66 resultados para Computer and network security


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The agronomic and economic performance of genetically modified (GM) crops relative to their conventional counterparts has been largely investigated worldwide. As a result there is considerable information to conduct a meta-analysis to evaluate the agronomic and economic relative performance of GM crops vs. non GM crops by crop, GM trait, and country’s level of development. Such meta-analysis has been recently conducted showing that overall GM crops outperform non GM crops in both agronomic and economic terms (1). This paper focuses on the agronomic and economic performance of GM crops in developing and developed countries as well as the potential implications for global food security of adoption of GM crops by developing countries. The presumption that technology only benefits the developed world is not supported by the meta-analysis conducted. No evidence that GM technology benefits moredeveloped than developing countries was found. Indeed, the agronomic and economic performance of GM crops vs. conventional crops tends to be better for developing than for developed countries. Although it is manifested that the conventional agronomic practices in developing countries are different to those in developed countries, it is also apparent that GM crop adoption in developing countries may help to tackle the growing concerns over the scarcity of food globally.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Agriculture and food security are key sectors for intervention under climate change. Agricultural production is highly vulnerable even to 2C (low-end) predictions for global mean temperatures in 2100, with major implications for rural poverty and for both rural and urban food security. Agriculture also presents untapped opportunities for mitigation, given the large land area under crops and rangeland, and the additional mitigation potential of aquaculture. This paper presents a summary of current knowledge on options to support farmers, particularly smallholder farmers, in achieving food security through agriculture under climate change. Actions towards adaptation fall into two broad overlapping areas: (1) accelerated adaptation to progressive climate change over decadal time scales, for example integrated packages of technology, agronomy and policy options for farmers and food systems, and (2) better management of agricultural risks associated with increasing climate variability and extreme events, for example improved climate information services and safety nets. Maximization of agriculture’s mitigation potential will require investments in technological innovation and agricultural intensification linked to increased efficiency of inputs, and creation of incentives and monitoring systems that are inclusive of smallholder farmers. Food systems faced with climate change need urgent, broad-based action in spite of uncertainties.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This research aimed to investigate the implications of changing agricultural land use from food production towards increased cashew cultivation for food security and poverty alleviation in Jaman North District, Brong-Ahafo Region of Ghana. Based on qualitative, participatory research with a total of 60 participants, the research found that increased cashew production had led to improvements in living standards for many farmers and their children over recent years. Global demand for cashew is projected to continue to grow rapidly in the immediate future and cashew-growing areas of Ghana are well placed to respond to this demand. Cashew farmers however were subject to price fluctuations in the value of Raw Cashew Nuts (RCN) due to unequal power relations with intermediaries and export buyer companies and global markets, in addition to other vulnerabilities that constrained the quality and quantity of cashew and food crops they could produce. The expansion of cashew plantations was leading to pressure on the remaining family lands available for food crop production, which community members feared could potentially compromise the food security of rural communities and the land inheritance of future generations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Results from two studies on longitudinal friendship networks are presented, exploring the impact of a gratitude intervention on positive and negative affect dynamics in a social network. The gratitude intervention had been previously shown to increase positive affect and decrease negative affect in an individual but dynamic group effects have not been considered. In the first study the intervention was administered to the whole network. In the second study two social networks are considered and in each only a subset of individuals, initially low/high in negative affect respectively received the intervention as `agents of change'. Data was analyzed using stochastic actor based modelling techniques to identify resulting network changes, impact on positive and negative affect and potential contagion of mood within the group. The first study found a group level increase in positive and a decrease in negative affect. Homophily was detected with regard to positive and negative affect but no evidence of contagion was found. The network itself became more volatile along with a fall in rate of change of negative affect. Centrality measures indicated that the best broadcasters were the individuals with the least negative affect levels at the beginning of the study. In the second study, the positive and negative affect levels for the whole group depended on the initial levels of negative affect of the intervention recipients. There was evidence of positive affect contagion in the group where intervention recipients had low initial level of negative affect and contagion in negative affect for the group where recipients had initially high level of negative affect.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper describes a proposed new approach to the Computer Network Security Intrusion Detection Systems (NIDS) application domain knowledge processing focused on a topic map technology-enabled representation of features of the threat pattern space as well as the knowledge of situated efficacy of alternative candidate algorithms for pattern recognition within the NIDS domain. Thus an integrative knowledge representation framework for virtualisation, data intelligence and learning loop architecting in the NIDS domain is described together with specific aspects of its deployment.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper focuses on improving computer network management by the adoption of artificial intelligence techniques. A logical inference system has being devised to enable automated isolation, diagnosis, and even repair of network problems, thus enhancing the reliability, performance, and security of networks. We propose a distributed multi-agent architecture for network management, where a logical reasoner acts as an external managing entity capable of directing, coordinating, and stimulating actions in an active management architecture. The active networks technology represents the lower level layer which makes possible the deployment of code which implement teleo-reactive agents, distributed across the whole network. We adopt the Situation Calculus to define a network model and the Reactive Golog language to implement the logical reasoner. An active network management architecture is used by the reasoner to inject and execute operational tasks in the network. The integrated system collects the advantages coming from logical reasoning and network programmability, and provides a powerful system capable of performing high-level management tasks in order to deal with network fault.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

How effective are multi-stakeholder scenarios building processes to bring diverse actors together and create a policy-making tool to support sustainable development and promote food security in the developing world under climate change? The effectiveness of a participatory scenario development process highlights the importance of ‘boundary work’ that links actors and organizations involved in generating knowledge on the one hand, and practitioners and policymakers who take actions based on that knowledge on the other. This study reports on the application of criteria for effective boundary work to a multi-stakeholder scenarios process in East Africa that brought together a range of regional agriculture and food systems actors. This analysis has enabled us to evaluate the extent to which these scenarios were seen by the different actors as credible, legitimate and salient, and thus more likely to be useful. The analysis has shown gaps and opportunities for improvement on these criteria, such as the quantification of scenarios, attention to translating and communicating the results through various channels and new approaches to enable a more inclusive and diverse group of participants. We conclude that applying boundary work criteria to multi-stakeholder scenarios processes can do much to increase the likelihood of developing sustainable development and food security policies that are more appropriate.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Expert systems have been increasingly popular for commercial importance. A rule based system is a special type of an expert system, which consists of a set of ‘if-then‘ rules and can be applied as a decision support system in many areas such as healthcare, transportation and security. Rule based systems can be constructed based on both expert knowledge and data. This paper aims to introduce the theory of rule based systems especially on categorization and construction of such systems from a conceptual point of view. This paper also introduces rule based systems for classification tasks in detail.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In recent years, ZigBee has been proven to be an excellent solution to create scalable and flexible home automation networks. In a home automation network, consumer devices typically collect data from a home monitoring environment and then transmit the data to an end user through multi-hop communication without the need for any human intervention. However, due to the presence of typical obstacles in a home environment, error-free reception may not be possible, particularly for power constrained devices. A mobile sink based data transmission scheme can be one solution but obstacles create significant complexities for the sink movement path determination process. Therefore, an obstacle avoidance data routing scheme is of vital importance to the design of an efficient home automation system. This paper presents a mobile sink based obstacle avoidance routing scheme for a home monitoring system. The mobile sink collects data by traversing through the obstacle avoidance path. Through ZigBee based hardware implementation and verification, the proposed scheme successfully transmits data through the obstacle avoidance path to improve network performance in terms of life span, energy consumption and reliability. The application of this work can be applied to a wide range of intelligent pervasive consumer products and services including robotic vacuum cleaners and personal security robots1.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

IoT, crowd sensing and smart cities will be a traffic challenge. New communication paradigms as asynchronous messaging carry and forward, scheduled delivery and temporary storage will be needed to manage network resources dynamically. Since traditional end to end security will require keeping security associations among devices for a long time draining valuable resources, we propose and evaluate the use of proxy re-encryption protocols in these scenarios as a solution for reliable and flexible security.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An eddy current testing system consists of a multi-sensor probe, a computer and a special expansion card and software for data-collection and analysis. The probe incorporates an excitation coil, and sensor coils; at least one sensor coil is a lateral current-normal coil and at least one is a current perturbation coil.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An eddy current testing system consists of a multi-sensor probe, computer and a special expansion card and software for data collection and analysis. The probe incorporates an excitation coil, and sensor coils; at least one sensor coil is a lateral current-normal coil and at least one is a current perturbation coil.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Military Intelligence (Research) Department of the British War Office was tasked in 1940 with encouraging and supporting armed resistance in occupied Europe and the Axis-controlled Middle East. The major contention of this paper is that, in doing so, MI(R) performed a key role in British strategy in 1940-42 and in the development of what are now known as covert operations. MI(R) developed an organic, but coherent doctrine for such activity which was influential upon the Special Operations Executive (SOE) and its own sub-branch, G(R), which applied this doctrine in practice in East Africa and the Middle East in 1940-41. It was also here that a number of key figures in the development of covert operations and special forces first cut their teeth, the most notable being Major Generals Colin Gubbins and Orde Wingate.