure proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=proxy%20signature" title="proxy signature">proxy signature</a>, <a href="https://publications.waset.org/abstracts/search?q=fault%20tolerance" title=" fault tolerance"> fault tolerance</a>, <a href="https://publications.waset.org/abstracts/search?q=rsa" title=" rsa"> rsa</a>, <a href="https://publications.waset.org/abstracts/search?q=key%20agreement%20protocol" title=" key agreement protocol"> key agreement protocol</a> </p> <a href="https://publications.waset.org/abstracts/51452/a-secure-proxy-signature-scheme-with-fault-tolerance-based-on-rsa-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51452.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">286</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">233</span> Secure Proxy Signature Based on Factoring and Discrete Logarithm</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20El-Kamchouchi">H. El-Kamchouchi</a>, <a href="https://publications.waset.org/abstracts/search?q=Heba%20Gaber"> Heba Gaber</a>, <a href="https://publications.waset.org/abstracts/search?q=Fatma%20Ahmed"> Fatma Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Dalia%20H.%20El-Kamchouchi"> Dalia H. El-Kamchouchi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A digital signature is an electronic signature form used by an original signer to sign a specific document. When the original signer is not in his office or when he/she travels outside, he/she delegates his signing capability to a proxy signer and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on factoring and discrete logarithm problem. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=discrete%20logarithm" title="discrete logarithm">discrete logarithm</a>, <a href="https://publications.waset.org/abstracts/search?q=factoring" title=" factoring"> factoring</a>, <a href="https://publications.waset.org/abstracts/search?q=proxy%20signature" title=" proxy signature"> proxy signature</a>, <a href="https://publications.waset.org/abstracts/search?q=key%20agreement" title=" key agreement"> key agreement</a> </p> <a href="https://publications.waset.org/abstracts/51597/secure-proxy-signature-based-on-factoring-and-discrete-logarithm" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51597.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">308</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">232</span> Size Distribution Effect of InAs/InP Self–Organized Quantum Dots on Optical Properties </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdelkader%20Nouri">Abdelkader Nouri</a>, <a href="https://publications.waset.org/abstracts/search?q=M%E2%80%99hamed%20Bouslama"> M’hamed Bouslama</a>, <a href="https://publications.waset.org/abstracts/search?q=Faouzi%20Saidi"> Faouzi Saidi</a>, <a href="https://publications.waset.org/abstracts/search?q=Hassan%20Maaref"> Hassan Maaref</a>, <a href="https://publications.waset.org/abstracts/search?q=Michel%20Gendry"> Michel Gendry</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Self-organized InAs quantum dots (QDs) have been grown on 3,1% InP (110) lattice mismatched substrate by Solid Source Molecular Beam Epitaxy (SSMBE). Stranski-Krastanov mode growth has been used to create self-assembled 3D islands on InAs wetting layer (WL). The optical quality depending on the temperature and power is evaluated. In addition, Atomic Force Microscopy (AFM) images shows inhomogeneous island dots size distribution due to temperature coalescence. The quantum size effect was clearly observed through the spectra photoluminescence (PL) shape. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=AFM" title="AFM">AFM</a>, <a href="https://publications.waset.org/abstracts/search?q=InAs%20QDs" title=" InAs QDs"> InAs QDs</a>, <a href="https://publications.waset.org/abstracts/search?q=PL" title=" PL"> PL</a>, <a href="https://publications.waset.org/abstracts/search?q=SSMBE" title=" SSMBE"> SSMBE</a> </p> <a href="https://publications.waset.org/abstracts/20670/size-distribution-effect-of-inasinp-self-organized-quantum-dots-on-optical-properties" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20670.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">686</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">231</span> Comparison of the Seismic Response of Planar Regular and Irregular Steel Frames</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Robespierre%20Chavez">Robespierre Chavez</a>, <a href="https://publications.waset.org/abstracts/search?q=Eden%20Bojorquez"> Eden Bojorquez</a>, <a href="https://publications.waset.org/abstracts/search?q=Alfredo%20Reyes-Salazar"> Alfredo Reyes-Salazar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study compares the seismic response of regular and vertically irregular steel frames determined by nonlinear time history analysis and by using several sets of earthquake records, which are divided in two categories: The first category having 20 stiff-soil ground motion records obtained from the NGA database, and the second category having 30 soft-soil ground motions recorded in the Lake Zone of Mexico City and exhibiting a dominant period (Ts) of two seconds. The steel frames in both format regular and irregular were designed according to the Mexico City Seismic Design Provisions (MCSDP). The effects of irregularity throught the height on the maximum interstory drifts are estimated. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=irregular%20steel%20frames" title="irregular steel frames">irregular steel frames</a>, <a href="https://publications.waset.org/abstracts/search?q=maximum%20interstory%20drifts" title=" maximum interstory drifts"> maximum interstory drifts</a>, <a href="https://publications.waset.org/abstracts/search?q=seismic%20response" title=" seismic response"> seismic response</a>, <a href="https://publications.waset.org/abstracts/search?q=seismic%20records" title=" seismic records"> seismic records</a> </p> <a href="https://publications.waset.org/abstracts/42693/comparison-of-the-seismic-response-of-planar-regular-and-irregular-steel-frames" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42693.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">327</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">230</span> Stationary Gas Turbines in Power Generation: Past, Present and Future Challenges</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Michel%20Moliere">Michel Moliere</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the next decades, the thermal power generation segment will survive only if it achieves deep mutations, including drastical abatements of CO2 emissions and strong efficiency gains. In this challenging perspective, stationary gas turbines appear as serious candidates to lead the energy transition. Indeed, during the past decades, these turbomachines have made brisk technological advances in terms of efficiency, reliability, fuel flex (including the combustion of hydrogen), and the ability to hybridize with regenrables. It is, therefore, timely to summarize the progresses achieved by gas turbines in the recent past and to examine what are their assets to face the challenges of the energy transition. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=energy%20transition" title="energy transition">energy transition</a>, <a href="https://publications.waset.org/abstracts/search?q=gas%20turbines" title=" gas turbines"> gas turbines</a>, <a href="https://publications.waset.org/abstracts/search?q=decarbonization" title=" decarbonization"> decarbonization</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20generation" title=" power generation"> power generation</a> </p> <a href="https://publications.waset.org/abstracts/144235/stationary-gas-turbines-in-power-generation-past-present-and-future-challenges" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/144235.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">208</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">229</span> The Foucaultian Relationship between Power and Knowledge: Genealogy as a Method for Epistemic Resistance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jana%20Soler%20Libran">Jana Soler Libran</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The primary aim of this paper is to analyze the relationship between power and knowledge suggested in Michel Foucault's theory. Taking into consideration the role of power in knowledge production, the goal is to evaluate to what extent genealogy can be presented as a practical method for epistemic resistance. To do so, the methodology used consists of a revision of Foucault’s literature concerning the topic discussed. In this sense, conceptual analysis is applied in order to understand the effect of the double dimension of power on knowledge production. In its negative dimension, power is conceived as an organ of repression, vetoing certain instances of knowledge considered deceitful. In opposition, in its positive dimension, power works as an organ of the production of truth by means of institutionalized discourses. This double declination of power leads to the first main findings of the present analysis: no truth or knowledge can lie outside power’s action, and power is constituted through accepted forms of knowledge. To second these statements, Foucaultian discourse formations are evaluated, presenting external exclusion procedures as paradigmatic practices to demonstrate how power creates and shapes the validity of certain epistemes. Thus, taking into consideration power’s mechanisms to produce and reproduce institutionalized truths, this paper accounts for the Foucaultian praxis of genealogy as a method to reveal power’s intention, instruments, and effects in the production of knowledge. In this sense, it is suggested to consider genealogy as a practice which, firstly, reveals what instances of knowledge are subjugated to power and, secondly, promotes aforementioned peripherical discourses as a form of epistemic resistance. In order to counterbalance these main theses, objections to Foucault’s work from Nancy Fraser, Linda Nicholson, Charles Taylor, Richard Rorty, Alvin Goldman, or Karen Barad are discussed. In essence, the understanding of the Foucaultian relationship between power and knowledge is essential to analyze how contemporary discourses are produced by both traditional institutions and new forms of institutionalized power, such as mass media or social networks. Therefore, Michel Foucault's practice of genealogy is relevant, not only for its philosophical contribution as a method to uncover the effects of power in knowledge production but also because it constitutes a valuable theoretical framework for political theory and sociological studies concerning the formation of societies and individuals in the contemporary world. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=epistemic%20resistance" title="epistemic resistance">epistemic resistance</a>, <a href="https://publications.waset.org/abstracts/search?q=Foucault%E2%80%99s%20genealogy" title=" Foucault’s genealogy"> Foucault’s genealogy</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge" title=" knowledge"> knowledge</a>, <a href="https://publications.waset.org/abstracts/search?q=power" title=" power"> power</a>, <a href="https://publications.waset.org/abstracts/search?q=truth" title=" truth"> truth</a> </p> <a href="https://publications.waset.org/abstracts/132595/the-foucaultian-relationship-between-power-and-knowledge-genealogy-as-a-method-for-epistemic-resistance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/132595.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">124</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">228</span> Musical Tesla Coil Controlled by an Audio Signal Processed in Matlab</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sandra%20Cuenca">Sandra Cuenca</a>, <a href="https://publications.waset.org/abstracts/search?q=Danilo%20Santana"> Danilo Santana</a>, <a href="https://publications.waset.org/abstracts/search?q=Anderson%20Reyes"> Anderson Reyes</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The following project is based on the manipulation of audio signals through the Matlab software, which has an audio signal that is modified, and its resultant obtained through the auxiliary port of the computer is passed through a signal amplifier whose amplified signal is connected to a tesla coil which has a behavior like a vumeter, the flashes at the output of the tesla coil increase and decrease its intensity depending on the audio signal in the computer and also the voltage source from which it is sent. The amplified signal then passes to the tesla coil being shown in the plasma sphere with the respective flashes; this activation is given through the specified parameters that we want to give in the MATLAB algorithm that contains the digital filters for the manipulation of our audio signal sent to the tesla coil to be displayed in a plasma sphere with flashes of the combination of colors commonly pink and purple that varies according to the tone of the song. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=auxiliary%20port" title="auxiliary port">auxiliary port</a>, <a href="https://publications.waset.org/abstracts/search?q=tesla%20coil" title=" tesla coil"> tesla coil</a>, <a href="https://publications.waset.org/abstracts/search?q=vumeter" title=" vumeter"> vumeter</a>, <a href="https://publications.waset.org/abstracts/search?q=plasma%20sphere" title=" plasma sphere"> plasma sphere</a> </p> <a href="https://publications.waset.org/abstracts/170874/musical-tesla-coil-controlled-by-an-audio-signal-processed-in-matlab" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/170874.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">90</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">227</span> Central African Republic Government Recruitment Agency Based on Identity Management and Public Key Encryption</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Koyangbo%20Guere%20Monguia%20Michel%20Alex%20Emmanuel">Koyangbo Guere Monguia Michel Alex Emmanuel </a> </p> <p class="card-text"><strong>Abstract:</strong></p> In e-government and especially recruitment, many researches have been conducted to build a trustworthy and reliable online or application system capable to process users or job applicant files. In this research (Government Recruitment Agency), cloud computing, identity management and public key encryption have been used to management domains, access control authorization mechanism and to secure data exchange between entities for reliable procedure of processing files. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing%20network" title="cloud computing network">cloud computing network</a>, <a href="https://publications.waset.org/abstracts/search?q=identity%20management%20systems" title=" identity management systems"> identity management systems</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20key%20encryption" title=" public key encryption"> public key encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20control%20and%20authorization" title=" access control and authorization"> access control and authorization</a> </p> <a href="https://publications.waset.org/abstracts/50648/central-african-republic-government-recruitment-agency-based-on-identity-management-and-public-key-encryption" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50648.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">358</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">226</span> Innovative Biomonitoring in Port Ecosystem: Lessons and Perspectives from the QUAMPO Project</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Benedicte%20Madon">Benedicte Madon</a>, <a href="https://publications.waset.org/abstracts/search?q=Marion%20Pillet"> Marion Pillet</a>, <a href="https://publications.waset.org/abstracts/search?q=Justine%20Castrec"> Justine Castrec</a>, <a href="https://publications.waset.org/abstracts/search?q=Quentin%20Fonatine"> Quentin Fonatine</a>, <a href="https://publications.waset.org/abstracts/search?q=Pierre%20Lejeune"> Pierre Lejeune</a>, <a href="https://publications.waset.org/abstracts/search?q=Michel%20Marengo"> Michel Marengo</a>, <a href="https://publications.waset.org/abstracts/search?q=Helene%20Thomas"> Helene Thomas</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Biodiversity in port ecosystems faces many anthropic pressures from port activities. The maritime industry and port areas have been under scrutiny regarding their environmental impacts. In the port value chain, port managers need to implement actions to fulfil environmental certifications and European Directive requirements. This paper seeks to highlight the lessons learned and opportunities through the QUAMPO project to move towards port biodiversity restoration in Corsica using innovative biomonitoring in the goal of obtaining green certification. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=biomonitoring" title="biomonitoring">biomonitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=port" title=" port"> port</a>, <a href="https://publications.waset.org/abstracts/search?q=water%20quality" title=" water quality"> water quality</a>, <a href="https://publications.waset.org/abstracts/search?q=invertebrate" title=" invertebrate"> invertebrate</a>, <a href="https://publications.waset.org/abstracts/search?q=corsica" title=" corsica"> corsica</a>, <a href="https://publications.waset.org/abstracts/search?q=biomarker" title=" biomarker"> biomarker</a>, <a href="https://publications.waset.org/abstracts/search?q=trace%20elements" title=" trace elements"> trace elements</a>, <a href="https://publications.waset.org/abstracts/search?q=HAP" title=" HAP"> HAP</a>, <a href="https://publications.waset.org/abstracts/search?q=PCB" title=" PCB"> PCB</a>, <a href="https://publications.waset.org/abstracts/search?q=certification" title=" certification"> certification</a> </p> <a href="https://publications.waset.org/abstracts/147986/innovative-biomonitoring-in-port-ecosystem-lessons-and-perspectives-from-the-quampo-project" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147986.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">119</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">225</span> Network User Rules in Universities</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Michel%20Berthiaume">Michel Berthiaume</a>, <a href="https://publications.waset.org/abstracts/search?q=Daniel%20Chamberland-Tremblay"> Daniel Chamberland-Tremblay</a>, <a href="https://publications.waset.org/abstracts/search?q=Elaine%20Paiva%20Mosconi"> Elaine Paiva Mosconi</a>, <a href="https://publications.waset.org/abstracts/search?q=J%C3%A9r%C3%B4me%20Blanchet-Brisson"> Jérôme Blanchet-Brisson</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This presentation documents the overall failure of North-American universities to build an effective IT Policies communication with their primary users: the students. A sample of 12 universities was selected. A set of indicators based on usability principles to assess the content of IT Policies vas devised. Then, IT Policies were rated according to the indicators and the results analyzed to build an overall picture of the potential of communication problems in policy communication. The initial finding is that network security professionals in Universities have to reach a delicate balance between asset protection, asset valorization and user security awareness. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer%20security" title="computer security">computer security</a>, <a href="https://publications.waset.org/abstracts/search?q=IT%20policy" title=" IT policy"> IT policy</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20awareness" title=" security awareness"> security awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20user%20rules" title=" network user rules "> network user rules </a> </p> <a href="https://publications.waset.org/abstracts/23213/network-user-rules-in-universities" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23213.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">562</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">224</span> Biopolitics and Race in the Age of a Global Pandemic: Interactions and Transformations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aistis%20ZekevicIus">Aistis ZekevicIus</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Biopolitical theory, which was first developed by Michel Foucault, takes into consideration the administration of life by implying a style of government based on the regulation of populations as its subject. The intensification of the #BlackLivesMatter movement and popular outcries against racial discrimination in the US health system have prompted us to reconsider the relationship between biopolitics and race in the face of the COVID-19 pandemic. Based on works by Foucault, Achille Mbembe and Nicholas Mirzoeff that transcend the boundaries of poststructuralism, critical theory and postcolonial studies, the paper suggests that the global pandemic has highlighted new aspects of the interplay between biopower and race by encouraging the search for scapegoats, deepening the structural racial inequality, and thus producing necropolitical regimes of exclusion. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=biopolitics" title="biopolitics">biopolitics</a>, <a href="https://publications.waset.org/abstracts/search?q=biopower" title=" biopower"> biopower</a>, <a href="https://publications.waset.org/abstracts/search?q=necropolitics" title=" necropolitics"> necropolitics</a>, <a href="https://publications.waset.org/abstracts/search?q=pandemic" title=" pandemic"> pandemic</a>, <a href="https://publications.waset.org/abstracts/search?q=race" title=" race"> race</a> </p> <a href="https://publications.waset.org/abstracts/130189/biopolitics-and-race-in-the-age-of-a-global-pandemic-interactions-and-transformations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/130189.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">259</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Dalia%20Michel%20Reyes%20Villeda&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Dalia%20Michel%20Reyes%20Villeda&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Dalia%20Michel%20Reyes%20Villeda&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Dalia%20Michel%20Reyes%20Villeda&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Dalia%20Michel%20Reyes%20Villeda&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Dalia%20Michel%20Reyes%20Villeda&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Dalia%20Michel%20Reyes%20Villeda&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Dalia%20Michel%20Reyes%20Villeda&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Dalia%20Michel%20Reyes%20Villeda&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>