11 resultados para security and protection

em Cochin University of Science


Relevância:

100.00% 100.00%

Publicador:

Resumo:

A socio-economic research is required as an attempt to address the socio-economic issues facing small-scale fisheries. A study of the socio economic conditions of small-scale fishermen is a prerequisite for good design and successful implementation of effective assistance Programmes. It will provide an overall pidure of the structure, activities and standards of living of small-scale fisherfolk The study is confined to the coastal districts of Ernakulam, Thrissur and Malappuram districts. It also gives a picture of socio-economic conditions of the fisher folk in the study area. The variables that may depict the standard of living of the small-scale fisherfolk are occupational structure, family size, age structure, income, expenditure, education, housing and other social amenities. It attempts to see the asset creation of the fisherfolk with the help of government agencies, and the nature of savings and expenditure pattern of the fisherfolk. It also provides a picture of the indebtedness of the fisherfolk in the study area. The study analyses the schemes implemented by the government through its agencies, like Fisheries Department, Matsyaboard, and Matsyafed; and the awareness of fisherfolk regarding these schemes, their attitude and reactions, the extent of accessibility, and the viability of the schemes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis is an attempt to explore the problems faced by Indian Women and to examine the ways in which the human rights of women could be better protected in the light of international movements with special reference to national legislation and judicial decisions.The evolution of human rights from early period to Universal Declaration of Human Rights, 1948 is traced in the first chapter. The second chapter deals with the evolution of human rights in India. The evolution of fundamental rights and directive principles and the role played by the Indian Judiciary in enforcing the human rights enumerated in various international instruments dealing with human rights are also dealt with in this chapter. The rights guaranteed to women under the various international documents have been dealt with in the third chapter.It is noticed that the international documents have had their impact in India leading to creation of machinery for protection of human rights. Organised violations of women's rights such as prostitution, devadasi system, domestic violence, sexual harassment at workplaces, the evil of dowry, female infanticide etc. have been analysed in the light of existing laws and decisional jurisprudence in the fourth chapter. The fifth chapter analyses the decisions and consensus that emerged from the world conferences on women and their impact on the Indian Society and Judiciary. The constitutional provisions and legislative provisions protecting the rights of women have been critically examined in the sixth chapter. Chapter seven deals with various mechanisms evolved to protect the human rights of women. The eighth chapter contains conclusions and suggestions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cochin University Of Science And Technology

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Any automatically measurable, robust and distinctive physical characteristic or personal trait that can be used to identify an individual or verify the claimed identity of an individual, referred to as biometrics, has gained significant interest in the wake of heightened concerns about security and rapid advancements in networking, communication and mobility. Multimodal biometrics is expected to be ultra-secure and reliable, due to the presence of multiple and independent—verification clues. In this study, a multimodal biometric system utilising audio and facial signatures has been implemented and error analysis has been carried out. A total of one thousand face images and 250 sound tracks of 50 users are used for training the proposed system. To account for the attempts of the unregistered signatures data of 25 new users are tested. The short term spectral features were extracted from the sound data and Vector Quantization was done using K-means algorithm. Face images are identified based on Eigen face approach using Principal Component Analysis. The success rate of multimodal system using speech and face is higher when compared to individual unimodal recognition systems

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The study is a close scrutiny of the process of investigation of offences in India along with an analysis of powers and functions of the investigating agency. The offences, which are prejudicial to sovereignty, integrity and security of the nation or to its friendly relations with foreign states, are generally called the offences against national security. Offences against national security being prejudicial to the very existence of the nation and its legal system, is a heinous and terrible one. As early as 1971 the Law Commission of India had pointed out the need of treating the offences relating to national security and their perpetrators on a totally different procedural footing. The recommendation that, all the offences coming under the said category ought to be brought under the purview of a single enactment so as to confront such offences effectively. The discrepancies in and inadequacies of the criminal justice system in India as much as they are related to the investigations of the offences against national security are examined and the reforms are also suggested. The quality of criminal justice is closely linked with the caliber of the prosecution system and many of the acquittals in courts can be ascribed not only to poor investigations but also to poor quality of prosecution.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The present investigation on “Coconut Phenology and Yield Response to Climate Variability and Change” was undertaken at the experimental site, at the Regional Station, Coconut Development Board, KAU Campus, Vellanikkara. Ten palms each of eight-year-old coconut cultivars viz., Tiptur Tall, Kuttiadi (WCT), Kasaragod (WCT) and Komadan (WCT) were randomly selected.The study therefore, reinforces our traditional knowledge that the coconut palm is sensitive to changing weather conditions during the period from primordium initiation to harvest of nuts (about 44 months). Absence of rainfall from December to May due to early withdrawal of northeast monsoon, lack of pre monsoon showers and late onset of southwest monsoon adversely affect the coconut productivity to a considerable extent in the following year under rainfed conditions. The productivity can be increased by irrigating the coconut palm during the dry periods.Increase in temperature, aridity index, number of severe summer droughts and decline in rainfall and moisture index were the major factors for a marginal decline or stagnation in coconut productivity over a period of time, though various developmental schemes were in operation for sustenance of coconut production in the State of Kerala. It can be attributed to global warming and climate change. Therefore, there is a threat to coconut productivity in the ensuing decades due to climate variability and change. In view of the above, there is an urgent need for proactive measures as a part of climate change adaptation to sustain coconut productivity in the State of Kerala.The coconut productivity is more vulnerable to climate variability such as summer droughts rather than climate change in terms of increase in temperature and decline in rainfall, though there was a marginal decrease (1.6%) in the decade of 1981-2009 when compared to that of 1951-80. This aspect needs to be examined in detail by coconut development agencies such as Coconut Development Board and State Agriculture Department for remedial measures. Otherwise, the premier position of Kerala in terms of coconut production is likely to be lost in the ensuing years under the projected climate change scenario. Among the four cultivars studied, Tiptur Tall appears to be superior in terms of reproduction phase and nut yield. This needs to be examined by the coconut breeders in their crop improvement programme as a part of stress tolerant under rainfed conditions. Crop mix and integrated farming are supposed to be the best combination to sustain development in the long run under the projected climate change scenarios. Increase in coconut area under irrigation during summer with better crop management and protection measures also are necessary measures to increase coconut productivity since the frequency of intensity of summer droughts is likely to increase under projected global warming scenario.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

n the recent years protection of information in digital form is becoming more important. Image and video encryption has applications in various fields including Internet communications, multimedia systems, medical imaging, Tele-medicine and military communications. During storage as well as in transmission, the multimedia information is being exposed to unauthorized entities unless otherwise adequate security measures are built around the information system. There are many kinds of security threats during the transmission of vital classified information through insecure communication channels. Various encryption schemes are available today to deal with information security issues. Data encryption is widely used to protect sensitive data against the security threat in the form of “attack on confidentiality”. Secure transmission of information through insecure communication channels also requires encryption at the sending side and decryption at the receiving side. Encryption of large text message and image takes time before they can be transmitted, causing considerable delay in successive transmission of information in real-time. In order to minimize the latency, efficient encryption algorithms are needed. An encryption procedure with adequate security and high throughput is sought in multimedia encryption applications. Traditional symmetric key block ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are not efficient when the data size is large. With the availability of fast computing tools and communication networks at relatively lower costs today, these encryption standards appear to be not as fast as one would like. High throughput encryption and decryption are becoming increasingly important in the area of high-speed networking. Fast encryption algorithms are needed in these days for high-speed secure communication of multimedia data. It has been shown that public key algorithms are not a substitute for symmetric-key algorithms. Public key algorithms are slow, whereas symmetric key algorithms generally run much faster. Also, public key systems are vulnerable to chosen plaintext attack. In this research work, a fast symmetric key encryption scheme, entitled “Matrix Array Symmetric Key (MASK) encryption” based on matrix and array manipulations has been conceived and developed. Fast conversion has been achieved with the use of matrix table look-up substitution, array based transposition and circular shift operations that are performed in the algorithm. MASK encryption is a new concept in symmetric key cryptography. It employs matrix and array manipulation technique using secret information and data values. It is a block cipher operated on plain text message (or image) blocks of 128 bits using a secret key of size 128 bits producing cipher text message (or cipher image) blocks of the same size. This cipher has two advantages over traditional ciphers. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the key avalanche effect produced in the ciphertext output is better than that of AES.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The Thesis deals with the entire estuarine system in totality on several parameters related to hydrography, ecology of biota, productivity and also the effects of pollution. The objective of this study has been to review the systems physical, chemical and biological features through varying periods of time at locations where human interference is high so that an overall assessment of the changing ecology could be made so as to impress on the scientific community whether remedial measures could be undertaken in sensitive areas. It is also the objective of this study to point out thrust areas where concerted efforts from a larger body of scientists and administrators who can sit together and chalk out programmes for a co-operative endeavor in monitoring the most sensitive areas and also suggest ways and means to exploit the rich and diverse resources at optimum levels with emphasis on conservation and protection from environmental degradation resulting in depletion of resources. Areas also have been identified which are potentially more productive where aquaculture could be intensified

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Communication is the process of transmitting data across channel. Whenever data is transmitted across a channel, errors are likely to occur. Coding theory is a stream of science that deals with finding efficient ways to encode and decode data, so that any likely errors can be detected and corrected. There are many methods to achieve coding and decoding. One among them is Algebraic Geometric Codes that can be constructed from curves. Cryptography is the science ol‘ security of transmitting messages from a sender to a receiver. The objective is to encrypt message in such a way that an eavesdropper would not be able to read it. A eryptosystem is a set of algorithms for encrypting and decrypting for the purpose of the process of encryption and decryption. Public key eryptosystem such as RSA and DSS are traditionally being prel‘en‘ec| for the purpose of secure communication through the channel. llowever Elliptic Curve eryptosystem have become a viable altemative since they provide greater security and also because of their usage of key of smaller length compared to other existing crypto systems. Elliptic curve cryptography is based on group of points on an elliptic curve over a finite field. This thesis deals with Algebraic Geometric codes and their relation to Cryptography using elliptic curves. Here Goppa codes are used and the curves used are elliptic curve over a finite field. We are relating Algebraic Geometric code to Cryptography by developing a cryptographic algorithm, which includes the process of encryption and decryption of messages. We are making use of fundamental properties of Elliptic curve cryptography for generating the algorithm and is used here to relate both.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Microcosm studies were performed to evaluate the survival of Escherichia coli, Salmonella paratyphi and Vibrio parahaemolyticus in water and sediment collected from the freshwater region of Vembanad Lake (9 35◦N 76 25◦E) along the south west coast of India. All three test microorganisms showed significantly (p < 0.01) higher survival in sediment compared to overlying water. The survival in different sediment types with different particle size and organic carbon content revealed that sediment with small particle size and high organic carbon content could enhance their extended survival (p < 0.05). The results indicate that sediments of the Lake could act as a reservoir of pathogenic bacteria and exhibit a potential health hazard from possible resuspension and subsequent ingestion during recreational activities. Therefore, the assessment of bacterial concentration in freshwater Lake sediments used for contact and non contact recreation has of considerable significance for the proper assessment of microbial pollution of the overlying water, and for the management and protection of related health risk at specific recreational sites. Besides, assessment of the bacterial concentration in sediments can be used as a relatively stable indicator of long term mean bacterial concentration in the water column above

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Prevalence of faecal coliform bacteria and the survival of Escherichia coli, Vibrio parahaemolyticus and Salmonella paratyphi were studied in the water and sediment from Vembanadu Lake in the presence and absence of protozoan predators. The density of faecal coliform bacteria ranged between mean MPN value 5080–9000/100 ml in water and 110,000–988,000/1 g in sediment (p <0.01), which was 110 times greater than in overlying water. The laboratory microcosm studies revealed that E. coli, V. parahaemolyticus and S. paratyphi showed significantly higher survival (p <0.05) potential in sediment than in overlying water both in the presence and absence of protozoan predators. The results indicate that Vembanadu Lake sediment constitutes a reservoir of pathogenic bacteria and exhibits potential health hazard from possible resuspension and subsequent ingestion during recreational activities. Therefore, assessment of bacterial concentration in freshwater lake sediments used for contact and non-contact recreation is of considerable significance for the proper assessment of microbial pollution of the overlying water and the management and protection of related health risk at specific recreational sites. In addition, assessment of the bacterial concentration in sediments can be used as a relatively stable indicator of long-term mean bacterial concentration in the water column above.