6,750 research outputs found
Countermeasures for the majority attack in blockchain distributed systems
La tecnología Blockchain es considerada como uno de los paradigmas informáticos más importantes posterior al Internet; en función a sus características únicas que la hacen ideal para registrar, verificar y administrar información de diferentes transacciones. A pesar de esto, Blockchain se enfrenta a diferentes problemas de seguridad, siendo el ataque del 51% o ataque mayoritario uno de los más importantes. Este consiste en que uno o más mineros tomen el control de al menos el 51% del Hash extraído o del cómputo en una red; de modo que un minero puede manipular y modificar arbitrariamente la información registrada en esta tecnología. Este trabajo se enfocó en diseñar e implementar estrategias de detección y mitigación de ataques mayoritarios (51% de ataque) en un sistema distribuido Blockchain, a partir de la caracterización del comportamiento de los mineros. Para lograr esto, se analizó y evaluó el Hash Rate / Share de los mineros de Bitcoin y Crypto Ethereum, seguido del diseño e implementación de un protocolo de consenso para controlar el poder de cómputo de los mineros. Posteriormente, se realizó la exploración y evaluación de modelos de Machine Learning para detectar software malicioso de tipo Cryptojacking.DoctoradoDoctor en Ingeniería de Sistemas y Computació
The development of the Kent coalfield 1896-1946
One of the unique features of the Kent Coalfield is that it is entirely concealed by newer rocks. The existence of a coalfield under southern England, being a direct link between those of South Wales, Somerset and Bristol in the west and the Ruhr, Belgium. and northern France in the east, was predicted by the geologist R. A. C. Godwin-Austen as early as 1856. It was, however, only the rapid increase in demand for Britain's coal in the last quarter of the nineteenth century that made it worth considering testing this hypothesis. The first boring was made in the years 1886-90, and although it discovered coal, this did not in itself prove the existence of a viable coalfield. This could be done only by incurring the heavy cost of boring systematically over a wide area. As the financial returns from such an undertaking were uncertain, it was not surprising that in the early years, around the turn of the century, a dominant role was played by speculators, who were able to induce numerous small investors to risk some of their savings in the expectation of high profits. As minerals in Britain were privately owned, the early pioneer companies not only had to meet the cost of the exploratory borines, but also, if they were not to see the benefit of their work accrue to others, lease beforehand the right to mine coal from local landowners in as much of the surrounding area as possible. This policy was pursued most vigorously by Arthur Burr, a Surrey land specula tor, who raised capital by creating the Kent Coal Conoessions Ltd. and then floating a series of companies allied to it. Burr's enterprise would probably have been. successful had it not been for the water problems encountered at depth in -v- the coalfield. As a result, the Concessions group found itself in control of most of the coalfield, but without the necessary capital to sink and adequately equip its 01ffi collieries. By 1910, however, the discovery of iron ore deposits in east Kent, coupled with the fact that Kent coal was excellent for coking purposes, began to attract the large steel firms of Bolckow, Vaughan Ltd. and Dorman, Long & Co. Ltd. in to the area. The First World War intervened, however, to delay their plans, and to provide an extended lease of life to the Concessions group, which, by the summer of 1914, was facing financial collapse. By the time Dorman, Lone & Co, in alliance with Weetman Pearson (Lord Cowdray), had acquired control over the greater part of the coalfield from the Concessions group, not only was the country's coal industry declining, but so was its steel industry, which suffered an even more severe rate of contraction during the inter-war years. As a result, Pearson and Dorman Long Ltd. was forced to concentrate just on coal production, and this in turn was hampered not only by the water problems, but also by labour shortages and the schemes introduced by the government in 1930 to restrict the country's coal output, in an attempt to maintain prices and revenue in the industry. Nevertheless, production did show a substantial increase between 1927 and 1935, after which it declined as miners left the coalfield to return to their former districts, where employment opportunities were improving in the late thirties. Supporting roles were played in the inter-war years by Richard Tilden Smith, a share underwriter turned industrialist with long standing interests in the coalfield, who acquired one of the Concessions group's two collieries, and by the Powell Duffryn Steam Coal Co. Ltd., which through subsidiary companies, took over the only colliery to be developed by a pioneer company outside the Concessions group. The impossibility of Kent coal, because of its nature, ever gaining more than token access to the more lucrative household market, and then the failure of the local steel industry to materialise meant that the -vi- companies had to develop alternative outlets for their growing outputs. Although nearness to industrial markets in the south-east of England did confer certain advantages were poor consolation for the hoped for developments of either the early pioneers or the later industrialists. Instead of the expected profits, the companies mostly incurred losses, and only the company acquired by Powell Duffryn ever paid a dividend to its shareholders in the years before nationalisation. From the point of view of the Kent miners, the shortage of labour in the coalfield, particularly in the years 1914-20 and 1927-35, was to an important extent responsible for their being amongst the highest paid in the industry. At the same time the more favourable employment opportunities prevailing in Kent compared with other mining districts enabled the Kent Nine Workers Association to develop into a well organised union, which on the whole was able to look after the interests of its members fairly successfully. Throughout the period 1896 to 1946 the Kent Coalfield existed very much at the margin of the British coal industry. Its failure to develop substantially along the lines envisaged by either the early pioneers or by the later industrialists meant that its importance in national terms always remained small
Free Movement of Persons and Access to the Labour Market: Lessons from the European Economic Community for the Association of Southeast Asian Nations Economic Community.
PhD Theses.While a regional framework on the free movement of persons does not exist within
the current AEC, it envisions advancing the region to have a freer flow of skilled labour. It
has initiated the regional movement of selected high-skilled labour through the MRAs on the
movement of selected professionals and the MNP on the movement of businesspersons.
However, the AEC does not have any integration at the regional level on the movement of
low-skilled labour. Thailand, which is the most preferred destination for low-skilled AEC
labour, has entered into bilateral agreements with other four AEC member states, namely,
Myanmar, Laos, Cambodia and Vietnam, in order to supplement the regional rule regarding
low-skilled labour.
This thesis postulates that the EEC free movement of persons framework, which
involved the movement of persons to pursue economic activities, could provide useful
lessons for the emerging AEC labour migration framework. The main supporting reason for
this hypothesis is that the original EEC framework has eventually developed into the most
mature regional system on the free movement of persons within the EU.
This thesis perceives the development of a regional framework on labour migration as
a historical development, which challenges labour migration theory. The central question of
this research is “How can participating states develop and accept a legal framework on labour
migration within regional economic associations?” This thesis aims to examine the feasibility
of regional integration on labour migration within the AEC, taking into account the
experiences of the EEC free movement of persons framework. It aims to explore approaches
and main features of the labour migration framework of the EEC and the AEC. The
examination mainly relies on obstacles to labour migration including access to the labour
market, permission to perform economic activities, permission to reside, family reunification,
working conditions, and protection from expulsion.
This thesis also aims to prove the hypothesis of the new regionalism theory, which
proposed that regionalism emerges from below and within the region. Through the lens of the
new regionalism theory, it explores the challenge that reliance only on existing international
law may be inadequate for regional cooperation to achieve deep regionalism in respect of
labour migration. Nevertheless, an effective regional framework could be initiated by new
rules agreed by the participating states or developed from reciprocal bilateral agreements
Statistical Learning for Gene Expression Biomarker Detection in Neurodegenerative Diseases
In this work, statistical learning approaches are used to detect biomarkers for neurodegenerative diseases (NDs). NDs are becoming increasingly prevalent as populations age, making understanding of disease and identification of biomarkers progressively important for facilitating early diagnosis and the screening of individuals for clinical trials. Advancements in gene expression profiling has enabled the exploration of disease biomarkers at an unprecedented scale. The work presented here demonstrates the value of gene expression data in understanding the underlying processes and detection of biomarkers of NDs. The value of novel approaches to previously collected -omics data is shown and it is demonstrated that new therapeutic targets can be identified. Additionally, the importance of meta-analysis to improve power of multiple small studies is demonstrated. The value of blood transcriptomics data is shown in applications to researching NDs to understand underlying processes using network analysis and a novel hub detection method. Finally, after demonstrating the value of blood gene expression data for investigating NDs, a combination of feature selection and classification algorithms were used to identify novel accurate biomarker signatures for the diagnosis and prognosis of Parkinson’s disease (PD) and Alzheimer’s disease (AD). Additionally, the use of feature pools based on previous knowledge of disease and the viability of neural networks in dimensionality reduction and biomarker detection is demonstrated and discussed. In summary, gene expression data is shown to be valuable for the investigation of ND and novel gene biomarker signatures for the diagnosis and prognosis of PD and AD
Recommended from our members
After Creation: Intergovernmental Organizations and Member State Governments as Co-Participants in an Authority Relationship
This is a re-amalgamation of what started as one manuscript and became two when the length proved to be more than any publisher wanted to consider. The splitting consisted of removing what are now Parts 3, 4, and 5 so that the manuscript focused on the outcome-related shared beliefs holding an authority relationship together. Those parts were last worked on in 2018. The rest were last worked on in late 2021 but also remain incomplete.
The relational approach adopted in this study treats intergovernmental organizations and the governments of member states as co-participants in an authority relationship with the governments of their member states. Authority relationships link two types of actor, defined by their authority-holder or addressee role in the relationship, through a set of shared beliefs about why the relationship exists and how the participants should fulfill their respective roles. The IGO as authority holder has a role that includes a right to instruct other actors about what they should or should not do; the governments of member states as addressees are expected to comply with the instructions. Three sets of shared beliefs provide the conceptual “glue” holding the relationship together. The first defines the goal of the collective effort, providing both the rationale for having the authority relationship and providing a lode star for assessments of the collective effort’s success or lack of success. The second set defines the shared understanding about allocation of roles and the process of interaction by establishing shared expectations about a) the selection process by which particular actors acquire authority holder roles, b) the definitions identifying one or more categories of addressees expected to follow instructions, and c) the procedures through which the authority holder issues instructions. The third set focus on the outcomes of cooperation through the relationship by defining a) the substantive areas in which the authority holder may issue instructions, b) the bases for assessing the relevance actions mandated in instructions for reaching the goal, and c) the relative efficacy of action paths chosen for reaching the goal as compared to other possible action paths.
Using an authority relationship framework for analyzing cooperation through IGOs highlights the inherently bi-directional nature of IGO-member government activity by viewing their interaction as involving a three-step process in which the IGO as authority holder decides when to issue what instruction, the member state governments as followers react to the instruction with anything from prompt and full compliance through various forms of pushback to outright rejection, and the IGO as authority holder responds to how the followers react with efforts to increase individual compliance with instructions and reinforce continuing acceptance of the authority relationship. Foregrounding the dynamics produced by the interaction of these two streams of perception and action reveals more clearly how far intergovernmental organizations acquire capacity to operate as independent actors, the dynamic ways they maintain that capacity, and how much they influence member governments’ beliefs and actions at different times. The approach fosters better understanding of why, when, and for how long governments choose cooperation through an IGO even in periods of rising unilateralism
Recommended from our members
Brain signal recognition using deep learning
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel UniversityBrain Computer Interface (BCI) has the potential to offer a new generation of applications independent of
muscular activity and controlled by the human brain. Brain imaging technologies are used to transfer the
cognitive tasks into control commands for a BCI system. The electroencephalography (EEG) technology
serves as the best available non-invasive solution for extracting signals from the brain. On the other hand,
speech is the primary means of communication, but for patients suffering from locked-in syndrome, there
is no easy way to communicate. Therefore, an ideal communication system for locked-in patients is a
thought-to-speech BCI system.
This research aims to investigate methods for the recognition of imagined speech from EEG signals
using deep learning techniques. In order to design an optimal imagined speech recognition BCI, variety
of issues have been solved. These include 1) proposing new feature extraction and classification
framework for recognition of imagined speech from EEG signals, 2) grammatical class recognition of
imagined words from EEG signals, 3) discriminating different cognitive tasks associated with speech in
the brain such as overt speech, covert speech, and visual imagery. In this work machine learning, deep
learning methods were used to analyze EEG signals.
For recognition of imagined speech from EEG signals, a new EEG database was collected while the
participants mentally spoke (imagined speech) the presented words. Along with imagined speech, EEG
data was recorded for visual imagery (imagining a scene or an image) and overt speech (verbal speech).
Spectro-temporal and spatio-temporal domain features were investigated for the classification of imagined
words from EEG signals. Further, a deep learning framework using the convolutional network
and attention mechanism was implemented for learning features in the spatial, temporal, and spectral
domains. The method achieved a recognition rate of 76.6% for three binary word pairs. These experiments
show that deep learning algorithms are ideal for imagined speech recognition from EEG signals
due to their ability to interpret features from non-linear and non-stationary signals. Grammatical classes
of imagined words from EEG signals were also recognized using a multi-channel convolution network
framework. This method was extended to a multi-level recognition system for multi-class classification
of imagined words which achieved an accuracy of 52.9% for 10 words, which is much better in
comparison to previous work.
In order to investigate the difference between imagined speech with verbal speech and visual imagery
from EEG signals, we used multivariate pattern analysis (MVPA). MVPA provided the time segments
when the neural oscillation for the different cognitive tasks was linearly separable. Further, frequencies
that result in most discrimination between the different cognitive tasks were also explored. A framework
was proposed to discriminate two cognitive tasks based on the spatio-temporal patterns in EEG signals.
The proposed method used the K-means clustering algorithm to find the best electrode combination and
convolutional-attention network for feature extraction and classification. The proposed method achieved
a high recognition rate of 82.9% and 77.7%.
The results in this research suggest that a communication based BCI system can be designed using
deep learning methods. Further, this work add knowledge to the existing work in the field of communication
based BCI system
Chinese Benteng Women’s Participation in Local Development Affairs in Indonesia: Appropriate means for struggle and a pathway to claim citizen’ right?
It had been more than two decades passing by aftermath the devastating Asia’s Financial Crisis in 1997, subsequently followed by Suharto’s step down from his presidential throne which he occupied for more than three decades. The financial turmoil turned to a political disaster furthermore has led to massive looting that severely impacted Indonesians of Chinese descendant, including unresolved mystery of the most atrocious sexual violation against women and covert killings of students and democracy activists in this country. Since then, precisely aftermath May 1998, which publicly known as “Reformasi”1, Indonesia underwent political reform that eventually corresponded positively to its macroeconomic growth. Twenty years later, in 2018, Indonesia captured worldwide attention because it has successfully hosted two internationally renowned events, namely the Asian Games 2018 – the most prestigious sport events in Asia – conducted in Jakarta and Palembang; and the IMF/World Bank Annual Meeting 2018 in Bali. Particularly in the IMF/World Bank Annual Meeting, this event has significantly elevated Indonesia’s credibility and international prestige in the global economic powerplay as one of the nations with promising growth and openness. However, the narrative about poverty and inequality, including increasing racial tension, religious conservatism, and sexual violation against women are superseded by friendly climate for foreign investment and eventually excessive glorification of the nation’s economic growth. By portraying the image of promising new economic power, as rhetorically promised by President Joko Widodo during his presidential terms, Indonesia has swept the growing inequality in this highly stratified society that historically compounded with religious and racial tension under the carpet of digital economy.Arte y Humanidade
Spam Reviews Detection in the Time of COVID-19 Pandemic: Background, Definitions, Methods and Literature Analysis
This work has been partially funded by projects PID2020-113462RB-I00 (ANIMALICOS), granted by Ministerio Espanol de Economia y Competitividad; projects P18-RT-4830 and A-TIC-608-UGR20 granted by Junta de Andalucia, and project B-TIC-402-UGR18 (FEDER and Junta de Andalucia).During the recent COVID-19 pandemic, people were forced to stay at home to protect
their own and others’ lives. As a result, remote technology is being considered more in all aspects
of life. One important example of this is online reviews, where the number of reviews increased
promptly in the last two years according to Statista and Rize reports. People started to depend more
on these reviews as a result of the mandatory physical distance employed in all countries. With no
one speaking to about products and services feedback. Reading and posting online reviews becomes
an important part of discussion and decision-making, especially for individuals and organizations.
However, the growth of online reviews usage also provoked an increase in spam reviews. Spam
reviews can be identified as fraud, malicious and fake reviews written for the purpose of profit
or publicity. A number of spam detection methods have been proposed to solve this problem. As
part of this study, we outline the concepts and detection methods of spam reviews, along with
their implications in the environment of online reviews. The study addresses all the spam reviews
detection studies for the years 2020 and 2021. In other words, we analyze and examine all works
presented during the COVID-19 situation. Then, highlight the differences between the works before
and after the pandemic in terms of reviews behavior and research findings. Furthermore, nine
different detection approaches have been classified in order to investigate their specific advantages,
limitations, and ways to improve their performance. Additionally, a literature analysis, discussion,
and future directions were also presented.Spanish Government PID2020-113462RB-I00Junta de Andalucia P18-RT-4830
A-TIC-608-UGR20
B-TIC-402-UGR18European Commission B-TIC-402-UGR1
Three decades of statistical pattern recognition paradigm for SHM of bridges
This is the author accepted manuscript. The final version is available from SAGE Publications via the DOI in this recordBridges play a crucial role in modern societies, regardless of their culture, geographical location, or economic development. The safest, economical, and most resilient bridges are those that are well managed and maintained. In the last three decades, structural health monitoring (SHM) has been a promising tool in management activities of bridges as potentially it permits one to perform condition assessment to reduce uncertainty in the planning and designing of maintenance activities as well as to increase the service performance and safety of operation. The general idea has been the transformation of massive data obtained from monitoring systems and numerical models into meaningful information. To deal with large amounts of data and perform the damage identification automatically, SHM has been cast in the context of the statistical pattern recognition (SPR) paradigm, where machine learning plays an important role. Meanwhile, recent technologies have unveiled alternative sensing opportunities and new perspectives to manage and observe the response of bridges, but it is widely recognized that bridge SHM is not yet fully capable of producing reliable global information on the presence of damage. While there have been multiple review studies published on SHM and vibration-based structural damage detection for wider scopes, there have not been so many reviews on SHM of bridges in the context of the SPR paradigm. Besides, some of those reviews become obsolete quite fast, and they are usually biased towards applications falling outside of bridge engineering. Therefore, the main goal of this article is to summarize the concept of SHM and point out key developments in research and applications of the SPR paradigm observed in bridges in the last three decades, including developments in sensing technology and data analysis, and to identify current and future trends to promote more coordinated and interdisciplinary research in the SHM of bridges
- …