848 research outputs found

    Security and Citizenship in Global South: In/securing citizens in early Republican Turkey (1923-1946)

    Get PDF
    Cataloged from PDF version of article.The relationship between security and citizenship is more complex than media portrayals based on binary oppositions seem to suggest (included/excluded, security/insecurity), or mainstream approaches to International Relations (IR) and security seem to acknowledge. This is particularly the case in the post-imperial and/or postcolonial contexts of global South where the transition of people from subjecthood to citizenship is better understood as a process of in/securing. For, people were secured domestically as they became citizens with access to a regime of rights and duties. People were also secured internationally as citizens of newly independent ‘nation-states’ who were protected against interventions and/or ‘indirect rule’ by the (European) International Society, whose practices were often justified on grounds of the former’s ‘failings’ in meeting the so-called ‘standards of civilization’. Yet, people were also rendered insecure as they sought to approximate and/or resist the citizen imaginaries of the newly established ‘nation-states’. The article illustrates this argument by looking at the case of Turkey in the early Republican era (1923–1946)

    Optimal Reactive Extraction of Valeric Acid from Aqueous Solutions Using Tri-n-propyl amine/Diluent and Dibenzyl amine/Diluent Systems

    Get PDF
    Reactive extraction of valeric acid from water by tri-n-propyl amine (TPA) and dibenzyl amine (DBA) dissolved in polar oxygenated aliphatic diluents (diethyl sebacate, diethyl succinate, diethyl malonate, ethyl caprylate, ethyl valerate and isoamyl alcohol) has been studied at T = 298 ± 0.2 K and Pp =101.3 ± 0.7 kPa . Distribution data have been subjected to formulation of an optimization structure for effective acid separation. The optimization approach uses separation ratio R and synergistic enhancement SE factors to efficiently identify optimum extraction ranges. Among the examined aliphatic ester and alcohol diluents, monoesters exhibit higher solvation efficiency comprising acid1–amine1 complex formation, while isoamyl alcohol yields larger loading factors. The uptake capacity of the amine/diluent system is ranging in the order TPA > DBA. Modeling efforts based on the mass-action law principles have shown considerable success. The mass action law chemodel and modified Langmuir approach are quite accurate yielding mean errors of 0.9 % and 0.7 %, respectively

    A combined anatomical variation of inferior epigastric vessels

    Get PDF
    During the routine anatomical dissection of a male cadaver, a variation was observed both in the inferior epigastric artery (IEA) and inferior epiastric vein (IEV). Although the origin of the IEA from the right femoral artery (FA) is common variation in this case, the right IEA originated from the RFA, 13 mm inferior to inguinal ligament. The artery didn’t course anterior to the femoral vein (FV) as described in the variations of this vessel; instead, coursed on the lateral side of the variant IEV. Additionally, in this cadaver, the single right IEV drained to RFV 8 mm inferior to inguinal ligament. Both the variant artery and vein passed posterior to spermatic cord and their course in the rectus sheath were normal in every aspect. Due to its clinical importance, this combined anatomical variation must be remembered by the surgeons

    Changing of the Guards: a simple and efficient method for achieving uniformity in threshold sharing

    Get PDF
    Since they were first proposed as a countermeasure against differential power analysis (DPA) in 2006, threshold schemes have attracted a lot of attention from the community concentrating on cryptographic implementations. What makes threshold schemes so attractive from an academic point of view is that they come with an information-theoretic proof of resistance against a specific subset of side-channel attacks: first-order DPA. From an industrial point of view they are attractive as a careful threshold implementation forces adversaries to DPA of higher order, with all its problems such a noise amplification. A threshold scheme that offers the mentioned provable security must exhibit three properties: correctness, incompleteness and uniformity. A threshold scheme becomes more expensive with the number of shares that must be implemented and the required number of shares is lower bound by the algebraic degree of the function being shared plus 1. Defining a correct and incomplete sharing of a function of degree d in d+1 shares is straightforward. However, up to now there is no generic method to achieve uniformity and finding uniform sharings of degree-d functions with d+1 shares is an active research area. In this paper we present a simple and relatively cheap method to find a correct, incomplete and uniform d+1-share threshold scheme for any S-box layer consisting of degree-d invertible S-boxes. The uniformity is not implemented in the sharings of the individual S-boxes but rather at the S-box layer level by the use of feed-forward and some expansion of shares. When applied to the Keccak-p nonlinear step Chi, its cost is very small

    PARADOXICAL REACTIONS, ESPECIALLY PSORIASIS IN RHEUMATOLOGY PATIENTS RECEIVING BIOLOGIC THERAPY FROM THE TREASURE DATABASE: A 5-YEAR FOLLOW-UP STUDY

    Get PDF
    EULAR European Congress of Rheumatology (EULAR) -- JUN 01-04, 2022 -- Copenhagen, DENMARK[Abstract Not Available]European Alliance Assoc Rheumato

    EPIDEMIOLOGICAL CHARACTERISTICS OF VIRAL HEPATITIS IN PATIENTS WITH RHEUMATIC DISEASES - IMPLICATIONS FROM TREASURE DATABASE

    Get PDF
    EULAR European Congress of Rheumatology (EULAR) -- JUN 01-04, 2022 -- Copenhagen, DENMARK[Abstract Not Available]European Alliance Assoc Rheumato
    corecore