20 resultados para Protection of Privacy
em Universidad Politécnica de Madrid
Resumo:
The HiPER project, phase 4a, is evolving. In this study we present the progress made in the field of neutronics and radiological protection for an integrated design of the facility. In the current model, we take into account the optical systems inside the target bay, as well as the remote handling requirements and related infrastructure, together with different shields. The last reference irradiation scenario, consisting of 20 MJ of neutron yields, 5 yields per burst, one burst every week and 30 years of expected lifetime is considered for this study. We have performed a characterization of the dose rates behavior in the facility, both during operation and between bursts. The dose rates are computed for workers, regarding to maintenance and handling, and also for optical systems, regarding to damage. Furthermore, we have performed a waste management assessment of all the components inside the target bay. Results indicate that remote maintenance is mandatory in some areas. The small beam penetrations in the shields are responsible for some high doses in some specific locations. With regards to optics, the residual doses are as high as prompt doses. It is found that the whole target bay may be fully managed as a waste in 30 years by recycling and/or clearance, with no need for burial.
Resumo:
Analysis of the "European Charter on General Principles for Protection of the Environment and Sustainable Development" The Council of Europe Document CO-DBP (2003) 2
Resumo:
Final lenses in laser fusion plants. Challenges for the protection of the final lenses. Plasmonic nanoparticles. Radiation resistance
Resumo:
Análisis de la atenuación del oleaje por un carguero funcionando como dique flotante y aplicación a dos casos de protección portuaria y costera. The effectiveness of a bulk carrier working as a detached floating breakwater to protect a stretch of coast and form salients or tombolos is assessed in this paper. Experiments were conducted in the Madrid CEDEX facilities in a 30 m long, 3 m wide, 1/150 scale flume. The bulk carrier ship is 205 m long, 29 m wide and 18 m in height with a draught of 13 m, and has been subjected to irregular waves with significant heights from 2 m to 4 m and peak periods from 6 s to 12 s at a depth of 15 m, all prototype dimensions. Three probes were placed between the wave paddle and the ship to record incident and reflected waves and four probes were placed between the ship and the coastline to measure the transmitted waves. Transmission, reflection and dissipation coefficients (Ct, Cr, Cd) were calculated to determine wave attenuation. Results show good shelter in the lee of the ship with values of Ct under 0.5 for peak periods from 6 s to 11 s. In addition, forces on the mooring chains were measured showing maximum values of about 2000 tons at a 10 speak period. Finally, two analytical models were used to determine the shoreline’s response to the ship’s protection and to assess the possible forming of salients or tombolos. According to the results, salients - but not tombolos - are formed in all tests.
Resumo:
Participatory Sensing combines the ubiquity of mobile phones with sensing capabilities of Wireless Sensor Networks. It targets pervasive collection of information, e.g., temperature, traffic conditions, or health-related data. As users produce measurements from their mobile devices, voluntary participation becomes essential. However, a number of privacy concerns -- due to the personal information conveyed by data reports -- hinder large-scale deployment of participatory sensing applications. Prior work on privacy protection, for participatory sensing, has often relayed on unrealistic assumptions and with no provably-secure guarantees. The goal of this project is to introduce PEPSI: a Privacy-Enhanced Participatory Sensing Infrastructure. We explore realistic architectural assumptions and a minimal set of (formal) privacy requirements, aiming at protecting privacy of both data producers and consumers. We design a solution that attains privacy guarantees with provable security at very low additional computational cost and almost no extra communication overhead.
Resumo:
In the last several years, micro-blogging Online Social Networks (OSNs), such as Twitter, have taken the world by storm, now boasting over 100 million subscribers. As an unparalleled stage for an enormous audience, they offer fast and reliable centralized diffusion of pithy tweets to great multitudes of information-hungry and always-connected followers. At the same time, this information gathering and dissemination paradigm prompts some important privacy concerns about relationships between tweeters, followers and interests of the latter. In this paper, we assess privacy in today?s Twitter-like OSNs and describe an architecture and a trial implementation of a privacy-preserving service called Hummingbird. It is essentially a variant of Twitter that protects tweet contents, hashtags and follower interests from the (potentially) prying eyes of the centralized server. We argue that, although inherently limited by Twitter?s mission of scalable information-sharing, this degree of privacy is valuable. We demonstrate, via a working prototype, that Hummingbird?s additional costs are tolerably low. We also sketch out some viable enhancements that might offer better privacy in the long term.
Resumo:
Which is the economic value of personal information? -How the exchange of information is benefiting society and the economy -How companies create value from personal information (by providing new services or servicing better an existing need). -The mechanisms by which personal information exchange creates economic value - How the level of privacy protection influences value creation in different markets
Resumo:
El extraordinario auge de las nuevas tecnologías de la información, el desarrollo de la Internet de las Cosas, el comercio electrónico, las redes sociales, la telefonía móvil y la computación y almacenamiento en la nube, han proporcionado grandes beneficios en todos los ámbitos de la sociedad. Junto a éstos, se presentan nuevos retos para la protección y privacidad de la información y su contenido, como la suplantación de personalidad y la pérdida de la confidencialidad e integridad de los documentos o las comunicaciones electrónicas. Este hecho puede verse agravado por la falta de una frontera clara que delimite el mundo personal del mundo laboral en cuanto al acceso de la información. En todos estos campos de la actividad personal y laboral, la Criptografía ha jugado un papel fundamental aportando las herramientas necesarias para garantizar la confidencialidad, integridad y disponibilidad tanto de la privacidad de los datos personales como de la información. Por otro lado, la Biometría ha propuesto y ofrecido diferentes técnicas con el fin de garantizar la autentificación de individuos a través del uso de determinadas características personales como las huellas dáctilares, el iris, la geometría de la mano, la voz, la forma de caminar, etc. Cada una de estas dos ciencias, Criptografía y Biometría, aportan soluciones a campos específicos de la protección de datos y autentificación de usuarios, que se verían enormemente potenciados si determinadas características de ambas ciencias se unieran con vistas a objetivos comunes. Por ello es imperativo intensificar la investigación en estos ámbitos combinando los algoritmos y primitivas matemáticas de la Criptografía con la Biometría para dar respuesta a la demanda creciente de nuevas soluciones más técnicas, seguras y fáciles de usar que potencien de modo simultáneo la protección de datos y la identificacíón de usuarios. En esta combinación el concepto de biometría cancelable ha supuesto una piedra angular en el proceso de autentificación e identificación de usuarios al proporcionar propiedades de revocación y cancelación a los ragos biométricos. La contribución de esta tesis se basa en el principal aspecto de la Biometría, es decir, la autentificación segura y eficiente de usuarios a través de sus rasgos biométricos, utilizando tres aproximaciones distintas: 1. Diseño de un esquema criptobiométrico borroso que implemente los principios de la biometría cancelable para identificar usuarios lidiando con los problemas acaecidos de la variabilidad intra e inter-usuarios. 2. Diseño de una nueva función hash que preserva la similitud (SPHF por sus siglas en inglés). Actualmente estas funciones se usan en el campo del análisis forense digital con el objetivo de buscar similitudes en el contenido de archivos distintos pero similares de modo que se pueda precisar hasta qué punto estos archivos pudieran ser considerados iguales. La función definida en este trabajo de investigación, además de mejorar los resultados de las principales funciones desarrolladas hasta el momento, intenta extender su uso a la comparación entre patrones de iris. 3. Desarrollando un nuevo mecanismo de comparación de patrones de iris que considera tales patrones como si fueran señales para compararlos posteriormente utilizando la transformada de Walsh-Hadarmard. Los resultados obtenidos son excelentes teniendo en cuenta los requerimientos de seguridad y privacidad mencionados anteriormente. Cada uno de los tres esquemas diseñados han sido implementados para poder realizar experimentos y probar su eficacia operativa en escenarios que simulan situaciones reales: El esquema criptobiométrico borroso y la función SPHF han sido implementados en lenguaje Java mientras que el proceso basado en la transformada de Walsh-Hadamard en Matlab. En los experimentos se ha utilizado una base de datos de imágenes de iris (CASIA) para simular una población de usuarios del sistema. En el caso particular de la función de SPHF, además se han realizado experimentos para comprobar su utilidad en el campo de análisis forense comparando archivos e imágenes con contenido similar y distinto. En este sentido, para cada uno de los esquemas se han calculado los ratios de falso negativo y falso positivo. ABSTRACT The extraordinary increase of new information technologies, the development of Internet of Things, the electronic commerce, the social networks, mobile or smart telephony and cloud computing and storage, have provided great benefits in all areas of society. Besides this fact, there are new challenges for the protection and privacy of information and its content, such as the loss of confidentiality and integrity of electronic documents and communications. This is exarcebated by the lack of a clear boundary between the personal world and the business world as their differences are becoming narrower. In both worlds, i.e the personal and the business one, Cryptography has played a key role by providing the necessary tools to ensure the confidentiality, integrity and availability both of the privacy of the personal data and information. On the other hand, Biometrics has offered and proposed different techniques with the aim to assure the authentication of individuals through their biometric traits, such as fingerprints, iris, hand geometry, voice, gait, etc. Each of these sciences, Cryptography and Biometrics, provides tools to specific problems of the data protection and user authentication, which would be widely strengthen if determined characteristics of both sciences would be combined in order to achieve common objectives. Therefore, it is imperative to intensify the research in this area by combining the basics mathematical algorithms and primitives of Cryptography with Biometrics to meet the growing demand for more secure and usability techniques which would improve the data protection and the user authentication. In this combination, the use of cancelable biometrics makes a cornerstone in the user authentication and identification process since it provides revocable or cancelation properties to the biometric traits. The contributions in this thesis involve the main aspect of Biometrics, i.e. the secure and efficient authentication of users through their biometric templates, considered from three different approaches. The first one is designing a fuzzy crypto-biometric scheme using the cancelable biometric principles to take advantage of the fuzziness of the biometric templates at the same time that it deals with the intra- and inter-user variability among users without compromising the biometric templates extracted from the legitimate users. The second one is designing a new Similarity Preserving Hash Function (SPHF), currently widely used in the Digital Forensics field to find similarities among different files to calculate their similarity level. The function designed in this research work, besides the fact of improving the results of the two main functions of this field currently in place, it tries to expand its use to the iris template comparison. Finally, the last approach of this thesis is developing a new mechanism of handling the iris templates, considering them as signals, to use the Walsh-Hadamard transform (complemented with three other algorithms) to compare them. The results obtained are excellent taking into account the security and privacy requirements mentioned previously. Every one of the three schemes designed have been implemented to test their operational efficacy in situations that simulate real scenarios: The fuzzy crypto-biometric scheme and the SPHF have been implemented in Java language, while the process based on the Walsh-Hadamard transform in Matlab. The experiments have been performed using a database of iris templates (CASIA-IrisV2) to simulate a user population. The case of the new SPHF designed is special since previous to be applied i to the Biometrics field, it has been also tested to determine its applicability in the Digital Forensic field comparing similar and dissimilar files and images. The ratios of efficiency and effectiveness regarding user authentication, i.e. False Non Match and False Match Rate, for the schemes designed have been calculated with different parameters and cases to analyse their behaviour.
Resumo:
Questions relating to the transport of radioactive materials are very much an issue of current interest due to the increasing mobility of the materials involved in the nuclear fuel cycle, commitment to the environment, the safety and protection of persons and the corresponding regulatory legal framework. The radiological impact associated with this type of transport was assessed by means of a new data-processing tool that may be of use and serve as complementary documentation to that included in transport regulations. Thus, by determining the level of radiation at a distance of one metre from the transport vehicle and by selecting a route, the associated impacts will be obtained, such as the affected populations, the dose received by the most highly exposed individual, the overall radiological impact, the doses received by the population along the route and the possible detriment to their health. The most important conclusion is that the emissions of ionising radiation from the transport of radioactive material by road in Spain are not significant as regards the generation of adverse effects on human health, and that their radiological impact may be considered negligible.
Resumo:
Ozone (O3) phytotoxicity has been reported on a wide range of plant species. However, scarce information has been provided regarding the sensitivity of semi-natural grassland species, especially those from dehesa Mediterranean grasslands, in spite of their great biological diversity and the high O3 levels recorded in the region. A screening study was carried out in open-top chambers (OTCs) to assess the O3-sensitivity of representative therophytes of these ecosystems based on the response of selected growth-related parameters. Three O3 treatments and 3 OTCs per treatment were used. Legume species were very sensitive to O3, because 78% of the tested species showed detrimental effects on their total biomass relative growth rate (RGR) following their exposure to O3. The Trifolium genus was particularly sensitive showing O3-induced adverse effects on most of the assessed parameters. Gramineae plants were less sensitive than Leguminosae species because detrimental effects on total biomass RGR were only observed in 14% of the assessed species. No relationship was found between relative growth rates when growing in clean air and O3 susceptibility. The implications of these effects on the performance of dehesa acidic grasslands and on the definition of ozone critical levels for the protection of semi-natural vegetation are discussed.
Resumo:
Transports of radioactive wastes in Spain are becoming issues of renewed interest, due to the increased mobility of these materials which can be expected after the building and operation of the planned central repository for this country in a near future. Such types of residues will be mainly of the medium and high activity classes and have raised concerns on the safety of the operations, the radiological protection of the individuals, the compliance with the legal regulations and their environmental consequences of all kind. In this study, relevant information for the assessment of radiological risk of road transport were taken into account, as the sources and destination of the radioactive transports, the amount of traveling to be done, the preferred routes and populations affected, the characterization of the residues and containers, their corresponding testing, etc. These data were supplied by different organizations fully related with these activities, like the nuclear power stations, the companies in charge of radioactive transports, the enterprises for inspection and control of the activities, etc., as well as the government institutions which are responsible for the selection and location of the storage facility and other decisions on the nuclear policies of the country. Thus, we have developed a program for computing the data in such a form that by entering the radiation levels at one meter of the transport loads and by choosing a particular displacement, the computer application is capable to calculate the corresponding radiological effects, like the global estimated impact, its relevance to the population in general or on those people living and driving near the main road routes, the doses received by the most exposed individuals (e.g. the workers for loading or driving the vehicle), or the probability of detrimental on the human health. The results of this work could be of help for a better understanding and management of these activities and their related impacts; at the same time that the generated reports of the computer application are considered of particular interest as innovative and complementary information to the current legal documentation, which is basically required for transporting radioactive wastes in the country, according with the international safety rules (like IAEA and ADR).Though main studies are still in progress, as the definite location for the Spanish storage facility has not been decided yet, preliminary results with the existing transports of residues of medium activity indicate that the radiological impact is very low in conventional operations. Nevertheless, the management of these transports is complex and laborious, making it convenient to progress further in the analysis and quantification of this kind of events, which constitutes one of the main objectives of the present study for the radioactive road mobility in Spain.
Resumo:
The aim of this work is to relate the curing conditions of concrete and the addition of an air-entraining admixture with the damage caused by freeze–thaw cycles. In countries with a continental climate, the curing of concrete in summer is performed under climatic conditions of high temperature and low humidity, and during the winter the concrete suffers conditions of freeze–thaw, often accompanied by the use of de-icing salts. This paper shows the experimental results of the behaviour of concrete specimens cured under climatic summer conditions (high temperature and low humidity) and then subjected to freeze–thaw cycles. Curing of the specimens includes conditions of good and bad practice in relation to wetting and protection of the concrete. It also examines the effectiveness of using an air-entraining admixture in both cases. The experimental programme includes an evaluation of the mechanical properties of the concrete, the study of the cement hydration and the measurement of the volume and pore sizes of the concrete. These tests were performed before and after the application of the freeze–thaw cycles. The results obtained showed that the specimens without air-entraining admixture show a deterioration of mechanical properties after the freeze–thaw test. However, the inclusion of air bubbles benefits the behaviour of concrete against freeze–thaw cycles so even better mechanical properties after the test were observed. This anomalous behaviour is because the cement hydration process continues over the freeze–thaw tests, closing the pore structure. This aspect has been confirmed with the DTA and TG tests performed
Resumo:
The figure of protection "micro-reserves" was created in the Region of Valencia (ANONYMOUS, 1994) with the aim of protecting endangered plant species. This is one of the areas of greatest floristic richness and uniqueness of the western Mediterranean. In this area rare, endemic or threatened vascular flora has a peculiar distribution: they appear to form small fragments spread over the entire region (LAGUNA, 1994; LAGUNA, 2001) The protection of every these small populations of great scientific value has significant challenges. It doesn´t try to protect every species that set out in Annex IV of the by then existing Law 4 / 1989 (repealed in 2007), or to protect to the most ecological level with the creation of Natural Protected Area but an intermediate level: the plant community of small size. According to the decree: “as Micro-Reserve will be declared the natural parcels of land under 20 hectares that contain a high concentration of rare plants, endemic, threatened or of high scientific interest” (ANONYMOUS, 1994) . Of course, the statement of an area as micro-reserve carries certain prohibitions that are harmful to the vegetal community
Resumo:
The term cryosphere is used to refer to all portions of the Earth surface where water appears in solid form. This includes the snow cover; sea, lake and river ice; glaciers, ice caps and ice sheets; and permafrost. The aim of this contribution is to present the current state of the cryosphere. Emphasis will be given to sea ice and continental ice masses (glaciers, ice caps and ice sheets), and the contribution of the losses from the latter to sea level rise (SLR).
Resumo:
One of the most significant aspects of a building’s acoustic behavior is the airborne sound insulation of the room façades, since this determines the protection of its inhabitants against environmental noise. For this reason, authorities in most countries have established in their acoustic regulations for buildings the minimum value of sound insulation that must be respected for façades. In order to verify compliance with legal requirements it is usual to perform acoustic measurements in the finished buildings and then compare the measurement results with the established limits. Since there is always a certain measurement uncertainty, this uncertainty must be calculated and taken into account in order to ensure compliance with specifications. The most commonly used method for measuring sound insulation on façades is the so-called Global Loudspeaker Method, specified in ISO 140-5:1998. This method uses a loudspeaker placed outside the building as a sound source. The loudspeaker directivity has a significant influence on the measurement results, and these results may change noticeably by choosing different loudspeakers, even though they all fulfill the directivity requirements of ISO 140-5. This work analyzes the influence of the loudspeaker directivity on the results of façade sound insulation measurement, and determines its contribution to measurement uncertainty. The theoretical analysis is experimentally validated by means of an intermediate precision test according to ISO 5725-3:1994, which compares the values of sound insulation obtained for a façade using various loudspeakers with different directivities