22 research outputs found

    Caste and ritual in a Malwa village

    Get PDF
    Caste is of fundamental importance to Hindus and to students of Hindu society and culture. Caste constitutes the basic element of Hindu social structure. It channelises, to a large extent, the activities, relations and incentives of the people. India is widely known as the classic land of castes, and the word "caste" is universally associated with India and her people. Even non-Hindus, it is said, have not scapted infection, and a number of scholars have drawn our attention to the fact that Muslims and Christians in India are divided into caste-like groups

    Big data security analysis and secure Hadoop server

    No full text
    Hadoop is a so influential technology that’s let us to do incredible things but major thing to secure informative data and environment is a big challenge as there are many bad guys (crackers, hackers) are there to harm the society using this data. Hadoop is now used in retail, banking, and healthcare applications; it has attracted the attention of thieves as well. While storing sensitive huge data, security plays an important role to keep it safe. Security was not that much considered when Hadoop was initially designed. Security is an important topic in Hadoop cluster. Plenty of examples are available in open media on data breaches and most recently was RANSOMEWARE which get access in server level which is more dangerous for an organizations. This is best time to only focus on security at any cost and time needed to secure data and platform. Hadoop is designed to run code on a distributed cluster of machines so without proper authentication anyone could submit code and it would be executed. Different projects have started to improve the security of Hadoop. In this thesis, the security of the system in Hadoop version 1, Hadoop version 2 and Hadoop version 3 is evaluated and different security enhancements are proposed, considering security improvements made by the two mentioned projects, Project Apache Knox Gateway, Project Apache Ranger and Apache Sentry, in terms of encryption, authentication, and authorization. This thesis suggests some high-level security improvements using hardening server implementing all best security practices and Kerberos. Hadoop Kerberos-based authentication is currently getting used widely. I am also going to use ElasticSearch method to analyze server errors log data to catch culprit of system and Server parameters, critical system alert notification with NetDat

    DOI:10.1068/htjr049 Relationships between thermal pressure and volume expansion for solids at high temperatures

    No full text
    Abstract. Relationships between thermal pressure and volume expansion with temperature reported in the literature are examined for NaCl, KCl, MgO, and CaO. Volume expansions are calculated for the solids under study at higher temperatures, up to their melting temperatures. The results are compared with experimental data obtained from density measurements reporte

    Optimal Ordering Quantities for Substitutable Items Under Joint Replenishment with Cost of Substitution

    No full text
    An inventory system of two mutually substitutable items has been studied where an item is out of stock, demand for it is met by the other item and any part of demand not met due to unavailability of the other item is lost. In the event of substitution, there is an additional cost of substitution involved for each unit of the substituted item. The demands are assumed to be deterministic and constant. Items are ordered jointly in each ordering cycle, in order to take advantage of joint replenishment. The problem is formulated and a solution procedure is suggested to determine the optimal ordering quantities that minimize the total inventory cost. The critical value of the substitution rate is defined to help in deciding the optimal value of decision parameters. Extensive numerical experimentation is carried out, which shows that prior knowledge of the critical value of the substitution rate helps to minimize the total inventory cost. Sensitivity analysis is carried out for the improvement in the optimal total cost with substitution as compared to the case without substitution to draw insights into the behaviour of the model. (original abstract
    corecore