889 resultados para internet use
Resumo:
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.
Resumo:
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.
Resumo:
The focus of this work is to provide authentication and confidentiality of messages in a swift and cost effective manner to suit the fast growing Internet applications. A nested hash function with lower computational and storage demands is designed with a view to providing authentication as also to encrypt the message as well as the hash code using a fast stream cipher MAJE4 with a variable key size of 128-bit or 256-bit for achieving confidentiality. Both nested Hash function and MAJE4 stream cipher algorithm use primitive computational operators commonly found in microprocessors; this makes the method simple and fast to implement both in hardware and software. Since the memory requirement is less, it can be used for handheld devices for security purposes.
Resumo:
Developments in the statistical analysis of compositional data over the last two decades have made possible a much deeper exploration of the nature of variability, and the possible processes associated with compositional data sets from many disciplines. In this paper we concentrate on geochemical data sets. First we explain how hypotheses of compositional variability may be formulated within the natural sample space, the unit simplex, including useful hypotheses of subcompositional discrimination and specific perturbational change. Then we develop through standard methodology, such as generalised likelihood ratio tests, statistical tools to allow the systematic investigation of a complete lattice of such hypotheses. Some of these tests are simple adaptations of existing multivariate tests but others require special construction. We comment on the use of graphical methods in compositional data analysis and on the ordination of specimens. The recent development of the concept of compositional processes is then explained together with the necessary tools for a staying- in-the-simplex approach, namely compositional singular value decompositions. All these statistical techniques are illustrated for a substantial compositional data set, consisting of 209 major-oxide and rare-element compositions of metamorphosed limestones from the Northeast and Central Highlands of Scotland. Finally we point out a number of unresolved problems in the statistical analysis of compositional processes
Resumo:
In human Population Genetics, routine applications of principal component techniques are often required. Population biologists make widespread use of certain discrete classifications of human samples into haplotypes, the monophyletic units of phylogenetic trees constructed from several single nucleotide bimorphisms hierarchically ordered. Compositional frequencies of the haplotypes are recorded within the different samples. Principal component techniques are then required as a dimension-reducing strategy to bring the dimension of the problem to a manageable level, say two, to allow for graphical analysis. Population biologists at large are not aware of the special features of compositional data and normally make use of the crude covariance of compositional relative frequencies to construct principal components. In this short note we present our experience with using traditional linear principal components or compositional principal components based on logratios, with reference to a specific dataset
Resumo:
In 2000 the European Statistical Office published the guidelines for developing the Harmonized European Time Use Surveys system. Under such a unified framework, the first Time Use Survey of national scope was conducted in Spain during 2002– 03. The aim of these surveys is to understand human behavior and the lifestyle of people. Time allocation data are of compositional nature in origin, that is, they are subject to non-negativity and constant-sum constraints. Thus, standard multivariate techniques cannot be directly applied to analyze them. The goal of this work is to identify homogeneous Spanish Autonomous Communities with regard to the typical activity pattern of their respective populations. To this end, fuzzy clustering approach is followed. Rather than the hard partitioning of classical clustering, where objects are allocated to only a single group, fuzzy method identify overlapping groups of objects by allowing them to belong to more than one group. Concretely, the probabilistic fuzzy c-means algorithm is conveniently adapted to deal with the Spanish Time Use Survey microdata. As a result, a map distinguishing Autonomous Communities with similar activity pattern is drawn. Key words: Time use data, Fuzzy clustering; FCM; simplex space; Aitchison distance
Resumo:
"Internet for Image Searching" is a free online tutorial to help staff and students in universities and colleges to find digital images for their learning and teaching. The emphasis of the tutorial is on finding copyright cleared images which are available free; facilitating quick, hassle-free access to a vast range of online photographs and other visual resources. "This tutorial is an excellent resource for anyone needing to know more about where and how to find images online. The fact that it concentrates on copyright cleared images will make it even more valuable for busy learning and teaching professionals, researchers and students alike. It will also serve to inspire confidence in those needing to use images from the web in their work." (Sharon Waller of the Higher Education Academy).
Resumo:
En este artículo se describen y analizan los resultados de un estudio exploratorio sobre el uso de Internet -más concretamente el World Wide Web (WWW)- por parte de un grupo de estudiantes universitarios para documentarse a la hora de desarrollar tareas académicas. Los datos -obtenidos a través de un cuestionario auto-administrado - ponen de manifiesto la escasa competencia de este alumnado para la búsqueda y manejo de información contenida en el ciberespacio.
Resumo:
IBM provide a comprehensive academic initiative, (http://www-304.ibm.com/ibm/university/academic/pub/page/academic_initiative) to universities, providing them free of charge access to a wide range of IBM Software. As part of this initiative we are currently offering free IBM Bluemix accounts, either to be used within a course, or for students to use for personal skills development. IBM Bluemix provides a comprehensive cloud based platform as a service solution set which includes the ability to quickly and easily integrate data from devices from Internet of Things ( IoT) solutions to develop and run productive and user focused web and mobile applications. If you would be interested in hearing more about IBM and Internet of Things or you would like to discuss prospective research projects that you feel would operate well in this environment, please come along to the seminar!
Resumo:
The incursion of Internet has created new forms of information and communication. As a result, today’s generation is culturally socialized by the influence of information and communication technologies in their various forms. This has generated a series of characteristics of social and cultural behaviour which are derivative of didactic, academic or recreational use. Nevertheless the use of the Internet from an early age represents not only a useful educational tool; it can constitute a great danger when it is used to access contents unsuitable for their adaptive development. Accordingly, it is necessary to study the legal regulation of internet content and to evaluate how such regulation may affect rights. Further, it is also important to study of the impact and use of this technological tool at level of the familiar unit, to understand better how it can suggest appropriate social mechanisms for the constructive use of Internet. The present investigation involves these two aspects with the purpose of uniting the legal and social perspective in a joint analysis that allows one more a more integral vision of this problem of great interest at the global level.
Resumo:
Este estudio mide el efecto del uso del Internet en el crecimiento de pequeñas y medianas empresas (PYMES) en el contexto empresarial de una economía emergente. Se revisan estudios empíricos sobre el uso de Internet en PYMES y se describen factores que pueden tener una influencia en el uso del Internet y de su efecto en el crecimiento. Con una muestra de PYMES en México se contrasta el modelo de investigación usando ecuaciones estructurales. El efecto total del uso del Internet en el crecimiento de la muestra se considera plausible, con un porcentaje de varianza que explica el crecimiento en un 47%. El estudio sugiere algunas implicaciones para la teoría y para la gestión.
Resumo:
Este artículo se propone analizar la manera en que se reubica la información de los medios en el contexto de los cambios tecnológicos y sociales que se han producido en el ámbito periodístico en Colombia, en general en Bogotá, en particular un caso específico de violencia contra la mujer; el caso escogido para el análisis es el de María Camila Sánchez, víctima de acoso sexual en Transmilenio en Julio de 2014, cuando se dirigía de regreso a su casa. Se espera proporcionar a partir del caso estudiado, nuevas miradas sobre el tema y aportar al conocimiento del periodismo sobre el fenómeno de intersección entre la información que se presenta en las redes sociales y que logra posicionarse en un lugar privilegiado en los medios de comunicación nacional. Facebook y Twitter son algunas las redes sociales en Internet que acaparan el interés de los colombianos como lo demuestra señala la más reciente “Encuesta de Calidad de Vida” del Departamento Administrativo Nacional de Estadística (DANE, 2014) de Colombia, que asegura que el 63,81 por ciento de los usuarios que accedieron a internet y redes sociales, lo hicieron desde cualquier lugar o dispositivo móvil y su aplicación móvil. En este contexto, el caso de María Camila permite analizar la vinculación actual de las redes sociales en la construcción de la agenda mediática, bajo la mirada de la teoría agenda setting, desarrollada por Maxwell McCombs.
Resumo:
Permite al lector apreciar cómo se usan las riquezas naturales y como punto de partida para el aprendizaje de las propiedades y sobre cuáles son algunos de los usos del agua: para beber, lavar, jugar, cultivar. Para la energía, el transporte, la refrigeración. De donde viene. Cómo se recicla. Por qué no utilizar agua en lugar de gasolina. El agua y el medio ambiente. Describe la forma en que no se debe utilizar. Tiene glosario, bibliografía y direcciones de Internet.
Resumo:
Para apreciar cómo se usan las riquezas naturales y como punto de partida para el aprendizaje de las propiedades y sobre cuáles son algunos de los usos de la madera: combustible, construcción, mobiliario, decoración, tableros, papel, barcos. Cómo se preserva de la humedad. El carbón vegetal y el medio ambiente. Describe la forma en que no se debe utilizar. Tiene glosario, bibliografía y direcciones de Internet.
Resumo:
Para apreciar cómo se usan las riquezas naturales y como punto de partida para el aprendizaje de las propiedades y sobre cuáles son algunos de los usos delas rocas : paredes, caminos, superficies, decoración. Arena y vidrio, rocas y cerámica, piedras preciosas, productos químicos y minerales. Describe la forma en que no se debe utilizar. Tiene glosario, bibliografía y direcciones de Internet.