9 resultados para Cyber threats
em Cochin University of Science
Resumo:
Cyber Physical systems (CPS) connect the physical world with cyber world. The events happening in the real world is enormous and most of it go unnoticed and information is lost. CPS enables to embed tiny smart devices to capture the data and send it to Internet for further processing. The entire set-up call for lots of challenges and open new research problems. This talk is a journey through the landscape of research problems in this emerging area.
Resumo:
In this study prospects of marketing the indigenous ornamental fishes of kerala, point out that the export market, consumer preferences in the domestic ornamental fishes, SWOT (strength weakness opportunities and threats) analysis etc. The study notes that the product indigenous ornamental fishes are mostely marketed by exporters and suppliers rather than the retail aquarium shopkeepers. The research findings on the attributes of indigenous ornamental fishes that matches customers preference in aquarium fish.SWOT analysis was carried out to classify the results of the study into strengths,weakness,opportunities and threats faced by the ornamental fish industry in kerala. The marketers in the study show less market perception compaired to the exporters of India. Rather than market survey, interest and experience and raw materials availability inspires them. The developments for large scale marketing have to be carried out, ensuring the sustainable exploitation of the wild fish population by adopting conservation measures such as breeding programmes, quota implementation, setting up of natural sanctuaries to protect the natural resource of ornamental fishes.
Resumo:
The thesis entitled "Studies on improved practices of prawn farming for higher production in central Kerala" prepared by the author describes various practices prevailing in the study area in order to elucidate their relative merits. The study on semi-intensive farming at Mundapuram, Kannur was also carried out and included in the thesis for comparison.The author felt it important to make a critical study of the existing culture practices in the central Kerala, a region where it has been existing since time immemorial.Careful analysis of data accrued by the author has helped him to identify strength, weakness, opportunities and threats confronting the shrimp farming. As a result it was possible to evolve an appropriate management technology taking into consideration the various ecological (location specific), social and economical conditions prevalent in the vast study area.
Resumo:
n the recent years protection of information in digital form is becoming more important. Image and video encryption has applications in various fields including Internet communications, multimedia systems, medical imaging, Tele-medicine and military communications. During storage as well as in transmission, the multimedia information is being exposed to unauthorized entities unless otherwise adequate security measures are built around the information system. There are many kinds of security threats during the transmission of vital classified information through insecure communication channels. Various encryption schemes are available today to deal with information security issues. Data encryption is widely used to protect sensitive data against the security threat in the form of “attack on confidentiality”. Secure transmission of information through insecure communication channels also requires encryption at the sending side and decryption at the receiving side. Encryption of large text message and image takes time before they can be transmitted, causing considerable delay in successive transmission of information in real-time. In order to minimize the latency, efficient encryption algorithms are needed. An encryption procedure with adequate security and high throughput is sought in multimedia encryption applications. Traditional symmetric key block ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are not efficient when the data size is large. With the availability of fast computing tools and communication networks at relatively lower costs today, these encryption standards appear to be not as fast as one would like. High throughput encryption and decryption are becoming increasingly important in the area of high-speed networking. Fast encryption algorithms are needed in these days for high-speed secure communication of multimedia data. It has been shown that public key algorithms are not a substitute for symmetric-key algorithms. Public key algorithms are slow, whereas symmetric key algorithms generally run much faster. Also, public key systems are vulnerable to chosen plaintext attack. In this research work, a fast symmetric key encryption scheme, entitled “Matrix Array Symmetric Key (MASK) encryption” based on matrix and array manipulations has been conceived and developed. Fast conversion has been achieved with the use of matrix table look-up substitution, array based transposition and circular shift operations that are performed in the algorithm. MASK encryption is a new concept in symmetric key cryptography. It employs matrix and array manipulation technique using secret information and data values. It is a block cipher operated on plain text message (or image) blocks of 128 bits using a secret key of size 128 bits producing cipher text message (or cipher image) blocks of the same size. This cipher has two advantages over traditional ciphers. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the key avalanche effect produced in the ciphertext output is better than that of AES.
Resumo:
Handwriting is an acquired tool used for communication of one's observations or feelings. Factors that inuence a person's handwriting not only dependent on the individual's bio-mechanical constraints, handwriting education received, writing instrument, type of paper, background, but also factors like stress, motivation and the purpose of the handwriting. Despite the high variation in a person's handwriting, recent results from different writer identification studies have shown that it possesses sufficient individual traits to be used as an identification method. Handwriting as a behavioral biometric has had the interest of researchers for a long time. But recently it has been enjoying new interest due to an increased need and effort to deal with problems ranging from white-collar crime to terrorist threats. The identification of the writer based on a piece of handwriting is a challenging task for pattern recognition. The main objective of this thesis is to develop a text independent writer identification system for Malayalam Handwriting. The study also extends to developing a framework for online character recognition of Grantha script and Malayalam characters
Resumo:
The situation in the backwaters of Kerala, which reportedly had about 70,000 ha of mangroves, is unique in the sense that there has been a total conversion to other uses such as paddy cultivation, coconut plantation, aquaculture, harbour development and urban development In order to save and restore what is left over national and international organisations are mounting pressure on scientists and policy makers to work out ways and means conserving and managing the mangrove ecosystems. In this context, it has been observed in recent years that mangrove vegetation has remained intact in isolated pockets of undisturbed areas in the Cochin estuarine system and also that there is resurgence of mangroves in areas of accretion and silting. The candidate took up the present study with a view to make an inventory of the existing mangrove locations, the areas of resurgence, species composition, zonation and other ecological parameters to understand their dynamism and to suggest a mangement plan for this important coastal ecosystem
Resumo:
In this computerized, globalised and internet world our computer collects various types of information’s about every human being and stores them in files secreted deep on its hard drive. Files like cache, browser history and other temporary Internet files can be used to store sensitive information like logins and passwords, names addresses, and even credit card numbers. Now, a hacker can get at this information by wrong means and share with someone else or can install some nasty software on your computer that will extract your sensitive and secret information. Identity Theft posses a very serious problem to everyone today. If you have a driver’s license, a bank account, a computer, ration card number, PAN card number, ATM card or simply a social security number you are more than at risk, you are a target. Whether you are new to the idea of ID Theft, or you have some unanswered questions, we’ve compiled a quick refresher list below that should bring you up to speed. Identity theft is a term used to refer to fraud that involves pretending to be someone else in order to steal money or get other benefits. Identity theft is a serious crime, which is increasing at tremendous rate all over the world after the Internet evolution. There is widespread agreement that identity theft causes financial damage to consumers, lending institutions, retail establishments, and the economy as a whole. Surprisingly, there is little good public information available about the scope of the crime and the actual damages it inflicts. Accounts of identity theft in recent mass media and in film or literature have centered on the exploits of 'hackers' - variously lauded or reviled - who are depicted as cleverly subverting corporate firewalls or other data protection defenses to gain unauthorized access to credit card details, personnel records and other information. Reality is more complicated, with electronic identity fraud taking a range of forms. The impact of those forms is not necessarily quantifiable as a financial loss; it can involve intangible damage to reputation, time spent dealing with disinformation and exclusion from particular services because a stolen name has been used improperly. Overall we can consider electronic networks as an enabler for identity theft, with the thief for example gaining information online for action offline and the basis for theft or other injury online. As Fisher pointed out "These new forms of hightech identity and securities fraud pose serious risks to investors and brokerage firms across the globe," I am a victim of identity theft. Being a victim of identity theft I felt the need for creating an awareness among the computer and internet users particularly youngsters in India. Nearly 70 per cent of Indian‘s population are living in villages. Government of India already started providing computer and internet facilities even to the remote villages through various rural development and rural upliftment programmes. Highly educated people, established companies, world famous financial institutions are becoming victim of identity theft. The question here is how vulnerable the illiterate and innocent rural people are if they suddenly exposed to a new device through which some one can extract and exploit their personal data without their knowledge? In this research work an attempt has been made to bring out the real problems associated with Identity theft in developed countries from an economist point of view.
Resumo:
The 21st century is marked by a paradigm shift in education that has resulted both in threats and opportunities. It has brought new challenges and an opportunity for higher education. Higher education in India is undergoing rapid changes. The challenges ahead are multifaceted and multidimensional. Though the data show a massive growth in the number of students' enrollment in colleges/universities, holistic view reveals that still only a meager of the total population has access to higher education. Globalization and privatization are imposing new challenges but the nations are still entangled in solving the basic problems of accessibility to higher education for all. In the wake of the transition from elitist to mass education, universities worldwide are under pressure to enhance access and equity, on the one hand, and to maintain high standards of quality and excellence, on the other. Today the notion of equity not only implies greater access to higher education, but also opportunities for progress. In recent debates on higher education, the notions of equity and access go beyond minority to diversity. Affirmative action, too, has become raceexclusive and gender-neutral.1
Resumo:
The objectives of this paper are mainly three (i) to make an overall study of the global experiences and trends in respect of ICT industry, (ii) to study the performance of the Indian ICT industry (including, its strengths, weaknesses, opportunities and threats), and lastly (iii) to make constructive suggestions as to ensure superior performance of the Indian ICT industry in the light of the latest developments and trends in the field.