904 resultados para Identity based encryption
Resumo:
The purpose of this project was to discern the inherent tension present in narratives told by adolescents with a visual impairment as they attempted to make sense of their experiences, specifically those surrounding risk. Mediated action, based on the foundational work of Vygotsky and Bakhtin, was used as both a theoretical and methodological approach; it is the theory that there are two components that constitute any human action: the "agent," or the person who is doing the acting, and the "mediational means" that he or she is using to accomplish the action in question. Tension ensues as neither is able to fully explain human behaviour. Ten adolescents with a visual impairment participated in a narrative interview, revealing numerous counter-narratives surrounding risk-taking, including "experimentation undertaken using good judgment." Participants offered examples of how they engaged, appropriated, resisted and transformed the dominant narratives of disability and adolescence in their identity formation.
Resumo:
The following thesis provides an empirical case study in which a group of 6 first generation female Afghan Canadian youth is studied to determine their identity negotiation and development processes in everyday experiences. This process is investigated across different contexts of home, school, and the community. In terms of schooling experiences, 2 participants each are selected representing public, Islamic, and Catholic schools in Southern Ontario. This study employs feminist research methods and is analyzed through a convergence of critical race theory (critical race feminism), youth development theory, and feminist theory. Participant experiences reveal issues of racism, discrimination, and bias within schooling (public, Catholic) systems. Within these contexts, participants suppress their identities or are exposed to negative experiences based on their ethnic or religious identification. Students in Islamic schools experience support for a more positive ethnic and religious identity. Home and community provided nurturing contexts where participants are able to reaffirm and develop a positive overall identity.
Resumo:
The purpose of this study was to investigate how teacher identity norms relate to teacher collaboration among the practices of elementary teachers in Ontario. Using quantitative research methods, the data indicated two clusters of teacher identity norms. The norm cluster of innovation, interdependence, and cooperation showed positive correlations with collaboration and the norm cluster of conservatism, individualism, and competition showed negative correlations with collaboration. The two clusters of norms also correlated with each other. The data showed that teachers highly valued collaboration as part of their teaching practice but did not always experience it in their school setting. The analysis suggested that if schools reinforce norms of innovation, interdependence, and cooperation, collaboration will be nurtured. Further, the data showed that if norms of conservatism, individualism, and competition are continued in school cultures, then collaboration will not be sustained. As a broad educational reform agenda, teacher collaboration is used (a) to support school cultures, (b) to change teaching practices, and (c) to implement policy-based initiatives. This research is expected to benefit teachers in its capacity to inform policy makers concerning the highly complex nature of teacher collaboration and some of the factors that impact it. With an understanding of the relationships between teacher identity norms and collaboration, it may be possible for policy makers to provide appropriate support structures that reinforce collaboration in teachers' practices as well as predict potential levels of collaboration within school cultures.
Resumo:
Ayant réalisé neuf longs-métrages entre 1988 et 2007, aussi que plusieurs campagnes publicitaires, vidéo-clips, courts-métrages et projets collectifs, Wong Kar-wai est un des réalisateurs contemporains les plus importants actuellement. Issu de l'industrie cinématographique fortement commerciale de Hong Kong, Wong est parvenu à attirer l'attention du circuit international des festivals de cinéma avec son style visuel unique et son récit fragmenté. Considéré par plusieurs critiques comme le poète de la recherche d’identité de Hong Kong après 1997, Wong Kar-wai défie toutes les tentatives de catégorisation. L’étude qui se poursuivit ici a donc pour objet essentiel de fournir une analyse attentive et complète de son oeuvre, tout en se concentrant sur les traits stylistiques qui donnent à ses films une unité. Ces caractéristiques correspondent à une certaine façon de raconter des histoires, de composer des personnages et des récits, de manipuler le temps et d'utiliser des ressources techniques de sorte que ses films offrent une identité cohérente. L'objectif est d'analyser les différents composants de ses images pour découvrir comment ses films communiquent les uns avec les autres afin de créer une identité unique. Pour atteindre cet objectif, je pose comme hypothèse de travail que le cinéma de Wong est marqué par une structure dualiste qui permet à ses films de présenter des qualités contradictoires simultanément. La plupart de mes arguments se concentrent sur le travail du philosophe français Gilles Deleuze, qui a proposé une théorie du cinéma divisé entre l’image-mouvement et l’image-temps. Je considère que sa théorie fournit un cadre valide sur lequel les films de Wong peuvent être projetés. Tandis que ma recherche se concentre sur l’interprétation textuelle des films, je profiterais également d’une analyse comparative.
Resumo:
Cet article présente et analyse la menace grandissante que représente le vol d’identité dans le cyberespace. Le développement, dans la dernière décennie, du commerce électronique ainsi que des transactions et des communications numériques s’accélère. Cette progression non linéaire a généré une myriade de risques associés à l’utilisation des technologies de l’information et de la communication (les TIC) dans le cyberespace, dont un des plus importants est sans conteste la menace du vol d’identité. Cet article vise à donner un aperçu des enjeux et des risques relatifs au vol d’identité et cherche à offrir certaines solutions basées sur la nécessité d’opter pour une politique à trois volets qui englobe des approches stratégiques et règlementaires, techniques et culturelles.
Resumo:
n the recent years protection of information in digital form is becoming more important. Image and video encryption has applications in various fields including Internet communications, multimedia systems, medical imaging, Tele-medicine and military communications. During storage as well as in transmission, the multimedia information is being exposed to unauthorized entities unless otherwise adequate security measures are built around the information system. There are many kinds of security threats during the transmission of vital classified information through insecure communication channels. Various encryption schemes are available today to deal with information security issues. Data encryption is widely used to protect sensitive data against the security threat in the form of “attack on confidentiality”. Secure transmission of information through insecure communication channels also requires encryption at the sending side and decryption at the receiving side. Encryption of large text message and image takes time before they can be transmitted, causing considerable delay in successive transmission of information in real-time. In order to minimize the latency, efficient encryption algorithms are needed. An encryption procedure with adequate security and high throughput is sought in multimedia encryption applications. Traditional symmetric key block ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are not efficient when the data size is large. With the availability of fast computing tools and communication networks at relatively lower costs today, these encryption standards appear to be not as fast as one would like. High throughput encryption and decryption are becoming increasingly important in the area of high-speed networking. Fast encryption algorithms are needed in these days for high-speed secure communication of multimedia data. It has been shown that public key algorithms are not a substitute for symmetric-key algorithms. Public key algorithms are slow, whereas symmetric key algorithms generally run much faster. Also, public key systems are vulnerable to chosen plaintext attack. In this research work, a fast symmetric key encryption scheme, entitled “Matrix Array Symmetric Key (MASK) encryption” based on matrix and array manipulations has been conceived and developed. Fast conversion has been achieved with the use of matrix table look-up substitution, array based transposition and circular shift operations that are performed in the algorithm. MASK encryption is a new concept in symmetric key cryptography. It employs matrix and array manipulation technique using secret information and data values. It is a block cipher operated on plain text message (or image) blocks of 128 bits using a secret key of size 128 bits producing cipher text message (or cipher image) blocks of the same size. This cipher has two advantages over traditional ciphers. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the key avalanche effect produced in the ciphertext output is better than that of AES.
Resumo:
Biometrics deals with the physiological and behavioral characteristics of an individual to establish identity. Fingerprint based authentication is the most advanced biometric authentication technology. The minutiae based fingerprint identification method offer reasonable identification rate. The feature minutiae map consists of about 70-100 minutia points and matching accuracy is dropping down while the size of database is growing up. Hence it is inevitable to make the size of the fingerprint feature code to be as smaller as possible so that identification may be much easier. In this research, a novel global singularity based fingerprint representation is proposed. Fingerprint baseline, which is the line between distal and intermediate phalangeal joint line in the fingerprint, is taken as the reference line. A polygon is formed with the singularities and the fingerprint baseline. The feature vectors are the polygonal angle, sides, area, type and the ridge counts in between the singularities. 100% recognition rate is achieved in this method. The method is compared with the conventional minutiae based recognition method in terms of computation time, receiver operator characteristics (ROC) and the feature vector length. Speech is a behavioural biometric modality and can be used for identification of a speaker. In this work, MFCC of text dependant speeches are computed and clustered using k-means algorithm. A backpropagation based Artificial Neural Network is trained to identify the clustered speech code. The performance of the neural network classifier is compared with the VQ based Euclidean minimum classifier. Biometric systems that use a single modality are usually affected by problems like noisy sensor data, non-universality and/or lack of distinctiveness of the biometric trait, unacceptable error rates, and spoof attacks. Multifinger feature level fusion based fingerprint recognition is developed and the performances are measured in terms of the ROC curve. Score level fusion of fingerprint and speech based recognition system is done and 100% accuracy is achieved for a considerable range of matching threshold
Resumo:
Any automatically measurable, robust and distinctive physical characteristic or personal trait that can be used to identify an individual or verify the claimed identity of an individual, referred to as biometrics, has gained significant interest in the wake of heightened concerns about security and rapid advancements in networking, communication and mobility. Multimodal biometrics is expected to be ultra-secure and reliable, due to the presence of multiple and independent—verification clues. In this study, a multimodal biometric system utilising audio and facial signatures has been implemented and error analysis has been carried out. A total of one thousand face images and 250 sound tracks of 50 users are used for training the proposed system. To account for the attempts of the unregistered signatures data of 25 new users are tested. The short term spectral features were extracted from the sound data and Vector Quantization was done using K-means algorithm. Face images are identified based on Eigen face approach using Principal Component Analysis. The success rate of multimodal system using speech and face is higher when compared to individual unimodal recognition systems
Resumo:
Division of Electronics Engineering
Resumo:
En este trabajo se expone e ilustra un modelo teórico para entender las funciones de la identidad, así como los mecanismos psicosociales asociados a su construcción: “Modelo Evolutivo y Funcional de la Identidad Mediada” (MEBIM). La identidad, mediada narrativamente, cumple una función personal orientada a la dirección de la propia vida, así como una función sociocultural vinculada a la búsqueda de reconocimiento de los derechos de los grupos sociales a los que uno se siente apegado. Se ilustran los factores asociados a la construcción de la identidad personal (sí mismos posibles, transiciones vitales, vínculo afectivo) y sociocultural (acción-transformación e identificación simbólica) a partir de 12 historias de vida realizadas con mestizos e indígenas de la Universidad Intercultural de Chiapas (México). Se sugiere que en contextos educativos formales, como la escuela o la Universidad, se deben propiciar narrativas personales y socioculturales con el objetivo de optimizar la identidad en un mundo a la vez globalizado y plural
Resumo:
If education is to be about ‘human flourishing’ (De Ruyter, 2004) as well as preparation for adulthood and work, then religious and citizenship education would seem to have a key contribution towards this goal, both offering opportunities for the exploration and development of a robust sense of identity. However, despite the opposition of most religious educators, religious education has been treated by successive UK governments simply as a form of inculcation into a homogenous notion of citizenship based on nominal church attendance. Moreover, the teaching of the relatively new subject of citizenship education, whilst recognising that the sense of identity and allegiance is complex, has not regularly included faith perspectives. I argue that the concept of ‘spiritual development’, which centres on an existential sense of identity, offers a justification for combining lessons in both religious and citizenship education. I conclude on a cautionary note, arguing that pupils need to be given a critical awareness of ways in which such identities can be provided for them by default, particularly since consumer culture increasingly makes use of ‘spiritual’ language and imagery.
Resumo:
Abstract: Instead of the political reading of the EU Constitution adopted by advocates of constitutional patriotism, this article examines the European economic constitution. The four single market freedoms can be used by the Court of Justice to strike down Member State laws which represent deeply held aspects of national cultural identity. The article examines whether the court does in fact act in this way and proceeds to argue that the issue of identity protection does not stop with the court. In those policy areas where the court is more interventionist, and its case-law is perceived as an identity threat, one is likely to find binding Treaty-based derogations. Where, in contrast, the effect of the court's case-law poses less of a threat, one is more likely to see non-binding declarations. The article examines a number of policy areas in which specific cultural derogations and declarations are to be found, including abortion, property acquisition, football and alcohol control.
Resumo:
Concern has been expressed that the current climate in schools militates against trainee teachers' self-directed development. This article explores the issue of trainees' capacity for self-direction through the analysis of interviews with 32 trainees, investigating their perceived proactive social strategies. Three proactive strategies were identified: 'tactical compliance', personalising advice, and seeking out opportunities to exercise control. It is argued that these strategies are indicative of trainees' drive to establish a personal teaching identity through self-directed development and the creation of individual development agendas. The article concludes by emphasising the importance of the development of proactive social skills in beginning teachers. (c) 2008 Elsevier Ltd. All rights reserved.
Resumo:
This paper discusses the RFID implants for identification via a sensor network. Brain-computer implants linked in to a wireless network. Biometric identification via body sensors is also discussed. The use of a network as a means for remote and distance monitoring of humans opens up a range of potential uses. Where implanted identification is concerned this immediately offers high security access to specific areas by means of only an RFID device. If a neural implant is employed then clearly the information exchanged with a network can take on a much richer form, allowing for identification and response to an individual's needs based on the signals apparent on their nervous system.
Resumo:
This paper views the increasing social networking as an efficient emerging ministry to the moveable generation. Through social network such as Facebook, ministry from a pastoral perspective can become more authentic and meaningful. Ministry is relational. Social Networking sites provide a strong platform to being part in other people’s life. Social networking and living online builds community beyond geographical boarders. Young adults and youths digital identity often reflects their faith, this is supported by research which suggests a practice of more openness to share and expose private issues online. Spiritual and religious views are freely shared, creating sacred spaces in the midst of life practising a holistic faith identity in a secular community. Providing a strong platform for information flow, Social Network is attractive in a postmodern society where inviting people to join in events are perceived as non threatening, making church community events transparent and available to people who do not attend church, inviting spiritual friendships and relationships. Social Networking strengthens relationship in a non hierarchical manner and invites the minister into lives where there previously would have been barriers, engaging in prayer and bible study as well as pastoral care through social networking, thus relationships deepens via social networking making people real. It has been observed that, although community building happens on the net, church affiliation loyalty remains to the local community. Therefore presence ministry though social networks emerges as a core form of ministry, where relations to youth who move from local church to university campuses are kept alive. The asynchronous nature of communication within social networking eases the minister in her work. The minister is able to engage with many individuals at the same time. Before the minister could visit one person at a time, now she visits 5-6 individuals at any given time. Therefore social networking not only increases the quality of the work, but also empowers the minister to be more efficient.