627 resultados para energy security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A long-running issue in appetite research concerns the influence of energy expenditure on energy intake. More than 50 years ago, Otto G. Edholm proposed that "the differences between the intakes of food [of individuals] must originate in differences in the expenditure of energy". However, a relationship between energy expenditure and energy intake within any one day could not be found, although there was a correlation over 2 weeks. This issue was never resolved before interest in integrative biology was replaced by molecular biochemistry. Using a psychobiological approach, we have studied appetite control in an energy balance framework using a multi-level experimental system on a single cohort of overweight and obese human subjects. This has disclosed relationships between variables in the domains of body composition [fat-free mass (FFM), fat mass (FM)], metabolism, gastrointestinal hormones, hunger and energy intake. In this Commentary, we review our own and other data, and discuss a new formulation whereby appetite control and energy intake are regulated by energy expenditure. Specifically, we propose that FFM (the largest contributor to resting metabolic rate), but not body mass index or FM, is closely associated with self-determined meal size and daily energy intake. This formulation has implications for understanding weight regulation and the management of obesity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: There are strong logical reasons why energy expended in metabolism should influence the energy acquired in food-intake behavior. However, the relation has never been established, and it is not known why certain people experience hunger in the presence of large amounts of body energy. Objective: We investigated the effect of the resting metabolic rate (RMR) on objective measures of whole-day food intake and hunger. Design: We carried out a 12-wk intervention that involved 41 overweight and obese men and women [mean ± SD age: 43.1 ± 7.5 y; BMI (in kg/m2): 30.7 ± 3.9] who were tested under conditions of physical activity (sedentary or active) and dietary energy density (17 or 10 kJ/g). RMR, daily energy intake, meal size, and hunger were assessed within the same day and across each condition. Results: We obtained evidence that RMR is correlated with meal size and daily energy intake in overweight and obese individuals. Participants with high RMRs showed increased levels of hunger across the day (P < 0.0001) and greater food intake (P < 0.00001) than did individuals with lower RMRs. These effects were independent of sex and food energy density. The change in RMR was also related to energy intake (P < 0.0001). Conclusions: We propose that RMR (largely determined by fat-free mass) may be a marker of energy intake and could represent a physiologic signal for hunger. These results may have implications for additional research possibilities in appetite, energy homeostasis, and obesity. This trial was registered under international standard identification for controlled trials as ISRCTN47291569.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Clean Development Mechanism (CDM) has been praised for its ingenuity in mobilising finance to implement sustainable development practices in non-industrialised countries (known as Non-Annex 1 parties under the Kyoto Protocol). During the first commitment period of the Kyoto Protocol (2008-2012), a large number of clean development mechanism projects have been registered with the CDM board. In addition to the large number of registered CDM projects, there are significant numbers of proposed projects stalled in implementation due to the cumbersome and lengthy CDM approval process. Despite this regulatory criticism it is recognised that the role performed by the CDM is essential for achieving a significant reduction in global green house gas emissions. This is because the CDM funds sustainable development in countries that lack capacity to do so on their own. It is anticipated that some form of CDM instrument will continue post the 2012 timeframe and that reform of the mechanism will be focused around making the mechanism’s approval and implementation processes faster and more efficient.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reviews electricity consumption feedback literature to explore the potential of electricity feedback to affect residential consumers’ electricity usage patterns. The review highlights a substantial amount of literature covering the debate over the effectiveness of different feedback criteria to residential customer acceptance and overall conservation and peak demand reduction. Researchers studying the effects of feedback on everyday energy use have observed substantial variation in effect size, both within and between studies. Although researchers still continue to question the types of feedback that are most effective in encouraging conservation and peak load reduction, some trends have emerged. These include that feedback be received as quickly as possible to the time of consumption; be related to a standard; be clear and meaningful and where possible both direct and indirect feedback be customised to the customer. In general, the literature finds that feedback can reduce electricity consumption in homes by 5 to 20 per cent, but that significant gaps remain in our knowledge of the effectiveness and cost benefit of feedback.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Threats against computer networks evolve very fast and require more and more complex measures. We argue that teams respectively groups with a common purpose for intrusion detection and prevention improve the measures against rapid propagating attacks similar to the concept of teams solving complex tasks known from field of work sociology. Collaboration in this sense is not easy task especially for heterarchical environments. We propose CIMD (collaborative intrusion and malware detection) as a security overlay framework to enable cooperative intrusion detection approaches. Objectives and associated interests are used to create detection groups for exchange of security-related data. In this work, we contribute a tree-oriented data model for device representation in the scope of security. We introduce an algorithm for the formation of detection groups, show realization strategies for the system and conduct vulnerability analysis. We evaluate the benefit of CIMD by simulation and probabilistic analysis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a virtual test bed for network security evaluation in mid-scale telecommunication networks. Migration from simulation scenarios towards the test bed is supported and enables researchers to evaluate experiments in a more realistic environment. We provide a comprehensive interface to manage, run and evaluate experiments. On basis of a concrete example we show how the proposed test bed can be utilized.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fourteen new complexes of the form cis-\[RuIIX2(R2qpy2+)2]4+ (R2qpy2+ = a 4,4′:2′,2″:4″,4‴-quaterpyridinium ligand, X = Cl− or NCS−) have been prepared and isolated as their PF6− salts. Characterisation involved various techniques including 1H NMR spectroscopy and +electrospray or MALDI mass spectrometry. The UV–Vis spectra display intense intraligand π → π∗ absorptions, and also metal-to-ligand charge-transfer (MLCT) bands with two resolved maxima in the visible region. Red-shifts in the MLCT bands occur as the electron-withdrawing strength of the pyridinium groups increases, while replacing Cl− with NCS− causes blue-shifts. Cyclic voltammograms show quasi-reversible or reversible RuIII/II oxidation waves, and several ligand-based reductions that are irreversible. The variations in the redox potentials correlate with changes in the MLCT energies. A single-crystal X-ray structure has been obtained for a protonated form of a proligand salt, \[(4-(CO2H)Ph)2qpyH3+]\[HSO4]3·3H2O. Time-dependent density functional theory calculations give adequate correlations with the experimental UV–Vis spectra for the two carboxylic acid-functionalised complexes in DMSO. Despite their attractive electronic absorption spectra, these dyes are relatively inefficient photosensitisers on electrodes coated with TiO2 or ZnO. These observations are attributed primarily to weak electronic coupling with the surfaces, since the DFT-derived LUMOs include no electron density near the carboxylic acid anchors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We introduce the Network Security Simulator (NeSSi2), an open source discrete event-based network simulator. It incorporates a variety of features relevant to network security distinguishing it from general-purpose network simulators. Compared to the predecessor NeSSi, it was extended with a three-tier plugin architecture and a generic network model to shift its focus towards simulation framework for critical infrastructures. We demonstrate the gained adaptability by different use cases

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Session Initiation Protocol (SIP) is developed to provide advanced voice services over IP networks. SIP unites telephony and data world, permitting telephone calls to be transmitted over Intranets and Internet. Increase in network performance and new mechanisms for guaranteed quality of service encourage this consolidation to provide toll cost savings. Security comes up as one of the most important issues when voice communication and critical voice applications are considered. Not only the security methods provided by traditional telephony systems, but also additional methods are required to overcome security risks introduced by the public IP networks. SIP considers security problems of such a consolidation and provides a security framework. There are several security methods defined within SIP specifications and extensions. But, suggested methods can not solve all the security problems of SIP systems with various system requirements. In this thesis, a Kerberos based solution is proposed for SIP security problems, including SIP authentication and privacy. The proposed solution tries to establish flexible and scalable SIP system that will provide desired level of security for voice communications and critical telephony applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An engaging narrative is maintained throughout this edited collection of articles that address the issue of militarism in international relations. The book seamlessly integrates historical and contemporary perspectives on militarism with theory and relevant international case studies, resulting in a very informative read. The work is comprised of three parts. Part 1 deals with the theorisation of militarism and includes chapters by Anna Stavrianakis and Jan Selby, Martin Shaw, Simon Dalby, and Nicola Short. It covers a range of topics relating to historical and contemporary theories of militarism, geopolitical threat construction, political economy, and the US military’s ‘cultural turn’.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present and analyze several gaze-based graphical password schemes based on recall and cued-recall of grid points; eye-trackers are used to record user's gazes, which can prevent shoulder-surfing and may be suitable for users with disabilities. Our 22-subject study observes that success rate and entry time for the grid-based schemes we consider are comparable to other gaze-based graphical password schemes. We propose the first password security metrics suitable for analysis of graphical grid passwords and provide an in-depth security analysis of user-generated passwords from our study, observing that, on several metrics, user-generated graphical grid passwords are substantially weaker than uniformly random passwords, despite our attempts at designing schemes to improve quality of user-generated passwords.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A composite paraffin-based phase change material (PCM) was prepared by blending composite paraffin and calcined diatomite through the fusion adsorption method. In this study, raw diatomite was purified by thermal treatment in order to improve the adsorption capacity of diatomite, which acted as a carrier material to prepare shape-stabilized PCMs. Two forms of paraffin (paraffin waxes and liquid paraffin) with different melting points were blended together by the fusion method, and the optimum mixed proportion with a suitable phase-transition temperature was obtained through differential scanning calorimetry (DSC) analysis. Then the prepared composite paraffin was adsorbed in calcined diatomite. The prepared paraffin/calcined diatomite composites were characterized by the scanning electron microscope (SEM) and Fourier transformation infrared (FT-IR) analysis techniques. Thermal energy storage properties of the composite PCMs were determined by DSC method. DSC results showed that there was an optimum adsorption ratio between composite paraffin and calcined diatomite and the phase-transition temperature and the latent heat of the composite PCMs were 33.04 ◦C and 89.54 J/g, respectively. Thermal cycling test of composite PCMs showed that the prepared material is thermally reliable and chemically stable. The obtained paraffin/calcined diatomite composites have proper latent heat and melting temperatures, and show practical significance and good potential application value.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Vibration Based Damage Identification Techniques which use modal data or their functions, have received significant research interest in recent years due to their ability to detect damage in structures and hence contribute towards the safety of the structures. In this context, Strain Energy Based Damage Indices (SEDIs), based on modal strain energy, have been successful in localising damage in structuers made of homogeneous materials such as steel. However, their application to reinforced concrete (RC) structures needs further investigation due to the significant difference in the prominent damage type, the flexural crack. The work reported in this paper is an integral part of a comprehensive research program to develop and apply effective strain energy based damage indices to assess damage in reinforced concrete flexural members. This research program established (i) a suitable flexural crack simulation technique, (ii) four improved SEDI's and (iii) programmable sequentional steps to minimise effects of noise. This paper evaluates and ranks the four newly developed SEDIs and existing seven SEDIs for their ability to detect and localise flexural cracks in RC beams. Based on the results of the evaluations, it recommends the SEDIs for use with single and multiple vibration modes.