997 resultados para Sim authentication messaggistica online
Resumo:
Sixty samples of milk, Halloumi cheese and local grazing plants (i.e. shrubs) were collected over a year from dairy farms located on three different locations of Cyprus. Major and trace elements were quantified using inductively coupled plasma-atomic emission spectroscopy (ICP-AES). Milk and Halloumi cheese produced in different geographical locations presented significant differences in the concentration of some of the elements analysed. Principal component analysis showed grouping of samples according to the region of production for both milk and cheese samples. These findings show that the assay of elements can provide useful fingerprints for the characterisation of dairy products.
Resumo:
This paper presents a multimodal analysis of online self-representations of the Elite Squad of the military police of Rio de Janeiro, the Special Police Operations Battalion BOPE. The analysis is placed within the wider context of a “new military urbanism”, which is evidenced in the ongoing “Pacification” of many of the city’s favelas, in which BOPE plays an active interventionist as well as a symbolic role, and is a kind of solution which clearly fails to address the root causes of violence which lie in poverty and social inequality. The paper first provides a sociocultural account of BOPE’s role in Rio’s public security and then looks at some of the mainly visual mediated discourses the Squad employs in constructing a public image of itself as a modern and efficient, yet at the same time “magical” police force.
Resumo:
Speaking out about sexual violence has been a fundamental part of feminist politics since the 1970s. The practice of narrating experiences of violence, either publicly or to friends and family aims to combat the culture of silence and stigmatisation that surrounds sexual violence while also helping individuals to gain a sense of empowerment and connect with other survivors. However, speaking out also contains inherent risks, especially for young people. Survivors may meet with stigmatising or disbelieving responses, and they may lose control over who knows their story and the way in which it is told and retold.
These risks and benefits are altered, and potentially exacerbated, in an online environment. While social media may increase survivors’ ability to contact and connect with others with similar experiences it also makes it harder to control when and how their story is shared. The disjuncture between online and offline environments may also increase feelings of stigmatisation and isolation.
There is a need to explore the specific risks and benefits of speaking out online given both young people’s extensive use of social media for social interactions and the increasing tendency for support and educational services targeted at young people to make use of social media and online environments. This paper draws on literature and some preliminary research to consider both risks and benefits of speaking out online and to open a conversation about the creation of supportive spaces and mechanisms for young people to speak about sexual violence in online environments.
Resumo:
This document describes the cryptographic hash function BLAKE2 and makes the algorithm specification and C source code conveniently available to the Internet community. BLAKE2 comes in two main flavors: BLAKE2b is optimized for 64-bit platforms and BLAKE2s for smaller architectures. BLAKE2 can be directly keyed, making it functionally equivalent to a Message Authentication Code (MAC).
Resumo:
Comparisons of international child welfare systems have identified two basic orientations to practice; a ‘child protection’ orientation and a ‘child welfare’ orientation, which are founded upon fundamentally different values and assumptions regarding the family, the origins of child care problems, and the proper role of the state in relation to the family. This paper describes a project which sought to compare how undergraduate social work students from three European Universities perceive risk in referrals about the welfare of children and to explore the impact of different cultural, ideological and educational contexts on the way in which risk is constructed by students. Students from Northern Ireland, Germany and Poland examined three vignettes via ten online discussion fora each of which provided a narrative summary of their discussion. The paper presents some findings from the analysis of the qualitative data emerging from the student discussions and draws out the lessons learned in terms of how the project was designed and implemented using online discussion fora.
Resumo:
This paper investigated using lip movements as a behavioural biometric for person authentication. The system was trained, evaluated and tested using the XM2VTS dataset, following the Lausanne Protocol configuration II. Features were selected from the DCT coefficients of the greyscale lip image. This paper investigated the number of DCT coefficients selected, the selection process, and static and dynamic feature combinations. Using a Gaussian Mixture Model - Universal Background Model framework an Equal Error Rate of 2.20% was achieved during evaluation and on an unseen test set a False Acceptance Rate of 1.7% and False Rejection Rate of 3.0% was achieved. This compares favourably with face authentication results on the same dataset whilst not being susceptible to spoofing attacks.
Helping Students Learn and Monitor Progress: expectations and challenges of formative online testing
Resumo:
In order to protect user privacy on mobile devices, an event-driven implicit authentication scheme is proposed in this paper. Several methods of utilizing the scheme for recognizing legitimate user behavior are investigated. The investigated methods compute an aggregate score and a threshold in real-time to determine the trust level of the current user using real data derived from user interaction with the device. The proposed scheme is designed to: operate completely in the background, require minimal training period, enable high user recognition rate for implicit authentication, and prompt detection of abnormal activity that can be used to trigger explicitly authenticated access control. In this paper, we investigate threshold computation through standard deviation and EWMA (exponentially weighted moving average) based algorithms. The result of extensive experiments on user data collected over a period of several weeks from an Android phone indicates that our proposed approach is feasible and effective for lightweight real-time implicit authentication on mobile smartphones.
Resumo:
Online help-seeking is an emerging trend within the 21st century. Yet despite some movement towards developing online services, little is known about how young people locate, access and receive support online. This study aims to conceptualise the process of online help-seeking among adolescent males. Modified photo-elicitation techniques were employed within eight semi-structured focus group sessions with adolescent males aged 14 – 15 years (n= 56) across seven schools in Northern Ireland. Thematic analyses was conducted within an ontological framework of critical realism and an epistemological framework of contextualism. Informal online help-seeking pathways increased opportunity for social support and reduced stigma but also included loss of control and reduced anonymity. Formal pathways offered increased anonymity but concerns were raised regarding participants’ ability to locate and appraise the quality of information online. A conceptual model of online help-seeking has been developed to highlight the key help seeking pathways taken by adolescent males.