10 resultados para Approach through a game
em Cochin University of Science
Resumo:
The study has wider policy implications as it identifies the possible variables which influence the sustainability of participatory productive sector projects. The method which is developed to study the sustainability of projects under People’s Planning in Chempu Panchayat could be used for studying the same in other panchayats also. Unlike the case of the standard features of sustainability identified, the independent variables vary according to the nature of the project. Hence, this needs to be modified accordingly while applying the method in a dissimilar domain. Selection of a single panchayat for the present study is relevant on the basis of a common package of inputs for decentralised planning which is forwarded by the State Planning Board respectively for the three-tier panchayat system in Kerala. The dynamic filed realities could be brought out in view of a comprehensive planning approach through an in depth study of specific cases.The assessment of the nature and pattern of productive sector projects in the selected Village Panchayat puts the projects under close scrutiny. The analysis has depended largely on secondary sources of information, especially from panchayat level plan documents, and also on the primary information obtained using direct observation and on-site inspection of project sites. An analysis of the nature and pattem of productive sector projects is important as it gives all necessary information regarding follow-up, monitoring/evaluation and even termination of a particular project. It has also revealed the tendencies of including infrastructure and service sector projects under ‘productive’ category, especially for maintaining the stipulated ratio (40:30:30) of grant-in-aid distribution. The study regarding the allocation and expenditure pattern of plan funds is vital in policy level as it reveals the under-noticed allocation and expenditure pattern of plan funds other than grant-in-aid. One major limitation of the study has been the limited availability of secondary data, especially regarding project-wise expenditure and monitoring/evaluation reports of various project committees.
Resumo:
Modern computer systems are plagued with stability and security problems: applications lose data, web servers are hacked, and systems crash under heavy load. Many of these problems or anomalies arise from rare program behavior caused by attacks or errors. A substantial percentage of the web-based attacks are due to buffer overflows. Many methods have been devised to detect and prevent anomalous situations that arise from buffer overflows. The current state-of-art of anomaly detection systems is relatively primitive and mainly depend on static code checking to take care of buffer overflow attacks. For protection, Stack Guards and I-leap Guards are also used in wide varieties.This dissertation proposes an anomaly detection system, based on frequencies of system calls in the system call trace. System call traces represented as frequency sequences are profiled using sequence sets. A sequence set is identified by the starting sequence and frequencies of specific system calls. The deviations of the current input sequence from the corresponding normal profile in the frequency pattern of system calls is computed and expressed as an anomaly score. A simple Bayesian model is used for an accurate detection.Experimental results are reported which show that frequency of system calls represented using sequence sets, captures the normal behavior of programs under normal conditions of usage. This captured behavior allows the system to detect anomalies with a low rate of false positives. Data are presented which show that Bayesian Network on frequency variations responds effectively to induced buffer overflows. It can also help administrators to detect deviations in program flow introduced due to errors.
Resumo:
Cochin University of Science And Technology
Resumo:
The objective of this research is to study the feasibility of bioremediating the oily sludge from a refinery site. Three different methods of waste treatment were tried i.e. phytoremediation, land farming and microbial enhanced oil separation in laboratory scale treatment systems. A multiprocess approach by combination of phytoremediation, biostimulation and microbial enhanced oil separation is also presented. The methods of analysis, experimental procedure, and results are incorporated into five chapters of this thesis entitled "Bioremediation of petroleum sludge through phytoremediation, land farming and microbial enhanced oil separation.
Resumo:
n the recent years protection of information in digital form is becoming more important. Image and video encryption has applications in various fields including Internet communications, multimedia systems, medical imaging, Tele-medicine and military communications. During storage as well as in transmission, the multimedia information is being exposed to unauthorized entities unless otherwise adequate security measures are built around the information system. There are many kinds of security threats during the transmission of vital classified information through insecure communication channels. Various encryption schemes are available today to deal with information security issues. Data encryption is widely used to protect sensitive data against the security threat in the form of “attack on confidentiality”. Secure transmission of information through insecure communication channels also requires encryption at the sending side and decryption at the receiving side. Encryption of large text message and image takes time before they can be transmitted, causing considerable delay in successive transmission of information in real-time. In order to minimize the latency, efficient encryption algorithms are needed. An encryption procedure with adequate security and high throughput is sought in multimedia encryption applications. Traditional symmetric key block ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are not efficient when the data size is large. With the availability of fast computing tools and communication networks at relatively lower costs today, these encryption standards appear to be not as fast as one would like. High throughput encryption and decryption are becoming increasingly important in the area of high-speed networking. Fast encryption algorithms are needed in these days for high-speed secure communication of multimedia data. It has been shown that public key algorithms are not a substitute for symmetric-key algorithms. Public key algorithms are slow, whereas symmetric key algorithms generally run much faster. Also, public key systems are vulnerable to chosen plaintext attack. In this research work, a fast symmetric key encryption scheme, entitled “Matrix Array Symmetric Key (MASK) encryption” based on matrix and array manipulations has been conceived and developed. Fast conversion has been achieved with the use of matrix table look-up substitution, array based transposition and circular shift operations that are performed in the algorithm. MASK encryption is a new concept in symmetric key cryptography. It employs matrix and array manipulation technique using secret information and data values. It is a block cipher operated on plain text message (or image) blocks of 128 bits using a secret key of size 128 bits producing cipher text message (or cipher image) blocks of the same size. This cipher has two advantages over traditional ciphers. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the key avalanche effect produced in the ciphertext output is better than that of AES.
Resumo:
one of the key sectors, identified by the Department of Industries Government of Kerala, for the cluster development initiative is Handloom, which gives employment to over over 50,000 people directly. Despite its age old tradition and fame, the performance of the sector vis-à-vis power looms is not very rosy owing to (i) competition from cheap power loom cloth from other states (ii) scarcity of quality yarn (iii) price escalation of yarn, dyes, chemicals and other raw materials (iv) the shrinking market for handlooms in Kerala (v) non-demand based production and inadequacy of new designs and (vi) inefficiencies in the system, particularly in the co-operative sector. Cluster based approach is adopted in the handloom sector with the objective of providing necessary support mechanism to come out of the crisis that the sector faces now. While four cluster schemes are being implemented in Kerala, it is under IHDS-CDP that the State got a sizeable number of clusters benefiting a large number of societies and weavers- 24 handloom clusters, bringing 152 handloom co-operative societies and over 19,800 handloom workers under the Programme. This research attempts to revisit the underlying rationale and context of the new direction and would attempt to broadly analyze the growth trends under the influence of cluster model adopted by the State IHDS-CDP for the revival of handloom sector through a detailed study of the handloom co-operative societies in Kerala. If handloom sector in Kerala can be revived using cluster based approach, it can be easily concluded that cluster is capable of taking the MSME in Kerala to a ‘high growth path.’ The study is aimed at understanding how best clusters emerge as appropriate industrial organization suitable for the current global structure of manufacture
Resumo:
In today's complicated computing environment, managing data has become the primary concern of all industries. Information security is the greatest challenge and it has become essential to secure the enterprise system resources like the databases and the operating systems from the attacks of the unknown outsiders. Our approach plays a major role in detecting and managing vulnerabilities in complex computing systems. It allows enterprises to assess two primary tiers through a single interface as a vulnerability scanner tool which provides a secure system which is also compatible with the security compliance of the industry. It provides an overall view of the vulnerabilities in the database, by automatically scanning them with minimum overhead. It gives a detailed view of the risks involved and their corresponding ratings. Based on these priorities, an appropriate mitigation process can be implemented to ensure a secured system. The results show that our approach could effectively optimize the time and cost involved when compared to the existing systems
Resumo:
This paper describes certain findings of intonation and intensity study of emotive speech with the minimal use of signal processing algorithms. This study was based on six basic emotions and the neutral, elicited from 1660 English utterances obtained from the speech recordings of six Indian women. The correctness of the emotional content was verified through perceptual listening tests. Marked similarity was noted among pitch contours of like-worded, positive valence emotions, though no such similarity was observed among the four negative valence emotional expressions. The intensity patterns were also studied. The results of the study were validated using arbitrary television recordings for four emotions. The findings are useful to technical researchers, social psychologists and to the common man interested in the dynamics of vocal expression of emotions
Resumo:
Earlier studies on measurement of customer satisfaction are based on either transaction specific or overall approaches. The transaction specific approach evaluates customer satisfaction with single components in the whole purchase process but the overall satisfaction was based on all the encounters or experiences to the customer throughout the purchase process. Consumers will comment on particular events of their purchase process when asked about transaction-specific satisfaction and they will comment their overall impression and general experiences in overall satisfaction (Bitner & Hubbert 1994) Through a critical review on the literature, it has been identified a new approaches to customer satisfaction, say, cumulative approaches that can be more useful than overall and transaction specific approaches for strategic decision making (Fornell et al 1996). The cumulative approach to customer satisfaction doesn’t study earlier due to the difficulty in operationalization of the concept. But the influencers of customer satisfaction are context specific and the prevailing models doesn’t give the sources of variations in the satisfaction, the importance of cumulative approaches to customer satisfaction has emerges that lights to a new research. The current study has focused to explore the influencers of overall customer satisfaction to form individual elements that can be used to identify the cumulative customer satisfaction.
Resumo:
Mangroves are specialised ecosystems developed along estuarine sea coasts and river mouths in tropical and subtropical regions of the world, mainly in the intertidal zone. Hence, the ecosystem and its biological components is under the influence of both marine and freshwater conditions and has developed a set of physiological adaptations to overcome problems of anoxia, salinity and frequent tidal inundations. This has led to the assemblage of a wide variety of plant and animal species of special adaptations suited to the ecosystem. The path of photosynthesis in mangroves is different from other glycophytes. There are modifications or alterations in other physiological processes such as carbohydrate metabolism or polyphenol synthesis. As they survive under extreme conditions of salinity, temperature, tides and anoxic soil conditions they may have chemical compounds, which protect them from these destructive elements. Mangroves are necessarily tolerant of high salt levels and have mechanisms to take up water despite strong osmotic potentials. Some also take up salts, but excrete them through specialised glands in the leaves. Others transfer salts into senescent leaves or store them in the bark or the wood. Still others simply become increasingly conservative in their water use as water salinity increases. A usual transportation or biosynthetic path as other plants cannot be expected in mangrove plants. In India, the states like West Bengal, Orissa, Andhra Pradesh, Tamil Nadu, Andaman and Nicobar Islands, Kerala, Goa, Maharashtra, and Gujarat occupy vast area of mangroves. Kerala has only 6 km2 total mangrove area with Rhizophora apiculata, Rhizophora mucronata, Bruguiera gymnorrhiza, Bruguiera cylindrica, Avicennia officinalis, Sonneratia caseolaris, Sonneratia apetala and Kandelia candal, as the important species present, most of which belong to the family Rhizophoraceae.Rhizophoraceae mangroves are ranked as “major elements of mangroves” as they give the real shape of this unique and interesting ecosystem and these mangrove species most productive and typical characteristic ecosystem of World renowned. It was found that the Rhizophoraceae mangrove extracts exhibit several bioactive properties. Various parts of these mangroves are used in ethnomedicinal practices. Even though extracts from these mangroves possess therapeutic activity against humans, animal and plant pathogens, the specific metabolites responsible for these bioactivities remains to be elucidated. Various parts of these mangroves are used in ethnomedicinal practices. There is a gap of information towards the chemistry of Rhizophoraceae mangroves from Kerala. Thorough phytochemical investigation can achieve the validity of ethnomedicines as well as apply the use of mangrove plants in the development of new drugs. Such studies can pave a firm base for their use in biomarker and chemotaxonomic studies as well as for the better management of the existing mangrove ecosystem. In this study, the various chemical parameters including minerals, biochemical components, bioactive and biomarker molecules were used to classify and assess the possible potentials of the mangrove plants of the true mangrove family Rhizophoraceae from Kochi.