144 resultados para Linux security module


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The production of reports and the distribution of information have become integral to the operation of many non-governmental organizations. In this regard, the fact that the all-women organization of Checkpoint Watch publishes reports about the Israeli checkpoints in the occupied West Bank seems to comply with current trends. However, the reports—most of which are short repetitive descriptions of the banality and everydayness of the military checkpoints, counting the number of people and cars waiting, commenting on the manner in which the checks are performed and meticulously documenting what mostly amounts to minor incidents of humiliation and distress—do not seem to abide by any convention of reporting. This work analyzes the reporting praxis of the organization and claims that it should be understood as a form of activism in and of itself. Tracking the ways in which the reports address the Israeli public through the concept of parrhesia, the work suggests that this form of reporting enables the women activists to use their gendered marginality to make their way into the highly masculinized and militarized Israeli security discourse.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Going beyond the association between youth exposure to political violence and psychopathology, the current article examines within-person change in youth strength of identity with their ethno-political group and youth reports of the insecurity in their communities. Conceptually related but growing out of different paradigms, both group identity and emotional insecurity have been examined as key variables impacting youth responses to threats from other group members. The goal of the current study is to review previous studies examining these two key variables and to contribute new analyses, modeling within-person change in both variables and examining covariation in their growth. The current article uses data from 823 Belfast adolescents over 4 years. The results suggest youth are changing linearly over age in both constructs and that there are ethno-political group differences in how youth are changing. The results also indicate that change in insecurity is related to strength of identity at age 18, and strength of identity and emotional insecurity are related at age 18. Implications and directions for future work in the area of youth and political violence are discussed. © 2014 American Psychological Association.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

African coastal regions are expected to experience the highest rates of population growth in coming decades. Fresh groundwater resources in the coastal zone of East Africa (EA) are highly vulnerable to seawater intrusion. Increasing water demand is leading to unsustainable and ill-planned well drilling and abstraction. Wells supplying domestic, industrial and agricultural needs are or have become, in many areas, too saline for use. Climate change, including weather changes and sea level rise, is expected to exacerbate this problem. The multiplicity of physical, demographic and socio-economic driving factors makes this a very challenging issue for management. At present the state and probable evolution of coastal aquifers in EA are not well documented. The UPGro project 'Towards groundwater security in coastal East Africa' brings together teams from Kenya, Tanzania, Comoros Islands and Europe to address this knowledge gap. An integrative multidisciplinary approach, combining the expertise of hydrogeologists, hydrologists and social scientists, is investigating selected sites along the coastal zone in each country. Hydrogeologic observatories have been established in different geologic and climatic settings representative of the coastal EA region, where focussed research will identify the current status of groundwater and identify future threats based on projected demographic and climate change scenarios. Researchers are also engaging with end users as well as local community and stakeholder groups in each area in order to understanding the issues most affecting the communities and searching sustainable strategies for addressing these.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The A-level Mathematics qualification is based on a compulsory set of pure maths modules and a selection of applied maths modules. The flexibility in choice of applied modules has led to concerns that many students would proceed to study engineering at university with little background in mechanics. A survey of aerospace and mechanical engineering students in our university revealed that a combination of mechanics and statistics (the basic module in both) was by far the most popular choice of optional modules in A-level Mathematics, meaning that only about one-quarter of the class had studied mechanics beyond the basic module within school mathematics. Investigation of student performance in two core, first-year engineering courses, which build on a mechanics foundation, indicated that any benefits for students who studied the extra mechanics at school were small. These results give concern about the depth of understanding in mechanics gained during A-level Mathematics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, the impact of multiple active eavesdroppers on cooperative single carrier systems with multiple relays and multiple destinations is examined. To achieve the secrecy diversity gains in the form of opportunistic selection, a two-stage scheme is proposed for joint relay and destination selection, in which, after the selection of the relay with the minimum effective maximum signal-to-noise ratio (SNR) to a cluster of eavesdroppers, the destination that has the maximum SNR from the chosen relay is selected. In order to accurately assess the secrecy performance, the exact and asymptotic expressions are obtained in closed-form for several security metrics including the secrecy outage probability, the probability of non-zero secrecy rate, and the ergodic secrecy rate in frequency selective fading. Based on the asymptotic analysis, key design parameters such as secrecy diversity gain, secrecy array gain, secrecy multiplexing gain, and power cost are characterized, from which new insights are drawn. Moreover, it is concluded that secrecy performance limits occur when the average received power at the eavesdropper is proportional to the counterpart at the destination. Specifically, for the secrecy outage probability, it is confirmed that the secrecy diversity gain collapses to zero with outage floor, whereas for the ergodic secrecy rate, it is confirmed confirm that its slope collapses to zero with capacity ceiling.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The primary purpose of the BASE Project was to establish how to help individuals with Autism Spectrum Disorder out of poverty by promoting social inclusion. In order to achieve this, a range of methodologies were utilised that aimed to provide a baseline against which the effect of the Autism Act (NI) 2011 and the associated Autism Strategy (2013-2020) and Action Plans can be measured. The BASE Project is reported in 5 volumes. Volume 2 reports on the analysis of the autism module of the Northern Ireland Life and Times (NILT) Survey that assessed public awareness, attitudes, knowledge, and projected behaviours with regard to individuals with ASD (all primary data and technical reports are available at www.ark.ac.uk/nilt/).

The NILT (2012) survey first ever autism module (n=1204) offered a baseline against which the impact of new autism legislation, policies, and strategies can be measured. Key findings:

• 82% awareness: Most people in Northern Ireland are aware of autism (n=989).
• 50% of all participants knew someone with autism personally (n=606).

Of those who were aware of autism:
• 19% had a close family member with autism (n=186), and/or a friends/acquaintance (n=296), and/or a work colleague (n=79) with autism.
• Autism awareness was particularly low for those from ethnic minorities and those with no internet access.
• Awareness of autism specific legislation was low (20%).
• Good levels of knowledge about autism strengths and challenges, slight tendency to overestimate the occurrence of special talents.
• Prevalence of autism was underestimated (62% thought autism was much less prevalent than official figures or did not know).
• Fairly accurate perception about causes of autism, i.e., not caused by poor parenting (84%).
• Strong support for evidence-based behavioural interventions (77%), but confusion about interventions that are not evidence-based (64%).
• Strong positive attitudes towards children and adults in social, educational and employment settings.
• Autism not viewed as necessarily ‘lifelong’ (58%); support for independent living (78%), e.g., driving a car (83%).
• More business for employers who employ people with autism (12%).
• Strong support for families caring rather than residential care (64%).
• Confusion about service responsibility: education (26%) health (33%) or both (28%).

Given increasing prevalence rates of ASD it is important that the general population is aware of autism and able to respond responsibly to the associated strengths and challenges. The results of the NILT (2012) first ever autism module show that the general public was well aware of autism, had positive attitudes, and was relatively knowledgeable about the issues faced by individuals and families affected directly. However, there was a lack of clarity about responsibility for effective service delivery. The NILT results show that a shift in focus is necessary from ‘awareness raising campaigns’ to an approach that delivers clarity with regard to intervention and accountability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Summary
-Predatory functional responses play integral roles in predator–prey dynamics, and their assessment promises greater understanding and prediction of the predatory impacts of invasive species.
-Other interspecific interactions, however, such as parasitism and higher-order predation, have the potential to modify predator–prey interactions and thus the predictive capability of the comparative functional response approach.
-We used a four-species community module (higher-order predator; focal native or invasive predators; parasites of focal predators; native prey) to compare the predatory functional responses of native Gammarus duebeni celticus and invasive Gammarus pulex amphipods towards three invertebrate prey species (Asellus aquaticus, Simulium spp., Baetis rhodani), thus, quantifying the context dependencies of parasitism and a higher-order fish predator on these functional responses.
-Our functional response experiments demonstrated that the invasive amphipod had a higher predatory impact (lower handling time) on two of three prey species, which reflects patterns of impact observed in the field. The community module also revealed that parasitism had context-dependent influences, for one prey species, with the potential to further reduce the predatory impact of the invasive amphipod or increase the predatory impact of the native amphipod in the presence of a higher-order fish predator.
-Partial consumption of prey was similar for both predators and occurred increasingly in the order A. aquaticus, Simulium spp. and B. rhodani. This was associated with increasing prey densities, but showed no context dependencies with parasitism or higher-order fish predator.
-This study supports the applicability of comparative functional responses as a tool to predict and assess invasive species impacts incorporating multiple context dependencies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Software-as-a-service (SaaS) is a type of software service delivery model which encompasses a broad range of business opportunities and challenges. Users and service providers are reluctant to integrate their business into SaaS due to its security concerns while at the same time they are attracted by its benefits. This article highlights SaaS utility and applicability in different environments like cloud computing, mobile cloud computing, software defined networking and Internet of things. It then embarks on the analysis of SaaS security challenges spanning across data security, application security and SaaS deployment security. A detailed review of the existing mainstream solutions to tackle the respective security issues mapping into different SaaS security challenges is presented. Finally, possible solutions or techniques which can be applied in tandem are presented for a secure SaaS platform.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A fully homomorphic encryption (FHE) scheme is envisioned as a key cryptographic tool in building a secure and reliable cloud computing environment, as it allows arbitrary evaluation of a ciphertext without revealing the plaintext. However, existing FHE implementations remain impractical due to very high time and resource costs. To the authors’ knowledge, this paper presents the first hardware implementation of a full encryption primitive for FHE over the integers using FPGA technology. A large-integer multiplier architecture utilising Integer-FFT multiplication is proposed, and a large-integer Barrett modular reduction module is designed incorporating the proposed multiplier. The encryption primitive used in the integer-based FHE scheme is designed employing the proposed multiplier and modular reduction modules. The designs are verified using the Xilinx Virtex-7 FPGA platform. Experimental results show that a speed improvement factor of up to 44 is achievable for the hardware implementation of the FHE encryption scheme when compared to its corresponding software implementation. Moreover, performance analysis shows further speed improvements of the integer-based FHE encryption primitives may still be possible, for example through further optimisations or by targeting an ASIC platform.