898 resultados para Security Analysis


Relevância:

40.00% 40.00%

Publicador:

Resumo:

sect. 1. Old-age pensions, federal old-age benefits, aid to dependent children, maternal and child welfare, aid to crippled children, vocational rehabilitation, aid to the blind, public health, unemployment compensation.--sect. 2. Unemployment compensation, federal old-age benefits.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The problems of formalization of the process of matching different management subjects’ functioning characteristics obtained on the financial flows analysis basis is considered. Formal generalizations for gaining economical security system knowledge bases elements are presented. One of feedback directions establishment between knowledge base of the system of economical security and financial flows database analysis is substantiated.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Some basic types of archiving programs are described in the paper in addition to their advantages and disadvantages with respect to the analysis of security in archiving. Analysis and appraisal are performed on the results obtained during the described experiments.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

How do local homeland security organizations respond to catastrophic events such as hurricanes and acts of terrorism? Among the most important aspects of this response are these organizations ability to adapt to the uncertain nature of these "focusing events" (Birkland 1997). They are often behind the curve, seeing response as a linear process, when in fact it is a complex, multifaceted process that requires understanding the interactions between the fiscal pressures facing local governments, the institutional pressures of working within a new regulatory framework and the political pressures of bringing together different levels of government with different perspectives and agendas. ^ This dissertation has focused on tracing the factors affecting the individuals and institutions planning, preparing, responding and recovering from natural and man-made disasters. Using social network analysis, my study analyzes the interactions between the individuals and institutions that respond to these "focusing events." In practice, it is the combination of budgetary, institutional, and political pressures or constraints interacting with each other which resembles a Complex Adaptive System (CAS). ^ To investigate this system, my study evaluates the evolution of two separate sets of organizations composed of first responders (Fire Chiefs, Emergency Management Coordinators) and community volunteers organized in the state of Florida over the last fifteen years. Using a social network analysis approach, my dissertation analyzes the interactions between Citizen Corps Councils (CCCs) and Community Emergency Response Teams (CERTs) in the state of Florida from 1996–2011. It is the pattern of interconnections that occur over time that are the focus of this study. ^ The social network analysis revealed an increase in the amount and density of connections between these organizations over the last fifteen years. The analysis also exposed the underlying patterns in these connections; that as the networks became more complex they also became more decentralized though not in any uniform manner. The present study brings to light a story of how communities have adapted to the ever changing circumstances that are sine qua non of natural and man-made disasters.^

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The organizational authority of the Papacy in the Roman Catholic Church and the permanent membership of the UN Security Council are unique from institutions that are commonly compared with the UN, like the Concert of Europe and the League of Nations, in that these institutional organs possessed strong authoritative and veto powers. Both organs also owe their strong authority during their founding to a need for stability: The Papacy after the crippling of Western Roman Empire and the P-5 to deal with the insecurities of the post-WWII world. While the P-5 still possesses similar authoritative powers within the Council as it did after WWII, the historical authoritative powers of the Papacy within the Church was debilitated to such a degree that by the time of the Reformation in Europe, condemnations of practices within the Church itself were not effective. This paper will analyze major challenges to the authoritative powers of the Papacy, from the crowning of Charlemagne to the beginning of the Reformation, and compare the analysis to challenges affecting the authoritative powers of the P-5 since its creation. From research conducted thus far, I hypothesize that common themes affecting the authoritative powers of the P-5 and the Papacy would include: major changes in the institutions organization (i.e. the Avignon Papacy and Japan’s bid to become a permanent member); the decline in power of actors supporting the institutional organ (i.e. the Holy Roman Empire and the P-5 members); and ideological clashes affecting the institution’s normative power (i.e. the Great Western Schism and Cold War politics).

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The organizational authority of the Papacy in the Roman Catholic Church and the permanent membership of the UN Security Council are unique from institutions that are commonly compared with the UN, like the Concert of Europe and the League of Nations, in that these institutional organs possessed strong authoritative and veto powers. Both organs also owe their strong authority during their founding to a need for stability: The Papacy after the crippling of Western Roman Empire and the P-5 to deal with the insecurities of the post-WWII world. While the P-5 still possesses similar authoritative powers within the Council as it did after WWII, the historical authoritative powers of the Papacy within the Church was debilitated to such a degree that by the time of the Reformation in Europe, condemnations of practices within the Church itself were not effective. This paper will analyze major challenges to the authoritative powers of the Papacy, from the crowning of Charlemagne to the beginning of the Reformation, and compare the analysis to challenges affecting the authoritative powers of the P-5 since its creation. From research conducted thus far, I hypothesize that common themes affecting the authoritative powers of the P-5 and the Papacy would include: major changes in the institutions organization (i.e. the Avignon Papacy and Japan’s bid to become a permanent member); the decline in power of actors supporting the institutional organ (i.e. the Holy Roman Empire and the P-5 members); and ideological clashes affecting the institution’s normative power (i.e. the Great Western Schism and Cold War politics).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Power system real time security assessment is one of the fundamental modules of the electricity markets. Typically, when a contingency occurs, it is required that security assessment and enhancement module shall be ready for action within about 20 minutes’ time to meet the real time requirement. The recent California black out again highlighted the importance of system security. This paper proposed an approach for power system security assessment and enhancement based on the information provided from the pre-defined system parameter space. The proposed scheme opens up an efficient way for real time security assessment and enhancement in a competitive electricity market for single contingency case

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The BR algorithm is a novel and efficient method to find all eigenvalues of upper Hessenberg matrices and has never been applied to eigenanalysis for power system small signal stability. This paper analyzes differences between the BR and the QR algorithms with performance comparison in terms of CPU time based on stopping criteria and storage requirement. The BR algorithm utilizes accelerating strategies to improve its performance when computing eigenvalues of narrowly banded, nearly tridiagonal upper Hessenberg matrices. These strategies significantly reduce the computation time at a reasonable level of precision. Compared with the QR algorithm, the BR algorithm requires fewer iteration steps and less storage space without depriving of appropriate precision in solving eigenvalue problems of large-scale power systems. Numerical examples demonstrate the efficiency of the BR algorithm in pursuing eigenanalysis tasks of 39-, 68-, 115-, 300-, and 600-bus systems. Experiment results suggest that the BR algorithm is a more efficient algorithm for large-scale power system small signal stability eigenanalysis.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Power system small signal stability analysis aims to explore different small signal stability conditions and controls, namely: (1) exploring the power system security domains and boundaries in the space of power system parameters of interest, including load flow feasibility, saddle node and Hopf bifurcation ones; (2) finding the maximum and minimum damping conditions; and (3) determining control actions to provide and increase small signal stability. These problems are presented in this paper as different modifications of a general optimization to a minimum/maximum, depending on the initial guesses of variables and numerical methods used. In the considered problems, all the extreme points are of interest. Additionally, there are difficulties with finding the derivatives of the objective functions with respect to parameters. Numerical computations of derivatives in traditional optimization procedures are time consuming. In this paper, we propose a new black-box genetic optimization technique for comprehensive small signal stability analysis, which can effectively cope with highly nonlinear objective functions with multiple minima and maxima, and derivatives that can not be expressed analytically. The optimization result can then be used to provide such important information such as system optimal control decision making, assessment of the maximum network's transmission capacity, etc. (C) 1998 Elsevier Science S.A. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Two previous papers in this series (Nelson et al., this issue) described the use of the Agricultural Production Systems Simulator (APSIM) to simulate the effect of erosion on maize yields from open-field farming and hedgerow intercropping in the Philippine uplands. In this paper, maize yields simulated with APSIM are used to compare the economic viability of intercropping maize between leguminous shrub hedgerows with that of continuous and fallow open-field farming of maize. The analysis focuses on the economic incentives of upland farmers to adopt hedgerow intercropping, discussing farmers' planning horizons, access to credit and security of land tenure, as well as maize pricing in the Philippines. Insecure land tenure has limited the planning horizons of upland farmers, and high establishment costs reduce the economic viability of hedgerow intercropping relative to continuous and fallow open-field farming in the short term, In the long term, high discount rates and share-tenancy arrangements in which landlords do not contribute to establishment costs reduce the economic viability of hedgerow intercropping relative to fallow open-field farming, (C) 1998 Elsevier Science Ltd. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The idea of “human security” is gaining attention among policy-makers and security analysts. Little scholarly attention has been given to the questions of why states accept (or reject) a human security agenda or how such an agenda is incorporated into policy practices. The article suggests that a human security approach is most likely to be applied when both humanitarian and national interests combine. Yet when states or organisations adopt a human security approach, they often misjudge the complex and long-term commitment required of such an approach. There is also the potential for such an agenda to be manipulated to justify questionable courses of action. These issues frame an analysis of six recent case studies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

One hundred and twenty subjects with Chagas' cardiopathy and 120 non-infected subjects were randomly selected from first time claimants of sickness benefits in the National Institute of Social Security (INPS) in Goiás. Cases of Chagas' cardiopathy were defined based on serological test, history of residence in an endemic area and, clinical and/or electrocardiogram (ECG) alterations suggestive of Chagas' cardiomyopathy. Controls were defined as subjects with at least two negative serological tests. Case and controls were compared in the analysis for age, sex, place of birth, migration history, socio-economic level, occupation, physical exertion at work, age at affiliation and years of contribution to the social security scheme, clinical course of their disease and ECG abnormalities. Chagas' disease patients were younger than other subjects and predominantly of rural origin. Non-infected subjects presented a better socio-economic level, were performing more skilled activities and had less changes of job than cases. No important difference was observed in relation to age at affiliation to INPS. About 60% of cases have claimed for benefits within the first four years of contribution while among controls this proportion was 38.5%. Cases were involved, proportionally more than controls, in "heavy" activities. A risk of 2.3 (95%CL 1.5 - 4.6) and 1.8 (95%CL 1.2- 3.5) was obtained comparing respectively "heavy" and "moderate" physical activity against "light". A relative risk of 8.5 (95%CL 4.9 - 14.8) associated with the presence of cardiopathy was estimated comparing the initial sample of seropositive subjects and controls. A high relative risk was observed in relation to right bundle branch block (RR = 37.1 95%CL = 8.8 - 155.6) and left anterior hemiblock (RR = 4.4, 95%CL = 2.1 - 9.1).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The current industry trend is towards using Commercially available Off-The-Shelf (COTS) based multicores for developing real time embedded systems, as opposed to the usage of custom-made hardware. In typical implementation of such COTS-based multicores, multiple cores access the main memory via a shared bus. This often leads to contention on this shared channel, which results in an increase of the response time of the tasks. Analyzing this increased response time, considering the contention on the shared bus, is challenging on COTS-based systems mainly because bus arbitration protocols are often undocumented and the exact instants at which the shared bus is accessed by tasks are not explicitly controlled by the operating system scheduler; they are instead a result of cache misses. This paper makes three contributions towards analyzing tasks scheduled on COTS-based multicores. Firstly, we describe a method to model the memory access patterns of a task. Secondly, we apply this model to analyze the worst case response time for a set of tasks. Although the required parameters to obtain the request profile can be obtained by static analysis, we provide an alternative method to experimentally obtain them by using performance monitoring counters (PMCs). We also compare our work against an existing approach and show that our approach outperforms it by providing tighter upper-bound on the number of bus requests generated by a task.