28 resultados para Supersymmetry Breaking


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Speaker diarization is the process of sorting speeches according to the speaker. Diarization helps to search and retrieve what a certain speaker uttered in a meeting. Applications of diarization systemsextend to other domains than meetings, for example, lectures, telephone, television, and radio. Besides, diarization enhances the performance of several speech technologies such as speaker recognition, automatic transcription, and speaker tracking. Methodologies previously used in developing diarization systems are discussed. Prior results and techniques are studied and compared. Methods such as Hidden Markov Models and Gaussian Mixture Models that are used in speaker recognition and other speech technologies are also used in speaker diarization. The objective of this thesis is to develop a speaker diarization system in meeting domain. Experimental part of this work indicates that zero-crossing rate can be used effectively in breaking down the audio stream into segments, and adaptive Gaussian Models fit adequately short audio segments. Results show that 35 Gaussian Models and one second as average length of each segment are optimum values to build a diarization system for the tested data. Uniting the segments which are uttered by same speaker is done in a bottom-up clustering by a newapproach of categorizing the mixture weights.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this dissertation is to examine the dynamics of the socio-technical system in the field of ageing. The study stems from the notion that the ageing of the population as a powerful megatrend has wide societal effects, and is not just a matter for the social and health sector. The central topic in the study is change: not only the age structures and structures of society are changing, but also at the same time there is constant development, for instance, in technologies, infrastructures and cultural perceptions. The changing concept of innovation has widened the understanding of innovations related to ageing from medical and assistive technological innovations to service and social innovations, as well as systemic innovations at different levels, which means the intertwined and co-evolutionary change in technologies, structures, services and thinking models. By the same token, the perceptions of older people and old age are becoming more multi-faceted: old age is no longer equated to illnesses and decline, but visions of active ageing and a third age have emerged, which are framed by choices, opportunities, resources and consumption in later life. The research task in this study is to open up the processes and mechanisms of change in the field of ageing, which are studied as a complex, multi-level and interrelated socio-technical system. The question is about co-effective elements consisting of macro-level landscape changes, the existing socio-technical regime (the rule system, practices and structures) and bottom-up niche-innovations. Societal transitions do not account for the things inside the regime alone, or for the long-term changes in the landscape, nor for the radical innovations, but for the interplay between all these levels. The research problem is studied through five research articles, which offer micro-level case studies to macro-level phenomenon. Each of the articles focus on different aspects related to ageing and change, and utilise various datasets. The framework of this study leans on the studies of socio-technical systems and multi-level perspective on transitions mainly developed by Frank Geels. Essential factors in transition from one socio-technological regime to another are the co-evolutionary processes between landscape changes, regime level and experimental niches. Landscape level changes, like the ageing of the population, destabilise the regime in the forms of coming pressures. This destabilization offers windows for opportunity to niche-innovations outside or at fringe of the regime, which, through their breakthrough, accelerate the transition process. However, the change is not easy because of various kinds of lock-ins and inertia, which tend to maintain the stability of the regime. In this dissertation, a constructionist approach of society is applied leaning mainly to the ideas of Anthony Giddens’ theory of structuration, with the dual nature of structures. The change is taking place in the interplay between actors and structures: structures shape people’s practices, but at the same time these practices constitute and reproduce social systems. Technology and other material aspects, as part of socio-technical systems, and the use of them, also take part in the structuration process. The findings of the study point out that co-evolutionary and co-effective relationships between economic, cultural, technological and institutional fields, as well as relationships between landscape changes, changes in the local and regime-level practices and rule systems, are a very complex and multi-level dynamic socio-technical phenomenon. At the landscape level of ageing, which creates the pressures and triggers to the regime change, there are three remarkable megatrends: demographic change, changes in the global economy and the development of technologies. These exert pressures to the socio-technical regime, which as a rule system is experiencing changes in the form of new markets and consumer habits, new ways of perceiving ageing, new models of organising the health care and other services and as new ways of considering innovation and innovativeness. There are also inner dynamics in the relationships between these aspects within the regime. These are interrelated and coconstructed: the prevailing perceptions of ageing and innovation, for instance, reflect the ageing policies, innovation policies, societal structures, organising models, technology and scientific discussion, and vice versa. Technology is part of the inner dynamics of the sociotechnological regime. Physical properties of the artefacts set limitations and opportunities with regard to their functions and uses. The use of and discussion about technology, contributes producing and reproducing the perceptions of old age. For societal transition, micro-level changes are also needed, in form of niche-innovations, for instance new services, organisational models or new technologies, Regimes, as stabilitystriven systems, tend to generate incremental innovations, but radically new innovations are generated in experimental niches protected from ‘normal’ market selection. The windows of opportunity for radical novelties may be opened if the circumstances are favourable for instance by tensions in the socio-technical regime affected by landscape level changes. This dissertation indicates that a change is taking place, firstly, in the dynamic interactionbetween levels, as a result of purposive action and governance to some extent. Breaking the inertia and using the window of opportunity for change and innovation offered by dynamics between levels, presupposes the actors’ special capabilities and actions such as dynamic capabilities and distance management. Secondly, the change is taking place the socio-technological negotiations inside the regime: interaction between technological and social, which is embodied in the use of technology. The use of technology includes small-level contextual scripts that also participate in forming broader societal scripts (for instance defining old age at the society level), which in their turn affect the formation of policies for innovation and ageing. Thirdly, the change is taking place by the means of active formation of the multi-actor innovation networks, where the role of distance management is crucial to facilitate the communication between actors coming from different backgrounds as well as to help the niches born outside the regime to utilise the window of opportunity offered by regime destabilisation. This dissertation has both theoretical and practical contributions. This study participates in the discussion of action-oriented view on transition by opening up of the socio-technological, coevolutionary processes of the multi-faceted phenomenon of ageing, which has lacked systematic analyses. The focus of this study, however, is not on the large-scale coordination and governance, but rather on opening up the incremental elements and structuration processes, which contribute to the transition little by little, and which can be affected to. This increases the practical importance of this dissertation, by highlighting the importance of very tiny, everyday elements in the change processes in the long run.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this thesis a closer look at ZigBee wireless network protocol was made and a ZigBee evaluation device was designed and built for testing it. ZigBee is a digital wireless network technology published in 2004, which was developed for wireless control and automation systems. It is based on the IEEE 802.15.4-2003 standard, and its aim was to create a reliable wireless networking protocol with secure data transmissions, low power consumption and low manufacturing costs. The low power consumption requirement has also led to a slow data rate and a short range, but in a ZigBee network individual network devices can route messages to each other, so short range is not a problem. In automation and control systems a fast data rate is not usually an important requirement either. ZigBee network can form automatically and one ZigBee network can theoretically include thousands of devices, all of which can communicate with each other. ZigBee network is also self-healing, so an individual device dropping out of the network, like breaking down, does not affect functionality of the network. Evaluation device was designed and implemented in four different versions, which were tested with six different antenna designs. All antennas were tested at a range of 100 meters in an open terrain using two different frequencies and transmission powers. Also a range test was performed for selected antennas using transmission power of 4,5 dBm, which was maximum power of the ZigBee chip used in the evaluation device. Range test resulted in a measured range of several hundred meters, which can be considered as a good result for a short-range technology.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The most outstanding conceptual challenge of modern crisis management is the principle of consent. It is not a problem only at the operational level - it challenges the entire decision-making structures of crisis management operations. In post-cold war times and especially in the 21st century, there has been a transition from peacekeeping with limited size and scope towards large and complex peace operations. This shift has presented peace operations with a dilemma. How to balance between maintaining consent for peace operations, whilst being able to use military force to coerce those attempting to wreck peace processes? To address such a dilemma, this research aims to promote understanding, on what can be achieved by military crisis management operations (peace support operations) in the next decade. The research concentrates on the focal research question: Should military components induce consent or rely on the compliance of conflicting parties in crisis management operations of the next decade (2020 – 2030)? The focus is on military – political strategic level considerations, and especially on the time before political decisions to commit to a crisis management operation. This study does not focus on which actor or organisation should intervene. The framework of this thesis derives from the so called ‘peacebuilding space’, the scope of peace operations and spoiler theory. Feasibility of both peace enforcement and peacekeeping in countering future risk conditions are analysed in this framework. This future-orientated qualitative research uses the Delphi-method with a panel of national and international experts. Citation analysis supports identification of relevant reference material, which consists of contemporary literature, the Delphi-questionnaires and interviews. The research process followed three main stages. In the first stage, plausible future scenarios and risk conditions were identified with the Delphi-panel. In the second stage, operating environments for peace support operations were described and consequent hypotheses formulated. In the third stage, these hypotheses were tested on the Delphi-panel. The Delphi-panel is sufficiently wide and diverse to produce plausible yet different insights. The research design utilised specifically military crisis management and peace operations theories. This produced various and relevant normative considerations. Therefore, one may argue that this research; which is based on accepted contemporary theory, hypotheses derived thereof and utilising an expert panel, contributes to the realm of peace support operations. This research finds that some degree of peace enforcement will be feasible and necessary in at least the following risk conditions: failed governance; potential spillover of ethnic, religious, ideological conflict; vulnerability of strategic chokepoints and infrastructures in ungoverned spaces; as well as in territorial and extra-territorial border disputes. In addition, some form of peace enforcement is probably necessary in risk conditions pertaining to: extremism of marginalised groups; potential disputes over previously uninhabited and resource-rich territories; and interstate rivalry. Furthermore, this research finds that peacekeeping measures will be feasible and necessary in at least risk conditions pertaining to: potential spillover of ethnic, religious, ideological conflict; uncontrolled migration; consequences from environmental catastrophes or changes; territorial and extra-territorial border disputes; and potential disputes over previously uninhabited and resource-rich territories. These findings are all subject to both generic and case specific preconditions that must exist for a peace support operation. Some deductions could be derived from the research findings. Although some risk conditions may appear illogical, understanding the underlying logic of a conflict is fundamental to understanding transition in crisis management. Practitioners of crisis management should possess cognizance of such transition. They must understand how transition should occur from threat to safety, from conflict to stability – and so forth. Understanding transition is imperative for managing the dynamic evolution of preconditions, which begins at the outset of a peace support operation. Furthermore, it is pertinent that spoilers are defined from a peace process point of view. If spoilers are defined otherwise, it changes the nature of an operation towards war, where the logic is breaking the will of an enemy - and surrender. In peace support operations, the logic is different: actions towards spoilers are intended to cause transition towards consent - not defeat. Notwithstanding future developments, history continues to provide strategic education. However, the distinction is that the risk conditions occur in novel futures. Hence, lessons learned from the past should be fitted to the case at hand. This research shows compelling evidence that swaying between intervention optimism and pessimism is not substantiated. Both peace enforcement and peacekeeping are sine qua non for successful military crisis management in the next decade.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Drawing from strategic theory, this study investigates the strategic roles of commercial companies providing military services, frequently referred to as private military companies. Theoretically, the thesis analyzes how states organize its military capabilities in order to be able to wield power within the international system while empirically, it examines the character and role of commercial companies that provide military training services to the United States Government and partner nations. The reason for this rather instrumental and functional, rather than critical, approach is that this work is written within the discipline known as War Studies. Strategic theory is used first to logically organize the empirical findings in two case studies and then to develop an analytical framework with which the strategic roles of companies providing military services can be investigated. The analysis has been conducted using both new and hitherto unknown sources in the shape of interviews as well as previously classified telegrams, but also draws on previous research and other secondary sources. The main findings are that commercial companies have five typical strategic roles: first, they cloak the state by substituting traditional uniformed troops; second, they act as trailblazers by securing US influence in new regions and by breaking new ground by contributing to the build-up of new partners; third, they act as scene setters by preparing the ground for military exit out of a theater of operations or by facilitating inter-operability between foreign militaries and the US military; fourth, they can be used to infiltrate the security structures of foreign countries; fifth and finally, they can be used to provide offensive capabilities by providing either kinetic or cyber warfare effects. Another finding is that military service contracting is an important part of the US strategic culture.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Repair of segmental defects in load-bearing long bones is a challenging task because of the diversity of the load affecting the area; axial, bending, shearing and torsional forces all come together to test the stability/integrity of the bone. The natural biomechanical requirements for bone restorative materials include strength to withstand heavy loads, and adaptivity to conform into a biological environment without disturbing or damaging it. Fiber-reinforced composite (FRC) materials have shown promise, as metals and ceramics have been too rigid, and polymers alone are lacking in strength which is needed for restoration. The versatility of the fiber-reinforced composites also allows tailoring of the composite to meet the multitude of bone properties in the skeleton. The attachment and incorporation of a bone substitute to bone has been advanced by different surface modification methods. Most often this is achieved by the creation of surface texture, which allows bone growth, onto the substitute, creating a mechanical interlocking. Another method is to alter the chemical properties of the surface to create bonding with the bone – for example with a hydroxyapatite (HA) or a bioactive glass (BG) coating. A novel fiber-reinforced composite implant material with a porous surface was developed for bone substitution purposes in load-bearing applications. The material’s biomechanical properties were tailored with unidirectional fiber reinforcement to match the strength of cortical bone. To advance bone growth onto the material, an optimal surface porosity was created by a dissolution process, and an addition of bioactive glass to the material was explored. The effects of dissolution and orientation of the fiber reinforcement were also evaluated for bone-bonding purposes. The Biological response to the implant material was evaluated in a cell culture study to assure the safety of the materials combined. To test the material’s properties in a clinical setting, an animal model was used. A critical-size bone defect in a rabbit’s tibia was used to test the material in a load-bearing application, with short- and long-term follow-up, and a histological evaluation of the incorporation to the host bone. The biomechanical results of the study showed that the material is durable and the tailoring of the properties can be reproduced reliably. The Biological response - ex vivo - to the created surface structure favours the attachment and growth of bone cells, with the additional benefit of bioactive glass appearing on the surface. No toxic reactions to possible agents leaching from the material could be detected in the cell culture study when compared to a nontoxic control material. The mechanical interlocking was enhanced - as expected - with the porosity, whereas the reinforcing fibers protruding from the surface of the implant gave additional strength when tested in a bone-bonding model. Animal experiments verified that the material is capable of withstanding load-bearing conditions in prolonged use without breaking of the material or creating stress shielding effects to the host bone. A Histological examination verified the enhanced incorporation to host bone with an abundance of bone growth onto and over the material. This was achieved with minimal tissue reactions to a foreign body. An FRC implant with surface porosity displays potential in the field of reconstructive surgery, especially regarding large bone defects with high demands on strength and shape retention in load-bearing areas or flat bones such as facial / cranial bones. The benefits of modifying the strength of the material and adjusting the surface properties with fiber reinforcement and bone-bonding additives to meet the requirements of different bone qualities are still to be fully discovered.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The superconducting gap is a basic character of a superconductor. While the cuprates and conventional phonon-mediated superconductors are characterized by distinct d- and s-wave pairing symmetries with nodal and nodeless gap distributions respectively, the superconducting gap distributions in iron-based superconductors are rather diversified. While nodeless gap distributions have been directly observed in Ba1–xKxFe2As2, BaFe2–xCoxAs2, LiFeAs, KxFe2–ySe2, and FeTe1–xSex, the signatures of a nodal superconducting gap have been reported in LaOFeP, LiFeP, FeSe, KFe2As2, BaFe2–xRuxAs2, and BaFe2(As1–xPx)2. Due to the multiplicity of the Fermi surface in these compounds s± and d pairing states can be both nodeless and nodal. A nontrivial orbital structure of the order parameter, in particular the presence of the gap nodes, leads to effects in which the disorder is much richer in dx2–y2-wave superconductors than in conventional materials. In contrast to the s-wave case, the Anderson theorem does not work, and nonmagnetic impurities exhibit a strong pair-breaking influence. In addition, a finite concentration of disorder produces a nonzero density of quasiparticle states at zero energy, which results in a considerable modification of the thermodynamic and transport properties at low temperatures. The influence of order parameter symmetry on the vortex core structure in iron-based pnictide and chalcogenide superconductors has been investigated in the framework of quasiclassical Eilenberger equations. The main results of the thesis are as follows. The vortex core characteristics, such as, cutoff parameter, ξh, and core size, ξ2, determined as the distance at which density of the vortex supercurrent reaches its maximum, are calculated in wide temperature, impurity scattering rate, and magnetic field ranges. The cutoff parameter, ξh(B; T; Г), determines the form factor of the flux-line lattice, which can be obtained in _SR, NMR, and SANS experiments. A comparison among the applied pairing symmetries is done. In contrast to s-wave systems, in dx2–y2-wave superconductors, ξh/ξc2 always increases with the scattering rate Г. Field dependence of the cutoff parameter affects strongly on the second moment of the magnetic field distributions, resulting in a significant difference with nonlocal London theory. It is found that normalized ξ2/ξc2(B/Bc2) dependence is increasing with pair-breaking impurity scattering (interband scattering for s±-wave and intraband impurity scattering for d-wave superconductors). Here, ξc2 is the Ginzburg-Landau coherence length determined from the upper critical field Bc2 = Φ0/2πξ2 c2, where Φ0 is a flux quantum. Two types of ξ2/ξc2 magnetic field dependences are obtained for s± superconductors. It has a minimum at low temperatures and small impurity scattering transforming in monotonously decreasing function at strong scattering and high temperatures. The second kind of this dependence has been also found for d-wave superconductors at intermediate and high temperatures. In contrast, impurity scattering results in decreasing of ξ2/ξc2(B/Bc2) dependence in s++ superconductors. A reasonable agreement between calculated ξh/ξc2 values and those obtained experimentally in nonstoichiometric BaFe2–xCoxAs2 (μSR) and stoichiometric LiFeAs (SANS) was found. The values of ξh/ξc2 are much less than one in case of the first compound and much more than one for the other compound. This is explained by different influence of two factors: the value of impurity scattering rate and pairing symmetry.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Presentation at Open Repositories 2014, Helsinki, Finland, June 9-13, 2014

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tässä väitöskirjassa tarkastellaan suomalaisen puoluejohtajuuden ja suuren puolueen johtajaksi nousun murroskautta 1980-luvun lopulta 2010-luvulle median ja politiikan vuorovaikutuksen näkökulmasta. Puolueiden johtaminen on myös Suomessa ollut miesten työtä, ja perinteisesti tehtävään on ollut yksi väylä: asettuminen ehdolle puheenjohtajavaalissa ja valituksi tulo puoluekokouksessa. Tarkastelujakson alkupuolella naisia oli Suomessa ensimmäistä kertaa ehdolla suurten puolueiden puheenjohtajavaaleissa. Kauden loppupuolella heitä myös valittiin tuohon tehtävään ja ensimmäiset naiset nousivat pääministeriksi. Tämä historiallinen murros päätti liki satavuotisen perinteen, jossa miehet ovat olleet Suomessa sekä suurten puolueiden että hallitustyön johtajia. Julkisessa keskustelussa kysymys tasa-arvosta jäi toissijaiseksi: naisia alettiin valita puoluejohtajiksi tilanteissa, joissa heidän valintansa nähtiin puolueille edulliseksi. Naisen valinta tulkittiin miehen valintaa merkittävämmäksi symboliseksi viestiksi, johon liitettiin ajatuksia uudistumisesta ja puolueen julkisuuskuvan parantamisesta. Merkille pantavaa on, että naisten ensimmäiset valinnat suurten puolueiden johtajiksi tapahtuivat vaiheessa, jossa puoluejohtajien valta-asema on vahvin kautta suomalaisen poliittisen historian. Tässä valossa näyttää siltä, että valta ei aina pakenekaan naisilta. Vaikka suomalainen yhteiskunta ja suomalaiset naiset ovat monessa mielessä olleet edelläkävijöitä tasa-arvon suhteen, politiikan johtopaikkoja tavoitelleet naiset ovat meilläkin kohdanneet kansainvälisessä tutkimuksessa naisten haasteeksi osoitettuja lasikattoja, pyöröovia ja liukkaita jyrkänteitä. Tutkittavan ajanjakson aikana konkretisoitui myös toinen mahdollinen, joskin poikkeuksellinen reitti suuren puolueen johtajaksi: pienen puolueen nouseminen suurten joukkoon eduskuntavaaleissa. Tämä vaihtoehto toteutui vuonna 2011 perussuomalaisten eduskuntavaalivoiton myötä. Perussuomalaisten nousu eduskunnan pienimmästä puolueesta kolmanneksi suurimmaksi mursi perinteisen kolmen suuren puolueen asetelman. Puolueen menestyksen seuraukset ovat olleet kauaskantoisemmat kuin ehkä ensin ajateltiin: perussuomalaisten vaalivoiton sosiaalidemokraateille, keskustalle, ja kokoomukselle aiheuttama järkytys heijastui myöhemmin myös niiden johtajavaihdoksiin ja -valintoihin. Sekä naisten läpimurrossa että populismin voittokulussa median rooli oli monisyisempi kuin siihen perinteisesti liitetty tiedon välittäjän ja valtaa pitävien toimia kriittisesti seuraavan neljännen valtiomahdin tehtävänkuva. Tutkittavalla jaksolla tiedotusvälineet tekivät onnistuneen intervention politiikan osapuoleksi. Toimittajat ottivat kantaa valintoihin ja ohjeistivat puolueita, ja puolueet taas mukauttivat näkyvyyden maksimoidakseen käytäntöjään median tarpeisiin. 1980-luvun lopulta 2010-luvulle ulottuvalla jaksolla suuren puolueen puoluejohtajaksi valikoitumisen kriteerit muuttuivat, samalla kun median merkitys johtajavalinnoissa ja myös puoluejohtajan käytännön työssä kasvoi. Mediasta tuli aiempaa konkreettisemmin johtajavalintojen ja valtakamppailun areena, ja siihen liittyvät näkökohdat nousivat myös keskeisiksi johtajan taitoja arvioitaessa. Kuka ehdokkaista toisi näkyvyyttä, ”pärjäisi” median paineissa ja vakuuttaisi äänestäjät? Vielä 1980- ja 1990-lukujen taitteessa johtajavalinnat olivat pitkälti puolueorganisaatioiden hallinnoimia prosesseja, joista lehdistö raportoi askeleen jäljessä kulkien. Viimeistään 2000-luvun ensimmäisellä vuosikymmenellä puolueet omaksuivat ajatuksen median hyödyllisyydestä. Tämän strategisen muutoksen myötä puolueet tulivat samalla luovuttaneeksi määriteltyvaltaa oman organisaationsa ulkopuolelle. Kokoomuksen vuoden 2014 johtajavaalissa silmiinpistävää oli pyrkimys sekä hyötyä julkisuudesta että palauttaa valtaa takaisin puolueelle. Politiikan mediajulkisuuden alttius tarttua myyviin poliitikkopersooniin, ilmiöihin, ristiriitoihin ja draamaan sekä vastaavasti populistijohtaja Timo Soinin ja perussuomalaisten kyky tarjota kaikkia näitä auttoivat puolueen suurvoittoon vuoden 2011 eduskuntavaaleissa. Organisaatioltaan pieni ja johtajaansa henkilöityvä puolue sai selvästi poliittista painoarvoaan suuremman julkisuuden, koska kiinnostavuus määritti näkyvyyden ja puolueen nousevasta kannatuksesta tuli yksi vaalien pääaiheista. Median ja politiikan suhteessa tapahtuneet muutokset olivat vauhdittamassa niin naisten nousua suurten puolueiden johtajiksi kuin populistisen johtajuuden läpimurtoa ja perussuomalaisten menestystä. Koska suurten puolueiden johtajista valikoituvat myös pääministerit, näiden muutosten vaikutus ulottuu Suomen poliittisesti vaikutusvaltaisimpaan tehtävään asti.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study examines information security as a process (information securing) in terms of what it does, especially beyond its obvious role of protector. It investigates concepts related to ‘ontology of becoming’, and examines what it is that information securing produces. The research is theory driven and draws upon three fields: sociology (especially actor-network theory), philosophy (especially Gilles Deleuze and Félix Guattari’s concept of ‘machine’, ‘territory’ and ‘becoming’, and Michel Serres’s concept of ‘parasite’), and information systems science (the subject of information security). Social engineering (used here in the sense of breaking into systems through non-technical means) and software cracker groups (groups which remove copy protection systems from software) are analysed as examples of breaches of information security. Firstly, the study finds that information securing is always interruptive: every entity (regardless of whether or not it is malicious) that becomes connected to information security is interrupted. Furthermore, every entity changes, becomes different, as it makes a connection with information security (ontology of becoming). Moreover, information security organizes entities into different territories. However, the territories – the insides and outsides of information systems – are ontologically similar; the only difference is in the order of the territories, not in the ontological status of entities that inhabit the territories. In other words, malicious software is ontologically similar to benign software; they both are users in terms of a system. The difference is based on the order of the system and users: who uses the system and what the system is used for. Secondly, the research shows that information security is always external (in the terms of this study it is a ‘parasite’) to the information system that it protects. Information securing creates and maintains order while simultaneously disrupting the existing order of the system that it protects. For example, in terms of software itself, the implementation of a copy protection system is an entirely external addition. In fact, this parasitic addition makes software different. Thus, information security disrupts that which it is supposed to defend from disruption. Finally, it is asserted that, in its interruption, information security is a connector that creates passages; it connects users to systems while also creating its own threats. For example, copy protection systems invite crackers and information security policies entice social engineers to use and exploit information security techniques in a novel manner.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Työn tavoitteena oli kehittää menetelmä, jolla voitaisiin arvioida veto-ominaisuuksien avulla konvertointikoneen prässäysnopeuden ja muottien lämpötilan vaikutuksia kartongin muovautuvuuteen. Kirjallisuusosassa käsiteltiin kartongin muovautuvuuteen vaikuttavia ominaisuuksia sekä vetolujuuteen vaikuttavia tekijöitä. Lisäksi käsiteltiin kosteuden vaikutusta muovautuvuuteen sekä esiteltiin vuokakonvertointiprosessin periaate ja muovin sekä kartongin käyttäytymisen erot konvertointiprosessissa. Kokeellinen osa jakaantui kolmeen osaan. Esikokeissa tutkittiin laboratoriomittauksilla vetonopeuden ja kosteuden muutosten vaikutusta erilaisten kaupallisten kartonkimateriaalien vetolujuuteen ja murtovenymään. Tulosten perusteella valittiin prässäysnopeudet ja kosteustaso 2D- testauslaitteella suoritettuihin esi-pilot-mittakaavan kokeisiin sekä varsinaiseen pilot-koeajoon. Pilot-koeajossa pyrittiin arvioimaan prässäysnopeuden ja muottien lämpötilan vaikutuksia muovautuvuuteen vetolujuusarvojen avulla. Prässäysnopeudella ja vetolujuuslaitteen nopeudella ei havaittu yhteneväisyyksiä, jotta voitaisiin arvioida kartongin muovautuvuutta. Muovautuvuutta voidaan kuitenkin arvioida epäonnistuneisuusluvulla, jonka laskentapa kehitettiin työn aikana. Epäonnistuneisuusluku kuvaa hyvin kartongin muovautuvuutta ja on menetelmänä helppo, mutta sen heikkoutena on repeämien mittaamisen aiheuttama epätarkkuus. Esikokeissa havaittiin myös muovipäällysteiden veto-ominaisuuksien vastaavan kartongin ominaisuuksia 65 %:n suhteellisessa kosteudessa, jonka valittiin siten olevan optimaalinen olosuhde pilot-mittakaavan koeajoihin.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Inside cyber security threats by system administrators are some of the main concerns of organizations about the security of systems. Since operating systems are controlled and managed by fully trusted administrators, they can negligently or intentionally break the information security and privacy of users and threaten the system integrity. In this thesis, we propose some solutions for enhancing the security of Linux OS by restricting administrators’ access to superuser’s privileges while they can still manage the system. We designed and implemented an interface for administrators in Linux OS called Linux Admins’ User Interface (LAUI) for managing the system in secure ways. LAUI along with other security programs in Linux like sudo protect confidentiality and integrity of users’ data and provide a more secure system against administrators’ mismanagement. In our model, we limit administrators to perform managing tasks in secure manners and also make administrators accountable for their acts. In this thesis we present some scenarios for compromising users’ data and breaking system integrity by system administrators in Linux OS. Then we evaluate how our solutions and methods can secure the system against these administrators’ mismanagement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tutkimus sijoittuu konstruktivismin ja kasvatuksen historian alueille. Tutkin diskurssianalyysin keinoin miten opettajiksi opiskelevien tyttö- ja naisoppilaiden poikkeavuuden tulkintoja on luotu, ylläpidetty ja uusinnettu 1860-1960 -lukujen Suomessa. Huomio on siinä miten opettajaseminaarien tyttö- ja naisoppilaiden käyttäytymistä on tulkittu poikkeavaksi opettajakokousten pöytäkirjojen teksteissä; miten poikkeavuutta on luotu diskursseilla - ja miten diskurssit ja niiden tulkinnat ovat olleet sukupuolitettuja. Tutkimusaiheeseen diskurssianalyysi soveltuu niin metodiksi kuin viitekehykseksikin, koska poikkeavuuden, normaalin ja epänormaalin rakentuminen tapahtuu kielenkäytön, vuorovaikutuksen ja sosiaalisen toiminnan keskinäisissä suhteissa. Pyrkimyksenä on tietoisuuden lisääminen niistä prosesseista, joissa näitä poikkeavuuden tulkintoja luotiin. Aineistoni koostuu rangaistustapauksista, jotka ovat kirjattu viiden opettajaseminaarin opettajakokousten pöytäkirjoihin vuosien 1863 - 1962 välisenä aikana. Rikkomustapauksia on yhteensä 1436, joista 194 tyttöoppilaiden tekemiä. Ajanjakso alkaa kansalaisyhteiskunnan ja kansanopetuksen synnystä ja päättyy peruskoulun alkuvaiheisiin. Vaikka seminaarien virallinen ja julkinen säännöstö oli kohdistettu yhtälailla nais- ja miesoppilaille, sisälsivät diskursseihin kätkeytyvät normistot seminaarien tyttö- ja naisoppilaille omat erilliset rajat, joiden ylittäminen teki heistä poikkeavia. Tyttö- ja naisoppilaiden poikkeavuus opettajaseminaareissa on ollut poikkeamista Jumalan säätämästä järjestyksestä, jossa naisella on määrätty paikkansa, asemansa ja tehtävänsä. Kun poika- ja miesoppilaiden normeista ja seminaarien säännöistä poikkeamisia on käsitelty opettajakokouksissa rikoksina, on tyttö- ja naisoppilaiden rikkeitä pyritty näkemään sairauden kaltaisina moraalia ja ymmärrystä heikentävinä tiloina. Ennen kaikkea ne ovat olleet rikkomuksia oikeanlaista naiseutta eli ”tosinaiseuden” mallia vastaan. Naisopettajuuden malli kansan äitinä ja mallikansalaisena sekä nöyrän, alistuvan, vaatimattoman ja säyseän ”tosinaisen” mallit olivat lähes yhdenmukaiset ja ne ovat luoneet ja ylläpitäneet tyttö- ja naisoppilaiden toiseutta. Diskurssit, joilla tätä toiseutta ylläpidettiin, elivät opettajaseminaarien pöytäkirjateksteissä liki sadan vuoden ajan vain painotuserojen muuttuessa hieman. Toivon työni herättävän pohdintaa siitä, mitä saattaisivat olla oman aikamme vastaavanlaiset itsestäänselvyydet, jotka otamme annettuina ja jotka kyseenalaistamattomina totuuksina rajoittavat niin kasvatettavien kuin kasvattajienkin omaksi itsekseen tulemista.