65 research outputs found

    Physical Model Test for Soft Soil With or Without Prefabricated Vertical Drain with Loading

    Get PDF
    The paper builds a physical model of testing in the laboratory with the parametric tempered glass box 0.5  0.5 1.2 m (length  width  depth) containing saturated clay to study the settlement and consolidation when loading increased gradually over time. The research covers herein to present the monitoring of settlement and pore water pressure, settlement calculation, numerical simulation using PLAXIS software V8.2 based on the results of soil physical and mechanical tests before and after loading in case of having or not prefabricated vertical drain (PVD). In case of no PVD, the calculation and numerical simulation using the soil parameters before loading have the differential settlement from the monitoring data, approximately 3.86 mm (10.45%), 0.41 mm (1.11%) respectively. Meanwhile, the deviation in the case using data after loading is about 2.29 mm (6.20%), 0.21 mm (0.56%) respectively. In case of PVD, the calculation and numerical simulation with the testing result of before loading deviation from the settlement monitoring by subsidence meter is 2.91 mm (7.88%), 44.42 mm (120.28%), calculation and simulation with the testing result of after loading deviation is 0.80 mm (2.17%), 1.26 mm (3.41%). In the case of having PVD, the difference in calculation, subsidence observation, and numerical simulation between the mechanical properties before and after loading is significant, when using the mechanical data after loading then the results are quite close to the subsidence of observation and simulation rather than before loading.

    The Fish and the Fishing Rod: Unemployment Insurance in Vietnam

    Get PDF
    As the second most populated country in the Southeast Asian region, Vietnam is drawing attention of both internal and external recruiters to take full advantage of its young and abundant workforce. Using firsthand data from Vietnam, this paper investigates the unemployment insurance scheme in the country based on important indicators such as coverage, qualifying conditions and benefits, and analyzes challenges of the scheme under economic changes. The paper addresses the original 2009 version and its gradual modifications until 2015. A comparison between the 2009 version and revised version is presented to understand the reformations on the unemployment insurance and how these adjustments improve the current unemployment insurance condition

    Study of the nat^{nat}Sm(γ,xn)143m,g(\gamma ,xn)^{143m,g}Sm Reactions Induced by Bremsstrahlung with End-point Energies Just above GDR Region

    Get PDF
    We investigate the energy dependence of the isomeric yield ratios for the nat^{nat}Sm(γ,xn)143m,g(\gamma ,xn)^{143m,g}Sm reactions with bremsstrahlung energies of 40-, 45-, and 50-MeV, just above the giant dipole resonance (GDR) region by the off-line γ\gamma -ray spectrometric method. The bremsstrahlung photons were produced from the 100 MeV electron linear accelerator (linac) at the Pohang accelerator laboratory (PAL), Pohang, Korea. In order to improve the accuracy of the experimental results the necessary corrections were made. The present results are compared with similar literature data of the nat^{nat}Sm(γ\gamma ,xn)143m,g^{143m,g}Sm reactions measured at various photon energies and of the nat^{nat}Sm(n,2n)143m,g^{143m,g}Sm reaction induced by 14 MeV neutrons in order to examine the effects of an excitation energy and an input angular momentum

    On the Security of Rate-limited Privacy Pass

    Get PDF
    The privacy pass protocol allows users to redeem anonymously issued cryptographic tokens instead of solving annoying CAPTCHAs. The issuing authority verifies the credibility of the user, who can later use the pass while browsing the web using an anonymous or virtual private network. Hendrickson et al. proposed an IETF draft (privacypass-rate-limit-tokens-00) for a rate-limiting version of the privacy pass protocol, also called rate-limited Privacy Pass (RlP). Introducing a new actor called a mediator makes both versions inherently different. The mediator applies access policies to rate-limit users’ access to the service while, at the same time, should be oblivious to the website/origin the user is trying to access. In this paper, we formally define the rate-limited Privacy Pass protocol and propose a game-based security model to capture the informal security notions introduced by Hendrickson et al.. We show a construction from simple building blocks that fulfills our security definitions and even allows for a post-quantum secure instantiation. Interestingly, the instantiation proposed in the IETF draft is a specific case of our construction. Thus, we can reuse the security arguments for the generic construction and show that the version used in practice is secure

    Cross Sections for the nat^{nat}Zr(p,xn)89,90(p,xn)^{89,90}Nb Reactions Induced by 27.7 MeV Protons

    Get PDF
    The cross-sections for the formation of 89^{89}Nb and  90^{90}Nb radionuclides in proton induced nuclear reactions on zirconium  were measured by using the well known activation method. The natural  zirconium (nat^{nat}Zr) target and copper (nat^{nat}Cu) monitor foils were  irradiated by 27.7 MeV proton beam at the MC50 Cyclotron of the Korea  Institute of Radiological and Medical Science (KIRAMS), Korea. The induced  gamma activities of the reaction products were measured by a coaxial high  purity germanium (HPGe) detector coupled to a PC-based multichannel  analyzer. The obtained cross sections for each nuclide are compared with  those existing in literature and with the theoretical cross sections  calculated by the TALYS - 1.4 code

    FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs

    Get PDF
    Two-factor authentication (2FA) mitigates the security risks of passwords as sole authentication factor. FIDO2---the de facto standard for interoperable web authentication---leverages strong, hardware-backed second factors. However, practical challenges hinder wider FIDO2 user adoption for 2FA tokens, such as the extra costs (2020-30 per token) or the risk of inaccessible accounts upon token loss/theft. To tackle the above challenges, we propose FeIDo, a virtual FIDO2 token that combines the security and interoperability of FIDO2 2FA authentication with the prevalence of existing eIDs (e.g., electronic passports). Our core idea is to derive FIDO2 credentials based on personally-identifying and verifiable attributes---name, date of birth, and place of birth---that we obtain from the user's eID. As these attributes do not change even for refreshed eID documents, the credentials "survive" token loss. Even though FeIDo operates on privacy-critical data, all personal data and resulting FIDO2 credentials stay unlinkable, are never leaked to third parties, and are securely managed in attestable hardware containers (e.g., SGX enclaves). In contrast to existing FIDO2 tokens, FeIDo can also derive and share verifiable meta attributes (anonymous credentials) with web services. These enable verified but pseudonymous user checks, e.g., for age verification (e.g., "is adult")

    FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs (Extended Version)

    Get PDF
    Two-factor authentication (2FA) mitigates the security risks of passwords as sole authentication factor. FIDO2---the de facto standard for interoperable web authentication---leverages strong, hardware-backed second factors. However, practical challenges hinder wider FIDO2 user adoption for 2FA tokens, such as the extra costs (2020-30 per token) or the risk of inaccessible accounts upon token loss/theft. To tackle the above challenges, we propose FeIDo, a virtual FIDO2 token that combines the security and interoperability of FIDO2 2FA authentication with the prevalence of existing eIDs (e.g., electronic passports). Our core idea is to derive FIDO2 credentials based on personally-identifying and verifiable attributes---name, date of birth, and place of birth---that we obtain from the user's eID. As these attributes do not change even for refreshed eID documents, the credentials "survive" token loss. Even though FeIDo operates on privacy-critical data, all personal data and resulting FIDO2 credentials stay unlinkable, are never leaked to third parties, and are securely managed in attestable hardware containers (e.g., SGX enclaves). In contrast to existing FIDO2 tokens, FeIDo can also derive and share verifiable meta attributes (anonymous credentials) with web services. These enable verified but pseudonymous user checks, e.g., for age verification (e.g., "is adult")

    The ribosomal transcription units of Haplorchis pumilio and H. taichui and the use of 28S rDNA sequences for phylogenetic identification of common heterophyids in Vietnam

    Get PDF
    Background: Heterophyidiasis is now a major public health threat in many tropical countries. Species in the trematode family Heterophyidae infecting humans include Centrocestus formosanus, Haplorchis pumilio, H. taichui, H. yokogawai, Procerovum varium and Stellantchasmus falcatus. For molecular phylogenetic and systematic studies on trematodes, we need more prospective markers for taxonomic identification and classification. This study provides near-complete ribosomal transcription units (rTU) from Haplorchis pumilio and H. taichui and demonstrates the use of 28S rDNA sequences for identification and phylogenetic analysis. Results: The near-complete ribosomal transcription units (rTU), consisting of 18S, ITS1, 5.8S, ITS2 and 28S rRNA genes and spacers, from H. pumilio and H. taichui from human hosts in Vietnam, were determined and annotated. Sequence analysis revealed tandem repetitive elements in ITS1 in H. pumilio and in ITS2 in H. taichui. A phylogenetic tree inferred from 28S rDNA sequences of 40 trematode strains/species, including 14 Vietnamese heterophyid individuals, clearly confirmed the status of each of the Vietnamese species: Centrocestus formosanus, Haplorchis pumilio, H. taichui, H. yokogawai, Procerovum varium and Stellantchasmus falcatus. However, the family Heterophyidae was clearly not monophyletic, with some genera apparently allied with other families within the superfamily Opisthorchioidea (i. e. Cryptogonimidae and Opisthorchiidae). These families and their constituent genera require substantial re-evaluation using a combination of morphological and molecular data. Our new molecular data will assist in such studies. Conclusions: The 28S rDNA sequences are conserved among individuals within a species but varied between genera. Based on analysis of 40 28S rDNA sequences representing 19 species in the superfamily Opisthorchioidea and an outgroup taxon (Alaria alata, family Diplostomidae), six common human pathogenic heterophyids were identified and clearly resolved. The phylogenetic tree inferred from these sequences again confirmed anomalies in molecular placement of some members of the family Heterophyidae and demonstrates the need for reappraisal of the entire superfamily Opisthorchioidea. The new sequences provided here supplement those already available in public databases and add to the array of molecular tools that can be used for the diagnosis of heterophyid species in human and animal infections

    Study of Multiple Photoneutron Reactions on 197Au Induced by 2.5 GeV Bremsstrahlung

    Get PDF
    We identified eight radionuclides 196^{196}Au, 195^{195}Au, 194^{194}Au, 193^{193}Au, 192^{192}Au, 191^{191}Au, 190^{190}Au, 189^{189}Au formed via the multiple photoneutron reactions 197^{197}Au(γ,kn)197k(\gamma ,kn)^{197 - k}Au with 2.5 GeV\break bremsstrahlung. The yields of radionuclides that decay by emitting γ\gamma -ray were measured using high purity germanium (HPGe) detector coupled to a PC-based multichannel analyzer. In order to improve the accuracy of the experimental results the necessary corrections were made. The obtained results are compared with reference data and the variations of the 197^{197}Au(γ\gamma ,kn)197k^{197 - k}Au reaction yields according to incident bremsstrahlung energy and neutron multiplicity are also discussed
    corecore