45 resultados para secure messaging in VANETs
em CentAUR: Central Archive University of Reading - UK
Resumo:
This paper offers an alternative viewpoint on why people choose to engage in artisanal mining – the low tech mineral extraction and processing of mainly precious metals and stones – for extended periods in sub-Saharan Africa. Drawing upon experiences from Akwatia, Ghana’s epicentre of diamond production since the mid-1920s, the analysis challenges the commonly-held view that the region’s people are drawn to artisanal mining solely because of a desire ‘to get rich quick’. A combination of events, including the recent closure of Ghana Consolidated Diamonds Ltd’s industrial-scale operation and decreased foreign investment in the country’s diamond industry over concerns of it potentially harbouring ‘conflict’ stones from neighbouring Coˆte D’Ivoire, has had a debilitating economic impact on Akwatia. In an attempt to alleviate their hardships, many of the town’s so-called ‘lifetime’ diamond miners have managed to secure employment in neighbouring artisanal gold mining camps. But their decision has been condemned by many of the country’s policymakers and traditional leaders, who see it solely as a move to secure ‘fast money’. It is argued here, however, that these people pursue work in surrounding artisanal gold mining communities mainly because of poverty, and that their decision has more to do with a desire to immerse in activities with which they are familiar, that offer stable employment and consistent salaries, and provide immediate debt relief. Misdiagnosis of cases such as Akwatia underscores how unfamiliar policymakers and donors are with the dynamics of ASM in sub-Saharan Africa.
Resumo:
In developing Isotype, Otto Neurath and his colleagues were the first to systematically explore a consistent visual language as part of an encyclopedic approach to representing all aspects of the physical world. The pictograms used in Isotype have a secure legacy in today's public information symbols, but Isotype was more than this: it was designed to communicate social facts memorably to less educated groups, including schoolchildren and workers, reflecting its initial testing ground in the socialist municipality of Vienna during the 1920s. The social engagement and methodology of Isotype are examined here in order to draw some lessons for information design today.
Resumo:
The current study discusses new opportunities for secure ground to satellite communications using shaped femtosecond pulses that induce spatial hole burning in the atmosphere for efficient communications with data encoded within super-continua generated by femtosecond pulses. Refractive index variation across the different layers in the atmosphere may be modelled using assumptions that the upper strata of the atmosphere and troposphere behaving as layered composite amorphous dielectric networks composed of resistors and capacitors with different time constants across each layer. Input-output expressions of the dynamics of the networks in the frequency domain provide the transmission characteristics of the propagation medium. Femtosecond pulse shaping may be used to optimize the pulse phase-front and spectral composition across the different layers in the atmosphere. A generic procedure based on evolutionary algorithms to perform the pulse shaping is proposed. In contrast to alternative procedures that would require ab initio modelling and calculations of the propagation constant for the pulse through the atmosphere, the proposed approach is adaptive, compensating for refractive index variations along the column of air between the transmitter and receiver.
Resumo:
Preface. Iron is considered to be a minor element employed, in a variety of forms, by nearly all living organisms. In some cases, it is utilised in large quantities, for instance for the formation of magnetosomes within magnetotactic bacteria or during use of iron as a respiratory donor or acceptor by iron oxidising or reducing bacteria. However, in most cases the role of iron is restricted to its use as a cofactor or prosthetic group assisting the biological activity of many different types of protein. The key metabolic processes that are dependent on iron as a cofactor are numerous; they include respiration, light harvesting, nitrogen fixation, the Krebs cycle, redox stress resistance, amino acid synthesis and oxygen transport. Indeed, it is clear that Life in its current form would be impossible in the absence of iron. One of the main reasons for the reliance of Life upon this metal is the ability of iron to exist in multiple redox states, in particular the relatively stable ferrous (Fe2+) and ferric (Fe3+) forms. The availability of these stable oxidation states allows iron to engage in redox reactions over a wide range of midpoint potentials, depending on the coordination environment, making it an extremely adaptable mediator of electron exchange processes. Iron is also one of the most common elements within the Earth’s crust (5% abundance) and thus is considered to have been readily available when Life evolved on our early, anaerobic planet. However, as oxygen accumulated (the ‘Great oxidation event’) within the atmosphere some 2.4 billion years ago, and as the oceans became less acidic, the iron within primordial oceans was converted from its soluble reduced form to its weakly-soluble oxidised ferric form, which precipitated (~1.8 billion years ago) to form the ‘banded iron formations’ (BIFs) observed today in Precambrian sedimentary rocks around the world. These BIFs provide a geological record marking a transition point away from the ancient anaerobic world towards modern aerobic Earth. They also indicate a period over which the bio-availability of iron shifted from abundance to limitation, a condition that extends to the modern day. Thus, it is considered likely that the vast majority of extant organisms face the common problem of securing sufficient iron from their environment – a problem that Life on Earth has had to cope with for some 2 billion years. This struggle for iron is exemplified by the competition for this metal amongst co-habiting microorganisms who resort to stealing (pirating) each others iron supplies! The reliance of micro-organisms upon iron can be disadvantageous to them, and to our innate immune system it represents a chink in the microbial armour, offering an opportunity that can be exploited to ward off pathogenic invaders. In order to infect body tissues and cause disease, pathogens must secure all their iron from the host. To fight such infections, the host specifically withdraws available iron through the action of various iron depleting processes (e.g. the release of lactoferrin and lipocalin-2) – this represents an important strategy in our defence against disease. However, pathogens are frequently able to deploy iron acquisition systems that target host iron sources such as transferrin, lactoferrin and hemoproteins, and thus counteract the iron-withdrawal approaches of the host. Inactivation of such host-targeting iron-uptake systems often attenuates the pathogenicity of the invading microbe, illustrating the importance of ‘the battle for iron’ in the infection process. The role of iron sequestration systems in facilitating microbial infections has been a major driving force in research aimed at unravelling the complexities of microbial iron transport processes. But also, the intricacy of such systems offers a challenge that stimulates the curiosity. One such challenge is to understand how balanced levels of free iron within the cytosol are achieved in a way that avoids toxicity whilst providing sufficient levels for metabolic purposes – this is a requirement that all organisms have to meet. Although the systems involved in achieving this balance can be highly variable amongst different microorganisms, the overall strategy is common. On a coarse level, the homeostatic control of cellular iron is maintained through strict control of the uptake, storage and utilisation of available iron, and is co-ordinated by integrated iron-regulatory networks. However, much yet remains to be discovered concerning the fine details of these different iron regulatory processes. As already indicated, perhaps the most difficult task in maintaining iron homeostasis is simply the procurement of sufficient iron from external sources. The importance of this problem is demonstrated by the plethora of distinct iron transporters often found within a single bacterium, each targeting different forms (complex or redox state) of iron or a different environmental condition. Thus, microbes devote considerable cellular resource to securing iron from their surroundings, reflecting how successful acquisition of iron can be crucial in the competition for survival. The aim of this book is provide the reader with an overview of iron transport processes within a range of microorganisms and to provide an indication of how microbial iron levels are controlled. This aim is promoted through the inclusion of expert reviews on several well studied examples that illustrate the current state of play concerning our comprehension of how iron is translocated into the bacterial (or fungal) cell and how iron homeostasis is controlled within microbes. The first two chapters (1-2) consider the general properties of microbial iron-chelating compounds (known as ‘siderophores’), and the mechanisms used by bacteria to acquire haem and utilise it as an iron source. The following twelve chapters (3-14) focus on specific types of microorganism that are of key interest, covering both an array of pathogens for humans, animals and plants (e.g. species of Bordetella, Shigella, , Erwinia, Vibrio, Aeromonas, Francisella, Campylobacter and Staphylococci, and EHEC) as well as a number of prominent non-pathogens (e.g. the rhizobia, E. coli K-12, Bacteroides spp., cyanobacteria, Bacillus spp. and yeasts). The chapters relay the common themes in microbial iron uptake approaches (e.g. the use of siderophores, TonB-dependent transporters, and ABC transport systems), but also highlight many distinctions (such as use of different types iron regulator and the impact of the presence/absence of a cell wall) in the strategies employed. We hope that those both within and outside the field will find this book useful, stimulating and interesting. We intend that it will provide a source for reference that will assist relevant researchers and provide an entry point for those initiating their studies within this subject. Finally, it is important that we acknowledge and thank wholeheartedly the many contributors who have provided the 14 excellent chapters from which this book is composed. Without their considerable efforts, this book, and the understanding that it relays, would not have been possible. Simon C Andrews and Pierre Cornelis
Resumo:
This paper provides an extended analysis of the tensions that have surfaced between large-scale mine operators and artisanal miners in gold-rich areas of rural Tanzania. The literature on grievance is used to contextualise, these disputes, the underlying cause of which is artisanal miners' mounting frustration over not being able to secure viable concessions to work. Newly implemented legislation has, for the most part, empowered foreign large-scale mine operators, while simultaneously disempowering indigenous small-scale miners. In many cases, the former have addressed mounting security and community problems on their own. Until the country's major mine operators extend assistance to marginalised small-scale mining groups, the likelihood of violent conflict unfolding between these parties will increase.
Resumo:
Consideration of the quality, relevance and utility of research in educational leadership and management has been a growing concern of researchers, policy-makers and practitioners, but there is little agreement about its current state or priorities for development. The article reflects on the key criticisms that have been made of research in educational leadership and management in this issue, and elsewhere. It considers how we might begin to devise better ways of understanding its audiences, judging its quality and identifying priorities for the future. It argues that the research reflects its capture by those with particular interests or values, and impacts in ways which are complex and indirect. If educational leadership and management research is to be secure in its perceived value and contribution in the future, several developments are needed, including a greater emphasis on interdisciplinarity, an expansion of the range of methodologies, particularly qualtitative studies; and these shifts must be evident in training researchers as well as in the conduct of research.
Resumo:
We examined the impact on adolescent socioemotional functioning of maternal postnatal depression (PND) and attachment style. We also investigated the role of earlier aspects of the child's development-attachment in infancy, and 5-year representations of family relationships. Ninety-one mother-child pairs, recruited in the postnatal period, were followed tip at 13 years. Adolescents were interviewed about their friendships, and their level of emotional sensitivity and maturity were rated. Emotional sensitivity was heightened in girls whose mothers experienced PND; notably, its occurrence was also linked to insecure attachment in infancy and raised awareness of emotional components of family relationships at 5 years. High emotional sensitivity was also associated with adolescent depressed mood. Raised social maturity was predicted by a secure maternal attachment style and, for girls, by exposure to maternal PND. Precursors of adolescent social maturity were evident in the narrative coherence of 5-year family representations. Higher social maturity in the friendship interview was also associated with overall good adjustment.
Resumo:
Objective To assess the efficacy of an intervention designed to improve the mother-infant relationship and security of infant attachment in a South African peri-urban settlement with marked adverse socioeconomic circumstances. Design Randomised controlled trial. Setting Khayelitsha, a peri-urban settlement in South Africa. Participants 449 pregnant women. Interventions The intervention was delivered from late pregnancy and for six months postpartum. Women were visited in their homes by previously untrained lay community workers who provided support and guidance in parenting. The purpose of the intervention was to promote sensitive and responsive parenting and secure infant attachment to the mother. Women in the control group received no therapeutic input from the research team. Main outcome measures Primary outcomes: quality of mother-infant interactions at six and 12 months postpartum; infant attachment security at 18 months. Secondary outcome: maternal depression at six and 12 months. Results The intervention was associated with significant benefit to the mother-infant relationship. At both six and 12 months, compared with control mothers, mothers in the intervention group were significantly more sensitive (6 months: mean difference=0.77 (SD 0.37), t=2.10, P<0.05, d=0.24; 12 months: mean difference=0.42 (0.18), t=-2.04, P<0.05, d=0.26) and less intrusive (6 months: mean difference=0.68 (0.36), t=2.28, P<0.05, d=0.26; 12 months: mean difference=-1.76 (0.86), t=2.28, P<0.05, d=0.24) in their interactions with their infants. The intervention was also associated with a higher rate of secure infant attachments at 18 months (116/156 (74%) v 102/162 (63%); Wald=4.74, odds ratio=1.70, P<0.05). Although the prevalence of maternal depressive disorder was not significantly reduced, the intervention had a benefit in terms of maternal depressed mood at six months (z=2.05, P=0.04) on the Edinburgh postnatal depression scale). Conclusions The intervention, delivered by local lay women, had a significant positive impact on the quality of the mother-infant relationship and on security of infant attachment, factors known to predict favourable child development. If these effects persist, and if they are replicated, this intervention holds considerable promise for use in the developing world. Trial registration Current Controlled Trials ISRCTN25664149.
Resumo:
This paper proposes a novel method of authentication of users in secure buildings. The main objective is to investigate whether user actions in the built environment can produce consistent behavioural signatures upon which a building intrusion detection system could be based. In the process three behavioural expressions were discovered: time-invariant, co-dependent and idiosyncratic.