117 resultados para SIDE-CHAINS
Resumo:
On 25 April 1998 part of the tailings pond dike of the Aznalcollar Zn mine north of the Guadalquivir marshes (Donana) in southern Spain collapsed releasing an estimated 5 million m3 of acidic metal-rich waste. This event contaminated farmland and wetland up to >40 km downstream, including the 900-ha 'Entremuros', an important area for birds within the Donana world heritage site. In spite of the contamination, birds continued to feed in this area. Samples of two abundant macrophytes (Typha dominguensis and Scirpus maritimus) were taken from the Entremuros and nearby uncontaminated areas; these plants are important food items for several bird species. Analyses showed that in the Entremuros mean plant tissue concentrations of Cd were 3-40-fold (0.8-7.4 ppm) and Zn 20-100-fold (20-3384 ppm) greater than those from control areas. Comparable dietary concentrations of Zn have been reported to cause severe physiological damage to aquatic birds under experimental conditions. Elevated Cd concentrations are of concern as Cd bioconcentrates and is a cumulative poison. Metals released in this accident are moving into this food-chain and present a considerable risk to species feeding on Typha sp. and Scirpus sp. Many other food-webs exist in this area and require detailed examination to identify the species at risk, and to facilitate the management of these risks to minimise future impacts to the wildlife of Donana. Copyright (C) 1999 Elsevier Science Ltd.
Resumo:
The desire for more robust supply chains has led to a growth in theoretical and practical interest in the application of both preventive and impact reductive disturbance management principles. This application should ultimately lead to less vulnerable and more competitive supply chains. Based on the extant literature we identify fresh food supply chain's contextual factors (products, processes, supply chain networks and supply chain business environment) and their corresponding characteristics, as well as the main disturbance management principles used. To analyse their influence on the selection and application of disturbance management principles in fresh food supply chains we conducted three case studies. In each case we collected data on the relevant contextual factors, disturbance management principles applied and company background. As an underlying methodology, we first conduct within-case analysis and then expand the analyses to a cross-case context. Based on the findings from these case studies, propositions are built concerning the nature of contextual factors and their characteristics, and their influence on the selection and application of disturbance management principles in fresh food supply chains. Our main findings are related to the identification of contextual characteristics of fresh food supply chains that are either critical vulnerability sources, critical enablers or conditionals and as such require, facilitate or condition selection and application of disturbance management principles.
Resumo:
In the last decade, many side channel attacks have been published in academic literature detailing how to efficiently extract secret keys by mounting various attacks, such as differential or correlation power analysis, on cryptosystems. Among the most efficient and widely utilized leakage models involved in these attacks are the Hamming weight and distance models which give a simple, yet effective, approximation of the power consumption for many real-world systems. These leakage models reflect the number of bits switching, which is assumed proportional to the power consumption. However, the actual power consumption changing in the circuits is unlikely to be directly of that form. We, therefore, propose a non-linear leakage model by mapping the existing leakage model via a transform function, by which the changing power consumption is depicted more precisely, hence the attack efficiency can be improved considerably. This has the advantage of utilising a non-linear power model while retaining the simplicity of the Hamming weight or distance models. A modified attack architecture is then suggested to yield the correct key efficiently in practice. Finally, an empirical comparison of the attack results is presented.
Resumo:
This paper presents a new methodology for characterising the energy performance of buildings suitable for city-scale, top-down energy modelling. Building properties that have the greatest impact on simulated energy performance were identified via a review of sensitivity analysis studies. The methodology greatly simplifies the description of a building to decrease labour and simulation processing overheads. The methodology will be used in the EU FP7 INDICATE project which aims to create a master-planning tool that uses dynamic simulation to facilitate the design of sustainable, energy efficient smart cities.
Resumo:
Demand Side Management (DSM) plays an important role in Smart Grid. It has large scale access points, massive users, heterogeneous infrastructure and dispersive participants. Moreover, cloud computing which is a service model is characterized by resource on-demand, high reliability and large scale integration and so on and the game theory is a useful tool to the dynamic economic phenomena. In this study, a scheme design of cloud + end technology is proposed to solve technical and economic problems of the DSM. The architecture of cloud + end is designed to solve technical problems in the DSM. In particular, a construct model of cloud + end is presented to solve economic problems in the DSM based on game theories. The proposed method is tested on a DSM cloud + end public service system construction in a city of southern China. The results demonstrate the feasibility of these integrated solutions which can provide a reference for the popularization and application of the DSM in china.
Resumo:
Libertarian paternalism, as advanced by Cass Sunstein, is seriously flawed, but not primarily for the reasons that most commentators suggest. Libertarian paternalism and its attendant regulatory implications are too libertarian, not too paternalistic, and as a result are in considerable tension with ‘thick’ conceptions of human dignity. We make four arguments. The first is that there is no justification for a presumption in favor of nudging as a default regulatory strategy, as Sunstein asserts. It is ordinarily less effective than mandates; such mandates rarely offend personal autonomy; and the central reliance on cognitive failures in the nudging program is more likely to offend human dignity than the mandates it seeks to replace. Secondly, we argue that nudging as a regulatory strategy fits both overtly and covertly, often insidiously, into a more general libertarian program of political economy. Thirdly, while we are on the whole more concerned to reject the libertarian than the paternalistic elements of this philosophy, Sunstein’s work, both in Why Nudge?, and earlier, fails to appreciate how nudging may be manipulative if not designed with more care than he acknowledges. Lastly, because of these characteristics, nudging might even be subject to legal challenges that would give us the worst of all possible regulatory worlds: a weak regulatory intervention that is liable to be challenged in the courts by well-resourced interest groups. In such a scenario, and contrary to the ‘common sense’ ethos contended for in Why Nudge?, nudges might not even clear the excessively low bar of doing something rather than nothing. Those seeking to pursue progressive politics, under law, should reject nudging in favor of regulation that is more congruent with principles of legality, more transparent, more effective, more democratic, and allows us more fully to act as moral agents. Such a system may have a place for (some) nudging, but not one that departs significantly from how labeling, warnings and the like already function, and nothing that compares with Sunstein’s apparent ambitions for his new movement.
Resumo:
A podcast of a talk presented at a conference in Berlin organized by the Vervassungsblog on Choice Architecture in Democracies, in January 2015 - Verfassungsblog - Autonomy vs. Technocracy: Libertarian Paternalism revisited
Resumo:
There is lack of consistent evidence as to how well PD patients are able to accurately time their movements across space with an external acoustic signal. For years, research based on the finger-tapping paradigm, the most popular paradigm for exploring the brain's ability to time movement, has provided strong evidence that patients are not able to accurately reproduce an isochronous interval [i.e., Ref. (1)]. This was undermined by Spencer and Ivry (2) who suggested a specific deficit in temporal control linked to emergent, rhythmical movement not event-based actions, which primarily involve the cerebellum. In this study, we investigated motor timing of seven idiopathic PD participants in event-based sensorimotor synchronization task. Participants were asked to move their finger horizontally between two predefined target zones to synchronize with the occurrence of two sound events at two time intervals (1.5 and 2.5 s). The width of the targets and the distance between them were manipulated to investigate impact of accuracy demands and movement amplitude on timing performance. The results showed that participants with PD demonstrated specific difficulties when trying to accurately synchronize their movements to a beat. The extent to which their ability to synchronize movement was compromised was found to be related to the severity of PD, but independent of the spatial constraints of the task.
Resumo:
Cryptographic algorithms have been designed to be computationally secure, however it has been shown that when they are implemented in hardware, that these devices leak side channel information that can be used to mount an attack that recovers the secret encryption key. In this paper an overlapping window power spectral density (PSD) side channel attack, targeting an FPGA device running the Advanced Encryption Standard is proposed. This improves upon previous research into PSD attacks by reducing the amount of pre-processing (effort) required. It is shown that the proposed overlapping window method requires less processing effort than that of using a sliding window approach, whilst overcoming the issues of sampling boundaries. The method is shown to be effective for both aligned and misaligned data sets and is therefore recommended as an improved approach in comparison with existing time domain based correlation attacks.