910 resultados para message rejection
Resumo:
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.
Resumo:
Design of a compact microstrip band reject filter is proposed. The device consists of an Open Loop Rectangular Resonator (OLRR) coupled to a microstrip line. The transmission line has a U-bend which enhances the coupling with the OLRR element and reduces the size of the filter. The filter can be made tunable by mounting variable capacitance to the system. Simulated and experimental results are presented.
Resumo:
The use of a split-ring resonator (SRR)-loaded waveguide for the design of a band-rejection filter with adjustable bandwidth is reported. The width of the stopband can be adjusted by suitably positioning the SRR array in the waveguide. The rejection band can be made very narrow by placing the array at the electric-field minimum. The stopband attenuation depends on the number of unit cells in the array.
Resumo:
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.
Resumo:
The focus of this work is to provide authentication and confidentiality of messages in a swift and cost effective manner to suit the fast growing Internet applications. A nested hash function with lower computational and storage demands is designed with a view to providing authentication as also to encrypt the message as well as the hash code using a fast stream cipher MAJE4 with a variable key size of 128-bit or 256-bit for achieving confidentiality. Both nested Hash function and MAJE4 stream cipher algorithm use primitive computational operators commonly found in microprocessors; this makes the method simple and fast to implement both in hardware and software. Since the memory requirement is less, it can be used for handheld devices for security purposes.
Resumo:
Diese Arbeit beschäftigt sich mit der grafischen Gestaltung von Mathematiklehrwerken und der damit verbundenen Wirkungen auf die SchülerInnen. Es wurde untersucht, welche Art von Gestaltungsaspekten in Schulbüchern eine positive Auswirkung auf die Lernmotivation hat. Im theoretischen Teil dieser Arbeit wird zunächst erläutert, wie der menschliche Wahrnehmungsapparat nach theoretischen Erkenntnissen aus der Wahrnehmungspsychologie visuelle Elemente wie Farbe und Form verarbeitet. Anhand gestaltpsychologischer und motivationspsychologischer Theorien werden mögliche Einflüsse und in diesem Zusammenhang bedeutungsvolle Aspekte aufgezeigt. Einzelne Funktionen und Wirkungsaspekte der einzelnen Medienbausteine wie Bild, Typografie und Bild-Text-Kombinationen werden anhand von Beispielen aus Mathematiklehrwerken dargestellt. Ein Exkurs über den vermehrten Einfluss der neuen Medien bei Kindern und Jugendlichen verdeutlicht, welche visuellen Medienerfahrungen Kinder und Jugendliche bei der Betrachtung eines Schulbuches mitbringen. Anschließend werden die erarbeiteten theoretischen Grundlagen in einer praktischen Arbeit genutzt. Eine exemplarisch ausgewählte Seite eines Mathematiklehrwerks werde unter verschiedenen gestalterischen Gesichtspunkten umgestaltet, so dass mehreren Varianten entstehen. Diese Entwürfe werden in einer qualitativen Studie mit einzelnen SchülerInnen diskutiert. Die Ergebnisse der aufgezeichneten Interviews wurden durch die Auswertungsmethode des zirkulären Dekonstruierens auf die aufgeworfenen Forschungsfragen untersucht und ausgewertet.
Resumo:
This thesis describes Optimist, an optimizing compiler for the Concurrent Smalltalk language developed by the Concurrent VLSI Architecture Group. Optimist compiles Concurrent Smalltalk to the assembly language of the Message-Driven Processor (MDP). The compiler includes numerous optimization techniques such as dead code elimination, dataflow analysis, constant folding, move elimination, concurrency analysis, duplicate code merging, tail forwarding, use of register variables, as well as various MDP-specific optimizations in the code generator. The MDP presents some unique challenges and opportunities for compilation. Due to the MDP's small memory size, it is critical that the size of the generated code be as small as possible. The MDP is an inherently concurrent processor with efficient mechanisms for sending and receiving messages; the compiler takes advantage of these mechanisms. The MDP's tagged architecture allows very efficient support of object-oriented languages such as Concurrent Smalltalk. The initial goals for the MDP were to have the MDP execute about twenty instructions per method and contain 4096 words of memory. This compiler shows that these goals are too optimistic -- most methods are longer, both in terms of code size and running time. Thus, the memory size of the MDP should be increased.
Resumo:
Fine-grained parallel machines have the potential for very high speed computation. To program massively-concurrent MIMD machines, programmers need tools for managing complexity. These tools should not restrict program concurrency. Concurrent Aggregates (CA) provides multiple-access data abstraction tools, Aggregates, which can be used to implement abstractions with virtually unlimited potential for concurrency. Such tools allow programmers to modularize programs without reducing concurrency. I describe the design, motivation, implementation and evaluation of Concurrent Aggregates. CA has been used to construct a number of application programs. Multi-access data abstractions are found to be useful in constructing highly concurrent programs.
Resumo:
Concurrent Smalltalk is the primary language used for programming the J- Machine, a MIMD message-passing computer containing thousands of 36-bit processors connected by a very low latency network. This thesis describes in detail Concurrent Smalltalk and its implementation on the J-Machine, including the Optimist II global optimizing compiler and Cosmos fine-grain parallel operating system. Quantitative and qualitative results are presented.
Resumo:
Postcolonial literature is often depicted as a form of cultural translation, a privileged space from which to rewrite history and retroactively reflect upon the colonial experience. Based on this notion of cultural translation, the article seeks to examine, respectively, Aimé Césaire’s Une Tempête (1969) and J. M. Coetzee’s Foe (1986) as regards the “written-back” characters Caliban and Friday. Both characters will be compared and contrasted concerning their peculiar use of language as an instrument of power, subversion, and rejection of the European ruling.
Resumo:
Empirical orthogonal function (EOF) analysis is a powerful tool for data compression and dimensionality reduction used broadly in meteorology and oceanography. Often in the literature, EOF modes are interpreted individually, independent of other modes. In fact, it can be shown that no such attribution can generally be made. This review demonstrates that in general individual EOF modes (i) will not correspond to individual dynamical modes, (ii) will not correspond to individual kinematic degrees of freedom, (iii) will not be statistically independent of other EOF modes, and (iv) will be strongly influenced by the nonlocal requirement that modes maximize variance over the entire domain. The goal of this review is not to argue against the use of EOF analysis in meteorology and oceanography; rather, it is to demonstrate the care that must be taken in the interpretation of individual modes in order to distinguish the medium from the message.