885 resultados para implicit authentication


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Langattomat lähiverkot ovat viime vuosikymmeninä saavuttaneet suuren suosion. Tässä työssä käsitellään käyttäjien todentamisjärjestelmän suunnittelua ja kehitystä langattomaan monioperaattoriverkkoon. Langattomassa monioperaattoriverkossa käyttäjillä on mahdollisuus käyttää eri operaattoreiden palveluita. Aluksi käsitellään olemassa olevia todentamismenetelmiä ja -järjestelmiä. minkä jälkeen kuvaillaan todentamisjärjestelmä langattomille monioperaattoriverkoille. Todentamisjärjestelmän ratkaisuvaihtoehtoja esitellään kaksi, niin sanotut moni- istunto - ja yksittäisistuntomalli. Moni-istuntomalli on normaali lähestymistapa käyttäjien todentamiseen tietokonejärjestelmissä. Siinä käyttäjän pitää tunnistautua ja todentaa itsensä jokaiselle verkon palvelulle erikseen. Yksittäisistuntomallissa pyritään parempaan luotettavuuteen ja käytettävyyteen. Siinä käyttäjä todentaa itsensä vain kerran ja voi sen jälkeen päästä useisiin palveluihin. Työn loppuosassa kuvaillaan suunnitellun järjestelmän toteutusta. Lisäksi ehdotetaan vaihtoehtoisia toteutustapoja, analysoidaan järjestelmän heikkouksia ja kerrotaan jatkokehitysmahdoillisuuksista.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many concepts have been developed to describe the convergence of media, languages, and formats in contemporary media systems. This article is a theoretical reflection on “transmedia storytelling” from a perspective that integrates semiotics and narratology in the context of media studies. After dealing with the conceptual chaos around transmedia storytelling, the article analyzes how these new multimodal narrative structures create different implicit consumers and construct a narrative world. The analysis includes a description of the multimedia textual structure created around the Fox television series 24. Finally, the article analyzes transmedia storytelling from the perspective of a semiotics of branding.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Phase encoded nano structures such as Quick Response (QR) codes made of metallic nanoparticles are suggested to be used in security and authentication applications. We present a polarimetric optical method able to authenticate random phase encoded QR codes. The system is illuminated using polarized light and the QR code is encoded using a phase-only random mask. Using classification algorithms it is possible to validate the QR code from the examination of the polarimetric signature of the speckle pattern. We used Kolmogorov-Smirnov statistical test and Support Vector Machine algorithms to authenticate the phase encoded QR codes using polarimetric signatures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless community networks became popular in uniting people with common interests. This thesis presents authentication and authorization service for a wireless community network using captive portal approach including ability to authenticate clients from associated networks thereby combining multiple communities in a syndicate. The system is designed and implemented to be reliable, scalable and flexible. Moreover, the result includes software management system, which automatically performs software updates at network’s access points. Future development of the system can be concentrated on an improvement of the software management system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Organic food products are highly susceptible to fraud. Currently, administrative controls are conducted to detect fraud, but having an analytical tool able to verify the organic identity of food would be very supportive. The state-of-the-art in food authentication relies on fingerprinting approaches that find characteristic analytical patterns to unequivocally identify authentic products. While wide research on authentication has been conducted for other commodities, the authentication of organic chicken products is still in its infancy. Challenges include finding fingerprints to discriminate organic from conventional products, and recruiting sample sets that cover natural variability. Future research might be oriented towards developing new authentication models for organic feed, eggs and chicken meat, keeping models updated and implementing them into regulations. Meanwhile, these models might be very supportive to the administrative controls directing inspections towards suspicious fraudulent samples.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

IoT consists of essentially thousands of tiny sensor nodes interconnected to the internet, each one of which executes the programmed functions under memory and power limita- tions. The sensor nodes are distributed mainly for gathering data in various situations. IoT envisions the future technologies such as e-health, smart city, auto-mobiles automa- tion, construction sites automation, and smart home. Secure communication of data under memory and energy constraints is major challenge in IoT. Authentication is the first and important phase of secure communication. This study presents a protocol to authenticate resource constraint devices in physical proximity by solely using the shared wireless communication interfaces. This model of authentication only relies on the abundance of ambient radio signals to authenticate in less than a second. To evaluate the designed protocol, SkyMotes are emulated in a network environment simulated by Contiki/COOJA. Results presented during this study proves that this approach is immune against passive and active attacks. An adversary located as near as two meters can be identified in less than a second with minimal expense of energy. Since, only radio device is used as required hardware for the authentication, this technique is scalable and interoperable to heterogeneous nature of IoT.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This experimental study examined the effects of cooperative learning and expliciUimpliGit instruction on student achievement and attitudes toward working in cooperative groups. Specifically, fourth- and fifth-grade students (n=48) were randomly assigned to two conditions: cooperative learning with explicit instruction and cooperative learning with implicit instruction. All participants were given initial training either explicitly or implicitly in cooperative learning procedures via 10 one-hour sessions. Following the instruction period, all students participated in completing a group project related to a famous artists unit. It was hypothesized that the explicit instruction training would enhance students' scores on the famous artists test and the group projects, as well as improve students' attitudes toward cooperative learning. Although the explicit training group did not achieve significantly higher scores on the famous artists test, significant differences were found in group project results between the explicit and implicit groups. The explicit group also exhibited more favourable and positive attitudes toward cooperative learning. The findings of this study demonstrate that combining cooperative learning with explicit instruction is an effective classroom strategy and a useful practice for presenting and learning new information, as well as working in groups with success.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

One group of 12 non learning disabled students and two groups of 12 learning disabled students between the ges of 10 and 12 were measured on implicit and explicit knowledge cquisition. Students in each group implicitly cquired knowledge bout I of 2 vocabulary rules. The vocabulary rules governed the pronunciation of 2 types of pseudowords. After completing the implicit acquisition phase, all groups were administered a test of implicit knowledge. The non learning disabled group and I learning disabled group were then asked to verbalize the knowledge acquired during the initial phase. This was a test of explicit knowledge. All 3 groups were then given a postlest of implicit knowledge. This tcst was a measure of the effectiveness of the employment of the verbalization technique. Results indicate that implicit knowledge capabilities for both the learning disabled and non learning disabled groups were intact. However. there were significant differences between groups on explicit knowledge capabilities. This led to the conclusion that implicit functions show little individual differences, and that explicit functions are affected by ability difference. Furthermore, the employment of the verbalization technique significantly increased POStlest scores for learning disabled students. This suggested that the use of metacognitive techniques was a beneficial learning tool for learning disabled students.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Implicit theories of shyness refer to a beUef that shyness is a fixed trait versus the belief that shyness is changeable and controllable. In this study, I explored the association between overall shyness and children's implicit self-theories of shyness, as well as between implicit self-theories of shyness and children's other shyness-related beliefs (perceptions of others' theories of shyness, shyness as a perceived problem, and ideas about treatment for shyness). Forty-six 10-12- year- old children (M = 10.74, SD = .88) were interviewed individually, filled out a set of questionnaires, and completed a computer-presented task. ' "^ As was expected, in ambiguous social situations, children perceived others' theories of shyness in a way that confirmed their own theories. The hypothesized curvilinear relation between shy and implicit self-theories of shyness was not found; instead, a linear positive relationship between these two variables emerged. Although implicit self-theories of shyness were not effective in predicting either the children's views of shyness as a perceived problem or children's ideas about treatment for shyness, some interesting results were found. Specifically, children's motivation to change their shyness correlated with their views of shyness as a problem for children in general and their perceptions of others' theories of shyness. Specific agents and strategies were regarded by children as having different effectiveness in their potential to change shyness. The theoretical and practical implications of these findings were discussed. Suggestions for future research were provided.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The intent of this study was to investigate .the effectiveness of teaching thirty-five Grade One children a variety of effective spelling strategies in comparison to tradit~onal spelling instruction. Strategy instruction included training in phonology, imagery and analogy. In addition, the type of instruction pro~ided (implicit versus explicit) was also examined. Children were seen in small groups of four or five, for four, twenty-five minute sessions. All children were tested prior and immediately following the training sessions, as well as at 14-day follow-ups. Pretest and posttest measures included a dictated spelling test (based on words used in training), a developmental spelling test and a sample of each child's writing. In addition, children completed a metacognitive spelling test as a measure of their strategy awareness. Performance scores on the pretest and posttest measures were compared to determine if any differences existed between the three spelling instruction groups using the Dunn-Bonferroni and Dunnett procedures. Findings revealed that explicit strategy instruction was the most effective spelling program for improving Grade One children's invented spellings. Children who received this instruction were able to spell targeted words more accurately, even after a 14-day follow-up, and were able to recall more effective spelling strategies than children who received either implicit strategy instruction or traditional strategy instruction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This dissertation examines different aspects involved in the formation of psychologists’ expert opinion in the Portuguese criminal justice system, more precisely, as this opinion is reflected in assessment reports. The present dissertation is comprised of three qualitative studies, the first sought to provide a general portrait of a sample of 106 forensic psychological reports as to their overall quality as measured in terms of relevance and coherence. Results show that the formal markers of quality are present in the sample analysed, a certain number of weaknesses have been observed, notably concerning the internal coherence of the reports as well as the relevance of the information reported on. The second study explored the opinions of 17 Portuguese judges and state prosecutors concerning the use they make of this type of forensic report. It appears that they consider these reports to be useful and very credible, specially so when they have been produced under the auspices of the National Institute of Legal Medicine and Forensic Sciences, which is the state forensic institution. Furthermore, it appears that judges and prosecutors were particularly interested in data that allowed for a personalised portrait of the assessee. The third study sought to better comprehend the conceptual bases on which psychologists construct their reports. To this end, an exploratory study was undertaken with a sample of key-actors; the analysis of their interviews shows that they define their judicial mandate as well as the basic concepts that are associated to this mandate in different ways. A theoretical framework provided by an implicit theories model was used to help understand these results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Biometrics deals with the physiological and behavioral characteristics of an individual to establish identity. Fingerprint based authentication is the most advanced biometric authentication technology. The minutiae based fingerprint identification method offer reasonable identification rate. The feature minutiae map consists of about 70-100 minutia points and matching accuracy is dropping down while the size of database is growing up. Hence it is inevitable to make the size of the fingerprint feature code to be as smaller as possible so that identification may be much easier. In this research, a novel global singularity based fingerprint representation is proposed. Fingerprint baseline, which is the line between distal and intermediate phalangeal joint line in the fingerprint, is taken as the reference line. A polygon is formed with the singularities and the fingerprint baseline. The feature vectors are the polygonal angle, sides, area, type and the ridge counts in between the singularities. 100% recognition rate is achieved in this method. The method is compared with the conventional minutiae based recognition method in terms of computation time, receiver operator characteristics (ROC) and the feature vector length. Speech is a behavioural biometric modality and can be used for identification of a speaker. In this work, MFCC of text dependant speeches are computed and clustered using k-means algorithm. A backpropagation based Artificial Neural Network is trained to identify the clustered speech code. The performance of the neural network classifier is compared with the VQ based Euclidean minimum classifier. Biometric systems that use a single modality are usually affected by problems like noisy sensor data, non-universality and/or lack of distinctiveness of the biometric trait, unacceptable error rates, and spoof attacks. Multifinger feature level fusion based fingerprint recognition is developed and the performances are measured in terms of the ROC curve. Score level fusion of fingerprint and speech based recognition system is done and 100% accuracy is achieved for a considerable range of matching threshold

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.