1,427 research outputs found

    Celebrating Womanhood: How better menstrual hygiene management is the path to better health, dignity and business

    Get PDF
    On International Women's Day in 2013, Water Supply and Sanitation Collaborative Councilheld Celebrating Womanhood: Menstrual Hygiene Management, a unique event that brought together a wide and deep range of participants to focus on issues related to menstruation. The event provided a chance to forge new connections and to make the "unspeakable" topic speakable. As the report describes, menstruation is still a taboo issue and has been neglected within WASH and in the field of human rights, but research and promising approaches and partnerships are already underway

    Obfuscating Against Side-Channel Power Analysis Using Hiding Techniques for AES

    Get PDF
    The transfer of information has always been an integral part of military and civilian operations, and remains so today. Because not all information we share is public, it is important to secure our data from unwanted parties. Message encryption serves to prevent all but the sender and recipient from viewing any encrypted information as long as the key stays hidden. The Advanced Encryption Standard (AES) is the current industry and military standard for symmetric-key encryption. While AES remains computationally infeasible to break the encrypted message stream, it is susceptible to side-channel attacks if an adversary has access to the appropriate hardware. The most common and effective side-channel attack on AES is Differential Power Analysis (DPA). Thus, countermeasures to DPA are crucial to data security. This research attempts to evaluate and combine two hiding DPA countermeasures in an attempt to further hinder side-channel analysis of AES encryption. Analysis of DPA attack success before and after the countermeasures is used to determine effectiveness of the protection techniques. The results are measured by evaluating the number of traces required to attack the circuit and by measuring the signal-to-noise ratios

    The Cord Weekly (February 28, 1996)

    Get PDF

    The Development of Cursing.

    Get PDF

    The Cowl - v.58 - n.13 - Feb 3, 1994

    Get PDF
    The Cowl - student newspaper of Providence College. Volume 58, Number 13 - February 3, 1994. 27 pages

    Pervasively Distributed Copyright Enforcement

    Get PDF
    In an effort to control flows of unauthorized information, the major copyright industries are pursuing a range of strategies designed to distribute copyright enforcement functions across a wide range of actors and to embed these functions within communications networks, protocols, and devices. Some of these strategies have received considerable academic and public scrutiny, but much less attention has been paid to the ways in which all of them overlap and intersect with one another. This article offers a framework for theorizing this process. The distributed extension of intellectual property enforcement into private spaces and throughout communications networks can be understood as a new, hybrid species of disciplinary regime that locates the justification for its pervasive reach in a permanent state of crisis. This hybrid regime derives its force neither primarily from centralized authority nor primarily from decentralized, internalized norms, but instead from a set of coordinated processes for authorizing flows of information. Although the success of this project is not yet assured, its odds of success are by no means remote as skeptics have suggested. Power to implement crisis management in the decentralized marketplace for digital content arises from a confluence of private and public interests and is amplified by the dynamics of technical standards processes. The emergent regime of pervasively distributed copyright enforcement has profound implications for the production of the networked information society

    Developmental process in mental handicap: a generative structure approach

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.A radical argument is presented that it is plausible to look at the condition of mental handicap as entailing dynamic cognitive processes which may be available to some degree of therapeutic intervention at a fundamental level. An overview of some broad aspects of mental handicap is presented and it is argued that much of the subject of mental handicap is based on assumptions which may not be justified. On the assumption that in normal infancy play is a powerful medium for promoting developmental change, aspects of the mentally handicapped child's inability to play is examined and discussed. This is done by adopting the Piagetian notion of decentration and showing how the concept has explanatory value for looking at change in the severely, or profoundly mentally handicapped child. A model of aspects of the process is developed and implemented as a computer simulation. This model entails he processes of "Integration and Differentiation" of hierarchical chunks. The prospects and usefulness of a developmental curriculum as a framework within which to work with the profoundly and severely mentally retarded is discussed. The notions of Integration and Differentiation are applied to systems of sensori-motor competence and presented as a candidate for a curriculum. A presentation of the Uzgiris & Hunt scales serves to provide the user with the means to understand where the child is "at" in the curriculum. The computer simulation is further developed to show how it could be extended to provide explanations for the effects of success and failure upon developmental process. The model provides an insight into the nature of stereotypy and the implications of the model are explored in a therapy undertaked with a mentally handicapped and withdrawn child. The relationship between the understanding gained here and the processes of normal mothering is introduced. The theme of the mothering process is develcped apd explored as a means of providing the mentally Nandi Gaped child with the experience of success that section 3 suggests is the means for promoting change. This is demonstrated via several case accounts. The transactional interface between the intractable organic and the potentially more plastic cognitive/social process is tentatively explored by a discussion of "eye contact". Finally an evaluative framework for the possible implications of the work are discussed

    On Offensive and Defensive Methods in Software Security

    Get PDF
    corecore