35 resultados para Repudiation
Resumo:
Presently different audio watermarking methods are available; most of them inclined towards copyright protection and copy protection. This is the key motive for the notion to develop a speaker verification scheme that guar- antees non-repudiation services and the thesis is its outcome. The research presented in this thesis scrutinizes the field of audio water- marking and the outcome is a speaker verification scheme that is proficient in addressing issues allied to non-repudiation to a great extent. This work aimed in developing novel audio watermarking schemes utilizing the fun- damental ideas of Fast-Fourier Transform (FFT) or Fast Walsh-Hadamard Transform (FWHT). The Mel-Frequency Cepstral Coefficients (MFCC) the best parametric representation of the acoustic signals along with few other key acoustic characteristics is employed in crafting of new schemes. The au- dio watermark created is entirely dependent to the acoustic features, hence named as FeatureMark and is crucial in this work. In any watermarking scheme, the quality of the extracted watermark de- pends exclusively on the pre-processing action and in this work framing and windowing techniques are involved. The theme non-repudiation provides immense significance in the audio watermarking schemes proposed in this work. Modification of the signal spectrum is achieved in a variety of ways by selecting appropriate FFT/FWHT coefficients and the watermarking schemes were evaluated for imperceptibility, robustness and capacity char- acteristics. The proposed schemes are unequivocally effective in terms of maintaining the sound quality, retrieving the embedded FeatureMark and in terms of the capacity to hold the mark bits. Robust nature of these marking schemes is achieved with the help of syn- chronization codes such as Barker Code with FFT based FeatureMarking scheme and Walsh Code with FWHT based FeatureMarking scheme. An- other important feature associated with this scheme is the employment of an encryption scheme towards the preparation of its FeatureMark that scrambles the signal features that helps to keep the signal features unreve- laed. A comparative study with the existing watermarking schemes and the ex- periments to evaluate imperceptibility, robustness and capacity tests guar- antee that the proposed schemes can be baselined as efficient audio water- marking schemes. The four new digital audio watermarking algorithms in terms of their performance are remarkable thereby opening more opportu- nities for further research.
Resumo:
Podeschi, J.B. Dickens,
Resumo:
"Reprinted from the Law reporter for March MDCCCXLII."
Resumo:
Cover title: Letter ... in answer to enquiries concerning the late imputations of dishonor upon the United States.
Resumo:
Mode of access: Internet.
Resumo:
The purpose of this study was to describe the experiences of a group of Catholic women related to the orientations received from priests and parents and their influence on sexual attitudes. The oral history method was used to interview 17 Catholic women. Three categories summarize women`s experiences: orientations about sexuality received from priests; lack of orientation or existence of open dialogue about sexuality: distinct experiences in the family context; adherence or repudiation; and distinct attitudes toward orientations received. Health professionals systematically should seek knowledge about women`s religious principles, because this is essential for meaningful and ethical health care.
Resumo:
Most models currently used to determine optimal foreign reserve holdings take the level of international debt as given. However, given the sovereign`s willingness-to-pay incentive problems, reserve accumulation may reduce sustainable debt levels. In addition, assuming constant debt levels does not allow addressing one of the puzzles behind using reserves as a means to avoid the negative effects of crisis: why do not sovereign countries reduce their sovereign debt instead? To study the joint decision of holding sovereign debt and reserves, we construct a stochastic dynamic equilibrium model calibrated to a sample of emerging markets. We obtain that the reserve accumulation does not play a quantitatively important role in this model. In fact, we find the optimal policy is not to hold reserves at all. This finding is robust to considering interest rate shocks, sudden stops, contingent reserves and reserve dependent output costs. (c) 2008 Elsevier B.V. All rights reserved.
Resumo:
The main arguments in favor and against nominal and indexed debts are the incentive to default through inflation versus hedging against unforeseen shocks. We model and calibrate these arguments to assess their quantitative importance. We use a dynamic equilibrium model with tax distortion, government outlays uncertainty, and contingent-debt service. Our framework also recognizes that contingent debt can be associated with incentive problems and lack of commitment. Thus, the benefits of unexpected inflation are tempered by higher interest rates. We obtain that costs from inflation more than offset the benefits from reducing tax distortions. We further discuss sustainability of nominal debt in developing (volatile) countries. (C) 2010 Elsevier Ltd. All rights reserved.
Resumo:
Critical Infrastructures became more vulnerable to attacks from adversaries as SCADA systems become connected to the Internet. The open standards for SCADA Communications make it very easy for attackers to gain in-depth knowledge about the working and operations of SCADA networks. A number of Intenrnet SCADA security issues were raised that have compromised the authenticity, confidentiality, integrity and non-repudiation of information transfer between SCADA Components. This paper presents an integration of the Cross Crypto Scheme Cipher to secure communications for SCADA components. The proposed scheme integrates both the best features of symmetric and asymmetric encryptiontechniques. It also utilizes the MD5 hashing algorithm to ensure the integrity of information being transmitted.
Resumo:
Desenvolupament d'un esquema criptogràfic per gestionar de forma segura els historials mèdics dels pacients através d'una xarxa de comunicacions. L'aplicació proporciona les propietatsbàsiques de seguretat que hem esmentat, a més de la propietat de no-repudique permet assegurar que una informació referent a una visita ha estat introduïda per un metge autoritzat i concret.
Resumo:
L'objectiu d'aquest TFC és dissenyar i implementar un gestor d'historial mèdics de pacients segur a través d'una xarxa de comunicacions que garanteixi la privadesa, la integritat, el no-repudi i l'autenticitat.
Resumo:
JXTA define un conjunto de seis protocolos básicos especialmente adecuados para una computación ad hoc, permanente, multi-hop, peer-to-peer (P2P). Estos protocolos permiten que los iguales cooperen y formen grupos autónomos de pares. Este artículo presenta un método que proporciona servicios de seguridad en los protocolos básicos: protección de datos, autenticidad, integridad y no repudio. Los mecanismos que se presentan son totalmente distribuidos y basados ¿¿en un modelo puro peer-to-peer, que no requieren el arbitraje de un tercero de confianza o una relación de confianza establecida previamente entre pares, que es uno de los principales retos en este tipo de entornos.
Resumo:
Abstract (Re)thinking Bodies: Deleuze and Guattari 's becoming-woman seeks to explore the notion of becoming-woman, as put forth by Gilles Deleuze and Felix Guattari in their collaborative 1982 text, A Thousand Plateaus: Capitalism and Schizophrenia, and as received by such prominent feminist theorists as Rosi Braidotti and Elizabeth Grosz. Arguing that the fairly decisive repudiation of this concept by some feminist theorists has been based on a critical misunderstanding, this project endeavors to clarify becomingwoman by exploring various conceptions of the body put forth by Baruch de Spinoza, Friedrich Nietzsche and Simone de Beauvoir. These conceptions of the body are indispensible to an appreciation of Deleuze and Guattari's notion of a body lived on both an immanent and transcendent plane, which, in turn, is indispensable to an appreciation of the concept of becoming (and, in particular, the concept of becoming-woman) as intended by Deleuze and Guattari.
Resumo:
L’appropriation de la thématique du multiculturalisme par les partisans du républicanisme fait l’objet de cet article. Dans un premier temps, il est permis de se demander si l’idée même d’un multiculturalisme républicain fait sens ; mais comme je le montrerai, le refus d’un projet multiculturel républicain est une exception française. Or, chez les penseurs néo-républicains, tels Philip Pettit, John Maynor et Cécile Laborde, le multiculturalisme a reçu une attention particulière. Je montrerai les particularités de chacune de ces approches et en particulier, comment les travaux de Laborde arrivent à résoudre des tensions que la pensée néo-républicaine entretient avec la reconnaissance de la diversité culturelle, en ajoutant une perspective critique à la voie délibérative ouverte par Maynor. L’originalité du multiculturalisme républicain consiste ainsi à rappeler le caractère instrumental de la politisation des identités minoritaires, puisqu’il s’agit à chaque fois de lutter contre l’assignation identitaire que subissent les membres des minorités, et non pas de valoriser publiquement leurs différences.
Resumo:
Pour respecter les droits d’auteur, la version électronique de cette thèse a été dépouillée de certains documents visuels et audio-visuels. La version intégrale de la thèse a été déposée au Service de la gestion des documents et des archives de l'Université de Montréal.