949 resultados para message broker
Resumo:
Ce texte a été présenté à la table ronde « Contested Footage: Snuff, Disease, the Avant-Garde, and the Archive » lors du congrès annuel de la PCA/ACA (Popular Culture Association/American Culture Association) qui se tenait à la Nouvelle-Orléans, du 1er au 4 avril 2015. La participation à ce congrès s’inscrivait dans le cadre du projet de recherche « Archives et création : nouvelles perspectives sur l’archivistique » sous la direction d’Yvon Lemay. Ce projet est financée par le Conseil de recherches en sciences humaines du Canada (CRSH) dans le cadre du programme Savoir (2013-2016).
Resumo:
La théorie de l'information quantique s'est développée à une vitesse fulgurante au cours des vingt dernières années, avec des analogues et extensions des théorèmes de codage de source et de codage sur canal bruité pour la communication unidirectionnelle. Pour la communication interactive, un analogue quantique de la complexité de la communication a été développé, pour lequel les protocoles quantiques peuvent performer exponentiellement mieux que les meilleurs protocoles classiques pour certaines tâches classiques. Cependant, l'information quantique est beaucoup plus sensible au bruit que l'information classique. Il est donc impératif d'utiliser les ressources quantiques à leur plein potentiel. Dans cette thèse, nous étudions les protocoles quantiques interactifs du point de vue de la théorie de l'information et étudions les analogues du codage de source et du codage sur canal bruité. Le cadre considéré est celui de la complexité de la communication: Alice et Bob veulent faire un calcul quantique biparti tout en minimisant la quantité de communication échangée, sans égard au coût des calculs locaux. Nos résultats sont séparés en trois chapitres distincts, qui sont organisés de sorte à ce que chacun puisse être lu indépendamment. Étant donné le rôle central qu'elle occupe dans le contexte de la compression interactive, un chapitre est dédié à l'étude de la tâche de la redistribution d'état quantique. Nous prouvons des bornes inférieures sur les coûts de communication nécessaires dans un contexte interactif. Nous prouvons également des bornes atteignables avec un seul message, dans un contexte d'usage unique. Dans un chapitre subséquent, nous définissons une nouvelle notion de complexité de l'information quantique. Celle-ci caractérise la quantité d'information, plutôt que de communication, qu'Alice et Bob doivent échanger pour calculer une tâche bipartie. Nous prouvons beaucoup de propriétés structurelles pour cette quantité, et nous lui donnons une interprétation opérationnelle en tant que complexité de la communication quantique amortie. Dans le cas particulier d'entrées classiques, nous donnons une autre caractérisation permettant de quantifier le coût encouru par un protocole quantique qui oublie de l'information classique. Deux applications sont présentées: le premier résultat général de somme directe pour la complexité de la communication quantique à plus d'une ronde, ainsi qu'une borne optimale, à un terme polylogarithmique près, pour la complexité de la communication quantique avec un nombre de rondes limité pour la fonction « ensembles disjoints ». Dans un chapitre final, nous initions l'étude de la capacité interactive quantique pour les canaux bruités. Étant donné que les techniques pour distribuer de l'intrication sont bien étudiées, nous nous concentrons sur un modèle avec intrication préalable parfaite et communication classique bruitée. Nous démontrons que dans le cadre plus ardu des erreurs adversarielles, nous pouvons tolérer un taux d'erreur maximal de une demie moins epsilon, avec epsilon plus grand que zéro arbitrairement petit, et ce avec un taux de communication positif. Il s'ensuit que les canaux avec bruit aléatoire ayant une capacité positive pour la transmission unidirectionnelle ont une capacité positive pour la communication interactive quantique. Nous concluons avec une discussion de nos résultats et des directions futures pour ce programme de recherche sur une théorie de l'information quantique interactive.
Resumo:
La vie et la mission de Sainte Faustyna Kowalska (1905-1938) ont donné naissance à une grande dévotion envers la Divine Miséricorde à Cracovie en Pologne. La nouveauté du message de la Miséricorde par rapport aux autres dévotions de l’Église Catholique se situe notamment sur le plan du visuel, du langage et des rituels. C’est dans le contexte de la Seconde Guerre mondiale qu’il faut situer sa propagation à travers le monde. Elle fut introduite au Canada en 1957 par deux dames de la noblesse polonaise immigrées. C’est dans la paroisse de Notre-Dame des Sept Douleurs à Verdun où se situe l’Œuvre de Jésus Miséricordieux que nous nous intéressons au développement de la vie spirituelle des dévots de la Divine Miséricorde; c’est-à-dire aux différentes croyances, rituels et pratiques religieuses qui mettent l’accent sur le corps, la pensée, les émotions et l’esprit. Les pratiques du corps, les postures, les mouvements, les manières de se concentrer, sont autant de moyens qui conduisent les dévots à des expériences spirituelles et des moyens qui y mènent à travers des rituels de prière qui mobilisent le corps qui est une dimension essentielle de l’expérience religieuse. On parle notamment de certains visuels, de prières et de gestes qui évoquent ces expériences spirituelles significatives. Ces expressions religieuses engagent les dévots dans leur quotidien et dans leur vécu. Pour ces croyants, cette dévotion représente un point de repère dans un monde qui leur apparaît souvent comme privé de sens.
Resumo:
Les organisations qui s’engagent dans une démarche de responsabilité sociale sont appelées à mieux prendre en considération les impacts environnementaux, sociaux et économiques de leurs activités et à communiquer publiquement les engagements qu’il prennent. Ces engagements sont véhiculés à travers différents médias réalisés par un designer graphique. Comme les notions de responsabilité sociale sont complexes et les engagements uniques à chaque organisation, le designer doit s’assurer de bien comprendre le message à transmettre pour rendre les médias cohérents autant dans leur forme que dans leur contenu. Pour aider le designer à répondre à ce défi, une démarche participative, qui vise la collaboration entre les parties prenantes en amont du processus, a été testée dans le cadre de cette recherche. Elle consistait à observer et à documenter, en contexte de pratique réel, comment une démarche participative pouvait soutenir la communication graphique de la responsabilité sociale d’une organisation. La création de l’identité visuelle et des médias de l’Institut de l’environnement, du développement durable et de l’économie circulaire a été choisi comme cas d’étude. Suivant une méthodologie inspirée de la recherche-action, nous avons pu identifier et valider les freins et les leviers de la démarche avec les participants. Les résultats obtenus soulignent l’apport positif de la démarche au processus de conception. Elle a permis aux parties prenantes de visualiser collectivement les valeurs de RS à communiquer grâce à un partage de connaissances. De plus, le processus itératif et participatif a facilité l’appropriation du projet par l’organisation. Le manque de temps, de ressources humaines et de ressources économiques constituent les principaux freins au maintien de la démarche au-delà de l’étape d’idéation et de rétroaction. L’analyse des données recueillies a permis de formuler des recommandations en vue d’améliorer la démarche pour en favoriser l’usage auprès de la communauté de pratique du design graphique et des organisations qui recourent à ses services pour communiquer leur responsabilité sociale.
Resumo:
La présente thèse rend compte de la dimension affective de la communication. Pour ce faire, l’expérience est d’abord considérée comme durée qualitative (Henri Bergson). Donc, l’expérience est mouvement. Point de départ : le mouvement comme caractéristique intrinsèque du corps qui, ainsi compris, devient un point de passage. Qu’est-ce qui le traverse? Des événements. Il se constitue par ce passage même, ce qui fait de lui un devenir-corps. Ici, toute expérience est acte de communication à son stade le plus pur. Qui est-ce qui communique? L’expérience est une occasion d’actualisation du virtuel. Il s’agit de l’actualisation d’une force virtuelle – que A. N. Whitehead appelle la forme subjective. Le sens du message est l’événement lui-même, c’est-à-dire ce qui émerge dans l’expérience (Gilles Deleuze). Non pas l’expérience subjective d’un sujet préconstitué, mais l’expérience pure, telle que définie par William James : une relationalité. Ce qui s’actualise est une tonalité affective (Whitehead), vécue comme qualité esthétique. Quels sont les facteurs constitutifs du sens? Élargissons la traditionnelle dualité sujet-objet à un complexe relationnel : nous pouvons ainsi percevoir des acteurs affectifs, perceptifs, humains et technologiques, dans un agencement qui se concrétise comme relationalité émergente. Tout événement est situé. Par conséquent, l’émergence du sens devient acte de co-création dans lequel participent les multiples facteurs qui conditionnent l’événement. Cette vision sort d’un anthropocentrisme pour concevoir l’événement lui-même comme sujet de ses propres expériences (Whitehead). De sorte que, tout comme chaque acte de communication, l’expérience des médias est aussi événement vécu. Ce dernier est incorporé par les dimensions du devenir-corps – la conscience-affective et la conscience-réflexive. Celles-ci sont si intimement interreliées qu’elles deviennent mutuellement inclusives dans l’expérience et totalement actives dans l’actualisation du sens.
Resumo:
Ship recycling has been considered as the best means to dispose off an obsolete ship. The current state of art of technology combined with the demands of sustainable developments from the global maritime industrial sector has modified the status of erstwhile ‘ship breaking’ involving ship scrap business to a modern industry undertaking dismantling of ships and recycling/reusing the dismantled products in a supply chain of pre owned product market by following the principles of recycling. Industries will have to formulate a set of best practices and blend them with the engineering activities for producing better quality products, improving the productivity and for achieving improved performances related to sustainable development. Improved performance by industries in a sustainable development perspective is accomplished only by implementing the 4E principles, ie.,. ecofriendliness, engineering efficiency, energy conservation and ergonomics in their core operations. The present study has done a comprehensive investigation into various ship recycling operations for formulating a set of best practices.Being the ultimate life cycle stage of a ship, ship recycling activities incorporate certain commercial procedures well in advance to facilitate the objectives of dismantling and recycling/reusing of various parts of the vessel. Thorough knowledge regarding these background procedures in ship recycling is essential for examining and understanding the industrial business operations associated with it. As a first step, the practices followed in merchant shipping operations regarding the decision on decommissioning have been and made available in the thesis. Brief description about the positioning methods and important preparations for the most feasible ship recycling method ie.,. beach method have been provided as a part of the outline of the background information. Available sources of guidelines, codes and rules & regulations for ship recycling have been compiled and included in the discussion.Very brief summary of practices in major ship recycling destinations has been prepared and listed for providing an overview of the global ship recycling activities. The present status of ship recycling by treating it as a full fledged engineering industry has been brought out to establish the need for looking into the development of the best practices. Major engineering attributes of ship as a unique engineering product and the significant influencing factors on her life cycle stage operations have been studied and added to the information base on ship recycling. Role of ship recycling industry as an important player in global sustainable development efforts has been reviewed by analysing the benefits of ship recycling. A brief synopsis on the state of art of ship recycling in major international ship recycling centres has also been incorporated in the backdrop knowledgebase generation on ship recycling processes.Publications available in this field have been reviewed and classified into five subject categories viz., Infrastructure for recycling yards and methods of dismantling, Rules regarding ship recycling activities, Environmental and safety aspects of ship recycling, Role of naval architects and ship classification societies, Application of information technology and Demand forecasting. The inference from the literature survey have been summarised and recorded. Noticeable observations in the inference include need of creation of a comprehensive knowledgebase on ship recycling and its effective implementation in the industry and the insignificant involvement of naval architects and shipbuilding engineers in ship recycling industry. These two important inferences and the message conveyed by them have been addressed with due importance in the subsequent part of the present study.As a part of the study the importance of demand forecasting in ship recycling has been introduced and presented. A sample input for ship recycling data for implementation of computer based methods of demand forecasting has been presented in this section of the thesis.The interdisciplinary nature of engineering processes involved in ship recycling has been identified as one of the important features of this industry. The present study has identified more than a dozen major stake holders in ship recycling having their own interests and roles. It has also been observed that most of the ship recycling activities is carried out in South East Asian countries where the beach based ship recycling is done in yards without proper infrastructure support. A model of beach based ship recycling has been developed and the roles, responsibilities and the mutual interactions of the elements of the system have been documented as a part of the study Subsequently the need of a generation of a wide knowledgebase on ship recycling activities as pointed out by the literature survey has been addressed. The information base and source of expertise required to build a broad knowledgebase on ship recycling operations have been identified and tabulated. Eleven important ship recycling processes have been identified and a brief sketch of steps involved in these processes have been examined and addressed in detail. Based on these findings, a detailed sequential disassembly process plan of ship recycling has been prepared and charted. After having established the need of best practices in ship recycling initially, the present study here identifies development of a user friendly expert system for ship recycling process as one of the constituents of the proposed best practises. A user friendly expert system has been developed for beach based ship recycling processes and is named as Ship Recycling Recommender (SRR). Two important functions of SRR, first one for the ‘Administrators’, the stake holders at the helm of the ship recycling affairs and second one for the ‘Users’, the stake holders who execute the actual dismantling have been presented by highlighting the steps involved in the execution of the software. The important output generated, ie.,. recommended practices for ship dismantling processes and safe handling information on materials present onboard have been presented with the help of ship recycling reports generated by the expert system. A brief account of necessity of having a ship recycling work content estimation as part of the best practices has been presented in the study. This is supported by a detailed work estimation schedule for the same as one of the appendices.As mentioned earlier, a definite lack of involvement of naval architect has been observed in development of methodologies for improving the status of ship recycling industry. Present study has put forward a holistic approach to review the status of ship recycling not simply as end of life activity of all ‘time expired’ vessels, but as a focal point of integrating all life cycle activities. A new engineering design philosophy targeting sustainable development of marine industrial domain, named design for ship recycling has been identified, formulated and presented. A new model of ship life cycle has been proposed by adding few stages to the traditional life cycle after analysing their critical role in accomplishing clean and safe end of life and partial dismantling of ships. Two applications of design for ship recycling viz, recyclability of ships and her products and allotment of Green Safety Index for ships have been presented as a part of implementation of the philosophy in actual practice.
Resumo:
Internet today has become a vital part of day to day life, owing to the revolutionary changes it has brought about in various fields. Dependence on the Internet as an information highway and knowledge bank is exponentially increasing so that a going back is beyond imagination. Transfer of critical information is also being carried out through the Internet. This widespread use of the Internet coupled with the tremendous growth in e-commerce and m-commerce has created a vital need for infonnation security.Internet has also become an active field of crackers and intruders. The whole development in this area can become null and void if fool-proof security of the data is not ensured without a chance of being adulterated. It is, hence a challenge before the professional community to develop systems to ensure security of the data sent through the Internet.Stream ciphers, hash functions and message authentication codes play vital roles in providing security services like confidentiality, integrity and authentication of the data sent through the Internet. There are several ·such popular and dependable techniques, which have been in use widely, for quite a long time. This long term exposure makes them vulnerable to successful or near successful attempts for attacks. Hence it is the need of the hour to develop new algorithms with better security.Hence studies were conducted on various types of algorithms being used in this area. Focus was given to identify the properties imparting security at this stage. By making use of a perception derived from these studies, new algorithms were designed. Performances of these algorithms were then studied followed by necessary modifications to yield an improved system consisting of a new stream cipher algorithm MAJE4, a new hash code JERIM- 320 and a new message authentication code MACJER-320. Detailed analysis and comparison with the existing popular schemes were also carried out to establish the security levels.The Secure Socket Layer (SSL) I Transport Layer Security (TLS) protocol is one of the most widely used security protocols in Internet. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL I TLS. But recent attacks on RC4 and HMAC have raised questions about the reliability of these algorithms. Hence MAJE4 and MACJER-320 have been proposed as substitutes for them. Detailed studies on the performance of these new algorithms were carried out; it has been observed that they are dependable alternatives.
Resumo:
Farm communication and extension programs are vital part of the farm development attempts. Electronic media plays a major role in farm extension activities. Kerala, the consumer state, which was a complete agricultural state in pre-independence period, is the sprouting land of agricultural extension and publication activities in print media. Later AIR (All India Radio) farm programs and farm broadcasting of Doordarshan enriched the role of electronic media in farm extension activities. The media saturated southern state of India received this new electronic media farm communication revolution whole heartedly. However, after 1990, Kerala witnessed a flood of private T V channels and currently there are 24 channels in this regional language, named Malayalam. All major news and entertainment channels are broadcasting farm programs. Farm programs of AIR and Doordarshan, broadcasted in Malayalam language, have been well accepted to the farmers‘ in Kerala. However, post-independence period, witnessed the formation of Kerala state in Indian Union and the first ballot-elected communist Government started its administration. After the land reform bills, the state witnessed a gradual decrease in agricultural production. Even if it is not reflected much in the attitude and practices of farm community and farm broadcast of traditional electronic broadcasting, a change is observable after the post-liberalization era of India. Private Television channels, which were focused on entertainment value of programs, started broadcasting farm programs and the parameters of program production went through certain changes. In this situation, there is ample relevance for a study about the farm programs of electronic media in terms of a comparative study of audience perception. The study is limited in the state of Kerala as it is the most media saturated state in India. The study analyzes the rate, nature and scope of adoption of farming methods transmitted through electronic media (T.V. and Radio) in Malayalam language.All kinds of Farm programs including comprehensive program serials, success stories, seasonal cropping methods, experts opinion, been analyzed on the basis of the following objectives. To find whether propagating new farm methods through farm programs in electronic media or the availability of adequate infrastructure and economic factors make a farmer to adopt a new farming method. To find which electronic media has more influence on farmers to adopt agricultural programs. To find which form of electronic media gets better feedback from farmers To find out whether the programs of T.V. or Radio is more acceptable to farmers than the print media. To find whether farmers gets the message through their preferred medium for the message. The researcher recorded opinions from a panel of agricultural officers, farm Information officers, agro extension researchers and experts. According to their opinions and guidelines, a pilot study is designed and conducted in Kanjikuzhy Panchayath, in Alappuzha district, Kerala. The Panchayath is selected by considering its ideal nature of being the sample for a social Science research. Besides, the nature of farming in the Panchayath, which devoid of the cultivation of cash crops also supported its sample value. As per the observations from the pilot study, researcher confirmed the Triangulation method as the methodology of research. The questionnaire survey, being the primary part contained 42 Questions with 6 independent and 32 dependent variables. The survey is conducted among 400 respondents in Idukki, Alappuzha and Pathanamthitta districts considering geographical differences and distribution of different types of crops. The response from a total of 360 respondents, 120 from each district, finally selected for tabulation and data analysis.The data analysis, based on percentage analysis, along with the results from focus group discussion among a selected group of 20 farmers, together produced the results as follows. Farmers, who are the audience of farm programs, have a very serious approach towards the medium. They are maintaining a critical point of view towards the content of the programs. Farmers are reasonably aware about the financial side of the programs and the monitory aspirations of both private and Government owned Television channels. Even though, the farmers are not aware on the technical terminology and jargons, they have ideas about success stories, program serials and they are even informed about channels are not maintaining an audience research section like AIR. Though the farmers accept Doordarshan as the credential source of farm information and methods, they are inclined to the entertainment value of programs too. They prefer to have more entertainment value for the programs of Doordarshan. Surprisingly, they have very solid suggestions on even about the shots which add entertainment value to the farm broadcasting methods of Doordarshan. Farmers are very much aware about the fact that media is just an instrument for inspiration and persuasion. They strongly believe that the source of information and new methods is agricultural research and an effective change happens only when there are adequate infrastructure and marketing facilities, along with the proper support from Government agricultural guideline and support systems like Krishi Bhavans. They strongly believe that media alone cannot create any magic in increasing agricultural production. Farmers are pointing out the lack of response to the feedback and queries of farmers on farming methods, as an evidence for the difference in levels of commitment of Government and private owned Television channels.Farmers are still perceiving AIR farm programs are far more committed to farmers and farming than any other electronic medium. However, they are seriously lacking Radio receivers with medium wave reception facility. Farmers perceive that the farming methods on new crops are more adoptable than the farming methods of traditional crops in both private and Government owned Television channels. There are multiple factors behind this observation from farmers. Farmers changed in terms of viewing habits and they prefer success stories, which are totally irrelevant and they even think that such stories encourage people to go for farming and they opined that such stories are good sources of inspiration. However, they are all very much sure about the importance and particular about the presence of entertainment factor even in farm programs. Farmers expect direct interaction of any expert of the new farming method to implement the method in their agriculture practices. Though introduction of a new idea in the T.V. is acceptable, farmers need the direct instruction of expert on field to start implementing the new farming practices Farmers still have an affinity towards print media reports and agricultural pages and they have complaints to print media on the removal of agricultural information pages from news papers. They prefer the reports in print media as it facilitates them to collect and refer articles when they need it. Farmers are having an eye of doubt about the credibility of farm programs by private T.V. channels. Even if they prefer private Television channels for listening and adopting new farming methods and other farm information, they scrutinize programs to know whether they are sponsored programs by agrochemical or agro-fertilizer manufacturer.
Resumo:
n the recent years protection of information in digital form is becoming more important. Image and video encryption has applications in various fields including Internet communications, multimedia systems, medical imaging, Tele-medicine and military communications. During storage as well as in transmission, the multimedia information is being exposed to unauthorized entities unless otherwise adequate security measures are built around the information system. There are many kinds of security threats during the transmission of vital classified information through insecure communication channels. Various encryption schemes are available today to deal with information security issues. Data encryption is widely used to protect sensitive data against the security threat in the form of “attack on confidentiality”. Secure transmission of information through insecure communication channels also requires encryption at the sending side and decryption at the receiving side. Encryption of large text message and image takes time before they can be transmitted, causing considerable delay in successive transmission of information in real-time. In order to minimize the latency, efficient encryption algorithms are needed. An encryption procedure with adequate security and high throughput is sought in multimedia encryption applications. Traditional symmetric key block ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are not efficient when the data size is large. With the availability of fast computing tools and communication networks at relatively lower costs today, these encryption standards appear to be not as fast as one would like. High throughput encryption and decryption are becoming increasingly important in the area of high-speed networking. Fast encryption algorithms are needed in these days for high-speed secure communication of multimedia data. It has been shown that public key algorithms are not a substitute for symmetric-key algorithms. Public key algorithms are slow, whereas symmetric key algorithms generally run much faster. Also, public key systems are vulnerable to chosen plaintext attack. In this research work, a fast symmetric key encryption scheme, entitled “Matrix Array Symmetric Key (MASK) encryption” based on matrix and array manipulations has been conceived and developed. Fast conversion has been achieved with the use of matrix table look-up substitution, array based transposition and circular shift operations that are performed in the algorithm. MASK encryption is a new concept in symmetric key cryptography. It employs matrix and array manipulation technique using secret information and data values. It is a block cipher operated on plain text message (or image) blocks of 128 bits using a secret key of size 128 bits producing cipher text message (or cipher image) blocks of the same size. This cipher has two advantages over traditional ciphers. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the key avalanche effect produced in the ciphertext output is better than that of AES.
Resumo:
Communication is the process of transmitting data across channel. Whenever data is transmitted across a channel, errors are likely to occur. Coding theory is a stream of science that deals with finding efficient ways to encode and decode data, so that any likely errors can be detected and corrected. There are many methods to achieve coding and decoding. One among them is Algebraic Geometric Codes that can be constructed from curves. Cryptography is the science ol‘ security of transmitting messages from a sender to a receiver. The objective is to encrypt message in such a way that an eavesdropper would not be able to read it. A eryptosystem is a set of algorithms for encrypting and decrypting for the purpose of the process of encryption and decryption. Public key eryptosystem such as RSA and DSS are traditionally being prel‘en‘ec| for the purpose of secure communication through the channel. llowever Elliptic Curve eryptosystem have become a viable altemative since they provide greater security and also because of their usage of key of smaller length compared to other existing crypto systems. Elliptic curve cryptography is based on group of points on an elliptic curve over a finite field. This thesis deals with Algebraic Geometric codes and their relation to Cryptography using elliptic curves. Here Goppa codes are used and the curves used are elliptic curve over a finite field. We are relating Algebraic Geometric code to Cryptography by developing a cryptographic algorithm, which includes the process of encryption and decryption of messages. We are making use of fundamental properties of Elliptic curve cryptography for generating the algorithm and is used here to relate both.
Resumo:
Cache look up is an integral part of cooperative caching in ad hoc networks. In this paper, we discuss a cooperative caching architecture with a distributed cache look up protocol which relies on a virtual backbone for locating and accessing data within a cooperate cache. Our proposal consists of two phases: (i) formation of a virtual backbone and (ii) the cache look up phase. The nodes in a Connected Dominating Set (CDS) form the virtual backbone. The cache look up protocol makes use of the nodes in the virtual backbone for effective data dissemination and discovery. The idea in this scheme is to reduce the number of nodes involved in cache look up process, by constructing a CDS that contains a small number of nodes, still having full coverage of the network. We evaluated the effect of various parameter settings on the performance metrics such as message overhead, cache hit ratio and average query delay. Compared to the previous schemes the proposed scheme not only reduces message overhead, but also improves the cache hit ratio and reduces the average delay
Resumo:
In this paper we investigate the problem of cache resolution in a mobile peer to peer ad hoc network. In our vision cache resolution should satisfy the following requirements: (i) it should result in low message overhead and (ii) the information should be retrieved with minimum delay. In this paper, we show that these goals can be achieved by splitting the one hop neighbours in to two sets based on the transmission range. The proposed approach reduces the number of messages flooded in to the network to find the requested data. This scheme is fully distributed and comes at very low cost in terms of cache overhead. The experimental results gives a promising result based on the metrics of studies.
Resumo:
A novel and fast technique for cryptographic applications is designed and developed using the symmetric key algorithm “MAJE4” and the popular asymmetric key algorithm “RSA”. The MAJE4 algorithm is used for encryption / decryption of files since it is much faster and occupies less memory than RSA. The RSA algorithm is used to solve the problem of key exchange as well as to accomplish scalability and message authentication. The focus is to develop a new hybrid system called MARS4 by combining the two cryptographic methods with an aim to get the advantages of both. The performance evaluation of MARS4 is done in comparison with MAJE4 and RSA.
Resumo:
This paper describes JERIM-320, a new 320-bit hash function used for ensuring message integrity and details a comparison with popular hash functions of similar design. JERIM-320 and FORK -256 operate on four parallel lines of message processing while RIPEMD-320 operates on two parallel lines. Popular hash functions like MD5 and SHA-1 use serial successive iteration for designing compression functions and hence are less secure. The parallel branches help JERIM-320 to achieve higher level of security using multiple iterations and processing on the message blocks. The focus of this work is to prove the ability of JERIM 320 in ensuring the integrity of messages to a higher degree to suit the fast growing internet applications
Resumo:
Die Geschäftspolitik der Banken und Sparkassen befindet sich in einem tiefgreifenden Veränderungsprozess. Lange Zeit war der stationäre Vertrieb mit großem Abstand der bedeutendste Absatzweg der Kreditinstitute. Damit ist es nun offenbar zu Ende. Alternative Vertriebskanäle gewinnen zunehmend an Bedeutung. Online-Broker und Direktbanken, wie z.B. DAB bank und ING-DiBa, sind dafür die besten Beispiele. Der Verfasser hat sich mit der vorliegenden Promotion der Aufgabe unterworfen, die Erfolgsstrategien und weitere Entwicklung der Direktbanken in Deutschland einer kritischen Analyse zu unterziehen. Dabei werden in erster Linie Direktbanken und Online-Broker betrachtet, aber auch sog. Internet-Only-Banken bzw. virtuelle Banken in die Überlegungen einbezogen. Gegenstand des ersten Kapitels ist die Betrachtung der traditionellen Vertriebswegestruktur im Privatkundengeschäft. Dabei wird deutlich, dass die neue Entwicklungsstufe “Direct Banking” die ehemals so monotone Vertriebspolitik der Kreditinstitute zwar nicht völlig ersetzen, aber gut ergänzen kann. Im zweiten Kapitel werden die Grundlagen des “Direct Banking” beschrieben und abgegrenzt, wobei die historische Entwicklung, die Beweggründe der Kreditinstitute und auch die Anbieterstruktur im einzelnen untersucht werden. Das Discount-Broking wird ebenfalls angesprochen, weil es als Vorläufer des Direktbankgeschäfts angesehen wird. Das dritte Kapitel stellt die strategischen Erfolgsfaktoren im Direct Banking vor und beschreibt einige Vorbehalte und derzeit noch bestehende Problemfelder. Der Ansatz einer ganzheitichen Direct-Banking-Strategie wird in einem gesonderten Abschnitt dargestellt und in sechs Phasen unterteilt. Abschließend werden fünf strategische Maßnahmen zur Verbesserung des Stellenwertes der Direktbanken präsentiert. Das vierte Kapitel beschäftigt sich mit den Auswirkungen auf das traditionelle Bankgeschäft und beleuchtet somit die Zukunft des Retail Banking. Der notwendige Anpassungsprozess im Filil Banking wird erklärt. Dabei werden die strategischen Herausforderungen im Filialbankgeschäft behandelt und Maßnahmen zur Kundenbindung und Kostensenkung aufgezeigt. Im letzten Kapitel werden die Zukunftsaspekte des Direct Banking etwas näher untersucht. Zunächst werden die wesentlichen Ergebnisse zur erfolgreichen Ausübung des Direkbankgeschäfts in Thesen zusammengefasst. Anschließend wird die Umbruchphase zum Virtual Banking anhand von drei Grundtrends analysiert.