271 |
Vartotojo prieigos duomenų saugojimo lustinėse kortelėse metodo sukūrimas ir tyrimas / Development and research of method for storage user access data in smart cardMatačiūnas, Jonas 31 August 2011 (has links)
Darbe nagrinėjama galimybė panaudoti lustinę kortelę saugoti vartotojo prieigos duomenis. Analizuojami raktų apsikeitimo protokolai DH-EKE, SRP. Taip pat nagrinėjama saugaus ryšio technologija TLS. Pasiūlomas konkretus autentifikavimo protokolas skirtas naudoti su lustinėmis kortelėmis. Atliekamas protokolo saugumo, greitaveikos tyrimas. / In this paper we research the possibility to use smart card as a secure storage to store user access data. We study such key exchange algorithms as SRP, DH-EKE. Also TLS technology is studied in order to gain better understanding how to establish secure connection between two communication points. Then we propose an authentication protocol which was specifically designed to be used with smart cards. Performance and other properties of the protocol are analysed in the last chapters of this paper.
|
272 |
ID TROUBLES: The National Identification Systems in Japan and the (mis) Construction of the SubjectOgasawara, Midori 30 May 2008 (has links)
Modern Japan established three kinds of national identification (ID) systems over its population: Koseki, Alien Registration, and Juki-net. The Koseki system is a patriarchal family registration of all citizens. It began in the 1870s when Japan’s nation-state was developed under the emperor’s rule. Koseki used traditional patriarchal hierarchy and loyalty to construct subjects for the Japanese Empire and reify a fictional unity among the “Japanese” people. Until today, this disciplinary element has functioned as the norm for organizational relations in Japan.
The Alien Registration System requires non-citizens to register and carry an ID card to distinguish “foreigners” from “Japanese”. This system stems from surveillance techniques used over the colonial populations in the early twentieth century: the Chinese in the colony of “Manchuria”, in northeast China, and the Koreans on the Japanese mainland. Although the empire collapsed after World War II, the practice was officially legislated to target Koreans and Chinese who remained in post-war democratic Japan.
Juki-net is the recently established computer network for sharing the personal data of citizens between government and municipal authorities. Juki-net attaches a unitary ID number to all citizens and gives them an optional ID card. Juki-net uses digital technology to capture individual movement, so the system is direct, individualistic, and fluid. It has expanded the scope of personal data and shifts the foundation of citizenship to state intervention.
This thesis examines how these three systems have defined the boundary of the nation and constructed categories for its subjects, which have then been imposed on the entire population. Drawing on the theories of Foucault’s bio-power and Agamben’s bare life, I explain how the national ID card systems enable the state to include and exclude people, use them for its own power, and produce subjects to support the state. Although this process is often hidden, the scheme is a vital part of the current proposal to use national ID card systems in the global “war on terror”. I argue that the national ID card systems impose compulsory classifications on individuals, threaten the public’s rights against state intervention, and spread “bare life” across the population. / Thesis (Master, Sociology) -- Queen's University, 2008-05-29 13:58:26.233
|
273 |
Secure contactless mobile financial services with near field communicationPoroye, Adeola Oluwaseyi January 2011 (has links)
This thesis presents the results from work with three prototypes that use Near Field Communication technology to provide secure contactless mobile nancial services on mobile phones.
|
274 |
Effect of Nutrition Merchandising and Consumer Preferences on Willingness to Pay for Local Tomatoes and Strawberries in Kentucky and OhioKompaniyets, Lyudmyla 01 January 2012 (has links)
This project investigates the impacts of nutrition merchandising on consumers’ willingness to pay for local tomatoes and strawberries. The data come from survey of Kentucky and Ohio residents in June 2011. Two thousand one hundred twelve individuals from Kentucky and Ohio were surveyed, to find out the impact of selfawareness of health benefits and health benefits information on their willingness to pay. The consumers were offered one of the three survey versions. The versions varied by how much nutrition information was provided to the consumer related to both strawberries and tomatoes – otherwise identical. A had the most, B had text only, and C omitted any nutritional benefits. This nutrition preamble was offered just before doing a payment card willingness-to-pay experiment. Standard demographic data were also included. The goal of the study was to see if and in what way the provision (or nonprovision) of this information, as well as consumers’ own knowledge of nutritional benefits of local foods, their beliefs and lifestyle influenced their willingness to pay for these local products.
|
275 |
Génération de tests de vulnérabilité pour vérifieur de byte code Java CardSavary, Aymerick January 2013 (has links)
Il devient important d'assurer que tout système critique est fiable. Pour cela différentes techniques existent, telles que le test ou l'utilisation de méthodes formelles. S'assurer que le comportement d'un vérifieur de byte code Java Card n'entraînera pas de faille de sécurité est une tâche complexe. L'automatisation totale de cette vérification n'à popr le moment pas été realisee. Des jeux de tests coûteux ont été produits manuellement, mais ils doivent être refaits à chaque nouvelle spécification. Les travaux présentés dans ce mémoire proposent une nouvelle méthode pour la génération automatique de tests de vulnérabilité. Ceux-ci reposent sur l'utilisation et la transformation automatique de modèles formels. Pour valider cette méthode, un outil à été développé puis utilisé sur différentes implémentations du vérifieur de byte code Java Card. Le langage de modelisation que nous avons utilisé est Event-B. Nos modèles représentent le comportement normal du système que l'on souhaite tester. Chaque instruction est modélisée comme un événement. Leur garde représente l'ensemble des conditions que doit satisfaire une instruction pour être acceptable. À partir de ce modèle initial, une succession de dérivations automatiques génère un ensemble de modèles dérivés. Chacun de ces modèles dérivés représente une faute particulière. On extrait de ces nouveaux modèles les tests de vulnérabilité abstraits. Ceux-ci sont ensuite concrétisés puis envoyés à un système à tester. Ce processus est assuré par notre logiciel qui repose sur les API Rodin, ProB, CapMap et OPAL.
|
276 |
Patalpos mikroklimato duomenų surinkimo įrenginys / Indoor microclimate data loggerŠidlauskas, Paulius 04 August 2011 (has links)
Lietuvoje kaip ir visame pasaulyje sparčiai vyksta elektronikos raida, įskaitant ir patalpų mikroklimato stebėjimą. Šiuolaikinės technologijos leidžia ne tik skaitmeniniu būdu gauti duomenis iš jutiklių, bet ir nuosekliai stebėti, juos išsaugoti norimu intervalu bei panaudoti mikroklimato įrenginių valdymui. Šiam darbui atlikti naudojami patalpų mikroklimato duomenų stebėjimo įtaisai. Elektronikos bakalauro baigiamojo darbo tema - "Patalpos mikroklimato duomenų surinkimo įrenginys". Pagrindinė darbo užduotis - suprojektuoti ir pagaminti įrenginio modelį. Atlikus panašių projektų ir technologijų apžvalgą, buvo parinkta toks įrenginio veikimo principas: informacijai apie oro sąlygas surinkti naudojami elektroniniai, skaitmeniniai jutikliai; parametrų registracijai pasirinkta atminties kortelė; realaus laiko stebėjimui internetu, visi duomenis matomi Web puslapyje, ethernet'o pagalba. / The entire countries world wide including Lithuania is undergoing rapid evolution of electronic development, including indoor microclimate monitoring. Today’s modern technology allows not only receive digital data from sensors, but also to consistently monitor it, maintain the desired data storing period and use it for climate control management. Indoor climate data monitoring devices were used for this work. Electronics Bachelor thesis topic is – “Indoor microclimate data logger”. The main task of the work is – to design and manufacture this model device. Following similar projects and technology reviews this device operating principle was chosen: electronic, digital sensors are used to collect information about weather condition; memory card is used to register parameters; real-time monitoring is done using internet, all data appears in Web page by Ethernet support.
|
277 |
Set-Switching and Learning TransferJohnson, C. Dustin 17 January 2008 (has links)
In this experiment I investigated the relationship between set-switching and transfer learning, both of which presumably invoke executive functioning (EF), which may in turn be correlated with intelligence. Set-switching was measured by a computerized version of the Wisconsin Card Sort Task. Another computer task was written to measure learning-transfer ability. The data indicate little correlation between the ability to transfer learning and the capacity for set-switching. That is, these abilities may draw from independent cognitive mechanisms. The major difference may be requirement to utilize previous learning in a new way in the learning-transfer task.
|
278 |
School Counselor-Parent Collaborations: Parents' Perceptions of How School Counselors Can Meet their NeedsGrubbs, Natalie 13 August 2013 (has links)
The purpose of this study was to gain a fuller understanding of the sort of assistance, support, or education parents feel they need from school counselors in parenting adolescents. The research question examined was: What sort of assistance, support, or education do independent school parents feel they need from school counselors in raising adolescent children? The participants for this study were parents of middle school children attending an independent school located in an urban southern city. All parents of children attending the independent school were asked to respond to an online “needs assessment” survey asking parents to select parent education topics that are of interest to them. Parents participating in this phase of the study had an opportunity to volunteer for the next phase of the study, an online card sort activity. Parents who volunteered for the online card sort activity were sent a link to the online card sort activity where they took a list of parent education topics and arranged them into groups as they saw fit. Analysis of the results revealed nine themes, or categories of topics that are of interest to parents of middle school children: Parenting Skills, Adolescent Self-Management, Self-Awareness and Esteem, Academic Opportunities and Career Choices, Peer Relationships and Skills, Emotional Wellness, Physical Health and Wellness, Parent-Teacher/Staff Communication, and Technology Safety and Use. An informal concept map was created to visually represent the categories of parent education topics that emerged from the study. The results of this study can assist professional school counselors in designing parent education and consultation curriculum and interventions, and help ensure that school counselors better meet parents’ needs.
|
279 |
The impact of club card on store loyalty : An empirical study of a Swedish grocery retailerAhlström, Sofia, Wangsell, Niklas January 2014 (has links)
The aim of this study is to investigate whether club card loyalty have an impact on customers store loyalty. A secondary purpose is to distinguish which attributes of a loyalty card that ICA’s customers prefer, with the focus on the variables; direct- versus indirect rewards, monetary- versus nonmonetary rewards, necessary- versus luxury rewards and immediate- versus delayed rewards.
|
280 |
Improving Credit Card Fraud Detection using a Meta-learning StrategyPun, Joseph King-Fung 19 December 2011 (has links)
One of the issues facing credit card fraud detection systems is that a significant percentage of transactions labeled as fraudulent are in fact legitimate. These “false alarms” delay the detection of fraudulent transactions. Analysis of 11 months of credit card transaction data from a major Canadian bank was conducted to determine savings improvements that can be achieved by identifying truly fraudulent transactions. A meta-classifier model was used in this research. This model consists of 3 base classifiers constructed using the k-nearest neighbour, decision tree, and naïve Bayesian algorithms. The naïve Bayesian algorithm was also used as the meta-level algorithm to combine the base classifier predictions to produce the final classifier. Results from this research show that when a meta-classifier was deployed in series with the Bank’s existing fraud detection algorithm a 24% to 34% performance improvement was achieved resulting in $1.8 to $2.6 million cost savings per year.
|
Page generated in 0.027 seconds