938 resultados para Security, usability, digital signature
Resumo:
Despite the long history of Muslims in Russia, most scholarly and political literatures on Russia’s Islam still narrowly interpret Muslim-Slavs relations in an ethnic-religious oppositional framework. In my work, I examine Russia’s discourse on Islam to argue that, in fact, the role of Islam in post-Soviet Russia is complex. Drawing from direct sources from academic, state, journalistic, and underground circles, often neglected by Western commentators, I identify ideational patterns in conceptualizations of Islam and reconstruct relational networks among authors. To explain complex intertextual relations within specific contexts, I utilize an analytically eclectic method that appropriately combines theories from different paradigms and/or disciplines. Thanks to my multi-dimensional approach, I show that, contrary to traditional views, Russia’s Muslims participate in processes of post-Soviet Russia’s identity formation. Starting from textual contents, avoiding pre-formed analytical frames, I argue that many Muslims in Russia perceive themselves as part of Russian civilization – even when they challenge the status-quo. Building on my initial findings, I state that a key element in Russia’s conceptualization of Islam is the definition, elaborated in the 1990s, of traditional Islam as part of Russian civilizational history, as opposed to extremist Islam as extraneous, hostile phenomenon. The differentiation creates an unprecedently safe, if confined, space for Islamic propositions, of which Muslims are taking advantage. Embedded in debates on Russian civilization, conceptualizations of Islam, then, influence Russia’s (geo)political self-perceptions and, consequently, its domestic and international policies. In particular, Russian so-far neglected Islamic doctrine supports views of Islamic terrorism as a political and not religious phenomenon. Hence, Russia interprets both terrorism and counterterrorism within its own historical tradition, causing its strategy to be at odds with Western views. Less apparently, these divergences affect Russian-U.S. broader relations. Finally, in revealing the civilizational value of Russia’s Islam, I expose intellectual relations among influential subjects who share the aim to devise a new civilizational model that should combine Slavic and non-Slavic, Orthodox and Islamic, Western, and Asian components. In this old Russian dilemma, the novelty is Muslims’ participation.
Resumo:
Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.
Resumo:
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.
Resumo:
Today, over 15,000 Ion Mobility Spectrometry (IMS) analyzers are employed at worldwide security checkpoints to detect explosives and illicit drugs. Current portal IMS instruments and other electronic nose technologies detect explosives and drugs by analyzing samples containing the headspace air and loose particles residing on a surface. Canines can outperform these systems at sampling and detecting the low vapor pressure explosives and drugs, such as RDX, PETN, cocaine, and MDMA, because these biological detectors target the volatile signature compounds available in the headspace rather than the non-volatile parent compounds of explosives and drugs. In this dissertation research volatile signature compounds available in the headspace over explosive and drug samples were detected using SPME as a headspace sampling tool coupled to an IMS analyzer. A Genetic Algorithm (GA) technique was developed to optimize the operating conditions of a commercial IMS (GE Itemizer 2), leading to the successful detection of plastic explosives (Detasheet, Semtex H, and C-4) and illicit drugs (cocaine, MDMA, and marijuana). Short sampling times (between 10 sec to 5 min) were adequate to extract and preconcentrate sufficient analytes (> 20 ng) representing the volatile signatures in the headspace of a 15 mL glass vial or a quart-sized can containing ≤ 1 g of the bulk explosive or drug. Furthermore, a research grade IMS with flexibility for changing operating conditions and physical configurations was designed and fabricated to accommodate future research into different analytes or physical configurations. The design and construction of the FIU-IMS were facilitated by computer modeling and simulation of ion’s behavior within an IMS. The simulation method developed uses SIMION/SDS and was evaluated with experimental data collected using a commercial IMS (PCP Phemto Chem 110). The FIU-IMS instrument has comparable performance to the GE Itemizer 2 (average resolving power of 14, resolution of 3 between two drugs and two explosives, and LODs range from 0.7 to 9 ng). The results from this dissertation further advance the concept of targeting volatile components to presumptively detect the presence of concealed bulk explosives and drugs by SPME-IMS, and the new FIU-IMS provides a flexible platform for future IMS research projects.
Resumo:
The purpose of the research is to study the relationship between international drug interdiction policies and domestic politics in fragile democracies, and to demonstrate how international drug control policies and the use of force fit the rhetoric of war, are legitimized by the principles of a just war, but may also cause collateral damage and negative unintended consequences. The method used is a case study of the Dominican Republic. The research has found that international drug control regimes, primarily led by the U.S. and narrowly focused on interdiction, have influenced an increasingly militarized approach to domestic law enforcement in the Dominican Republic. The collateral damage caused by militarized enforcement comes in the form of negative perceptions of citizen security, loss of respect for the rule of law and due process, and low levels of civil society development. The drug war has exposed the need for significant reform of the institutions charged with carrying out enforcement, the police force and the judicial system in particular. The dissertation concludes that the extent of drug trafficking in the Dominican Republic is beyond the scope of domestic reform efforts alone, but that the programs implemented do show some potential for future success. The dissertation also concludes that the framework of warfare is not the most appropriate for the international problems of drug traffic and abuse. A broader, multipronged approach should be considered by world policy makers in order to address all conditions that allow drugs to flourish without infringing upon democratic and civil rights in the process.
Resumo:
In a post-Cold War, post-9/11 world, the advent of US global supremacy resulted in the installation, perpetuation, and dissemination of an Absolutist Security Agenda (hereinafter, ASA). The US ASA explicitly and aggressively articulates and equates US national security interests with the security of all states in the international system, and replaced the bipolar, Cold War framework that defined international affairs from 1945-1992. Since the collapse of the USSR and the 11 September 2001 terrorist attacks, the US has unilaterally defined, implemented, and managed systemic security policy. The US ASA is indicative of a systemic category of knowledge (security) anchored in variegated conceptual and material components, such as morality, philosophy, and political rubrics. The US ASA is based on a logic that involves the following security components: 1., hyper militarization, 2., intimidation, 3., coercion, 4., criminalization, 5., panoptic surveillance, 6., plenary security measures, and 7., unabashed US interference in the domestic affairs of select states. Such interference has produced destabilizing tensions and conflicts that have, in turn, produced resistance, revolutions, proliferation, cults of personality, and militarization. This is the case because the US ASA rests on the notion that the international system of states is an extension, instrument of US power, rather than a system and/or society of states comprised of functionally sovereign entities. To analyze the US ASA, this study utilizes: 1., official government statements, legal doctrines, treaties, and policies pertaining to US foreign policy; 2., militarization rationales, budgets, and expenditures; and 3., case studies of rogue states. The data used in this study are drawn from information that is publicly available (academic journals, think-tank publications, government publications, and information provided by international organizations). The data supports the contention that global security is effectuated via a discrete set of hegemonic/imperialistic US values and interests, finding empirical expression in legal acts (USA Patriot ACT 2001) and the concept of rogue states. Rogue states, therefore, provide test cases to clarify the breadth, depth, and consequentialness of the US ASA in world affairs vis-a-vis the relationship between US security and global security.
Resumo:
Computing devices have become ubiquitous in our technologically-advanced world, serving as vehicles for software applications that provide users with a wide array of functions. Among these applications are electronic learning software, which are increasingly being used to educate and evaluate individuals ranging from grade school students to career professionals. This study will evaluate the design and implementation of user interfaces in these pieces of software. Specifically, it will explore how these interfaces can be developed to facilitate the use of electronic learning software by children. In order to do this, research will be performed in the area of human-computer interaction, focusing on cognitive psychology, user interface design, and software development. This information will be analyzed in order to design a user interface that provides an optimal user experience for children. This group will test said interface, as well as existing applications, in order to measure its usability. The objective of this study is to design a user interface that makes electronic learning software more usable for children, facilitating their learning process and increasing their academic performance. This study will be conducted by using the Adobe Creative Suite to design the user interface and an Integrated Development Environment to implement functionality. These are digital tools that are available on computing devices such as desktop computers, laptops, and smartphones, which will be used for the development of software. By using these tools, I hope to create a user interface for electronic learning software that promotes usability while maintaining functionality. This study will address the increasing complexity of computing software seen today – an issue that has risen due to the progressive implementation of new functionality. This issue is having a detrimental effect on the usability of electronic learning software, increasing the learning curve for targeted users such as children. As we make electronic learning software an integral part of educational programs in our schools, it is important to address this in order to guarantee them a successful learning experience.
Resumo:
The organizational authority of the Papacy in the Roman Catholic Church and the permanent membership of the UN Security Council are unique from institutions that are commonly compared with the UN, like the Concert of Europe and the League of Nations, in that these institutional organs possessed strong authoritative and veto powers. Both organs also owe their strong authority during their founding to a need for stability: The Papacy after the crippling of Western Roman Empire and the P-5 to deal with the insecurities of the post-WWII world. While the P-5 still possesses similar authoritative powers within the Council as it did after WWII, the historical authoritative powers of the Papacy within the Church was debilitated to such a degree that by the time of the Reformation in Europe, condemnations of practices within the Church itself were not effective. This paper will analyze major challenges to the authoritative powers of the Papacy, from the crowning of Charlemagne to the beginning of the Reformation, and compare the analysis to challenges affecting the authoritative powers of the P-5 since its creation. From research conducted thus far, I hypothesize that common themes affecting the authoritative powers of the P-5 and the Papacy would include: major changes in the institutions organization (i.e. the Avignon Papacy and Japan’s bid to become a permanent member); the decline in power of actors supporting the institutional organ (i.e. the Holy Roman Empire and the P-5 members); and ideological clashes affecting the institution’s normative power (i.e. the Great Western Schism and Cold War politics).
Resumo:
Computing devices have become ubiquitous in our technologically-advanced world, serving as vehicles for software applications that provide users with a wide array of functions. Among these applications are electronic learning software, which are increasingly being used to educate and evaluate individuals ranging from grade school students to career professionals. This study will evaluate the design and implementation of user interfaces in these pieces of software. Specifically, it will explore how these interfaces can be developed to facilitate the use of electronic learning software by children. In order to do this, research will be performed in the area of human-computer interaction, focusing on cognitive psychology, user interface design, and software development. This information will be analyzed in order to design a user interface that provides an optimal user experience for children. This group will test said interface, as well as existing applications, in order to measure its usability. The objective of this study is to design a user interface that makes electronic learning software more usable for children, facilitating their learning process and increasing their academic performance. This study will be conducted by using the Adobe Creative Suite to design the user interface and an Integrated Development Environment to implement functionality. These are digital tools that are available on computing devices such as desktop computers, laptops, and smartphones, which will be used for the development of software. By using these tools, I hope to create a user interface for electronic learning software that promotes usability while maintaining functionality. This study will address the increasing complexity of computing software seen today – an issue that has risen due to the progressive implementation of new functionality. This issue is having a detrimental effect on the usability of electronic learning software, increasing the learning curve for targeted users such as children. As we make electronic learning software an integral part of educational programs in our schools, it is important to address this in order to guarantee them a successful learning experience.
Resumo:
The organizational authority of the Papacy in the Roman Catholic Church and the permanent membership of the UN Security Council are unique from institutions that are commonly compared with the UN, like the Concert of Europe and the League of Nations, in that these institutional organs possessed strong authoritative and veto powers. Both organs also owe their strong authority during their founding to a need for stability: The Papacy after the crippling of Western Roman Empire and the P-5 to deal with the insecurities of the post-WWII world. While the P-5 still possesses similar authoritative powers within the Council as it did after WWII, the historical authoritative powers of the Papacy within the Church was debilitated to such a degree that by the time of the Reformation in Europe, condemnations of practices within the Church itself were not effective. This paper will analyze major challenges to the authoritative powers of the Papacy, from the crowning of Charlemagne to the beginning of the Reformation, and compare the analysis to challenges affecting the authoritative powers of the P-5 since its creation. From research conducted thus far, I hypothesize that common themes affecting the authoritative powers of the P-5 and the Papacy would include: major changes in the institutions organization (i.e. the Avignon Papacy and Japan’s bid to become a permanent member); the decline in power of actors supporting the institutional organ (i.e. the Holy Roman Empire and the P-5 members); and ideological clashes affecting the institution’s normative power (i.e. the Great Western Schism and Cold War politics).
Resumo:
Nowadays the Distance Learning (DL) is in its fifth generation and New Information and Communication Technologies (NICT) mediate it. In this technological context it is then called Distance e-Learning (DeL). DeL has also in the e-books a potential interactive tool to the collaborative learning. So, this study was accomplished with the purpose of analyzing the e-books developed by SEDIS – Secretaria de Educação a Distância (Department of Distance Learning). This study was performed in two phases: Firstly it was done an exploratory study to check out the reading and the handling of digital e-learning material available to the student-users. These e-books are obtainable on SEDIS Moodle platform. Secondly, it was performed some analysis of an e-book sample by means of the heuristic evaluation. This research aims both to identify potential problems and give some suggestions to solve them. At last it is presented a final report with diagnosis and suggestions for a more applicable design in order to optimize the e-book by means of the distance e-learning usability guidelines
Resumo:
There are authentication models which use passwords, keys, personal identifiers (cards, tags etc) to authenticate a particular user in the authentication/identification process. However, there are other systems that can use biometric data, such as signature, fingerprint, voice, etc., to authenticate an individual in a system. In another hand, the storage of biometric can bring some risks such as consistency and protection problems for these data. According to this problem, it is necessary to protect these biometric databases to ensure the integrity and reliability of the system. In this case, there are models for security/authentication biometric identification, for example, models and Fuzzy Vault and Fuzzy Commitment systems. Currently, these models are mostly used in the cases for protection of biometric data, but they have fragile elements in the protection process. Therefore, increasing the level of security of these methods through changes in the structure, or even by inserting new layers of protection is one of the goals of this thesis. In other words, this work proposes the simultaneous use of encryption (Encryption Algorithm Papilio) with protection models templates (Fuzzy Vault and Fuzzy Commitment) in identification systems based on biometric. The objective of this work is to improve two aspects in Biometric systems: safety and accuracy. Furthermore, it is necessary to maintain a reasonable level of efficiency of this data through the use of more elaborate classification structures, known as committees. Therefore, we intend to propose a model of a safer biometric identification systems for identification.
Resumo:
This article analyses security discourses that are beginning to self-consciously take on board the shift towards the Anthropocene. Firstly, it sets out the developing episteme of the Anthropocene, highlighting the limits of instrumentalist cause-and-effect approaches to security, increasingly becoming displaced by discursive framings of securing as a process, generated through new forms of mediation and agency, capable of grasping inter-relations in a fluid context. This approach is the methodology of hacking: creatively composing and repurposing already existing forms of agency. It elaborates on hacking as a set of experimental practices and imaginaries of securing the Anthropocene, using as a case study the field of digital policy activism with the focus on community empowerment through social-technical assemblages being developed and applied in ‘the City of the Anthropocene’: Jakarta, Indonesia. The article concludes that policy interventions today cannot readily be grasped in modernist frameworks of ‘problem solving’ but should be seen more in terms of evolving and adaptive ‘life hacks’.
Resumo:
The Enred@te initiative, created by Red Cross, the Vodafone Foundation and the TECSOS Foundation, emerged as an evolution of a previous project that developed and piloted a video-communication solution with older adults, using a system installed in their own televisions. Following the success of this first initiative, it was decided to advance toward a more flexible, robust, easy-to-use and high-quality solution, producing a social network accessible through tablets. Older adults can use the network to video-communicate with other older adults and stay informed on various topics of interest. Additionally, a new innovation incorporates the participation of virtual volunteers, a part of the network that promotes its use in an inclusive and participative manner. This solution was also piloted in 2014 with positive results and work to turn it into a service that can reach older adults through the Red Cross is currently on-going.
Resumo:
In order to cope up with the ever increasing demand for larger transmission bandwidth, Radio over Fiber technology is a very beneficial solution. These systems are expected to play a major role within future fifth generation wireless networks due to their inherent capillary distribution properties. Nonlinear compensation techniques are becoming increasingly important to improve the performance of telecommunication channels by compensating for channel nonlinearities. Indeed, significant bounds on the technology usability and performance degradation occur due to nonlinear characteristics of optical transmitter, nonlinear generation of spurious frequencies, which, in the case of RoF links exploiting Directly Modulated Lasers , has the combined effect of laser chirp and optical fiber dispersion among its prevailing causes. The purpose of the research is to analyze some of the main causes of harmonic and intermodulation distortion present in Radio over Fiber (RoF) links, and to suggest a solution to reduce their effects, through a digital predistortion technique. Predistortion is an effective and interesting solution to linearize and this allows to demonstrate that the laser’s chirp and the optical fiber’s dispersion are the main causes which generate harmonic distortion. The improvements illustrated are only theoretical, based on a feasibility point of view. The simulations performed lead to significant improvements for short and long distances of radio over fiber link lengths. The algorithm utilized for simulation has been implemented on MATLAB. The effects of chirp and fiber nonlinearity in a directly modulated fiber transmission system are investigated by simulation, and a cost effective and rather simple technique for compensating these effects is discussed. A detailed description of its functional model is given, and its attractive features both in terms of quality improvement of the received signal, and cost effectiveness of the system are illustrated.