125 resultados para secure interoperation
Resumo:
This special issue provides the latest research and development on wireless mobile wearable communications. According to a report by Juniper Research, the market value of connected wearable devices is expected to reach $1.5 billion by 2014, and the shipment of wearable devices may reach 70 million by 2017. Good examples of wearable devices are the prominent Google Glass and Microsoft HoloLens. As wearable technology is rapidly penetrating our daily life, mobile wearable communication is becoming a new communication paradigm. Mobile wearable device communications create new challenges compared to ordinary sensor networks and short-range communication. In mobile wearable communications, devices communicate with each other in a peer-to-peer fashion or client-server fashion and also communicate with aggregation points (e.g., smartphones, tablets, and gateway nodes). Wearable devices are expected to integrate multiple radio technologies for various applications' needs with small power consumption and low transmission delays. These devices can hence collect, interpret, transmit, and exchange data among supporting components, other wearable devices, and the Internet. Such data are not limited to people's personal biomedical information but also include human-centric social and contextual data. The success of mobile wearable technology depends on communication and networking architectures that support efficient and secure end-to-end information flows. A key design consideration of future wearable devices is the ability to ubiquitously connect to smartphones or the Internet with very low energy consumption. Radio propagation and, accordingly, channel models are also different from those in other existing wireless technologies. A huge number of connected wearable devices require novel big data processing algorithms, efficient storage solutions, cloud-assisted infrastructures, and spectrum-efficient communications technologies.
Resumo:
The republican idea of non-domination stresses the importance of certain social relationships for a person’s freedom, showing that freedom is a social-relational state. While the idea of freedom as non-domination receives a lot of attention in the literature, republican theorists say surprisingly little about equality. Therefore, the aim of this paper is to carve out the contours of a republican conception of equality.. In so doing, I will argue that republican accounts of equality share a significant normative overlap with the idea of social equality. However, closer analysis of Philip Pettit’s account of ‘expressive egalitarianism’ (which Pettit sees as inherently connected to non-domination) and recent theories of social equality shows that republican non-domination – in contrast to what Pettit seems to claim – is not sufficient for securing (republican) social equality. In order to secure social equality for all, republicans would have to go beyond non-domination.
Resumo:
This report provides an overview of the research evidence on the relationship between poverty and ethnicity in Northern Ireland. After a period of increasing ethnic diversity, the review was concerned with understanding how issues of poverty affect people from different minority ethnic communities and their ability to access and secure good outcomes from key services. A comprehensive literature review and focus groups with people from the Roma, Somali, Chinese and Polish communities, and with local stakeholders, provide the basis for the report. The report discusses: • how new migrants have joined long-standing communities of people from minority ethnic groups; • how the policy framework to address racial inequalities in Northern Ireland is relatively new; • how people from minority ethnic groups experience low incomes and access services; and • how the legacy of conflict in the region may affect minority ethnic groups.
Resumo:
This review article considers Samuel Moyn’s book The Last Utopia:Human Rights in History in the context of recent trends in the writing of human rights history. A central debate among historians of human rights, in seekingto account for the genesis and spread of human rights, is how far current humanrights practice demonstrates continuity or radical discontinuity with previousattempts to secure rights. Moyn’s discontinuity thesis and the controversysurrounding it exemplify this debate. Whether Moyn is correct is importantbeyond the confines of human rights historiography, with implications for theirmeaning in law, as well as their political legitimacy. This review argues that Moyn’s book ultimately fails to convince, for two broad reasons. First, a more balanced judgment would conclude that the history of human rights is both one of continuity and discontinuity. Second, and more importantly, Moyn fails to offer a convincing account of the normativity of human rights. Undertaking a history of human rights requires a deeper engagement with debates on the nature and validity of human rights than Moyn seems prepared to contemplate.
Resumo:
The future of Belfast is found in its plans – beginning with 1945 planning proposals to the recently adopted Belfast Metropolitan Area Plan, these documents have aimed to encourage and channel urban development processes to secure collective outcomes that enhance the public interest. Central to this objective has been the idea of ‘development’ and in this paper we interrogate the representation of this concept in the urban discourse of Belfast. We seek to do this by first exploring how ‘development’ and associated concepts are articulated in key spatial policy documents and then contrast these with examples of some of the key physical, spatial outcomes of economic processes that have occurred in the last ten years. The paper will review the dominant trajectories of urban change in Belfast, consider their implications and relate these to the official goals and aspirations represented in planning strategies and regeneration visions for the city. In doing this we draw on the recent work of Marcuse (2015) to identify how ideas of ‘development’ and ‘growth’ have been used to anonymise, harmonize and homogenise the outcomes of these spatial processes. The paper will conclude by considering how Belfast’s urban discourse acts to suppresses alternative visions of the city and explores the potential consequences of this for the new governance arrangements for planning in Belfast.
Resumo:
Directional modulation (DM), as a promising physical-layer security technique, is able to secure wireless communications by virtue of the property of its direction-dependent signal modulation format transmission. Here modulated signal waveform signatures can only be detected by legitimate receiver(s) positioned along a-prior assigned directions. This paper reviews the development in DM technology over recent years, and provides some recommendations for future studies.
Resumo:
New Irish speakers in Belfast play a crucial, complex part in the revitalization and change of both the city and Irish within Northern Ireland. This paper examines the role of new Irish speakers in transforming Belfast, whose emergence from a post-conflict period involves a reassessment of communal cultural expressions. Markers of ethno-national identity are bitterly contentious locally, and yet increasingly celebrated, in line with international trends, as high status cultural forms and potentially profitable tourist attractions. Irish in Belfast currently occupies an ambiguous position: divisive enough for a sign reading ‘Happy Christmas’ in Irish to be experienced as an insult by some city councillors, yet a secure enough part of the establishment for a neighbourhood to be officially rebranded as the Gaeltacht Quarter.
When, how and where new Irish speakers use the language in Belfast has implications for the relationship of Irishness to the Northern Irish state and for the place of Belfast within regional frameworks across the UK, Ireland and Europe. Adult learners and young people exiting Irish medium education have an impact on life in Belfast beyond its small population of Irish speakers. Urbanisation fuelled by new speakers, which shifts the balance of Irish language resources and speakers away from traditional rural Gaeltacht areas and towards cities, also has implications for the language itself. Recent increase in new Irish speakers in Belfast is due to expansion in the Irish-medium sector as well as to adult learners, whose decisions contribute to the school expansion.
Urbanisation, multilingualism and intergenerational shift combine in Belfast to produce new linguistic norms. Moreover, in a minority language community where hierarchies of ‘authenticity’ are weighted towards the rural and the native speaker, where the rural and the native have traditionally been conflated, and where indigeneity is a central concept to contested nationalisms, the emergence of a self-confident, youthful Irish speaking community in Northern Ireland’s biggest city involves a recalibration of the qualities signifying ‘gaelicness’. As students, professionals, hobbyists and activists, new Irish speakers in Belfast occupy a vital position at the crux of changing ideas about place, language and identity.
Resumo:
BACKGROUND: The need for structured education programmes for type 2 diabetes is a high priority for many governments around the world. One such national education programme in the United Kingdom is the DESMOND Programme, which has been shown to be robust and effective for patients in general. However, these programmes are not generally targeted to people with intellectual disabilities (ID), and robust evidence on their effects for this population is lacking. We have adapted the DESMOND Programme for people with ID and type 2 diabetes to produce an amended programme known as DESMOND-ID. This protocol is for a pilot trial to determine whether a large-scale randomised trial is feasible, to test if DESMOND-ID is more effective than usual care in adults with ID for self-management of their type 2 diabetes, in particular as a means to reduce glycated haemoglobin (Hb1Ac), improve psychological wellbeing and quality of life and promote a healthier lifestyle. This protocol describes the rationale, methods, proposed analysis plan and organisational and administrative details.
METHODS/DESIGN: This trial is a two arm, individually randomised, pilot trial for adults with ID and type 2 diabetes, and their family and/or paid carers. It compares the DESMOND-ID programme with usual care. Approximately 36 adults with mild to moderate ID will be recruited from three countries in the United Kingdom. Family and/or paid carers may also participate in the study. Participants will be randomly assigned to one of two conditions using a secure computerised system with robust allocation concealment. A range of data will be collected from the adults with ID (biomedical, psychosocial and self-management strategies) and from their carers. Focus groups with all the participants will assess the acceptability of the intervention and the trial.
DISCUSSION: The lack of appropriate structured education programmes and educational materials for this population leads to secondary health conditions and may lead to premature deaths. There are significant benefits to be gained globally, if structured education programmes are adapted and shown to be successful for people with ID and other cognitive impairments.
TRIAL REGISTRATION: Registered with International Standard Randomised Controlled Trial (identifier: ISRCTN93185560 ) on 10 November 2014.
Resumo:
Background:
Prolonged mechanical ventilation is associated with a longer intensive care unit (ICU) length of stay and higher mortality. Consequently, methods to improve ventilator weaning processes have been sought. Two recent Cochrane systematic reviews in ICU adult and paediatric populations concluded that protocols can be effective in reducing the duration of mechanical ventilation, but there was significant heterogeneity in study findings. Growing awareness of the benefits of understanding the contextual factors impacting on effectiveness has encouraged the integration of qualitative evidence syntheses with effectiveness reviews, which has delivered important insights into the reasons underpinning (differential) effectiveness of healthcare interventions.
Objectives:
1. To locate, appraise and synthesize qualitative evidence concerning the barriers and facilitators of the use of protocols for weaning critically-ill adults and children from mechanical ventilation;
2. To integrate this synthesis with two Cochrane effectiveness reviews of protocolized weaning to help explain observed heterogeneity by identifying contextual factors that impact on the use of protocols for weaning critically-ill adults and children from mechanical ventilation;
3. To use the integrated body of evidence to suggest the circumstances in which weaning protocols are most likely to be used.
Search methods:
We used a range of search terms identified with the help of the SPICE (Setting, Perspective, Intervention, Comparison, Evaluation) mnemonic. Where available, we used appropriate methodological filters for specific databases. We searched the following databases: Ovid MEDLINE, Embase, OVID, PsycINFO, CINAHL Plus, EBSCOHost, Web of Science Core Collection, ASSIA, IBSS, Sociological Abstracts, ProQuest and LILACS on the 26th February 2015. In addition, we searched: the grey literature; the websites of professional associations for relevant publications; and the reference lists of all publications reviewed. We also contacted authors of the trials included in the effectiveness reviews as well as of studies (potentially) included in the qualitative synthesis, conducted citation searches of the publications reporting these studies, and contacted content experts.
We reran the search on 3rd July 2016 and found three studies, which are awaiting classification.
Selection criteria:
We included qualitative studies that described: the circumstances in which protocols are designed, implemented or used, or both, and the views and experiences of healthcare professionals either involved in the design, implementation or use of weaning protocols or involved in the weaning of critically-ill adults and children from mechanical ventilation not using protocols. We included studies that: reflected on any aspect of the use of protocols, explored contextual factors relevant to the development, implementation or use of weaning protocols, and reported contextual phenomena and outcomes identified as relevant to the effectiveness of protocolized weaning from mechanical ventilation.
Data collection and analysis:
At each stage, two review authors undertook designated tasks, with the results shared amongst the wider team for discussion and final development. We independently reviewed all retrieved titles, abstracts and full papers for inclusion, and independently extracted selected data from included studies. We used the findings of the included studies to develop a new set of analytic themes focused on the barriers and facilitators to the use of protocols, and further refined them to produce a set of summary statements. We used the Confidence in the Evidence from Reviews of Qualitative Research (CERQual) framework to arrive at a final assessment of the overall confidence of the evidence used in the synthesis. We included all studies but undertook two sensitivity analyses to determine how the removal of certain bodies of evidence impacted on the content and confidence of the synthesis. We deployed a logic model to integrate the findings of the qualitative evidence synthesis with those of the Cochrane effectiveness reviews.
Main results:
We included 11 studies in our synthesis, involving 267 participants (one study did not report the number of participants). Five more studies are awaiting classification and will be dealt with when we update the review.
The quality of the evidence was mixed; of the 35 summary statements, we assessed 17 as ‘low’, 13 as ‘moderate’ and five as ‘high’ confidence. Our synthesis produced nine analytical themes, which report potential barriers and facilitators to the use of protocols. The themes are: the need for continual staff training and development; clinical experience as this promotes felt and perceived competence and confidence to wean; the vulnerability of weaning to disparate interprofessional working; an understanding of protocols as militating against a necessary proactivity in clinical practice; perceived nursing scope of practice and professional risk; ICU structure and processes of care; the ability of protocols to act as a prompt for shared care and consistency in weaning practice; maximizing the use of protocols through visibility and ease of implementation; and the ability of protocols to act as a framework for communication with parents.
Authors' conclusions:
There is a clear need for weaning protocols to take account of the social and cultural environment in which they are to be implemented. Irrespective of its inherent strengths, a protocol will not be used if it does not accommodate these complexities. In terms of protocol development, comprehensive interprofessional input will help to ensure broad-based understanding and a sense of ‘ownership’. In terms of implementation, all relevant ICU staff will benefit from general weaning as well as protocol-specific training; not only will this help secure a relevant clinical knowledge base and operational understanding, but will also demonstrate to others that this knowledge and understanding is in place. In order to maximize relevance and acceptability, protocols should be designed with the patient profile and requirements of the target ICU in mind. Predictably, an under-resourced ICU will impact adversely on protocol implementation, as staff will prioritize management of acutely deteriorating and critically-ill patients.
Resumo:
WHIRLBOB, also known as STRIBOBr2, is an AEAD (Authenticated Encryption with Associated Data) algorithm derived from STRIBOBr1 and the Whirlpool hash algorithm. WHIRLBOB/STRIBOBr2 is a second round candidate in the CAESAR competition. As with STRIBOBr1, the reduced-size Sponge design has a strong provable security link with a standardized hash algorithm. The new design utilizes only the LPS or ρ component of Whirlpool in flexibly domain-separated BLNK Sponge mode. The number of rounds is increased from 10 to 12 as a countermeasure against Rebound Distinguishing attacks. The 8 ×8 - bit S-Box used by Whirlpool and WHIRLBOB is constructed from 4 ×4 - bit “MiniBoxes”. We report on fast constant-time Intel SSSE3 and ARM NEON SIMD WHIRLBOB implementations that keep full miniboxes in registers and access them via SIMD shuffles. This is an efficient countermeasure against AES-style cache timing side-channel attacks. Another main advantage of WHIRLBOB over STRIBOBr1 (and most other AEADs) is its greatly reduced implementation footprint on lightweight platforms. On many lower-end microcontrollers the total software footprint of π+BLNK = WHIRLBOB AEAD is less than half a kilobyte. We also report an FPGA implementation that requires 4,946 logic units for a single round of WHIRLBOB, which compares favorably to 7,972 required for Keccak / Keyak on the same target platform. The relatively small S-Box gate count also enables efficient 64-bit bitsliced straight-line implementations. We finally present some discussion and analysis on the relationships between WHIRLBOB, Whirlpool, the Russian GOST Streebog hash, and the recent draft Russian Encryption Standard Kuznyechik.
Resumo:
Those living with an acquired brain injury often have issues with fatigue due to factors resulting from the injury. Cognitive impairments such as lack of memory, concentration and planning have a great impact on an individual’s ability to carry out general everyday tasks, which subsequently has the effect of inducing cognitive fatigue. Moreover, there is difficulty in assessing cognitive fatigue, as there are no real biological markers that can be measured. Rather, it is a very subjective effect that can only be diagnosed by the individual. Consequently, the traditional way of assessing cognitive fatigue is to use a self-assessment questionnaire that is able to determine contributing factors. State of the art methods to evaluate cognitive! fa tigue employ cognitive tests in order to analyse performance on predefined tasks. However, one primary issue with such tests is that they are typically carried out in a clinical environment, therefore do not have the ability to be utilized in situ within everyday life. This paper presents a smartphone application for the evaluation of fatigue, which can be used daily to track cognitive performance in order to assess the influence of fatigue.
Resumo:
Although the impact of multiple adverse events in childhood is well known, it is equally accepted that the variation in individual trajectories and outcomes is significant. Resilience focuses on positive adaption in the face of adversity, offering a counterbalance to deficit-based research and risk averse, procedurally driven practice. Positive relationships and secure attachments are widely considered to be the cornerstone of resilience, yet, within social work practice, there is a tendency to consider attachment only in relation to children and adults. Three biographical narratives are used to explore resilience and attachment through a narrative identity framework, exploring parents' experiences of multiple adversities over their lifespan, their close relationships, and their experiences of child welfare interventions. It argues for the importance of narrative in social work assessment, particularly in relation to families with complex needs, illustrating how this enables a richer, more nuanced understanding of mothers and fathers as individuals in their own right, and provides insight into how alternative narratives might be better supported and developed.
Resumo:
Homomorphic encryption offers potential for secure cloud computing. However due to the complexity of homomorphic encryption schemes, performance of implemented schemes to date have been unpractical. This work investigates the use of hardware, specifically Field Programmable Gate Array (FPGA) technology, for implementing the building blocks involved in somewhat and fully homomorphic encryption schemes in order to assess the practicality of such schemes. We concentrate on the selection of a suitable multiplication algorithm and hardware architecture for large integer multiplication, one of the main bottlenecks in many homomorphic encryption schemes. We focus on the encryption step of an integer-based fully homomorphic encryption (FHE) scheme. We target the DSP48E1 slices available on Xilinx Virtex 7 FPGAs to ascertain whether the large integer multiplier within the encryption step of a FHE scheme could fit on a single FPGA device. We find that, for toy size parameters for the FHE encryption step, the large integer multiplier fits comfortably within the DSP48E1 slices, greatly improving the practicality of the encryption step compared to a software implementation. As multiplication is an important operation in other FHE schemes, a hardware implementation using this multiplier could also be used to improve performance of these schemes.
Resumo:
We present two physical layer secure transmission schemes for multi-user multi-relay networks, where the communication from M users to the base station is assisted by direct links and by N decode-and-forward relays. In this network, we consider that a passive eavesdropper exists to overhear the transmitted information, which entails exploiting the advantages of both direct and relay links for physical layer security enhancement. To fulfill this requirement, we investigate two criteria for user and relay selection and examine the achievable secrecy performance. Criterion I performs a joint user and relay selection, while Criterion II performs separate user and relay selections, with a lower implementation complexity. We derive a tight lower bound on the secrecy outage probability for Criterion I and an accurate analytical expression for the secrecy outage probability for Criterion II. We further derive the asymptotic secrecy outage probabilities at high transmit signal-to-noise ratios and high main-to-eavesdropper ratios for both criteria. We demonstrate that the secrecy diversity order is min (MN, M + N) for Criterion I, and N for Criterion II. Finally, we present numerical and simulation results to validate the proposed analysis, and show the occurrence condition of the secrecy outage probability floor
Resumo:
Organizing and managing channels of distribution is an important marketing task. Due to the emergence of electronic commerce on the Internet, e-channel distribution systems have been adopted by many manufacturers. However, academic and anecdotal evidence both point to the pressures arising from this new e-channel manufacturing environment. Questions marks therefore remain on how the addition of this e-channel affects the traditional marketing strategies of leasing and selling. We set up several two-period dual-channel models in which a manufacturer sells a durable product through both a manufacturer-owned e-channel and an independent reseller (leaser) who adopts selling (leasing) to consumers. Our main results indicate that, direct selling cost aside, product durability plays an important role in shaping the strategies of all members. With either marketing strategy, the additional expansion of an e-channel territory may secure Pareto gains, in which all members benefit.