66 resultados para Computer and network security
Resumo:
Biodiversity has been defined as the totality of genes, species, and ecosystems that inhabit the earth with the field contributing to many aspects of our lives and livelihoods by providing us with food, drink, medicines and shelter, as well as contributing to improving our surrounding environment. Benefits include providing life services through improved horticultural production, improving the business and service of horticulture as well as our environment, as well as improving our health and wellbeing, and our social and cultural relationships. Threats to biodiversity can include fragmentation, degradation and deforestation of habitat, introduction of invasive and exotic species, climate change and extreme weather events, over-exploitation of our natural resources, hybridisation, genetic pollution/erosion and food security issues and human overpopulation. This chapter examines a series of examples that provide the dual aims of biodiversity conservation and horticultural production and service; namely organic horticultural cropping, turf management, and nature-based tourism, and ways of valuing biological biodiversity such as the payment of environmental services and bio-prospecting. Horticulture plays a major role in the preserving of biodiversity.
Resumo:
Despite revived notions of a ‘cultural divide’ between East and West, Edward's Said's ‘Orientalism’ has received little attention from scholars of intelligence and diplomacy. This article brings to light for the first time a number of recently declassified documents of a different nature to usual assessments produced by Anglo-American analytic bodies: those focussed primarily on the issue of ‘national character’. Using and critiquing Said's thesis of Western ‘Orientalism’ it reveals some critical and enduring conceptualizations articulated by the diplomatic and intelligence community about Arab culture such as the role of Islam, rhetoric, political motivation and notions of ‘honour’. Such a critical approach demonstrates how diplomatic and intelligence history can also be a history of culture, ideas and institutional mentalité.
Resumo:
This article presents an experimental scalable message driven IoT and its security architecture based on Decentralized Information Flow Control. The system uses a gateway that exports SoA (REST) interfaces to the internet simplifying external applications whereas uses DIFC and asynchronous messaging within the home environment.
Resumo:
Climate change, a quintessential environmental problem, is generally recognised as the most important development challenge in the 21st century (IPCC, 2014). In addition to acknowledging its many significant direct consequences, climate change is increasingly used to frame discussions on other important global challenges, such as health, energy and food security. This chapter provides understanding of the intricate and complex relationship between climate change, environment and development.
Resumo:
Reflecting on the strategic commitment outlined in the Plan of Action for Gender Equality (2005-2015) and the priority issues of the Commonwealth Women’s Forum, this article assesses the extent to which the Commonwealth as an institution is supporting troop and police-contributing member states in addressing the gender imbalance in peacekeeping operations. Drawing on desk-based research, interviews with international policymakers and a statistical analysis of the International Peace Institute Peacekeeping Database, the article first outlines the Commonwealth’s gender and security policy perspective before examining data sets to determine the success of Commonwealth member states in integrating women into uniformed peacekeeping contingencies between 2009 and 2015. The article observes that, in spite of a renewed optimism and drive to propel women into leadership positions in politics, the judiciary, public bodies and private companies, security sector reform and the implementation of pillar one of the UN Security Council Resolution 1325, is notably absent from the Commonwealth’s gender agenda. It is argued that this policy gap suggests that national and international security architecture is regarded as an accepted domain of masculine privilege. A lack of political will among Commonwealth Heads of Government to mainstream gender equality and facilitate structural transformation of national security organs, and a chronically under resourced Commonwealth Secretariat limits the influence of the institution to that of arms-length promoter of international norms on women, peace and security.
Resumo:
Wireless Sensor Networks (WSNs) have been an exciting topic in recent years. The services offered by a WSN can be classified into three major categories: monitoring, alerting, and information on demand. WSNs have been used for a variety of applications related to the environment (agriculture, water and forest fire detection), the military, buildings, health (elderly people and home monitoring), disaster relief, and area or industrial monitoring. In most WSNs tasks like processing the sensed data, making decisions and generating emergency messages are carried out by a remote server, hence the need for efficient means of transferring data across the network. Because of the range of applications and types of WSN there is a need for different kinds of MAC and routing protocols in order to guarantee delivery of data from the source nodes to the server (or sink). In order to minimize energy consumption and increase performance in areas such as reliability of data delivery, extensive research has been conducted and documented in the literature on designing energy efficient protocols for each individual layer. The most common way to conserve energy in WSNs involves using the MAC layer to put the transceiver and the processor of the sensor node into a low power, sleep state when they are not being used. Hence the energy wasted due to collisions, overhearing and idle listening is reduced. As a result of this strategy for saving energy, the routing protocols need new solutions that take into account the sleep state of some nodes, and which also enable the lifetime of the entire network to be increased by distributing energy usage between nodes over time. This could mean that a combined MAC and routing protocol could significantly improve WSNs because the interaction between the MAC and network layers lets nodes be active at the same time in order to deal with data transmission. In the research presented in this thesis, a cross-layer protocol based on MAC and routing protocols was designed in order to improve the capability of WSNs for a range of different applications. Simulation results, based on a range of realistic scenarios, show that these new protocols improve WSNs by reducing their energy consumption as well as enabling them to support mobile nodes, where necessary. A number of conference and journal papers have been published to disseminate these results for a range of applications.