1,600,145 research outputs found

    Three Factor Authentication Using Java Ring and Biometrics

    Get PDF
    Computer security is a growing field in the IT industry. One of the important aspects of the computer security is authentication. Using passwords (something you know) is one of the most common ways of authentications. But passwords have proven to provide weak level of security as they can be easily compromised. Some other ways of authenticating a user are using physical tokens, (something you possess) and biometrics, (something you are). Using any one of these techniques to secure a system always has its own set of threats. One way to make sure a system is secure is to use multiple factors to authenticate. One of the ways to use multiple factors is to use all the three factors of authentication, something you possess, something you are and something you know. This thesis discusses about different ways of authentication and implements a system using three factor authentication. It takes many security aspects of the system into consideration while implementing it, to make it secure

    Three Factor Authentication Using Java Ring and Biometrics

    Get PDF
    Computer security is a growing field in the IT industry. One of the important aspects of the computer security is authentication. Using passwords (something you know) is one of the most common ways of authentications. But passwords have proven to provide weak level of security as they can be easily compromised. Some other ways of authenticating a user are using physical tokens, (something you possess) and biometrics, (something you are). Using any one of these techniques to secure a system always has its own set of threats. One way to make sure a system is secure is to use multiple factors to authenticate. One of the ways to use multiple factors is to use all the three factors of authentication, something you possess, something you are and something you know. This thesis discusses about different ways of authentication and implements a system using three factor authentication. It takes many security aspects of the system into consideration while implementing it, to make it secure

    Analysis of Women Images in to the Lighthouse

    Get PDF
    Through the analysis of the two women Mrs. Ramsay and Lily in To the Lighthouse, this paper makes a comparison between the two figures. It is found that they are different in many ways but at the same time have something in common. The two women represent the two sides of women. Only these two sides are united, the woman is completed

    An Independent Identity

    Get PDF
    Much of my time in graduate school was spent pondering the very basic question, what is art? My experience was that certain distinctions separate the Illustration and Fine Art disciplines. This is something I have wrestled with. One common component between the disciplines, however, is the aspiration to communicate ideas and feelings. It is not so much the medium or mode of expression that is important as is the content. To this end, mortality is the one universally relatable truth all human beings share. The opposing ways in which different cultures have understood, accepted, and expressed this is something which greatly interests me. Part of what I am presenting in this text is an account of my work as a visual artist as it relates to spiritual reality, religious belief, and faith. These things, in varying degrees, have always been inextricably related to my work

    Colin McCahon and the Visible Mystery of Painting

    Get PDF
    This essay brings together two paintings that on the surface seem to have very little in common: one dates from 1528–29 (The Visitation by the Italian late Renaissance painter Jacopo Carucci, better known as Pontormo after his birthplace), the other from 1968 (Visible Mysteries no. 8 by Colin McCahon). They are brought together here because they share the same subject matter: the central Catholic doctrine of the Incarnation, the mystery of God’s word becoming flesh, and the belief that divine and human natures are united. These two paintings can, in both similar and different ways, teach us something about the visible mystery that is painting

    Colin McCahon and the Visible Mystery of Painting

    Get PDF
    This essay brings together two paintings that on the surface seem to have very little in common: one dates from 1528–29 (The Visitation by the Italian late Renaissance painter Jacopo Carucci, better known as Pontormo after his birthplace), the other from 1968 (Visible Mysteries no. 8 by Colin McCahon). They are brought together here because they share the same subject matter: the central Catholic doctrine of the Incarnation, the mystery of God’s word becoming flesh, and the belief that divine and human natures are united. These two paintings can, in both similar and different ways, teach us something about the visible mystery that is painting

    Epic and identity : national, regional, communal, individual

    Get PDF
    The ethnologists and folklorists present at the meeting agreed that the term was used in three different ways, firstly, "tradition as something that is handed down in a continuous process of transmission." This meaning was the least interesting of the three, because it reflected only the most common everyday usage found in dictionaries. It seemed to lack analytic power; that is, it was not problematic in a fruitful way. The second meaning, "tradition as the stuff out of which cultures are made and which we have deposited in our folklore archives," was problematic because it raised the question of how tradition and culture relate to each other. Tradition was seen as a haphazard collection of material and immaterial items. The third meaning, "tradition as something representative of a social group (based on selection by members of the group or by outside agents)," proved to be the actual core of the debate. As in the previous case, an additional term offered itself" "group identity." The third meaning clearly referred to those elements in the traditions of a group that signify the group's typicality, its character and possibly uniqueness.Issue title; "Epics Along the Silk Roads.

    From Divine to Design:Unearthing Groundwater Practices in Tamil Nadu, India

    Get PDF
    This paper describes two common groundwater logics in Tamil Nadu: that of dowsing and that of modelling. Both rely on intimate knowledge and great dedication but have legitimacy and status in different communities. Groundwater experts celebrate and value modelling for assessing well and aquifer conditions, but – at least when among peers – dismiss dowsing logics for being 'non-scientific'. Farmers and others interested in digging and drilling wells, on the other hand, routinely call in the help of dowsers, or water diviners, for determining well locations (and often depths). Rather than entering the science-dowsing controversy, this paper starts from the observation that modellers indubitably make use of the wisdom of dowsers: they use known well locations and depths to make their predictions more accurate and sensitive. This is why we think it is worthwhile to assess the practices of both in a more symmetrical way. For this we engage in a care-ful comparison of these two ways of knowing, showing that despite their differences, modelling and dowsing have many things in common. Both require years of education and training, and both modellers and dowsers take pride in being meticulous and insist on the need for repetition and fine-tuning to perfect their routines – that is, to mathematically represent aquifers or magnetically sense groundwater flows. So, does dowsing or divining as a 'beyond scientific' form of knowing have something to offer when it comes to sustainable groundwater governance? The ways in which a water diviner practises care – seeks to improve farmer livelihoods, gets compensated, and senses the right place for a well (which is not about whether you could, but also whether you should dig at a certain location) – suggests that this may be so.</p

    Dust

    Get PDF
    Dust is a dystopian novel centered on the effects of inaction in our combat with climate change. Set in the future (around the year 2150), the world is a much different place. The Earth has turned into a hot and overused world which is devoid of most of the plants and animals that exist today. Desertification has occurred on much of the Earth and sand and dust have become prominent in place of grasslands and forests. One of the common motifs of the book is, as the title suggests, this dust. Dust is looked at in many different ways throughout the book, symbolizing aspects of the storyline and showing that things can often be two-sided and multilayered. At times dust is viewed as a hindrance to the characters – something stifling and perilous, but dust is also viewed as beautiful and renewing – something that has a rejuvenating effect. This novel explores the themes of family and connection in a time when these things are hard to come by. The characters search for ways to regain part of what was lost, while slowly realizing that they have a lot already to begin with. As they each go through challenges in their own lives, all while fleeing from danger at every turn, the characters slowly learn the importance of maintaining humanity in a time when it appears to have been lost. The theme of age also plays an integral role in this book, with the characters all being different ages from eight to nineteen. This theme plays a part not just in emphasizing the unique perspectives of characters, but showing that every one of us, no matter how old we are, can bring something valuable to the world
    • …
    corecore