55 resultados para Secure European System for Applications Vendor Environment (SESAME)
em QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast
Resumo:
Composite Applications on top of SAPs implementation of SOA (Enterprise SOA) enable the extension of already existing business logic. In this paper we show, based on a case study, how Model-Driven Engineering concepts are applied in the development of such Composite Applications. Our Case Study extends a back-end business process which is required for the specific needs of a demo company selling wine. We use this to describe how the business centric models specifying the modified business behaviour of our case study can be utilized for business performance analysis where most of the actions are performed by humans. In particular, we apply a refined version of Model-Driven Performance Engineering that we proposed in our previous work and motivate which business domain specifics have to be taken into account for business performance analysis. We additionally motivate the need for performance related decision support for domain experts, who generally lack performance related skills. Such a support should offer visual guidance about what should be changed in the design and resource mapping to get improved results with respect to modification constraints and performance objectives, or objectives for time.
Resumo:
A pure state decoheres into a mixed state as the system entangles with an environment which is initially in a pure state. However, it is not definite that the system becomes entangled with a confined environment with which it only ever interacts. We investigate the disentangling mechanism by considering the quantum correlation between a two-mode squeezed state and a thermal environment.
Resumo:
A pure state decoheres into a mixed state as it entangles with an environment. When an entangled two-mode system is embedded in a thermal environment, however, each mode may not be entangled with its environment by their simple linear interaction. We consider an exactly solvable model to study the dynamics of a total system, which is composed of an entangled two-mode system and a thermal environment. The Markovian interaction with the environment is concerned with an array of infinite number of beam splitters. It is shown that many-body entanglement of the system and the environment may play a crucial role in the process of disentangling the system.
Resumo:
To date, the usefulness of stereoscopic visual displays in research on manual interceptive actions has never been examined. In this study, we compared the catching movements of 8 right-handed participants (6 men, 2 women) in a real environment (with suspended balls swinging past the participant, requiring lateral hand movements for interception) with those in a situation in which similar virtual ball trajectories were displayed stereoscopically in a virtual reality system (Cave Automated Virtual Environment [CAVE]; Cruz-Neira, Sandin, DeFranti, Kenyon, & Hart, 1992) with the head fixated. Catching the virtual ball involved grasping a lightweight ball attached to the palm of the hand. The results showed that, compared to real catching, hand movements in the CAVE were (a) initiated later, (b) less accurate, (c) smoother, and (d) aimed more directly at the interception point. Although the latter 3 observations might be attributable to the delayed movement initiation observed in the CAVE, this delayed initiation might have resulted from the use of visual displays. This suggests that stereoscopic visual displays such as present in many virtual reality systems should be used circumspectly in the experimental study of catching and should be used only to address research questions requiring no detailed analysis of the information-based online control of the catching movements.
Resumo:
BACKGROUND: The need for structured education programmes for type 2 diabetes is a high priority for many governments around the world. One such national education programme in the United Kingdom is the DESMOND Programme, which has been shown to be robust and effective for patients in general. However, these programmes are not generally targeted to people with intellectual disabilities (ID), and robust evidence on their effects for this population is lacking. We have adapted the DESMOND Programme for people with ID and type 2 diabetes to produce an amended programme known as DESMOND-ID. This protocol is for a pilot trial to determine whether a large-scale randomised trial is feasible, to test if DESMOND-ID is more effective than usual care in adults with ID for self-management of their type 2 diabetes, in particular as a means to reduce glycated haemoglobin (Hb1Ac), improve psychological wellbeing and quality of life and promote a healthier lifestyle. This protocol describes the rationale, methods, proposed analysis plan and organisational and administrative details.
METHODS/DESIGN: This trial is a two arm, individually randomised, pilot trial for adults with ID and type 2 diabetes, and their family and/or paid carers. It compares the DESMOND-ID programme with usual care. Approximately 36 adults with mild to moderate ID will be recruited from three countries in the United Kingdom. Family and/or paid carers may also participate in the study. Participants will be randomly assigned to one of two conditions using a secure computerised system with robust allocation concealment. A range of data will be collected from the adults with ID (biomedical, psychosocial and self-management strategies) and from their carers. Focus groups with all the participants will assess the acceptability of the intervention and the trial.
DISCUSSION: The lack of appropriate structured education programmes and educational materials for this population leads to secondary health conditions and may lead to premature deaths. There are significant benefits to be gained globally, if structured education programmes are adapted and shown to be successful for people with ID and other cognitive impairments.
TRIAL REGISTRATION: Registered with International Standard Randomised Controlled Trial (identifier: ISRCTN93185560 ) on 10 November 2014.
Resumo:
Cloud computing is a technological advancementthat provide resources through internet on pay-as-you-go basis.Cloud computing uses virtualisation technology to enhance theefficiency and effectiveness of its advantages. Virtualisation isthe key to consolidate the computing resources to run multiple instances on each hardware, increasing the utilization rate of every resource, thus reduces the number of resources needed to buy, rack, power, cool, and manage. Cloud computing has very appealing features, however, lots of enterprises and users are still reluctant to move into cloud due to serious security concerns related to virtualisation layer. Thus, it is foremost important to secure the virtual environment.In this paper, we present an elastic framework to secure virtualised environment for trusted cloud computing called Server Virtualisation Security System (SVSS). SVSS provide security solutions located on hyper visor for Virtual Machines by deploying malicious activity detection techniques, network traffic analysis techniques, and system resource utilization analysis techniques.SVSS consists of four modules: Anti-Virus Control Module,Traffic Behavior Monitoring Module, Malicious Activity Detection Module and Virtualisation Security Management Module.A SVSS prototype has been deployed to validate its feasibility,efficiency and accuracy on Xen virtualised environment.
Resumo:
Biometric systems provide a valuable service in helping to identify individuals from their stored personal details. Unfortunately, with the rapidly increasing use of such systems, there is a growing concern about the possible misuse of that information. To counteract the threat, the European Union (EU) has introduced comprehensive legislation that seeks to regulate data collection and help strengthen an individual’s right to privacy. This article looks at the implications of the legislation for biometric system deployment. After an initial consideration of current privacy concerns, it examines what is meant by ‘personal data’ and its protection, in legislation terms. Also covered are issues around the storage of biometric data, including its accuracy, its security, and justification for what is collected. Finally, the privacy issues are illustrated through three biometric use cases: border security, online bank access control and customer profiling in stores.
Resumo:
In this paper, we propose three relay selection schemes for full-duplex heterogeneous networks in the presence of multiple cognitive radio eavesdroppers. In this setup, the cognitive small-cell nodes (secondary network) can share the spectrum licensed to the macro-cell system (primary network) on the condition that the quality-of-service of the primary network is always satisfied subjected to its outage probability constraint. The messages are delivered from one small-cell base station to the destination with the help of full-duplex small-cell base stations, which act as relay nodes. Based on the availability of the network’s channel state information at the secondary information source, three different selection criteria for full-duplex relays, namely: 1) partial relay selection; 2) optimal relay selection; and 3) minimal self-interference relay selection, are proposed. We derive the exact closed-form and asymptotic expressions of the secrecy outage probability for the three criteria under the attack of non-colluding/colluding eavesdroppers. We demonstrate that the optimal relay selection scheme outperforms the partial relay selection and minimal self-interference relay selection schemes at the expense of acquiring full channel state information knowledge. In addition, increasing the number of the full-duplex small-cell base stations can improve the security performance. At the illegitimate side, deploying colluding eavesdroppers and increasing the number of eavesdroppers put the confidential information at a greater risk. Besides, the transmit power and the desire outage probability of the primary network have great influences on the secrecy outage probability of the secondary network.