927 resultados para security and protection


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Grounded upon research in Cambodia, a theory of ‘reintegration’ is proposed for victims of sex-trafficking and benchmarks for assessing success. Drawing upon a cosmopolitan conception of shared vulnerability, it is argued that a life lived with dignity chiefly depends upon access to either modernist or traditional forms of reciprocal recognition.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study explored the lived experience of security and contentment, and their absence, for latency-aged children (aged 8-12) living in shared-time parenting arrangements following their parents' separation. A descriptive phenomenological methodology was utilized (Giorgi, 1985, 2009; Giorgi & Giorgi, 2003, 2008). Sixteen children living in shared-time were interviewed about their experiences of two phenomena: "feeling secure and content living in shared-time" and "not feeling secure and content living in shared-time." The eight richest protocols were selected for analysis. The two resultant general structures and their core constituents are presented, and individual variations discussed. Central to each phenomenon is the parent/s' capacity, or incapacity, to create and sustain a physical and emotional space in which the child feels secure and held in the mind, feels the arrangements are responsive to their needs, feels free to access the "absent" parent, and experiences integration between the two parental homes. Implications for phenomenological human science research are considered, including the use of descriptive phenomenology with children.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

 This research investigated the proliferation of malicious applications on smartphones and a framework that can efficiently detect and classify such applications based on behavioural patterns was proposed. Additionally the causes and impact of unauthorised disclosure of personal information by clean applications were examined and countermeasures to protect smartphone users’ privacy were proposed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Chinas economic and politico-military development is placing considerable strain on the established framework of the trilateral relationship between itself, the United States, and Australia. Specifically, Chinas rise is generating security concerns that are politicizing economic relations between the three states. A more guarded approach to economic collaboration will transform trilateralism, which up to now has been characterized by the scope allowed for the discrete pursuit of security and economic relations. This will force political authorities to carefully consider their policy priorities and further strain relations between the states, as well as supporting a more cautious approach to China on the part of the United States and Australia.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Opportunistic networks or OppNets refer to a number of wireless nodes opportunistically communicating with each other in a form of “Store–Carry–Forward”. This occurs when they come into contact with each other without proper network infrastructure. OppNets use wireless technologies, such as IEEE 802.11, WiMAX, Bluetooth, and other short-range radio communication. In OppNets, there is no end-to-end connection between the source and the destination nodes, and the nodes usually have high mobility, low density, limited power, short radio range, and often subject to different kinds of attacks by malicious nodes. Due to these characteristics and features, OppNets are subject to serious security challenges. OppNets strongly depend on human interaction; therefore, the success of securing such networks is based on trust between people. This survey includes the security approaches in OppNets and techniques used to increase their security levels.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Electrical power systems are undergoing highly significant changes in their structures. The emergence of renewable energy units in the power generation sector, the use of high-voltage DC in the power transmission sector, and the prevalence of islanded or integrated microgrids in the distribution sector are the strongest evidence supporting this claim. These changes are mostly the consequences of the increasing energy demand rate, climate change, and environmental challenges, as well as the high investment and maintenance cost of the previous structures. Considering these new conditions and according to the recent development in DC/DC conversion topologies and control techniques, different studies have been conducted on how and why DC microgrids outperform AC microgrids. This study discusses the feasibility of the DC microgrid system according to recent developments in power systems. The efficiency and power loss reduction in DC distribution systems are then analyzed, some of the common strategies and devices for protection systems in such networks are reviewed, and the possible and existing challenges in developing the DC microgrids are highlighted. The mathematical calculations and theories for this evaluation are presented to determine the reliable justification for selecting the appropriate microgrid systems.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

New national infrastructure initiatives such as the National Broadband Network (NBN) allow small and medium-sized enterprises (SMEs) in Australia to have greater access to cost effective Cloud computing. However, the ability of Cloud computing to store data remotely and share services in a dynamic environment brings with it security and privacy concerns. Evaluating these concerns is critical to address the Cloud computing underutilisation issue and leverage the benefits of costly NBN investment. This paper examines the influence of privacy and security factors on Cloud adoption by Australian SMEs in metropolitan and regional area. Data were collected from 150 Australian SMEs (specifically, 79 metropolitan SMEs and 71 regional SMEs) and structural equation modelling was used for the analysis. The findings reveal that privacy and security factors do not significantly influence the decision-making of Australian SMEs in the adoption of Cloud computing. Moreover, the results indicate that Cloud computing adoption is not influenced by the geographical location (i.e., metropolitan or regional location) of the SMEs. The findings extend the current understanding of Cloud computing adoption by Australian SMEs. The results will be useful to SMEs, Cloud service providers and policy makers devising Cloud security and privacy policies.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We described a prophylactic and therapeutic effect of a DNA vaccine encoding the Mycobacterium leprae 65- kDa heat shock protein (DNA-hsp65) in experimental murine tuberculosis. However, high homology of the vaccine to the corresponding mammalian hsp60, together with the CpG motifs in the plasmidial vector, could trigger or exacerbate an autoimmune disease. In the present study, we evaluate the potential of DNA- hsp65 vaccination to induce or modulate arthritis in mice genetically selected for acute inflammatory reaction (AIR), either maximal (AIRmax) or minimal (AIRmin). Mice immunized with DNA-hsp65 or injected with the corresponding DNA vector (DNAv) developed no arthritis, whereas pristane injection resulted in arthritis in 62% of AIRmax mice and 7.3% of AIRmin mice. Administered after pristane, DNA- hsp65 downregulated arthritis induction in AIRmax animals. Levels of interleukin (IL)- 12 were significantly lower in mice receiving pristane plus DNA- hsp65 or DNAv than in mice receiving pristane alone. However, when mice previously injected with pristane were inoculated with DNA- hsp65 or DNAv, the protective effect was significantly correlated with lower IL-6 and IL-12 levels and higher IL-10 levels. Our results strongly suggest that DNA-hsp65 has no arthritogenic potential and is actually protective against experimentally induced arthritis in mice.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Reliability of power supply is related, among other factors, to the control and protection devices allocation in feeders of distribution systems. In this way, optimized allocation of sectionalizing switches and protection devices in strategic points of distribution circuits, improves the quality of power supply and the system reliability indices. In this work, it is presented a mixed integer non-linear programming (MINLP) model, with real and binary variables, for the sectionalizing switches and protection devices allocation problem, in strategic sectors, aimed at improving reliability indices, increasing the utilities billing and fulfilling exigencies of regulatory agencies for the power supply. Optimized allocation of protection devices and switches for restoration, allows that those faulted sectors of the system can be isolated and repaired, re-managing loads of the analyzed feeder into the set of neighbor feeders. Proposed solution technique is a Genetic Algorithm (GA) developed exploiting the physical characteristics of the problem. Results obtained through simulations for a real-life circuit, are presented. © 2004 IEEE.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this study, the relationship between child malnutrition, depression, anxiety and other maternal socio-demographic variables was investigated in mothers of malnourished (MD) and eutrophic (ME) children. The causes attributed by mothers to malnutrition were also studied. Ten mothers from each group, with children aged from 11 months to three years and who were users of primary health care units, participated in the study. They answered Beck depression and anxiety inventory, a questionnaire on vital events and an open question concerning the causes of malnutrition. The evaluation instruments were corrected according to proper guidelines and comparative analyses between the groups were performed. The answers to the open question were qualitatively evaluated, submitted to content analysis. The mothers in the two groups were nearly 30 years old or older. They had a steady partner and were subject to very similar life conditions. They had attended school for 5.5 years and were housewives or worked in low-income jobs. Concerning mental health indicators, a significantly larger number of mothers in the MM group showed depression indicators when compared to mothers in the EM group. Most mothers attributed malnutrition to biological factors or to the lack of maternal care, with more moralist statements in the EM group, and statements filled with guilt in MM. Results suggest that in order to fight malnutrition, in addition to nutritional interventions, it is necessary to heed attention to maternal socio-emotional issues.