50 resultados para security of supply


Relevância:

90.00% 90.00%

Publicador:

Resumo:

Recently, two fast selective encryption methods for context-adaptive variable length coding and context-adaptive binary arithmetic coding in H.264/AVC were proposed by Shahid et al. In this paper, it was demonstrated that these two methods are not as efficient as only encrypting the sign bits of nonzero coefficients. Experimental results showed that without encrypting the sign bits of nonzero coefficients, these two methods can not provide a perceptual scrambling effect. If a much stronger scrambling effect is required, intra prediction modes, and the sign bits of motion vectors can be encrypted together with the sign bits of nonzero coefficients. For practical applications, the required encryption scheme should be customized according to a user's specified requirement on the perceptual scrambling effect and the computational cost. Thus, a tunable encryption scheme combining these three methods is proposed for H.264/AVC. To simplify its implementation and reduce the computational cost, a simple control mechanism is proposed to adjust the control factors. Experimental results show that this scheme can provide different scrambling levels by adjusting three control factors with no or very little impact on the compression performance. The proposed scheme can run in real-time and its computational cost is minimal. The security of the proposed scheme is also discussed. It is secure against the replacement attack when all three control factors are set to one.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The spontaneous oxidation of CO adsorbates on a Pt electrode modified by Ru under open circuit (OC) conditions in perchloric acid solution has been followed, for the first time, using in situ FTIR spectroscopy, and the dynamics of the surface processes taking place have been elucidated. The IR data show that adsorbed CO present on both the Ru and Pt domains and can be oxidized by the oxygen-containing adlayer on the Ru in a chemical process to produce CO under OC conditions. There is a free exchange of CO is between the Ru and Pt sites. Oxidation of CO may take place at the edges of the Ru islands, but CO is transfer, at least on the time scale of these experiments, allows the two different populations to maintain equilibrium. Oxidation is limited in this region by the rate of supply of oxygen to die surface of the catalyst. A mechanism is postulated to explain the observed behavior.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In this paper, we study the information-theoretical security of a downlink multiuser cooperative relaying network with multiple intermediate amplify-and-forward (AF) relays, where there exist multiple eavesdroppers which can overhear the message. To prevent the wiretap and strength the network security, we select one best relay and user pair, so that the selected user can receive the message from the base station assisted by the selected relay. The relay and user selection is performed by maximizing the ratio of the received signal-to-noise ratio (SNR) at the user to the eavesdroppers, which is based on both the main and eavesdropper links. For the considered system, we derive the closed-form expression of the secrecy outage probability, and provide the asymptotic expression in high main-to-eavesdropper ratio (MER) region. From the asymptotic analysis, we can find that the system diversity order is equivalent to the number of relays regardless of the number of users and eavesdroppers.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The influence of oscillatory versus unidirectional flow on the growth and nitrate-uptake rates of juvenile kelp, Laminaria digitata, was determined seasonally in experimental treatments that simulated as closely as possible natural environmental conditions. In winter, regardless of flow condition (oscillatory and unidirectional) or water velocity, no influence of water motion was observed on the growth rate of L. digitata. In summer, when ambient nitrate concentrations were low, increased water motion enhanced macroalgal growth, which is assumed to be related to an increase in the rate of supply of nutrients to the blade surface. Nitrate-uptake rates were significantly influenced by water motion and season. Lowest nitrate-uptake rates were observed for velocities <5 cm · s−1 and nitrate-uptake rates increased by 20%–50% under oscillatory motion compared to unidirectional flow at the same average speed. These data further suggested that the diffusion boundary layer played a significant role in influencing nitrate-uptake rates. However, while increased nitrate-uptake in oscillatory flow was clear, this was not reflected in growth rates and further work is required to understand the disconnection of nitrate-uptake and growth by L. digitata in oscillatory flow. The data obtained support those from related field-based studies, which suggest that in summer, when insufficient nitrogen is available in the water to saturate metabolic demand, the growth rate of kelps will be influenced by water motion restricting mass transfer of nitrogen.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The European hare (Lepus europaeus) has declined throughout its native range but invaded numerous regions where it has negatively impacted native wildlife. In southern Sweden, it replaces the native mountain hare (L. timidus) through competition and hybridisation. We investigated temporal change in the invasive range of the European hare in Ireland, and compared its habitat use with the endemic Irish hare (L. timidus hibernicus). The range of the European hare was three times larger and its core range twice as large in 2012–2013 than in 2005. Its rate of radial range expansion was 0.73 km year−1 with its introduction estimated to have occurred ca. 1970. Both species utilised improved and rough grasslands and exhibited markedly similar regression coefficients with almost every land cover variable examined. Irish hares were associated with low fibre and high sugar content grass (good quality grazing) whilst the invader had a greater tolerance for low quality forage. European hares were associated with habitat patch edge density, suggesting it may be more suited to using hedgerows as diurnal resting sites than the Irish hare. Consequently, the invader had a wider niche breadth than the native but their niche overlap was virtually complete. Given the impact of the European hare on native species elsewhere, and its apparent pre-adaption for improved grasslands interspersed with arable land (a habitat that covers 70 % of Ireland), its establishment and range expansion poses a significant threat to the ecological security of the endemic Irish hare, particularly given their ecological similarities.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Cyber threats in Supervisory Control and Data Acquisition (SCADA) systems have the potential to render physical damage and jeopardize power system operation, safety and stability. SCADA systems were originally designed with little consideration of escalating cyber threats and hence the problem of how to develop robust intrusion detection technologies to tailor the requirements of SCADA is an emerging topic and a big challenge. This paper proposes a stateful Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method to improve the cyber-security of SCADA systems using the IEC 60870-5-104 protocol which is tailored for basic telecontrol communications. The proposed stateful protocol analysis approach is presented that is designed specifically for the IEC 60870-5-104 protocol. Finally, the novel intrusion detection approach are implemented and validated.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Throughout the world the share of wind power in the generation mix is increasing. In the All Island Grid, of the Republic of Ireland and Northern Ireland there is now over 1.5 GW of installed wind power. As the penetration of these variable, non-dispatchable generators increases, power systems are becoming more sensitive to weather events on the supply side as well as on the demand side. In the temperate climate of Ireland, sensitivity of supply to weather is mainly due to wind variability while demand sensitivity is driven by space heating or cooling loads. The interplay of these two weather-driven effects is of particular concern if demand spikes driven by low temperatures coincide with periods of low winds. In December 2009 and January 2010 Ireland experienced a prolonged spell of unusually cold conditions. During much of this time, wind generation output was low due to low wind speeds. The impacts of this event are presented as a case study of the effects of weather extremes on power systems with high penetrations of variable renewable generation.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The purpose of this paper is to conceptualise and operationalise the concept of supply chain management sustainability practices. Based on a multi-stage procedure involving a literature review, expert Q-sort and pre-test process, pilot test and survey of 156 supply chain directors and managers in Ireland, we develop a multidimensional conceptualisation and measure of social and environmental supply chain management sustainability practices. The research findings show theoretically sound constructs based on four underlying sustainable supply chain management practices: monitoring, implementing systems, new product and process development and strategy redefinition. A two-factor model is then identified as the most reliable: comprising process-based and market-based practices.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The scale of the Software-Defined Network (SDN) Controller design problem has become apparent with the expansion of SDN deployments. Initial SDN deployments were small-scale, single controller environments for research and usecase testing. Today, enterprise deployments requiring multiple controllers are gathering momentum e.g. Google’s backbone network, Microsoft’s public cloud, and NTT’s edge gateway. Third-party applications are also becoming available e.g. HP SDN App Store. The increase in components and interfaces for the evolved SDN implementation increases the security challenges of the SDN controller design. In this work, the requirements of a secure, robust, and resilient SDN controller are identified, stateof-the-art open-source SDN controllers are analyzed with respect to the security of their design, and recommendations for security improvements are provided. This contribution highlights the gap between the potential security solutions for SDN controllers and the actual security level of current controller designs.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

They’re cheap. They’re in every settlement of significance in Britain, Ireland and elsewhere. We all use them but perhaps do not always admit to it. Especially, if we are architects.
Over the past decades Aldi/Lidl low cost supermarkets have escaped from middle Europe to take over large tracts of the English speaking world remaking them according to a formula of mass-produced sheds, buff-coloured cobble-lock car parks, logos in primary colours, bare-shelves and eclectic special offers. Response within architectural discourse to this phenomenon has been largely one of indifference and such places remain, perhaps reiterating Pevsner’s controversial insights into the bicycle shed, on the peripheries of what we might term architecture. This paper seeks to explore the spatial complexities of the discount supermarket and in doing so open up a discussion on the architecture of cheapness. As a road-map, it takes former managing director Dieter Brandes’ treatise on the Aldi formula, Bare Essentials: the Aldi Way to Retailing, and investigates the strategies through which economic exigencies manifest themselves in a series of spatial tactics which involve building. Central to this is the idea of architecture as system rather than form and, in Aldi/Lidl’s case, the result of a spatial network of flows. To understand the architecture of the supermarket, then, it is necessary to measure the times and spaces of supply across the scales of intersection between global and local.
Evaluating the energy, economy and precision of such systems challenges the liminal position of the commercial, the placeless and especially the cheap within architectural discourse. As is well known, architectures of mass-production and prefabrication and their origins exercised modernist thinkers such as Sigfried Giedion and Walter Gropius in the early twentieth century and has undergone a resurgence in recent times. Meanwhile, the mapping of the hitherto overlooked forms and iconography of commerce in Learning from Las Vegas (1971) was extended by Rem Koolhaas et al into an investigation of the technologies, systems and precedents of retail in the Harvard Design School Guide to Shopping, thirty years later in 2001. While obviously always a criteria for building, to find writings on architecture which explicitly celebrate cheapness as a design virtue or, indeed, even iterate the word cheap is more difficult. Walter Gropius’ essay ‘How can we build cheaper, better, more attractive houses?’ (1927), however, situates the cheap within the discussions – articulated, amongst others, by Karl Teige and Bruno Taut – surrounding the minimal dwelling and the moral benefits of absence of the 1920s and 30s.
In our contemporary age of heightened consumption, it is perhaps fitting that an architecture of bare essentials is defined in retail rather than in housing, a commercial existenzminimum where the Miesian paradox of ‘less is more’ is resold as a paradigm of ‘more for less’ in the ubiquitous yet overlooked architectures of the discount supermarket.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Cyber-physical systems tightly integrate physical processes and information and communication technologies. As today’s critical infrastructures, e.g., the power grid or water distribution networks, are complex cyber-physical systems, ensuring their safety and security becomes of paramount importance. Traditional safety analysis methods, such as HAZOP, are ill-suited to assess these systems. Furthermore, cybersecurity vulnerabilities are often not considered critical, because their effects on the physical processes are not fully understood. In this work, we present STPA-SafeSec, a novel analysis methodology for both safety and security. Its results show the dependencies between cybersecurity vulnerabilities and system safety. Using this information, the most effective mitigation strategies to ensure safety and security of the system can be readily identified. We apply STPA-SafeSec to a use case in the power grid domain, and highlight its benefits.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Poverty alleviation lies at the heart of contemporary international initiatives on development. The key to development is the creation of an environment in which people can develop their potential, leading productive, creative lives in accordance with their needs, interests and faith. This entails, on the one hand, protecting the vulnerable from things that threaten their survival, such as inadequate nutrition, disease, conflict, natural disasters and the impact of climate change, thereby enhancing the poor’s capabilities to develop resilience in difficult conditions. On the other hand, it also requires a means of empowering the poor to act on their own behalf, as individuals and communities, to secure access to resources and the basic necessities of life such as water, food, shelter, sanitation, health and education. ‘Development’, from this perspective, seeks to address the sources of human insecurity, working towards ‘freedom from want, freedom from fear’ in ways that empower the vulnerable as agents of development (not passive recipients of benefaction).

Recognition of the magnitude of the problems confronted by the poor and failure of past interventions to tackle basic issues of human security led the United Nations (UN) in September 2000 to set out a range of ambitious, but clearly defined, development goals to be achieved by 2015. These are known as the Millennium Development Goals (MDGs). The intention of the UN was to mobilise multilateral international organisations, non-governmental organisations and the wider international community to focus attention on fulfilling earlier promises to combat global poverty. This international framework for development prioritises: the eradication of extreme poverty and hunger; achieving universal primary education; promoting gender equality and empowering women; reducing child mortality; improving maternal health; combating HIV/AIDS, malaria and other diseases; ensuring environmental sustainability; and developing a global partnership for development. These goals have been mapped onto specific targets (18 in total) against which outcomes of associated development initiatives can be measured and the international community held to account. If the world achieves the MDGs, more than 500 million people will be lifted out of poverty. However, the challenges the goals represent are formidable. Interim reports on the initiative indicate a need to scale-up efforts and accelerate progress.
Only MDG 7, Target 11 explicitly identifies shelter as a priority, identifying the need to secure ‘by 2020 a significant improvement in the lives of at least 100 million slum dwellers’. This raises a question over how Habitat for Humanity’s commitment to tackling poverty housing fits within this broader international framework designed to allievate global poverty. From an analysis of HFH case studies, this report argues that the processes by which Habitat for Humanity tackles poverty housing directly engages with the agenda set by the MDGs. This should not be regarded as a beneficial by-product of the delivery of decent, affordable shelter, but rather understood in terms of the ways in which Habitat for Humanity has translated its mission and values into a participatory model that empowers individuals and communities to address the interdependencies between inadequate shelter and other sources of human insecurity. What housing can deliver is as important as what housing itself is.

Examples of the ways in which Habitat for Humanity projects engage with the MDG framework include the incorporation of sustainable livelihoods strategies, up-grading of basic infrastructure and promotion of models of good governance. This includes housing projects that have also offered training to young people in skills used in the construction industry, microfinanced loans for women to start up their own home-based businesses, and the provision of food gardens. These play an important role in lifting families out of poverty and ensuring the sustainability of HFH projects. Studies of the impact of improved shelter and security of livelihood upon family life and the welfare of children evidence higher rates of participation in education, more time dedicated to study and greater individual achievement. Habitat for Humanity projects also typically incorporate measures to up-grade the provision of basic sanitation facilities and supplies of safe, potable drinking water. These measures not only directly help reduce mortality rates (e.g. diarrheal diseases account for around 2 million deaths annually in children under 5), but also, when delivered through HFH project-related ‘community funds’, empower the poor to mobilise community resources, develop local leadership capacities and even secure de facto security of tenure from government authorities.

In the process of translating its mission and values into practical measures, HFH has developed a range of innovative practices that deliver much more than housing alone. The organisation’s participatory model enables both direct beneficiaries and the wider community to tackle the insecurities they face, unlocking latent skills and enterprise, building sustainable livelihood capabilities. HFH plays an important role as a catalyst for change, delivering through the vehicle of housing the means to address the primary causes of poverty itself. Its contribution to wider development priorities deserves better recognition. In calibrating the success of HFH projects in terms of units completed or renovated alone, the significance of the process by which HFH realises these outcomes is often not sufficiently acknowledged, both within the organisation and externally. As the case studies developed in the report illustrate, the methodologies Habitat for Humanity employs to address the issue of poverty housing within the developing world, place the organisation at the centre of a global strategic agenda to address the root causes of poverty through community empowerment and the transformation of structures of governance.

Given this, the global network of HFH affiliates constitutes a unique organisational framework to faciliate sharing resources, ideas and practical experience across a diverse range of cultural, political and institutional environments. This said, it is apparent that work needs to be done to better to faciliate the pooling of experience and lessons learnt from across its affiliates. Much is to be gained from learning from less successful projects, sharing innovative practices, identifying strategic partnerships with donors, other NGOs and CBOs, and engaging with the international development community on how housing fits within a broader agenda to alleviate poverty and promote good governance.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The present paper examines the role of organisational learning and transaction costs economics in strategic outsourcing decisions. Interorganisational learning is critical to competitive success, and organisations often learn more effectively by collaborating with other organisations. However, learning processes may also complicate the process of forming interorganisational partnerships which may increase transaction costs. Based on the literature, the authors develop refutable implications for outsourcing supply chain logistics and a sample of 121 firms in the supply chain logistics industry is used to test the hypotheses. The results show that trust and transaction costs are significant and substantial drivers of strategic outsourcing of supply chain logistics (a strategic flexibility action). Learning intent and knowledge acquisition have no significant influence on the decision to outsource supply chain logistics. The paper concludes with a discussion of the different and often conflicting implications for managing interorganisational learning processes.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Recent cold winters and prolonged periods of low wind speeds have prompted concerns about the increasing penetration of wind generation in the Irish and other northern European power systems. On the combined Republic of Ireland and Northern Ireland system there was in excess of 1.5 GW of installed wind power in January 2010. As the penetration of these variable, non-dispatchable generators increases, power systems are becoming more sensitive to weather events on the supply side as well as on the demand side. In the temperate climate of Ireland, sensitivity of supply to weather is mainly due to wind variability while demand sensitivity is driven by space heating or cooling loads. The interplay of these two weather-driven effects is of particular concern if demand spikes driven by low temperatures coincide with periods of low winds. In December 2009 and January 2010 Ireland experienced a prolonged spell of unusually cold conditions. During much of this time, wind generation output was low due to low wind speeds. The impacts of this event are presented as a case study of the effects of weather extremes on power systems with high penetrations of variable renewable generation.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in Smart Grids potentially means greater susceptibility to malicious attackers. SCADA systems with legacy communication infrastructure have inherent cyber-security vulnerabilities as these systems were originally designed with little consideration of cyber threats. In order to improve cyber-security of SCADA networks, this paper presents a rule-based Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method, which includes signature-based and model-based approaches tailored for SCADA systems. The proposed signature-based rules can accurately detect several known suspicious or malicious attacks. In addition, model-based detection is proposed as a complementary method to detect unknown attacks. Finally, proposed intrusion detection approaches for SCADA networks are implemented and verified using a ruled based method.