Slices & Articles Get by the slice or add to your own ebook
|Ibrahim Abdul-Matin||Berrett-Koehler Publishers||ePub|
A Green path, or Deen, recognizes that how we manage waste, watts, and food also impacts our water. This chapter looks at industrial practices and how they have mistreated our water systems.
Water is integral to human life, and the way corporations treat water points to the value they place on human life. The Qur’an says:
We made from water every living thing. (Qur’an 21:30)
Yet for over a century, large corporations have used our water sources as their dumping grounds. The effects have lasted for decades and have caused numerous untold deaths.
One of the worst examples is the mercury poisoning of Japan’s Minamata Bay. Chisso Corporation, a Japanese chemical company, dumped waste mercury into the bay for decades, denied it, and sat back to watch as the contamination destroyed the local fishing stock and sickened the lives of thousands of residents.
Chisso used mercury as a catalyst to produce a variety of materials. It prospered during post–World War II reconstruction and by 1950 was a dominant force in the fishing town of Minamata, even while it dumped wastewater into the local bay. In the 1950s, mullet, lobster, and shad began disappearing. Dead fish floated and birds dropped dead from the sky. By 1954, patients with impaired nervous systems were coming to the hospital at the Chisso plant. Bodies were racked with convulsions, and newborns showed birth defects. Fishermen and their families were most affected by what came to be called the Minamata disease.1See All Chapters
|Samuel S. Bak||Indiana University Press||ePub|
|Noe Marchevsky||Karnac Books||ePub|
Tine Norregaard Arroyo
All the unhappiness of man stems from the fact that he is incapable of staying quietly in his room.
He who is willing to work gives birth to his own father.
Memory: the space in which a thing happens for a second time.
These three quotes are all taken from Paul Auster’s novel, The Invention of Solitude.1 It is his first novel, as he has before this only written and translated poetry, which he notes that his father somehow did not think much of. It is a novel in which he is concerned with “a search for the father” in a style of writing that makes references to autobiographical elements from Auster’s own life, as well as involving quotes from a multitude of other authors. The story evolves from different points of loss that evoke a solitude in Auster’s life; starting with the death of his father, the fear of losing his son due to a serious illness and the family mystery he encounters in the search for the absent paternal grandfather, to a tackling of the question of the solitude of writing. The story is woven around the relationship between a father and a son which in different ways poses a question of how the paternal functions in Auster’s own family history and what it means to become a writer in one’s own name.See All Chapters
|Kevin Daimi, Hamid R. Arabnia, Samiha Ayed, Michael R. Grimaila, Hanen Idoudi, George Markowsky, and Ashu M. G. Solo||CSREA Press|
Int'l Conf. Security and Management | SAM'14 |
Modeling and Attack for 4-MUXs based PUF
S. Kiryu1, K. Asahi1, and M. Yoshikawa1
Department of Information Engineering, Meijo University, Nagoya, Aichi, Japan
Abstract - Physical unclonable function (PUF) is one of the technique to prevent forgery circuits. PUF uses analog characteristics of each device which are accidentally generated due to dispersion during Large Scale Integrated circuit (LSI) manufacturing as a measure of individual identification. Arbiter PUF, which uses the difference in signal propagation delay between selectors, is typical methods of composing PUF using delay characteristics. 4-MUXs based
PUF, which is improved the performance of conventional arbiter 2-MUXs PUF is proposed. This paper proposes a modeling method of the 4-MUXs based PUF for machine learning attacks and discusses the vulnerability of the proposed 4-MUXs based PUF.
attacks and discusses the vulnerability of the proposed 4MUXs based PUF.
The operation of a conventional arbiter PUF can be expressed by using a model formula. Conventional PUFs are known to be attacked by forcing them to learn a model formula in reference . This section describes a method of modeling a conventional PUF. In reference , the model formulae for the delay time and the challenge can be expressed as formulae (1) and (2), respectively.See All Chapters
Business & Economics