372 research outputs found

    REPLACEMENT OF Ti02 PIGMENT BY CaC03 FROM CEFALONIA IN EMULSION PAINTS

    Get PDF
    Στόχος της εργασίας είναι να δείξει ότι το ανθρακικό ασβέστιο από τα κοιτάσματα κρητίδας της περιοχής Μηνιές της Κεφαλονιάς, που υφίστανται εκμετάλευση από την εταιρεία IONIAN KALK Α.Ε. είναι κατάλληλη πρώτη ύλη για τη βιομηχανία χρωμάτων, ιδίως για υδατοδιαλυτά χρώματα. Το κοίτασμα χαρακτηρίζεται από υψηλή περιεκτικότητα σε ανθρακικό ασβέστιο (>99 %), υψηλή λευκότητα και χαμηλό δείκτη κιτρινισμού, από πολύ χαμηλή περιεκτικότητα σε βαρέα ορυκτά και χαμηλό περιεχόμενο σε MgO (99 %), high whiteness and low yellowness, by negligible content of heavy metals and low contents of MgO (<0.15 %), Si02 (<0.05 %) andFe203 (<0.01 %). This research was based on determination of the optical and mechanical properties of the emulsion white water based paints, which included calcium carbonate from the Kefalonia limestone deposits. The calcium carbonate replaced Ti02 pigment in various proportions. It is concluded that this product can be utilized not only as inert filler and extender but may have more functional application acting simultaneously as pigment. Replacement of TiO2 pigment by calcium carbonate may reach 50% without deteriorating the optical and mechanical properties significantly. Hence calcium carbonate from this deposit offers excellent optical properties to paints, reduces sufficiently their production cost and replaces a great part of the proportion of titanium dioxide, which is currently used as white pigment

    Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach

    Full text link
    The adoption of blockchain-based distributed computation platforms is growing fast. Some of these platforms, such as Ethereum, provide support for implementing smart contracts, which are envisioned to have novel applications in a broad range of areas, including finance and Internet-of-Things. However, a significant number of smart contracts deployed in practice suffer from security vulnerabilities, which enable malicious users to steal assets from a contract or to cause damage. Vulnerabilities present a serious issue since contracts may handle financial assets of considerable value, and contract bugs are non-fixable by design. To help developers create more secure smart contracts, we introduce FSolidM, a framework rooted in rigorous semantics for designing con- tracts as Finite State Machines (FSM). We present a tool for creating FSM on an easy-to-use graphical interface and for automatically generating Ethereum contracts. Further, we introduce a set of design patterns, which we implement as plugins that developers can easily add to their contracts to enhance security and functionality

    A Block-Free Distributed Ledger for P2P Energy Trading:Case with IOTA?

    Get PDF
    & #x00A9; 2019, Springer Nature Switzerland AG. Across the world, the organisation and operation of the electricity markets is quickly changing, moving towards decentralised, distributed, renewables-based generation with real-time data exchange-based solutions. In order to support this change, blockchain-based distributed ledgers have been proposed for implementation of peer-to-peer energy trading platform. However, blockchain solutions suffer from scalability problems as well as from delays in transaction confirmation. This paper explores the feasibility of using IOTA’s DAG-based block-free distributed ledger for implementation of energy trading platforms. Our agent-based simulation research demonstrates that an IOTA-like DAG-based solution could overcome the constraints that blockchains face in the energy market. However, to be usable for peer-to-peer energy trading, even DAG-based platforms need to consider specificities of energy trading markets (such as structured trading periods and assured confirmation of transactions for every completed period)

    SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing by Remote Entities

    Get PDF
    Part 5: CybersecurityInternational audienceThe self-sovereign identity (SSI) model entails the full responsibility and sovereignty of a user regarding his identity data. This identity data can contain private data which is solely known to the user. The user himself is therefore required to manage the whole lifecycle of his private data, including the backup and restore. We show that prior work on how to backup and restore the user’s identity data does not meet the requirements of the SSI setting, and we present the first solution which does meet the requirements. Authenticated backup with auditing by remote entities (AWARE) combines SSI sustaining aspects and extends them to create a truly self-sovereign backup-and-restore protocol. In AWARE, trusted, physically met humans, called custodians, hold a secure device. Custodians with a secure device offer an offline backup possibility and a secure channel. The backup and restore are audited by commits on a publicly accessible distributed ledger. These commits are answered by auditing services which are required during restore. Only some auditing services hold relevant data for a restore. The self sovereignty of the user lies in the exclusive information which auditing services hold relevant data. AWARE  is the first backup-and-restore mechanism that fully complies with the SSI model. We perform an in-depth security-risk analysis of AWARE, showing a risk rating which is comparable to the best risk rating o related non-SSI-compliant backup-and-restore mechanisms. We instantiate the AWARE protocol with cryptographic primitives providing a high security level of 256-bit. We show its implementation feasibility by providing a simulation of AWARE, and conclude with an estimated performance analysis on a microcontoller architecture based on our simulation and implementation results in the literature

    HOMER: A semantically enhanced knowledge management approach in the domain of homemade explosives intelligence.

    Get PDF
    This paper presents a new approach, in handling data (encoding, managing and retrieving) in secure sensitive and classified organisations (such as Law Enforcement Agencies (LEAs)), that utilises Web 3.0 technologies as well as knowledge management techniques and pushing of information. This approach signals a departure from current use of databases and pulling of information technologies as well as allowing separation of concerns between how data are organised/structured and how data are manipulated/processed. Such an approach utilises an adaptive knowledge management platform capable of supporting organisational operations of LEAs using data aggregated from assorted, heterogeneous and online sources. Such knowledge is then pushed to the users, using recommenders, in an effortless manner addressing the needs of the organisation. Moreover, the system is designed to afford easier change of operational needs through the addition and removal of multiple folksonomies (representing changes in focus or new trends). These changes are further enriched with semantics providing specialised domain-specific content recommendations and semantically enriched search capabilities. This approach to knowledge retrieval has been applied to the domain of homemade explosives and counter-terrorism efforts as part of the HOMER project, where data are aggregated from sources such as police databases, online forums and explosives wikis. Data are stored in an unstructured manner and annotated by the users, ultimately being categorised as per the knowledge retrieval needs of the organisation, which in this case is to carry out efficient and effective investigations regarding homemade explosives. We describe the architecture of a system that can efficiently and effectively support related investigatory activities, and we also present an evaluation from the perspective of the end-users

    Smart Contracts for Global Sourcing Arrangements

    Get PDF
    While global sourcing arrangements are highly complex and usually represent large value to the partners, little is known of the use of e-contracts or smart contracts and contract management systems to enhance the contract management process. In this paper we assess the potential of emerging technologies for global sourcing. We review current sourcing contract issues and evaluate three technologies that have been applied to enhance contracting processes. These are (1) semantic standardisation, (2) cognitive technologies and (3) smart contracts and blockchain. We discuss that each of these seem to have their merit for contract management and potentially can contribute to contract management in more complex and dynamic sourcing arrangements. The combination and configuration in which these three technologies will provide value to sourcing should be on the agenda for future research in sourcing contract management.</p

    DADA: data assimilation for the detection and attribution of weather and climate-related events

    Get PDF
    A new nudging method for data assimilation, delay‐coordinate nudging, is presented. Delay‐coordinate nudging makes explicit use of present and past observations in the formulation of the forcing driving the model evolution at each time step. Numerical experiments with a low‐order chaotic system show that the new method systematically outperforms standard nudging in different model and observational scenarios, also when using an unoptimized formulation of the delay‐nudging coefficients. A connection between the optimal delay and the dominant Lyapunov exponent of the dynamics is found based on heuristic arguments and is confirmed by the numerical results, providing a guideline for the practical implementation of the algorithm. Delay‐coordinate nudging preserves the easiness of implementation, the intuitive functioning and the reduced computational cost of the standard nudging, making it a potential alternative especially in the field of seasonal‐to‐decadal predictions with large Earth system models that limit the use of more sophisticated data assimilation procedures
    corecore