7 resultados para security of tenure

em Cochin University of Science


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Globalisation has many facets and its impact on labour is one of the most significant aspects.Though its influence is worldwide,it is much more significant in a transforming economy like India.The right of workers to social security is seen recognised under the Constitution of India and other welfare legislations.But,after adoption of the new economic policy of liberalisation and privatisation by the Government of India,the labour is exposed to new set of challenges.They are posed mainly due to economic restructuring affected in employment relationship,coupled with the increase in unprotected informal labour force.This study is an attempt to analyse the new challenges stemming up in employment relation,efficacy of the existing measures for social security of labour in the present economic condition and the suggestions for securing workers'right to social security in the trade regime.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The study is a close scrutiny of the process of investigation of offences in India along with an analysis of powers and functions of the investigating agency. The offences, which are prejudicial to sovereignty, integrity and security of the nation or to its friendly relations with foreign states, are generally called the offences against national security. Offences against national security being prejudicial to the very existence of the nation and its legal system, is a heinous and terrible one. As early as 1971 the Law Commission of India had pointed out the need of treating the offences relating to national security and their perpetrators on a totally different procedural footing. The recommendation that, all the offences coming under the said category ought to be brought under the purview of a single enactment so as to confront such offences effectively. The discrepancies in and inadequacies of the criminal justice system in India as much as they are related to the investigations of the offences against national security are examined and the reforms are also suggested. The quality of criminal justice is closely linked with the caliber of the prosecution system and many of the acquittals in courts can be ascribed not only to poor investigations but also to poor quality of prosecution.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Internet today has become a vital part of day to day life, owing to the revolutionary changes it has brought about in various fields. Dependence on the Internet as an information highway and knowledge bank is exponentially increasing so that a going back is beyond imagination. Transfer of critical information is also being carried out through the Internet. This widespread use of the Internet coupled with the tremendous growth in e-commerce and m-commerce has created a vital need for infonnation security.Internet has also become an active field of crackers and intruders. The whole development in this area can become null and void if fool-proof security of the data is not ensured without a chance of being adulterated. It is, hence a challenge before the professional community to develop systems to ensure security of the data sent through the Internet.Stream ciphers, hash functions and message authentication codes play vital roles in providing security services like confidentiality, integrity and authentication of the data sent through the Internet. There are several ·such popular and dependable techniques, which have been in use widely, for quite a long time. This long term exposure makes them vulnerable to successful or near successful attempts for attacks. Hence it is the need of the hour to develop new algorithms with better security.Hence studies were conducted on various types of algorithms being used in this area. Focus was given to identify the properties imparting security at this stage. By making use of a perception derived from these studies, new algorithms were designed. Performances of these algorithms were then studied followed by necessary modifications to yield an improved system consisting of a new stream cipher algorithm MAJE4, a new hash code JERIM- 320 and a new message authentication code MACJER-320. Detailed analysis and comparison with the existing popular schemes were also carried out to establish the security levels.The Secure Socket Layer (SSL) I Transport Layer Security (TLS) protocol is one of the most widely used security protocols in Internet. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL I TLS. But recent attacks on RC4 and HMAC have raised questions about the reliability of these algorithms. Hence MAJE4 and MACJER-320 have been proposed as substitutes for them. Detailed studies on the performance of these new algorithms were carried out; it has been observed that they are dependable alternatives.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The present study on the dynamics of land use in recently settled forest areas. In the course of events, tribals lost their land; the demographic structure of Attappady changed; the cropping pattern got diversified; traditional techniques of production were ruined; new crops and new techniques of cultivation came to stay; and the entire cost and return structure of production underwent radical change. Migration to Attappady is essentially a continuation of the Malabar migration process from Travancore, through, some people from Tamil Nadu also had migrated to this region earlier. The demographic structure, along with land structure, has changed in favour of the settlers within a short span of time. Lack of security of ownership has acted as a strong reason for wanton exploitation of land resources. The major influencing factors on crop choices among settlers were labour endowment, date of settlement and education. Attappady is an unique ecosystem in Kerala characterized by many interdependables. The latest hand of environmental degradation is a grave danger especially on sloppy terrains,which are under cultivation of tapioca and dry annual crops like groundnuts, cotton, grams etc. Soil erosion as a result of the unplanned cultivation of these crops has resulted in dramatic decline in soil fertility and hence low crop productivity. This calls for a watershed management approach for the sustainable development of the region. A progressive agrarian transformation is warranted to maintain the homegarden as a sustainable production system in ecological and socio-economic terms.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Communication is the process of transmitting data across channel. Whenever data is transmitted across a channel, errors are likely to occur. Coding theory is a stream of science that deals with finding efficient ways to encode and decode data, so that any likely errors can be detected and corrected. There are many methods to achieve coding and decoding. One among them is Algebraic Geometric Codes that can be constructed from curves. Cryptography is the science ol‘ security of transmitting messages from a sender to a receiver. The objective is to encrypt message in such a way that an eavesdropper would not be able to read it. A eryptosystem is a set of algorithms for encrypting and decrypting for the purpose of the process of encryption and decryption. Public key eryptosystem such as RSA and DSS are traditionally being prel‘en‘ec| for the purpose of secure communication through the channel. llowever Elliptic Curve eryptosystem have become a viable altemative since they provide greater security and also because of their usage of key of smaller length compared to other existing crypto systems. Elliptic curve cryptography is based on group of points on an elliptic curve over a finite field. This thesis deals with Algebraic Geometric codes and their relation to Cryptography using elliptic curves. Here Goppa codes are used and the curves used are elliptic curve over a finite field. We are relating Algebraic Geometric code to Cryptography by developing a cryptographic algorithm, which includes the process of encryption and decryption of messages. We are making use of fundamental properties of Elliptic curve cryptography for generating the algorithm and is used here to relate both.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The evolution of wireless sensor network technology has enabled us to develop advanced systems for real time monitoring. In the present scenario wireless sensor networks are increasingly being used for precision agriculture. The advantages of using wireless sensor networks in agriculture are distributed data collection and monitoring, monitor and control of climate, irrigation and nutrient supply. Hence decreasing the cost of production and increasing the efficiency of production. This paper describes the security issues related to wireless sensor networks and suggests some techniques for achieving system security. This paper also discusses a protocol that can be adopted for increasing the security of the transmitted data

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In symmetric block ciphers, substitution and diffusion operations are performed in multiple rounds using sub-keys generated from a key generation procedure called key schedule. The key schedule plays a very important role in deciding the security of block ciphers. In this paper we propose a complex key generation procedure, based on matrix manipulations, which could be introduced in symmetric ciphers. The proposed key generation procedure offers two advantages. First, the procedure is simple to implement and has complexity in determining the sub-keys through crypt analysis. Secondly, the procedure produces a strong avalanche effect making many bits in the output block of a cipher to undergo changes with one bit change in the secret key. As a case study, matrix based key generation procedure has been introduced in Advanced Encryption Standard (AES) by replacing the existing key schedule of AES. The key avalanche and differential key propagation produced in AES have been observed. The paper describes the matrix based key generation procedure and the enhanced key avalanche and differential key propagation produced in AES. It has been shown that, the key avalanche effect and differential key propagation characteristics of AES have improved by replacing the AES key schedule with the Matrix based key generation procedure