6 resultados para Alternatives to incarceration
em Cochin University of Science
Resumo:
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.
Resumo:
Despite its recognized value in detecting and characterizing breast disease, X-ray mammography has important limitations that motivate the quest for alternatives to augment the diagnostic tools that are currently available to the radiologist. The rationale for pursuing electromagnetic methods are based on the significant dielectric contrast between normal and cancerous breast tissues, when exposed to microwaves. The present study analyzes two-dimensional microwave tomographic imaging on normal and malignant breast tissue samples extracted by mastectomy, to assess the suitability of the technique for early detection ofbreast cancer. The tissue samples are immersed in matching coupling medium and are illuminated by 3 GHz signal. 2-D tomographic images ofthe breast tissue samples are reconstructed from the collected scattered data using distorted Born iterative method. Variations of dielectric permittivity in breast samples are distinguishable from the obtained permittivity profiles, which is a clear indication of the presence of malignancy. Hence microwave tomographic imaging is proposed as an alternate imaging modality for early detection ofbreast cancer.
Resumo:
Fluorescence is a powerful tool in biological research, the relevance of which relies greatly on the availability of sensitive and selective fluorescent probes. Nanometer sized fluorescent semiconductor materials have attracted considerable attention in recent years due to the high luminescence intensity, low photobleaching, large Stokes’ shift and high photochemical stability. The optical and spectroscopic features of nanoparticles make them very convincing alternatives to traditional fluorophores in a range of applications. Efficient surface capping agents make these nanocrystals bio-compatible. They can provide a novel platform on which many biomolecules such as DNA, RNA and proteins can be covalently linked. In the second phase of the present work, bio-compatible, fluorescent, manganese doped ZnS (ZnS:Mn) nanocrystals suitable for bioimaging applications have been developed and their cytocompatibility has been assessed. Functionalization of ZnS:Mn nanocrystals by safe materials results in considerable reduction of toxicity and allows conjugation with specific biomolecules. The highly fluorescent, bio-compatible and water- dispersible ZnS:Mn nanocrystals are found to be ideal fluorescent probes for biological labeling
Resumo:
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.
Resumo:
Quantile functions are efficient and equivalent alternatives to distribution functions in modeling and analysis of statistical data (see Gilchrist, 2000; Nair and Sankaran, 2009). Motivated by this, in the present paper, we introduce a quantile based Shannon entropy function. We also introduce residual entropy function in the quantile setup and study its properties. Unlike the residual entropy function due to Ebrahimi (1996), the residual quantile entropy function determines the quantile density function uniquely through a simple relationship. The measure is used to define two nonparametric classes of distributions
Resumo:
Refiners today operate their equipment for prolonged periods without shutdown. This is primarily due to the increased pressures of the market resulting in extended shutdown-to-shutdown intervals. This places extreme demands on the reliability of the plant equipment. The traditional methods of reliability assurance, like Preventive Maintenance, Predictive Maintenance and Condition Based Maintenance become inadequate in the face of such demands. The alternate approaches to reliability improvement, being adopted the world over are implementation of RCFA programs and Reliability Centered Maintenance. However refiners and process plants find it difficult to adopt this standardized methodology of RCM mainly due to the complexity and the large amount of analysis that needs to be done, resulting in a long drawn out implementation, requiring the services of a number of skilled people. These results in either an implementation restricted to only few equipment or alternately, one that is non-standard. The paper presents the current models in use, the core requirements of a standard RCM model, the alternatives to classical RCM, limitations in the existing model, classical RCM and available alternatives to RCM and will then go on to present an ‗Accelerated‘ approach to RCM implementation, that, while ensuring close conformance to the standard, does not place a large burden on the implementers