849 resultados para Defense Systems Management College. Deliberation Support Division.


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This is the report of the “BFAR/NACA-STREAM/FAO Workshop on Livelihoods Approaches and Analysis” that was conducted in Iloilo City, Philippines from 24-28 November 2003. The main purpose of the workshop was to develop and document mechanisms for training in livelihoods approaches and analysis, and to build national capacity to conduct livelihoods analysis. The workshop in Iloilo was the first in a series which will take place in other countries in the region, including India (with Nepal), Lao PDR, Myanmar and Yunnan, China. (Pdf contains 53 pages).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This report presents the findings from a thorough literature review, workshops, and group and individual interviews conducted by STREAM in the Philippines in November and December 2003. The ambitious scope of the report combined with the limited time frame and funding available to compile it necessitated the extensive use of secondary data, including both published and unpublished material written by staff of the agencies / organisations involved, with very limited editing of material used. All possible efforts were made to generate information in participation with the government institutions responsible for managing the fisheries, and all contributors (as well as many other stakeholders) were provided with multiple opportunities to comment on the report content. The contributors are listed on the front page of the report. (Pdf contains 56 pages).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Established in early 2002, STREAM Vietnam has so far attained a number of good experiences and lessons in using participatory approaches for its work. The Country Office has been able to link to a wide range of stakeholders, and is working hard to build close relationships amongst them, so that institutional entities can better support the livelihoods of poor aquatic resources users, and support disadvantaged groups of people to improve their living standards by themselves. Reservoir fisheries and co-management are at early stage in Vietnam, but in certain places and industries co-management has brought about successful results by involving proactive participation of communities. Situated on the same continent and having many similarities, the interaction in agriculture and fisheries sector between Vietnam and Sri Lanka has brought the two countries closer. Being members of the STREAM family, there are great opportunities for exchange of experiences and lessons towards sustainable management of reservoir resources. (PDF has 11 pages.)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This e-mail conference has been organised by the DFID Aquatic Resources Management (ARM) Programme, S E Asia. It forms part of a wider process of consultation including links with other donors, with government and non-government partners and participatory livelihood assessments with vulnerable groups who benefit from aquatic resources. The objective is to provide a forum for professionals who have been involved in aquatic resources management in the context of poor peoples’ livelihoods, to share experiences, reflect on approaches and contribute to their development. Participants can submit poster presentations (2-pagers) and contribute to the discussions (via the conference website) organised around 5 key issues, set out in this discussion paper. After 4 weeks online the contributed posters and discussions will be edited into a document assessing approaches to aquatic resources management, which benefit livelihoods of poor people. This will be downloadable from the website. (PDF contains 134 pages)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Over the last decad , the paradigm of Total Quality Management (TQM) has been successfully forged in our business world. TQM may be defined as something that is both complex and ambiguous; nevertheless, some key elements or principles can be mentioned which are common to all of them: customer satisfaction, continuous improvement, commitment and leadership on the part of top management, involvement and support on the part of employees, teamwork, measurement via indicators and feedback. There are, in short, two main reasons for it having spread so widely: on the one hand, the successful diffusion of ISO 9000 standards for the implementation and certification of quality management systems, standards that have been associated to the TQM paradigm, and, on the other, the also successful diffusion of self evaluation models such as the EFQM promoted by the European Foundation for Quality Management and the Malcolm Baldrige National Quality Award in the USA, promoted by the Foundation for the Malcolm Baldrige National Quality Award. However, the quality movement is not without its problems as far as its mid and long term development is concerned. In this book some research findings related to these issues are presented.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Managers in technology-intensive businesses need to make decisions in complex and dynamic environments. Many tools, frameworks and processes have been developed to support managers in these situations, leading to a proliferation of such approaches, with little consistency in terminology or theoretical foundation, and a lack of understanding of how such tools can be linked together to tackle management challenges in an integrated way. As a step towards addressing these issues, this paper proposes the concept of an integrated 'toolkit', incorporating generalized forms of three core technology management tools that support strategic planning (roadmapping, portfolio analysis and linked analysis grids). © 2006 World Scientific Publishing Company.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Malicious software (malware) have significantly increased in terms of number and effectiveness during the past years. Until 2006, such software were mostly used to disrupt network infrastructures or to show coders’ skills. Nowadays, malware constitute a very important source of economical profit, and are very difficult to detect. Thousands of novel variants are released every day, and modern obfuscation techniques are used to ensure that signature-based anti-malware systems are not able to detect such threats. This tendency has also appeared on mobile devices, with Android being the most targeted platform. To counteract this phenomenon, a lot of approaches have been developed by the scientific community that attempt to increase the resilience of anti-malware systems. Most of these approaches rely on machine learning, and have become very popular also in commercial applications. However, attackers are now knowledgeable about these systems, and have started preparing their countermeasures. This has lead to an arms race between attackers and developers. Novel systems are progressively built to tackle the attacks that get more and more sophisticated. For this reason, a necessity grows for the developers to anticipate the attackers’ moves. This means that defense systems should be built proactively, i.e., by introducing some security design principles in their development. The main goal of this work is showing that such proactive approach can be employed on a number of case studies. To do so, I adopted a global methodology that can be divided in two steps. First, understanding what are the vulnerabilities of current state-of-the-art systems (this anticipates the attacker’s moves). Then, developing novel systems that are robust to these attacks, or suggesting research guidelines with which current systems can be improved. This work presents two main case studies, concerning the detection of PDF and Android malware. The idea is showing that a proactive approach can be applied both on the X86 and mobile world. The contributions provided on this two case studies are multifolded. With respect to PDF files, I first develop novel attacks that can empirically and optimally evade current state-of-the-art detectors. Then, I propose possible solutions with which it is possible to increase the robustness of such detectors against known and novel attacks. With respect to the Android case study, I first show how current signature-based tools and academically developed systems are weak against empirical obfuscation attacks, which can be easily employed without particular knowledge of the targeted systems. Then, I examine a possible strategy to build a machine learning detector that is robust against both empirical obfuscation and optimal attacks. Finally, I will show how proactive approaches can be also employed to develop systems that are not aimed at detecting malware, such as mobile fingerprinting systems. In particular, I propose a methodology to build a powerful mobile fingerprinting system, and examine possible attacks with which users might be able to evade it, thus preserving their privacy. To provide the aforementioned contributions, I co-developed (with the cooperation of the researchers at PRALab and Ruhr-Universität Bochum) various systems: a library to perform optimal attacks against machine learning systems (AdversariaLib), a framework for automatically obfuscating Android applications, a system to the robust detection of Javascript malware inside PDF files (LuxOR), a robust machine learning system to the detection of Android malware, and a system to fingerprint mobile devices. I also contributed to develop Android PRAGuard, a dataset containing a lot of empirical obfuscation attacks against the Android platform. Finally, I entirely developed Slayer NEO, an evolution of a previous system to the detection of PDF malware. The results attained by using the aforementioned tools show that it is possible to proactively build systems that predict possible evasion attacks. This suggests that a proactive approach is crucial to build systems that provide concrete security against general and evasion attacks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As more diagnostic testing options become available to physicians, it becomes more difficult to combine various types of medical information together in order to optimize the overall diagnosis. To improve diagnostic performance, here we introduce an approach to optimize a decision-fusion technique to combine heterogeneous information, such as from different modalities, feature categories, or institutions. For classifier comparison we used two performance metrics: The receiving operator characteristic (ROC) area under the curve [area under the ROC curve (AUC)] and the normalized partial area under the curve (pAUC). This study used four classifiers: Linear discriminant analysis (LDA), artificial neural network (ANN), and two variants of our decision-fusion technique, AUC-optimized (DF-A) and pAUC-optimized (DF-P) decision fusion. We applied each of these classifiers with 100-fold cross-validation to two heterogeneous breast cancer data sets: One of mass lesion features and a much more challenging one of microcalcification lesion features. For the calcification data set, DF-A outperformed the other classifiers in terms of AUC (p < 0.02) and achieved AUC=0.85 +/- 0.01. The DF-P surpassed the other classifiers in terms of pAUC (p < 0.01) and reached pAUC=0.38 +/- 0.02. For the mass data set, DF-A outperformed both the ANN and the LDA (p < 0.04) and achieved AUC=0.94 +/- 0.01. Although for this data set there were no statistically significant differences among the classifiers' pAUC values (pAUC=0.57 +/- 0.07 to 0.67 +/- 0.05, p > 0.10), the DF-P did significantly improve specificity versus the LDA at both 98% and 100% sensitivity (p < 0.04). In conclusion, decision fusion directly optimized clinically significant performance measures, such as AUC and pAUC, and sometimes outperformed two well-known machine-learning techniques when applied to two different breast cancer data sets.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Gemstone Team Future Firefighting Advancements

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background: Visual impairment (VI) is rising in prevalence and contributing to increasing morbidity, particularly among older people. Understanding patients' problems is fundamental to achieving optimal health outcomes but little is known about how VI impacts on self-management of medication.

Aim: To compare issues relating to medication self-management between older people with and without VI.

Design and setting: Case-control study with participants aged =65 years, prescribed at least two long-term oral medications daily, living within the community.

Method: The study recruited 156 patients with VI (best corrected visual acuity [BCVA] 6/18 to 3/60) at low-vision clinics; community optometrists identified 158 controls (BCVA 6/9 or better). Researchers visited participants in their homes, administered two validated questionnaires to assess medication adherence (Morisky; Medication Adherence Report Scale [MARS]), and asked questions about medication self-management, beliefs, and support.

Results: Approximately half of the participants in both groups reported perfect adherence on both questionnaires (52.5% Morisky; 43.3%, MARS). Despite using optical aids, few (3%) with VI could read medication information clearly; 24% had difficulty distinguishing different tablets. More people with VI (29%) than controls (13%) (odds ratio [OR] = 2.8; 95% confidence interval [CI] = 1.6 to 5.0) needed help managing their medication, from friends (19% versus 10%) or pharmacists (10% versus 2.5%; OR = 4.4, 95% CI = 1.4 to 13.5); more received social service support (OR = 7.1; 95% CI = 3.9 to 12.9).

Conclusion: Compared to their peers without VI, older people with VI are more than twice as likely to need help in managing medication. In clinical practice in primary care, patients' needs for practical support in taking prescribed treatment must be recognised. Strategies for effective medication self-management should be explored.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Individuals who have been subtly reminded of death display heightened in-group favouritism, or “worldview defense.” Terror management theory argues (i) that death cues engender worldview defense via psychological mechanisms specifically evolved to suppress death anxiety, and (ii) that the core function of religiosity is to suppress death anxiety. Thus, terror management theory predicts that extremely religious individuals will not evince worldview defense. Here, two studies are presented in support of an alternative perspective. According to the unconscious vigilance hypothesis, subtly processed threats (which need not pertain to death) heighten sensitivity to affectively valenced stimuli (which need not pertain to cultural attitudes). From this perspective, religiosity mitigates the influence of mortality-salience only insofar as afterlife doctrines reduce the perceived threat posed by death. Tibetan Buddhism portrays death as a perilous gateway to rebirth rather than an end to suffering; faith in this doctrine should therefore not be expected to nullify mortality-salience effects. In Study 1, devout Tibetan Buddhists who were subtly reminded of death produced exaggerated aesthetic ratings unrelated to cultural worldviews. In Study 2, devout Tibetan Buddhists produced worldview defense following subliminal exposure to non-death cues of threat. The results demonstrate both the domain-generality of the process underlying worldview defense and the importance of religious doctrinal content in moderating mortality-salience effects.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Tourism activity, due to its own characteristics, causes high environmental impact and its development should be influenced by the environmental characteristics of each region. The Information Systems, mainly those which represent the geographical information, will permit the development of a design, allowing the Decision-Maker the consult, the management and the presentation of decision schemes based on the defined measures of the Tourism Planning of a region. As the information associated with this design should be real and update, the Internet should be used as a means of access to the information of the region. The design presents the schemes associated to each decision, offering competitive advantages to the Decision-Makers involved in the decision process, since it is possible to evaluate, foresee and control the future environmental impacts of Tourism.