133 resultados para inherent requirements


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the last decade RFID technology has become a major contender for managing large scale logistics operations and generating and distributing the massive amount of data involved in such operations. One of the main obstacles to the widespread deployment and adoption of RFID systems is the security issues inherent in them. This is compounded by a noticeable lack of literature on how to identify the vulnerabilities of a RFID system and then effectively identify and develop counter measures to combat the threats posed by those vulnerabilities. In this chapter, the authors develop a conceptual framework for analysing the threats, attacks, and security requirements pertaining to networked RFID systems. The vulnerabilities of, and the threats to, the system are identified using the threat model. The security framework itself consists of two main concepts: (1) the attack model, which identifies and classifies the possible attacks, and (2) the system model, which identifies the security requirements. The framework gives readers a method with which to analyse the threats any given system faces. Those threats can then be used to identify the attacks possible on that system and get a better understanding of those attacks. It also allows the reader to easily identify all the security requirements of that system and identify how those requirements can be met.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Adequate nutrition during toddlerhood is essential for optimal growth and development, yet biochemical data suggest that 12-24-month-old children are at risk of iron deficiency. Mathematical modelling combined with experimental interventions can provide strong evidence regarding the types of foods required to improve toddler iron status.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It has been assumed that R5 and X4 HIV utilize similar strategies to support viral cDNA synthesis post viral entry. In this study, we provide evidence to show that R5 and X4 HIV have distinct requirements for host cell uracil DNA glycosylase (UNG2) during the early stage of infection. UNG2 has been previously implicated in HIV infection, but its precise role remains controversial. In this study we show that, although UNG2 is highly expressed in different cell lines, UNG2 levels are low in the natural host cells of HIV. Short interfering RNA knockdown of endogenous UNG2 in primary cells showed that UNG2 is required for R5 but not X4 HIV infection and that this requirement is bypassed when HIV enters the target cell via vesicular stomatitis virus envelope-glycoprotein-mediated endocytosis. We also show that short interfering RNA knockdown of UNG2 in virus-producing primary cells leads to defective R5 HIV virions that are unable to complete viral cDNA synthesis. Quantitative PCR analysis revealed that endogenous UNG2 levels are transiently up-regulated post HIV infection, and this increase in UNG2 mRNA is ∼10–20 times higher in R5 versus X4 HIV-infected cells. Our data show that both virion-associated UNG2 and HIV infection-induced UNG2 expression are critical for reverse transcription during R5 but not X4 HIV infection. More importantly, we have made the novel observation that R5 and X4 HIV have distinct host cell factor requirements and differential capacities to induce gene expression during the early stages of infection. These differences may result from activation of distinct signaling cascades and/or infection of divergent T-lymphocyte subpopulations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since the end of the Cold War, U.S. policymakers have faced the challenge of addressing the technological requirements of both economic competitiveness and national security. Promoting the technological objectives of competitiveness and security poses a daunting task, as these objectives can differ significantly in terms of autonomy, the private sector’s role, and the time frame involved. The difficulties inherent in meeting these competing needs for technological investment and resources are exacerbated by growing technological globalization. American Technology Policy analyzes the ongoing efforts of politicians, legislators, policymakers, and industry leaders to balance their often-conflicting technological requirements. J. D. Kenneth Boutin examines recent trends and developments in American technology policy as it strives to support high-technology firms without undermining national security. He then considers issues of autonomy, relations between the federal government and industry, and the time frame involved in formulating and implementing policy initiatives, all in the context of globalization. Though satisfying the ambitious American technological agenda is difficult, it is impossible for authorities to avoid making the effort, given the high stakes involved. Boutin’s analysis is intended to inform those who are charged with prioritizing and balancing the technological needs of national defense and economic growth. Although the post–Cold War technology policy of the United States has been characterized by efforts to achieve a balance between these two competing priorities, the dominant focus remains on national security. Boutin explains the ways in which American authorities seek to limit the extent of compromise necessary by working with local and foreign actors and by encouraging structural changes in the environment for technological development, application, and diffusion.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The objective of this study is to investigate the impacts of mixed use developments on parking requirements. Along with the renewed interests in mixed use development, shared parking concept has been a focus for traffic engineers, local governments and mixed use developers in recent years. With the help of a case study of Gold Coast city in Australia, this study has identified that shared parking significantly reduces the overall parking requirements of mixed use developments. However, to be shared parking more effective, the type and the size of various land uses within a particular mixed use development should favour the concept. For example, offices and hotels can go side by side as the time-of-day parking requirements and peak parking demand do not conflict each other. A series of time-of-day parking occupancy rates have been developed for typical land use categories to identify such effectiveness.