Repository of University of Nova Gorica

Search the repository
A+ | A- | Help | SLO | ENG

Query: search in
search in
search in
search in
* old and bolonia study programme

Options:
  Reset


51 - 60 / 74
First pagePrevious page12345678Next pageLast page
51.
Return to materialism: between 10th and 11th Theses of Feuerbach”, in Encountering Althusser
Gal Kirn, 2013, independent scientific component part or a chapter in a monograph

Found in: ključnih besedah
Summary of found: ...to marx, althusser between political and theoretical analysis, new materialism...
Keywords: 10th thesis, 11th thesis on feuerbach, return to marx, althusser between political and theoretical analysis, new materialism
Published: 19.08.2020; Views: 811; Downloads: 0
.pdf Fulltext (3,11 MB)

52.
53.
Studying TDEs in the era of LSST
Katja Bricman, Andreja Gomboc, 2019, published scientific conference contribution abstract

Found in: ključnih besedah
Summary of found: ...end-to-end LSST simulation framework. Based on the analysis of simulated light curves we estimate the...
Keywords: The observing strategy with continuous scanning and large sky coverage of the upcoming ground-based Large Synoptic Survey Telescope (LSST) will make it a perfect tool in search of rare transients, such as Tidal Disruption Events (TDEs). Bright optical flares resulting from tidal disruption of stars by their host supermassive black hole (SMBH) can provide us with important information about the mass of the SMBH involved in the disruption and thus enable the study of quiescent SMBHs, which represent a large majority of SMBHs found in centres of galaxies. These types of transients are extremely rare, with only about few tens of candidates discovered so far. It is expected that the LSST will provide a large sample of new TDE light curves. Here we present simulations of TDE observations using an end-to-end LSST simulation framework. Based on the analysis of simulated light curves we estimate the number of TDEs with good quality light curves the LSST is expected to discover in 10 years of observations. In addition, we investigate whether TDEs observed by the LSST could be used to probe the SMBH mass distribution in the universe. The participation at this conference is supported by the Action CA16104 Gravitational waves, black holes and fundamental physics (GWverse), supported by COST (European Cooperation in Science and Technology).
Published: 04.01.2021; Views: 785; Downloads: 0

54.
Built to Be Torn Down, Fed to Be Starved, Resurrected to Be Disposed Of
Gal Kirn, Niloufar Tajeri, 2021, independent scientific component part or a chapter in a monograph

Found in: ključnih besedah
Summary of found: ...subject, surplus population, class and race in analysis of riots, memory of uprisings, dissent...
Keywords: riot from above, urban regeneration, urban destruction, the dispossessed, riotous subject, surplus population, class and race in analysis of riots, memory of uprisings, dissent
Published: 05.01.2021; Views: 685; Downloads: 0
.pdf Fulltext (681,06 KB)

55.
56.
Observational evidence in favor of scale-free evolution of sunspot groups
Alexander Shapoval, Jean-Louis Le Mouël, M. Shnirman, Vincent Courtillot, 2018, original scientific article

Found in: ključnih besedah
Keywords: sunspots, sun, magnetic fields, data analysis
Published: 23.03.2021; Views: 573; Downloads: 19
.pdf Fulltext (451,74 KB)
This document has many files! More...

57.
Dynamics of sunspot series on time scales from days to years
Jean-Louis Le Mouël, M. Shnirman, Vincent Courtillot, Alexander Shapoval, 2017, original scientific article

Found in: ključnih besedah
Keywords: sunspots series, average lifetime, average birthrate, data analysis
Published: 30.03.2021; Views: 509; Downloads: 18
.pdf Fulltext (1,52 MB)
This document has many files! More...

58.
Internet traffic surveillance & network monitoring in India
Rajan Gupta, Sunil K. Muttoo, 2016, original scientific article

Abstract: Internet traffic surveillance is gaining importance in today’s digital world. Lots of international agencies are putting in efforts to monitor the network around their countries to see suspicious activities and illegal or illegitimate transmission of messages. India, being a center of attraction for terrorist activities, is also working towards the development of such surveillance systems. NETRA or Network Traffic Analysis is one such effort being taken by the Indian Government to filter suspicious keywords from messages in the network. But is it good enough to be used at the highest level for security analysis or does the system design needs to be improved as compared to other similar systems around the world; this question is answered through this study. The comparison of NETRA is done against Dish Fire, Prism, and Echelon. The design of the NETRA scheme and implementation level analysis of the system shows few weaknesses like limited memory options, limited channels for monitoring, pre-set filters, ignoring big data demands, security concerns, social values breach and ignoring ethical issues. These can be covered through alternate options which can improve the existing system. The Inclusion of self-similarity models, Self-Configuring Network Monitoring, and smart monitoring through early intrusion detections can be embedded in the architecture of existing surveillance system to give it more depth and make it more robust.
Found in: ključnih besedah
Summary of found: ...such surveillance systems. NETRA or Network Traffic Analysis is one such effort being taken by...
Keywords: cyber attacks, NETRA, network monitoring, network traffic analysis, surveillance system, spy system
Published: 01.04.2021; Views: 385; Downloads: 17
URL Fulltext (0,00 KB)
This document has many files! More...

59.
Design and analysis of new shuffle encryption schemes for multimedia
Rajan Gupta, Ankur Aggarwal, Saibal K. Pal, 2012, original scientific article

Abstract: Securing the contents of visual data and multimedia requires specific design consideration for use in different applications. The major issue with this type of data has been occurrence of redundancy, at various places particularly in images, which makes data values repetitive at several places. The focus of this paper is on design of new shuffling schemes that can efficiently destroy redundancy in the visual data ensuring its secured transmission and distribution over public networks. Different variants of these shuffling schemes will be used as pre-processing schemes on multimedia data values especially in light weight devices using images. Standard as well as chaotic permutation and substitution schemes together with S-box rotation have been used to shuffle and map the plain data into random uncorrelated values via various variants of the presented schemes. For further improving the security, the processed data is encrypted using a computationally fast algorithm in its normal mode of operation. Security analysis using different types of images show that the proposed schemes satisfy the parameters required for securing visual contents even with very high redundancy.
Found in: ključnih besedah
Keywords: multimedia security, shuffle, S-box, chaotic encryption, security analysis
Published: 01.04.2021; Views: 443; Downloads: 0
.pdf Fulltext (1,06 MB)

60.
A novel lightweight encryption scheme for multimedia data
Neeharika Chaudhary, Saibal K. Pal, Rajan Gupta, 2014, original scientific article

Abstract: The usage of Multimedia data has increased by many folds in recent years. And with so many different types of devices available to access the data, it becomes imperative to protect its sanctity. In this paper, a novel lightweight encryption scheme using a secret key has been proposed for multimedia data especially Videos. Chaos based maps has been used to provide an apt level of confusion and diffusion process at different levels of Video Processing. Proposed technique has a high encryption rate and performs well even with the videos with excessive redundant data. Security Analysis has been performed to validate the high security features against different types of Statistical and Differential attacks and helps to prove the effectiveness of proposed system.
Found in: ključnih besedah
Summary of found: ...with the videos with excessive redundant data. Security Analysis has been performed to validate the high...
Keywords: chaotic maps, lightweight schemes, multimedia encryption, security analysis
Published: 01.04.2021; Views: 478; Downloads: 2
URL Fulltext (0,00 KB)
This document has many files! More...

Search done in 0 sec.
Back to top