991 resultados para JAD file
Resumo:
This report examines important issues pertaining to the different ways of affecting the information security of file objects under information attacks through methods of compression. Accordingly, the report analyzes the three-way relationships which may exist among a selected set of attacks, methods and objects. Thus, a methodology is proposed for evaluation of information security, and a coefficient of information security is created. With respects to this coefficient, using different criteria and methods for evaluation and selection of alternatives, the lowest-risk methods of compression are selected.
Resumo:
AMS Subj. Classification: 68U05, 68P30
Resumo:
ACM Computing Classification System (1998): I.2.8, G.1.6.
Resumo:
In his study - File Control: The Heart Of Business Computer Management - William G. O'Brien, Assistant Professor, The School of Hospitality Management at Florida International University, initially informs you: “Even though computers are an everyday part of the hospitality industry, many managers lack the knowledge and experience to control and protect the files in these systems. The author offers guidelines which can minimize or prevent damage to the business as a whole.” Our author initially opens this study with some anecdotal instances illustrating the failure of hospitality managers to exercise due caution with regard to computer supported information systems inside their restaurants and hotels. “Of the three components that make up any business computer system (data files, programs, and hard-ware), it is files that are most important, perhaps irreplaceable, to the business,” O’Brien informs you. O’Brien breaks down the noun, files, into two distinct categories. They are, the files of extrinsic value, and its counterpart the files of intrinsic value. An example of extrinsic value files would be a restaurant’s wine inventory. “As sales are made and new shipments are received, the computer updates the file,” says O’Brien. “This information might come directly from a point-of-sale terminal or might be entered manually by an employee,” he further explains. On the intrinsic side of the equation, O’Brien wants you to know that the information itself is the valuable part of this type of file. Its value is over and above the file’s informational purpose as a pragmatic business tool, as it is in inventory control. “The information is money in the legal sense For instance, figures moved about in banking system computers do not represent dollars; they are dollars,” O’Brien explains. “If the record of a dollar amount is erased from all computer files, then that money ceases to exist,” he warns. This type of information can also be bought and sold, such as it is in customer lists to advertisers. Files must be protected O’Brien stresses. “File security requires a systematic approach,” he discloses. O’Brien goes on to explain important elements to consider when evaluating file information. File back-up is also an important factor to think about, along with file storage/safety concerns. “Sooner or later, every property will have its fire, flood, careless mistake, or disgruntled employee,” O’Brien closes. “…good file control can minimize or prevent damage to the business as a whole.”
Characterization of the defined MDC types and compilation of MDC initiation times (excel-file 19 kB)
Resumo:
Mud accumulates on continental shelves under a variety of environmental conditions and results in a diverse formation of mud depocenters (MDCs). Their three-dimensional architectures have been in the focus of several recent studies. Due to some terminological confusion concerning MDCs, the present study sets out to define eight individual MDC types in terms of surface sediment distribution and internal geometry. Under conditions of substantial sediment supply, prodeltas (distal zones off river deltas; triangular sheets), subaqueous deltas (disconnected from deltas by strong normal-to-shore currents; wedge-like clinoforms), and mud patches (scattered distribution) and mud blankets (widespread covers) are formed. Forced by hydrodynamic conditions, mud belts in the strict sense (detached from source; elongated bodies), and shallow-water contourite drifts (detached from source; growing normal to prevailing current direction; triangular clinoforms) develop. Controlled by local morphology, mud entrapments (in depressions, behind morphological steps) and mud wedges (triangular clinoforms growing in flow direction) are deposited. Shelf mud deposition took place (1) during early outer-shelf drowning (~14 ka), (2) after inner-shelf inundation to maximum flooding (9.5-6.5 ka), and (3) in sub-recent times (<2 ka). Subsequent expansion may be (1) concentric, in cases where the depocenter formed near the fluvial source, (2) uni-directional, extending along advective current transport paths, and (3) progradational, forming clinoforms that grow either parallel or normal to the bottom current direction. Classical mud belts may be initiated around defined nuclei, the remote sites of which are determined by seafloor morphology rather than the location of the source. From a stratigraphic perspective, mud depocenters coincide with sea-level highstand-related, shelf-wide condensed sections. They often show a conformable succession from transgressive to highstand systems tract stages.
Resumo:
An autonomous vessel, the Offshore Sensing Sailbuoy, was used for wave measurements near the Ekofisk oil platform complex in the North Sea (56.5 N, 3.2 E, operated by ConocoPhilllips) from 6 to 20 November 2015. Being 100% wind propelled, the Sailbuoy has two-way communication via the Iridium network and has the capability for missions of six months or more. It has previously been deployed in the Arctic, Norwegian Sea and the Gulf of Mexico, but this was the first real test for wave measurements. During the campaign it held position about 20km northeast of Ekofisk (on the lee side) during rough conditions. Mean wind speed measured at Ekofisk during the campaign was near 9.8m/s, with a maximum of 20.4m/s, with wind mostly from south and south west. A Datawell MOSE G1000 GPS based 2Hz wave sensor was mounted on the Sailbuoy. Mean significant wave height (Hs 1hr) measured was 3m, whereas maximum Hs was 6m. Mean wave period was 7.7s, while maximum wave height, Hmax, was 12.6m. These measurements have been compared with non-directional Waverider observations at the Ekofisk complex. Mean Hs at Ekofisk was 3.1m, while maximum Hs was 6.5m. Nevertheless, the correlation between the two measurements was high (97%). Spectra comparison was also good, except for low Hs (~1m), where the motion of the vessel seemed to influence the measurements. Nevertheless, the Sailbuoy performed well during this campaign, and results suggests that it is a suitable platform for wave measurements in rather rough sea conditions.
Resumo:
This exhibition was curated and devised by Dr Michael Pierse, with help from Dr Feargal Mac Ionnachtaigh and further research from Órla McGrory and Mike McKenna.