980 resultados para Socket.io


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Iron, aluminium and mixed iron aluminium pillared clays have been prepared by partial hydrolysis method and doped with IO% Mo, V and Cr. The samples have been characterised by XRD, FTIR and surface area and pore Volume measurements. The surface acid site distribution has been determined by temperature programmed desorption of ammonia. Vanadia incorporated systems show maximum acidity. Benzylation of o-xylene has been done as probe reaction to test catalytic activity. Benzyl chloride is a superior benzylating agent compared to benzyl alcohol in activity and selectivity. Cent percent selectivity towards monobenzylated product is obtained in all the cases. Fe pillared systems exhibit maximum activity. The catalytic activities of the systems can be correlated with the amount of strong add sites. The effects of various reaction variables on the reaction have been studied. Presence of moisture has a diminishing effect on the reaction rate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Internet today has become a vital part of day to day life, owing to the revolutionary changes it has brought about in various fields. Dependence on the Internet as an information highway and knowledge bank is exponentially increasing so that a going back is beyond imagination. Transfer of critical information is also being carried out through the Internet. This widespread use of the Internet coupled with the tremendous growth in e-commerce and m-commerce has created a vital need for infonnation security.Internet has also become an active field of crackers and intruders. The whole development in this area can become null and void if fool-proof security of the data is not ensured without a chance of being adulterated. It is, hence a challenge before the professional community to develop systems to ensure security of the data sent through the Internet.Stream ciphers, hash functions and message authentication codes play vital roles in providing security services like confidentiality, integrity and authentication of the data sent through the Internet. There are several ·such popular and dependable techniques, which have been in use widely, for quite a long time. This long term exposure makes them vulnerable to successful or near successful attempts for attacks. Hence it is the need of the hour to develop new algorithms with better security.Hence studies were conducted on various types of algorithms being used in this area. Focus was given to identify the properties imparting security at this stage. By making use of a perception derived from these studies, new algorithms were designed. Performances of these algorithms were then studied followed by necessary modifications to yield an improved system consisting of a new stream cipher algorithm MAJE4, a new hash code JERIM- 320 and a new message authentication code MACJER-320. Detailed analysis and comparison with the existing popular schemes were also carried out to establish the security levels.The Secure Socket Layer (SSL) I Transport Layer Security (TLS) protocol is one of the most widely used security protocols in Internet. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL I TLS. But recent attacks on RC4 and HMAC have raised questions about the reliability of these algorithms. Hence MAJE4 and MACJER-320 have been proposed as substitutes for them. Detailed studies on the performance of these new algorithms were carried out; it has been observed that they are dependable alternatives.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work aims to study the variation in subduction zone geometry along and across the arc and the fault pattern within the subducting plate. Depth of penetration as well as the dip of the Benioff zone varies considerably along the arc which corresponds to the curvature of the fold- thrust belt which varies from concave to convex in different sectors of the arc. The entire arc is divided into 27 segments and depth sections thus prepared are utilized to investigate the average dip of the Benioff zone in the different parts of the entire arc, penetration depth of the subducting lithosphere, the subduction zone geometry underlying the trench, the arctrench gap, etc.The study also describes how different seismogenic sources are identified in the region, estimation of moment release rate and deformation pattern. The region is divided into broad seismogenic belts. Based on these previous studies and seismicity Pattern, we identified several broad distinct seismogenic belts/sources. These are l) the Outer arc region consisting of Andaman-Nicobar islands 2) the back-arc Andaman Sea 3)The Sumatran fault zone(SFZ)4)Java onshore region termed as Jave Fault Zone(JFZ)5)Sumatran fore arc silver plate consisting of Mentawai fault(MFZ)6) The offshore java fore arc region 7)The Sunda Strait region.As the Seismicity is variable,it is difficult to demarcate individual seismogenic sources.Hence, we employed a moving window method having a window length of 3—4° and with 50% overlapping starting from one end to the other. We succeeded in defining 4 sources each in the Andaman fore arc and Back arc region, 9 such sources (moving windows) in the Sumatran Fault zone (SFZ), 9 sources in the offshore SFZ region and 7 sources in the offshore Java region. Because of the low seismicity along JFZ, it is separated into three seismogenic sources namely West Java, Central Java and East Java. The Sunda strait is considered as a single seismogenic source.The deformation rates for each of the seismogenic zones have been computed. A detailed error analysis of velocity tensors using Monte—Carlo simulation method has been carried out in order to obtain uncertainties. The eigen values and the respective eigen vectors of the velocity tensor are computed to analyze the actual deformation pattem for different zones. The results obtained have been discussed in the light of regional tectonics, and their implications in terms of geodynamics have been enumerated.ln the light of recent major earthquakes (26th December 2004 and 28th March 2005 events) and the ongoing seismic activity, we have recalculated the variation in the crustal deformation rates prior and after these earthquakes in Andaman—Sumatra region including the data up to 2005 and the significant results has been presented.ln this chapter, the down going lithosphere along the subduction zone is modeled using the free air gravity data by taking into consideration the thickness of the crustal layer, the thickness of the subducting slab, sediment thickness, presence of volcanism, the proximity of the continental crust etc. Here a systematic and detailed gravity interpretation constrained by seismicity and seismic data in the Andaman arc and the Andaman Sea region in order to delineate the crustal structure and density heterogeneities a Io nagnd across the arc and its correlation with the seismogenic behaviour is presented.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The present study was undsrtaken.with the objectives to assess the distribution and density of population of benthic animals with special reference to macrofauna from the south west coast of India from ' Malippursa 1 in the north to Alleppey in the south, to evaluate significant difference, if any, in the number and distribution of animals in th md bank regions and other intermittent stations, to examine the influence of bottom stability on the distribution of fauna, to observe the effect of the environmental parameters on the distribution pattern of nacrofauna, and to evaluate the nature and depthpwise distribution of the benthic fishery. The region selected for the investigation is one of the nest important fishing grounds in India for bottom fishing especially for prawns, covering a distance of about 60 kns in length.total number of thirty stations in five transects at right angles to the coast, each consisting of six stations were surveyed. The six stations in a transect were at depths of 5 m, 10m, 20:, 30:, 35m and 45m respectively formation of the Iudbanke, popularly known as 'Ghaknra' in the local language, is a peculiar phenomenon along the ooaet of Kerala and provides a good fishing ground.quantitative distribution of the mecrofauna chewed that the maximum number of organism was near the 35 n contour line in the first three profiles whereas in the fourth and fifth profiles it was at 20 n and 30 m depth respectively. The density of the fauna wee comparatively poor in shallow water etatione at depths 5-‘IO M.was a general decline in the numerical abundance and biomass of the bottom fauna in all the stations during the monsoon period. There has been very little yearly change in the composition of the fauna during the two years‘ study.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It became so usual for the east coast of India to face at least IO to 15 cyclones every year, out of which 3 to 4 may reach the deep depression stage. As a result the east coast of India experiences frequent heavy damages of varying intensities due to storm surges and it is also not unusual to experience a calamitous deluge once in a decade or so. Loss of life and damages can be minimized only if the magnitude of the surge could be predicted at least a day in advance. Therefore, an attempt to study the storm surges generated by the cyclones that strike the east coast of India and. suggest a method of predicting them through nomogram is made

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Developments in laser technology over the past few years have made it possible to do experiments with focused intensities of IO"-102' Wcm'z. Short-pulse high-intensity lasers are able to accelerate protons and heavier ions to multi-MeV energies during their interaction with solid targets, gas jets and clusters. When such a laser radiation is focused at the intensity above 10” Wcm'2, local electric field strength will be almost equivalent to that within an atom. Hence, new nonlinear optical phenomena will be expected in the field of light matter interaction. Most of the research in the material interaction using high power lasers, especially related to plasma interaction, has been directed to the short pulse x-ray generation- Nanosecond laser interactions with solid targets also generate plasmas which emit radiation mainly in the optical region, the understanding of which is far from satisfactory. This thesis deals with a detailed study of some of the dynamical processes in plasmas generated by nanosecond and femtosecond lasers

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A novel Acinetobacter sp. BTJR-IO isolated from highly acidic (pH 2.5-4.5) rubber latex centrifugation effluent with high COD (22000 rng/L) and BOD (5000 rng/L). This strain could effect 39.5% COD reduction on free cell inoculation of effluent without incorporation of additional nutrients after 8 days. CalciLnn alginate irrmobilized cells showed 16.4% and 25% COD reduction after 6 hra, without aeration and after 1 hr. with mild aeration under batch process respectively. Whereas 44.0% COD reduction could be achieved after 6 hrs. on continuous treatment in a packed bed reactor with mild aeration. Further, even after 3 cycles 37% COD reduction was recorded with continuous treatment

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Comment faire évoluer sa pratique professionnelle? Notre proposition s'intéresse à l'activité des professeurs des écoles confrontés à la volonté de l’institution (IO 2008) de renforcer la place du récit dans l'enseignement de l'histoire à l’école aux dépens de la pédagogie du « tout document » (IO 2002). De plus, excepté le lapidaire « par l’usage du récit », aucune précision supplémentaire n'est apportée quant aux modalités. Aussi modifier sa pratique professionnelle est-il problématique lorsque les textes officiels sont aussi peu explicites quant au fond et à la forme

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A partir del proyecto macro “Municipio Saludable y Polo de Desarrollo Local” se desarrolló un trabajo de campo en el Municipio de Sesquilé, centrado principalmente en el sector agrícola, en donde se identificaron ciertas características en el proceso de cultivo ejecutado por los agricultores de la zona. Dichas características dejan ver que se está subutilizando la capacidad de cultivos, así como la necesidad de cambio y/o diversificación de los productos cosechados, mostrándose esto último como una gran oportunidad para el crecimiento del sector y por ende una nueva forma de generación de empleos. Es importante resaltar que el sector tiene una gran capacidad para el crecimiento agrícola por todos los factores naturales con los que cuenta, por lo que la identificación de nuevas alternativas de cultivos podrían tomarse como ejemplo por otras zonas para su implementación, lo que permitiría fortalecer el sector en otros municipios de Cundinamarca y convertir a Sesquilé en unos de los municipios con mayor desarrollo agrícola.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El siguiente trabajo tiene como objetivo el Estado del arte acerca de la discusión teórica de la repercusión de la unión monetaria en el principio de soberanía nacional, específicamente el caso de Gran Bretaña, ya que éste es el único país que expresa abiertamente su incertidumbre referente a algún tipo de amenaza a su soberanía. Se pretende precisar si existen criterios concluyentes, o por el contrario determinar si no hay claridad con respecto al futuro de Gran Bretaña como miembro de la unión monetaria.A partir de lo anterior, se plantean como sus propósitos particulares construir un marco conceptual acerca de la soberanía. Este estado del arte se inicia con citas de los principales autores de finales de siglo XVII y XVIII y finaliza con las posiciones conceptuales aportadas por los teóricos modernos motivados por el nacimiento de la Unión Europea como un nuevo orden político. Entre las que se citan: modelo centrico o intergubernamentalista, modelo de gobernabilidad multi-nivel, modelo neo-funcionalista y modelo federalista. Igualmente, el trabajo, busca desarrollar un marco conceptual sobre Unión Monetaria y su evolución hasta el logro de una unión fiscal europea en el periodo de 1950-2010, establecer las relaciones teóricas entre Soberanía del Estado y Unión Monetaria y por último realizar un análisis histórico hermenéutico de la Unión Europea y el caso del Reino Unido de acuerdo a las relaciones evidenciadas en los apartados teóricos entre soberanía del Estado y Unión Monetaria.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Original material Taken from training material by the Open Data Institute. Later material from Keynote at Go Open!

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El trabajo es una de las actividades sobre las que se organizan las sociedades y por ello en los Estados modernos se incluye entre las responsabilidades de los poderes públicos el velar por la salud, seguridad e higiene en el trabajo. El reconocimiento del derecho de los trabajadores, en el ámbito laboral, a la protección de su salud y de su integridad, implica trabajar con seguridad y sin riesgos. En este estudio se describen los riesgos Psicosociales como: bienestar, satisfacción, y la calidad de vida laboral de los profesionales y trabajadores dentro de una organización y su relación con el clima organizacional, el cual hace relación al pensar, sentir y actuar de cada individuó para lograr un desempeño adecuado y eficiente dentro de la organización. Por lo tanto los factores de riesgo psicosocial y clima organizacional tienen una importancia significativa en la medida que permite conocer las condiciones al interior de las organizaciones que están afectando el ambiente laboral y como son percibidas por los trabajadores.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

For more than 60 years, Colombia has been suffering an internal conflict, full of a constant violence known today as terrorism. The actual government from President Alvaro Uribe Velez has been developing during his administration, strategies looking for better conditions for those who decide to give away the weapons over the process known as “Reinsercion” or “Reincorporacion” for all the terrorist groups in Colombia. During the investigation, specifically at the work field with the actors from the Reinsercion, through conversations during all the meetings done, where identified the internal and external variables from the surroundings that affected somehow the Reinsercion Process. 85% of the system variables are in the Zone of Conflict, where a big amount of them have some kind of influence over the others, but not all of them are in the zone of the strategic vari ables. This way, there are many front works, important decisions to be taken, awareness on the population to generate, so that all the steps that are to be done toward a solution, reach fruitful results. On the other hand, when analyzing the relation betwe en the actors, the terrorist groups have shown a strong level of convergence from the first moment on the investigation, it could be identify that through the strategic route, this actor confronts the objectives from the other actors of the system. Next, i t will be presented the 4 possible scenarios to happen in the process of Reinsercion in Colombia, and the one with more probability is describe. - Scenario 1: A new Horizon - Scenario 2: Unavoidable Renegotiations - Scenario 3: Everything keeps the same way As the group of experts expressed, this is the scenario with the mayor probability to happen, therefore, as people that have already given up the weapons, perceive the process as a strategy with a lots of difficulties because just a few of the promises that gave the government are really being accomplished. There hasn‟t been a real change in the political structure, and there may be 3 or 4 more governments more and the influence of the narcotrafic could maintain.