920 resultados para SSO,Shibboleth,2FA,ADFS,Strong Authentication
Resumo:
The purpose of the study is to define the characteristics of strong personal brands on social media in Finland. Personal branding as a phenomenon is no longer limited to celebrities and political leaders. The digital revolution and the change in online behavior have created the need for a deeper investigation of the characteristics of strong personal brands on social media. The work of different academics on personal branding are examined to gain a comprehensive understanding on this research topic that has gone through a revolution during the last decade. Early impression management theory is refined to include elements from more modern literature related to personal branding, brand identity management and social media to create a theoretical framework that simplifies the process of personal brand building on social media. The framework consisting of three phases clarifies the process of modern personal branding. The results of the study are presented in line with three research themes derived from the theoretical framework: the background of the brand, the brand identity management and the social media behavior and activities. Mixed methods are used in the research as means to broaden perception on the subject. The quantitative part of the study defines general characteristics concerning the most follower personal brands in Finland in three social media channels – Facebook, Instagram and Twitter. The other part of the research was conducted by single case study including two Finnish personal brands cases to provide a deeper understanding of personal branding practices of strong social media personal brands. The results of the study show that the most used social media channels differ in terms of the personal brand characteristics and personal branding activities. Due to the characteristics of the channels also the post activities of the personal brands differ quite significantly. It can be also inferred that there is a difference between brands with an existing offline awareness and the brands with no awareness before joining the social media. In order to reduce the gap between the ideal brand image and the current image, the brand should have a clear vision as well as a good understanding of the target group and the value it creates for its target audience. The brand identity needs to be managed by communicating with the target audience authentically in the right channels, with relevant content. The dedication, the target group’s behavior and the ability to create valuable and relevant content determines the right tactics for social media personal branding.
Resumo:
The fragmentation patterns and mass spectra of some phenyl tin and -lead halide adducts with hexamethylphosphoramide are compared by subjecting them t~ electron impact and fast atom bombardment ionization in a mass spectrometer. This comparison is restricted to the metal-containing ions. Ligand-exchange mechanisms of some of the metal-containing species are explored by FAB-MS. Several moisturesensitive organo-metallics and H-bonded systems have been examined by FAB for attempted characterization, but without any success. Scavenging and trapping of water molecules by complex aggregates in solutions of quaternary ammonium fluorides and hydroxides are investigated by FAB to complement previous NMR-studies.
Resumo:
Systems such as MF/diol (M = alkali metal) and }1F/carboxylic acid were subjected to IH, I9F and 13C nmr study to investigate the nature of the very strong H-bonding of fluoride ions with these systems. Evidence indicates a strong H-bond in diol-fluoride systems (~H ~ -(56) kJ mol-I) which is stronger than most 'typical' H-bonds (~H = -(12-40) kJ mol-I), but weaker than that reported for carboxylic acid-fluoride systems (~H ~ -(120) kJ mol-I). Approximate fluoride H-bonded shifts (o(OH)OHF) were evaluated for MF/diol systems from IH chemical shift measurements. No direct correlation was observed between I9F chemical shift and H-bond strength. Thermodynamic parameters were calculated from temperature dependent IH and 19F shifts. Preliminary studies of BUn 4NF-acetylacetone by I9F nmr were conducted at low temperatures and a possible Jmax (ca. 400 Hz) is reported for the fluoride ion H-bonded to acetylacetone. Highfield shift for non-protonated carbons and downfield shift for protonated carbons were observed in carboxylic acid/KF systems. Significant decreas$in I3C TI due to strong H-bonding to fluoride ions were also detected in both diol and carboxylic acid systems. Anomalous results were obtained, such as increasing NOE with increasing temperature in neat 1,2-ethanediol (values above the theoretical maximum of 1.988) and in 1,2-ethanediol/KF. The large 13C NOE's for carboxy carbons in neat carboxylic acids which are. further enhanced by the addition of KF are also unusual.
Resumo:
The preparation of phenacyl and para-phenylphenacyl esters, the reactions of carboxylic acids, phenols, 2-nitropropane and alcohols with alkyl halides in the presence of fluoride anion are described. The reactions are thought to be accelerated by the formation of hydrogen bonds between the fluoride anion and the organic electron acceptor. The fluoride ,carboxylic acids, fluoride-phenols and fluoride-2-nitropropane are better reaction systems than the fluoride-alcohol. The source of the fluoride anion and the choice of solvents are also discussed.
Resumo:
Reactions of 5,6- and 4,5-epoxycholestane derivatives with strong bases were investigated. Epoxidation of 3a-acetoxycholest-5-ene also gave a new compound along with the anticipated epoxides. Interconversions of the latter were observed. Some possible mechanisms of its formation and rearrangements have been pIioposed. No reaction was observed with any of the 5,6- and 4,5-steroidal epoxides employed in the present study, using potassium tertiary butoxide under refluxing conditions. n-Butyllithium reacted only with 5,6-epoxycholestanes bearing a ketal moiety at the C3 carbon. Opening of the ketal group was observed with n-butyllithium in the case of a ~-epoxide. The reaction was also investigated in the absence of epoxide functionality. A possible mechanism for the opening of ketal group has been proposed. Lithium diethylamide (LDEA) was found effective in rearranging 5,6- and 4,5-epoxides to their ~orresponding allylic alcohols. These rearrangements presumably proceed via syn-eliminations, however the possibility of a corresponding anti-elimination has not been eliminated. A substituent effect of various functional groups (R = H, OH, OCH2CH20) at C3 has-been observed on product distribution in the LDEApromoted rearrangements of the corresponding epoxides. No reaction of these epoxides was observed with lithium diisopropylamide (LDA) • In the second part of the project, several attempts were made towards the sYRthesis of deoxycorticoste~one~17,2l,2l~d3' a compound desirable for the 2l-dehydroxylation studies of deoxycorticosterone. Several routes were investigated, and some deuterium labelled pregnane derivatives were prepared in this regard. Microbial 21-hydroxylation of progesteronel7,21,21,2l- d4 by ~ niger led to loss of deuterium from C21 of the product. An effort was made to hydroxylate progesterone microbially under neutral condtions.
Resumo:
Présentation vulgarisée pour faire apparaitre le potentiel de transformation de service et de soutien de services communs d'une pareille infrastructure.
Resumo:
Les institutions juridiques ont été bâties autour des réalités connues depuis des millénaires, que nous appelons de nos jours des phénomènes du monde réel. Ces phénomènes retrouvent présentement un nouveau théâtre – le cyberespace, et les règles du droit font face au défi de s’approprier ce nouvel environnement. Entre autres, les technologies du cyberespace ont mis au monde divers moyens qui nous permettent de nous identifier et de manifester notre attitude envers les actes juridiques – des finalités qui ont été assurées de longue date par la signature manuscrite. Bien que ces nouveaux moyens aient mérité un nom similaire à leur contrepartie traditionnelle – l’appellation de signature électronique, ils restent des phénomènes dont la proximité avec la signature manuscrite est discutable. Force est de constater que le seul point commun entre les moyens classiques et électroniques de signer réside dans les fonctions qu’ils remplissent. C’est en se basant sur ces fonctions communes que le droit a adopté une attitude identique envers les moyens d’authentification traditionnels et électroniques et a accueilli ces derniers sous l’emprise de ses institutions. Cependant, ceci ne signifie pas que ces institutions se soient avérées appropriées et qu’elles ne demandent aucun ajustement. Un des buts de notre étude sera de mettre en relief les moyens d’adaptation qu’offre le droit pour réconcilier ces deux environnements. Ainsi, pour ajuster l’institution de la signature aux phénomènes électroniques, le droit s’est tourné vers le standard de fiabilité de la signature électronique. Le standard de fiabilité est un complément de l’institution juridique de signature qui ne se rapporte qu’à la signature électronique et dont cette étude démontrera les applications. Les composantes du standard de fiabilité qui occuperont un deuxième volet de notre étude représentent un ensemble de règles techniques liées à la signature électronique. Ainsi, comme le standard de fiabilité puise sa substance dans les propriétés de l’architecture du cyberespace, l’attitude du droit envers la signature électronique s’avère tributaire de la morphologie du cyberespace. Étant donné que les possibilités qui nous sont offertes par la technologie continue à déterminer la réglementation juridique, il est légitime de conclure que l’examen des tendances dans l’évolution du cyberespace nous fournira un point de vue prospectif sur l’évolution des règles du droit.
Resumo:
Utilisant les plus récentes données recueillies par le détecteur ATLAS lors de collisions pp à 7 et 8 TeV au LHC, cette thèse établira des contraintes sévères sur une multitude de modèles allant au-delà du modèle standard (MS) de la physique des particules. Plus particulièrement, deux types de particules hypothétiques, existant dans divers modèles théoriques et qui ne sont pas présentes dans le MS, seront étudiés et sondés. Le premier type étudié sera les quarks-vectoriels (QV) produits lors de collisions pp par l’entremise de couplages électrofaibles avec les quarks légers u et d. On recherchera ces QV lorsqu’ils se désintègrent en un boson W ou Z, et un quark léger. Des arguments théoriques établissent que sous certaines conditions raisonnables la production simple dominerait la production en paires des QV. La topologie particulière des évènements en production simple des QV permettra alors la mise en oeuvre de techniques d’optimisation efficaces pour leur extraction des bruits de fond électrofaibles. Le deuxième type de particules recherché sera celles qui se désintègrent en WZ lorsque ces bosons de jauges W, et Z se désintègrent leptoniquement. Les états finaux détectés par ATLAS seront par conséquent des évènements ayant trois leptons et de l’énergie transverse manquante. La distribution de la masse invariante de ces objets sera alors examinée pour déterminer la présence ou non de nouvelles résonances qui se manifesterait par un excès localisé. Malgré le fait qu’à première vue ces deux nouveaux types de particules n’ont que très peu en commun, ils ont en réalité tous deux un lien étroit avec la brisure de symétrie électrofaible. Dans plusieurs modèles théoriques, l’existence hypothétique des QV est proposé pour annuler les contributions du quark top aux corrections radiatives de la masse du Higgs du MS. Parallèlement, d’autres modèles prédisent quant à eux des résonances en WZ tout en suggérant que le Higgs est une particule composite, chambardant ainsi tout le sector Higgs du MS. Ainsi, les deux analyses présentées dans cette thèse ont un lien fondamental avec la nature même du Higgs, élargissant par le fait même nos connaissances sur l’origine de la masse intrinsèque des particules. En fin de compte, les deux analyses n’ont pas observé d’excès significatif dans leurs régions de signal respectives, ce qui permet d’établir des limites sur la section efficace de production en fonction de la masse des résonances.
Resumo:
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.
Resumo:
In this paper we show that if the electrons in a quantum Hall sample are subjected to a constant electric field in the plane of the material, comparable in magnitude to the background magnetic field on the system of electrons, a multiplicity of edge states localized at different regions of space is produced in the sample. The actions governing the dynamics of these edge states are obtained starting from the well-known Schrödinger field theory for a system of nonrelativistic electrons, where on top of the constant background electric and magnetic fields, the electrons are further subject to slowly varying weak electromagnetic fields. In the regions between the edges, dubbed as the "bulk," the fermions can be integrated out entirely and the dynamics expressed in terms of a local effective action involving the slowly varying electromagnetic potentials. It is further shown how the bulk action is gauge noninvariant in a particular way, and how the edge states conspire to restore the U(1) electromagnetic gauge invariance of the system. In the edge action we obtain a heretofore unnoticed gauge-invariant term that depends on the particular edge. We argue that this term may be detected experimentally as different edges respond differently to a monochromatic probe due to this term
Resumo:
Biometrics deals with the physiological and behavioral characteristics of an individual to establish identity. Fingerprint based authentication is the most advanced biometric authentication technology. The minutiae based fingerprint identification method offer reasonable identification rate. The feature minutiae map consists of about 70-100 minutia points and matching accuracy is dropping down while the size of database is growing up. Hence it is inevitable to make the size of the fingerprint feature code to be as smaller as possible so that identification may be much easier. In this research, a novel global singularity based fingerprint representation is proposed. Fingerprint baseline, which is the line between distal and intermediate phalangeal joint line in the fingerprint, is taken as the reference line. A polygon is formed with the singularities and the fingerprint baseline. The feature vectors are the polygonal angle, sides, area, type and the ridge counts in between the singularities. 100% recognition rate is achieved in this method. The method is compared with the conventional minutiae based recognition method in terms of computation time, receiver operator characteristics (ROC) and the feature vector length. Speech is a behavioural biometric modality and can be used for identification of a speaker. In this work, MFCC of text dependant speeches are computed and clustered using k-means algorithm. A backpropagation based Artificial Neural Network is trained to identify the clustered speech code. The performance of the neural network classifier is compared with the VQ based Euclidean minimum classifier. Biometric systems that use a single modality are usually affected by problems like noisy sensor data, non-universality and/or lack of distinctiveness of the biometric trait, unacceptable error rates, and spoof attacks. Multifinger feature level fusion based fingerprint recognition is developed and the performances are measured in terms of the ROC curve. Score level fusion of fingerprint and speech based recognition system is done and 100% accuracy is achieved for a considerable range of matching threshold
Resumo:
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.
Resumo:
Biometrics is an efficient technology with great possibilities in the area of security system development for official and commercial applications. The biometrics has recently become a significant part of any efficient person authentication solution. The advantage of using biometric traits is that they cannot be stolen, shared or even forgotten. The thesis addresses one of the emerging topics in Authentication System, viz., the implementation of Improved Biometric Authentication System using Multimodal Cue Integration, as the operator assisted identification turns out to be tedious, laborious and time consuming. In order to derive the best performance for the authentication system, an appropriate feature selection criteria has been evolved. It has been seen that the selection of too many features lead to the deterioration in the authentication performance and efficiency. In the work reported in this thesis, various judiciously chosen components of the biometric traits and their feature vectors are used for realizing the newly proposed Biometric Authentication System using Multimodal Cue Integration. The feature vectors so generated from the noisy biometric traits is compared with the feature vectors available in the knowledge base and the most matching pattern is identified for the purpose of user authentication. In an attempt to improve the success rate of the Feature Vector based authentication system, the proposed system has been augmented with the user dependent weighted fusion technique.
Resumo:
Die Ionisation von H2 in intensiven Laserpulsen wird mit Hilfe der numerischen Integration der zeitabhängigen Schrödingergleichung für ein Einelektronenmodell untersucht, das die Vibrationsbewegung berücksichtigt. Die Spektren der kinetischen Elektronenenergie hängen stark von der Vibrationsquantenzahl des erzeugten H2+ Ions ab. Für bestimmte Vibrationszustände ist die Ausbeute der Elektronen in der Mitte des Plateaus stark erhöht. Der Effekt wird "channel closings" zugeschrieben, die in Atomen durch Variation der Laserintensität beobachtet wurden. The ionization of H2 in intense laser pulses is studied by numerical integration of the time-dependent Schrödinger equation for a single-active-electron model including the vibrational motion. The electron kinetic energy spectra in high-order above-threshold ionization are strongly dependent on the vibrational quantum number of the created H2+ ion. For certain vibrational states, the electron yield in the mid-plateau region is strongly enhanced. The effect is attributed to channel closings, which were previously observed in atoms by varying the laser intensity.