2 resultados para foreign and security policy
em Biblioteca Digital da Produção Intelectual da Universidade de São Paulo
Resumo:
Objective This study analyzed the internal functioning, organization and political participation of the local food and nutrition security council and possible implications of their participation on the creation of a municipal food and nutrition security policy in the city of Sao Paulo. Methods This qualitative study was done in three stages: document analysis; observation of meetings and semi-structured interviews with board members considered key informants. The axis of analysis was the political participation of the council, considering its internal aspects, like board members, operating dynamics of political participation of its members and the relationship between these topics and the council's actions for the definition and creation of a food and nutrition security policy. Results The intellectual profile of the board members does not represent the majority of the population, thereby facilitating the omission of actual issues in council discussions. Its strict internal dynamics and the asymmetry of its members generally prevent the active participation of board members and, specifically, discussions about a food and nutrition security policy. The so-called "militant members" have a differentiated, more aggressive participation, with greater mastery of the subject and its topics. Conclusion The board member profiles, internal organization of the council, complexity of the subject and its low insertion in the society distance the council from social needs and lead them to act incipiently with regard to the municipal policies of food and nutrition security.
Resumo:
In this paper, we perform a thorough analysis of a spectral phase-encoded time spreading optical code division multiple access (SPECTS-OCDMA) system based on Walsh-Hadamard (W-H) codes aiming not only at finding optimal code-set selections but also at assessing its loss of security due to crosstalk. We prove that an inadequate choice of codes can make the crosstalk between active users to become large enough so as to cause the data from the user of interest to be detected by other user. The proposed algorithm for code optimization targets code sets that produce minimum bit error rate (BER) among all codes for a specific number of simultaneous users. This methodology allows us to find optimal code sets for any OCDMA system, regardless the code family used and the number of active users. This procedure is crucial for circumventing the unexpected lack of security due to crosstalk. We also show that a SPECTS-OCDMA system based on W-H 32(64) fundamentally limits the number of simultaneous users to 4(8) with no security violation due to crosstalk. More importantly, we prove that only a small fraction of the available code sets is actually immune to crosstalk with acceptable BER (<10(-9)) i.e., approximately 0.5% for W-H 32 with four simultaneous users, and about 1 x 10(-4)% for W-H 64 with eight simultaneous users.