The philosopher Xunzi (Hsün Tzu, c. 310—c. 220 B.C.E.) was an important Confucian. Xunzi’s political philosophy was unique in combining li, or rules of propriety, and fa, or laws and punishment. Li was originally seen as a... more
The philosopher Xunzi (Hsün Tzu, c. 310—c. 220 B.C.E.) was an important Confucian. Xunzi’s political philosophy was unique in combining li, or rules of propriety, and fa, or laws and punishment. Li was originally seen as a political instrument by Confucianism but fa was not. Acceptance of the newly proposed roles of fa was examined. Results were that factors in Xunzi’s acceptance of fa might have been influenced by contemporaneous reformist ideas and interest in problems’ of the lower classes. Li remained Xunzi’s most influential concept. Xunzi's interpretation of li was not identical to the original formulation of Confucius. Li was understood through fa as a political instrument for achieving concrete goals. In this way, Xunzi's approach to li was an indirect reinterpretation of fa.
Goal: The present work aims to present how the use of a blockchain two-factor authentication solution 2FA on a page developed on WordPress can contribute to the information security regarding user authentication.... more
Goal: The present work aims to present how the use of a blockchain two-factor authentication solution 2FA on a page developed on WordPress can contribute to the information security regarding user authentication. Design/Methodology/Approach: The research method employed is characterized as an exploratory research, since all the analysis is based on the theoretical reference data available on the subject. A field research was carried out in relation to the implementation of the multi-factor authentication plugin Hydro Raindrop MFA, which uses blockchain technology offered by The Hydrogen Technology Corporation and the Project Hydro platform over the Ethereum network. Thus, this paper sought to present and conceptualize some of the technologies used, pointing out their contribution to information security. Results: The main results showed that the use of decentralized technology, such as blockchain and the Hydro Raindrop Plugin, can contribute considerably in the process of user authe...
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor... more
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor authentication (2FA) as the only means of verifying mobile money users. These 2FA schemes are vulnerable to numerous security attacks because they only use a personal identification number (PIN) and subscriber identity module (SIM). This study aims to develop a secure and efficient multi-factor authentication algorithm for mobile money applications. It uses a novel approach combining PIN, a one-time password (OTP), and a biometric fingerprint to enforce extra security during mobile money authentication. It also uses a biometric fingerprint and quick response (QR) code to confirm mobile money withdrawal. The security of the PIN and OTP is enforced by using secure hashing algorithm-256 (SHA-256), a biometric fingerprint by Fast IDentity Online (FIDO) tha...
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor... more
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor authentication (2FA) as the only means of verifying mobile money users. These 2FA schemes are vulnerable to numerous security attacks because they only use a personal identification number (PIN) and subscriber identity module (SIM). This study aims to develop a secure and efficient multi-factor authentication algorithm for mobile money applications. It uses a novel approach combining PIN, a one-time password (OTP), and a biometric fingerprint to enforce extra security during mobile money authentication. It also uses a biometric fingerprint and quick response (QR) code to confirm mobile money withdrawal. The security of the PIN and OTP is enforced by using secure hashing algorithm-256 (SHA-256), a biometric fingerprint by Fast IDentity Online (FIDO) tha...
<p>p value maps are displayed as described in <a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0087874#pone-0087874-g002" target="_blank">Figure 2</a>, only using those with 3½ year outcome data for group-wise comparisons. Low Bayley III = infants with scores below predefined cut-offs for Bayley III (<82 for composite motor score, <85 for composite cognitive score); Slow head growth = isolated slow head growth (fall in head circumference centile from birth to follow-up of >2 standard deviations), with otherwise normal neurological examination and Bayley III scores.</p
The recommended treatment for patients with limited Small-Cell Lung Cancer (SCLC) combines thoracic radiotherapy and chemotherapy, in conjunction with prophylactic cranial irradiation (PCI). Prophylactic cranial irradiation is known to... more
The recommended treatment for patients with limited Small-Cell Lung Cancer (SCLC) combines thoracic radiotherapy and chemotherapy, in conjunction with prophylactic cranial irradiation (PCI). Prophylactic cranial irradiation is known to reduce the incidence of brain metastases before they clinically manifest. Many studies indicate that it results in improved prognosis for limited or extensive stage SCLC patients and even achieving complete remission of disease. However, there is evidence that PCI may contribute to neurocognitive deficits. The aim of our research is to employ TractBased Spatial Statistics (TBSS) in order to investigate potential voxel-wise differences in Diffusion Tensor Imaging (DTI) parameters between healthy-volunteers and patients with SCLC, before and after PCI treatment. The scope of this preliminary study is to examine potential differentiations in DTI images in five SCLC patients measured before and after PCI treatment and to find any possible differences between healthy-volunteers and patients right after the completion of whole brain radiotherapy.
In recent times, the world is taking into a part of challenging construction by using hard structures and high strength concretes. The proposed procedure deals with the experimental examination to find the mechanical properties of ternary... more
In recent times, the world is taking into a part of challenging construction by using hard structures and high strength concretes. The proposed procedure deals with the experimental examination to find the mechanical properties of ternary blended concrete with hybrid fibers. Utilizations of mineral admixtures, such as, Fly Ash (FA), Metakaolin (MK) and Ground Granulated Blast Furnace Slag (GGBS) are efficient to increase the strength and make sturdy for high strength concrete. Mechanical behavior of ternary blended concrete is prepared by high rates of ternary mixes like MK, FA, GGBS (10%-30%) and hybrid fibers (steel and polypropylene) with different volume parts (Steel:0.5-2%; PP:0.1-0.5%) are explored. The specimens are set up by various evaluations of concrete, for example, M20, M50, and M60 and furthermore shifting rates of ternary mix and fibers. The test examinations explored the proposed specimens and find the compressive strength, split tensile strength, and flexural strength. The proposed ternary blended concrete with hybrid fibers upgraded the mechanical properties and optimal strength.