866 resultados para Security and emergencies
Resumo:
The region of Latin America and the Caribbean can boast a successful track record in the process of eradicating hunger: it is the only region in the world that has halved both the proportion of people who suffer from hunger (the target set in the Millennium Development Goals) and their absolute number (the target set at the World Food Summit of 1996). This publication aims to provide the region’s countries with up-todate and timely information on the status of food and nutrition security; on the role in eradicating hunger played by the different areas such as agriculture, agrifood trade and natural resources management; and on the possibility of successfully addressing the twin burden of malnutrition, in a context where the effects of climate change could threaten the progress achieved in Latin America and the Caribbean thus far. The CELAC Plan for Food and Nutrition Security and the Eradication of Hunger 2025 is a cross-cutting tool for achieving the Sustainable Development Goals of the 2030 Agenda for Sustainable Development; and it thus encourages the countries of Latin America and the Caribbean to redouble their efforts to identify key policy areas that will make it possible to speed up and consolidate the process of eradicating hunger and tackle the twin burden of malnutrition in the region, in which overweight and obesity are increasingly adding to that scourge.
Resumo:
This article advances the discussion of the contentious question of links between global inequalities of power and violent responses, focussing on globalisation and non-inclusive forms of governance. Drawing on international political economy, the article criticises the nationstate-centrism in much political discourse, suggesting that both authority and security need to be reconsidered - to account for less plausible national borders and controls. It suggests that human security (including issues of development and equality) ought to replace national security as the primary focus of public policy. It draws attention to the intractability of difference, insisting that the terrorism of 2001 has complex transnational antecedents. Realist approaches to international order have become part of a problem to be overcome through further intellectual debate.
Resumo:
Australian foreign and security policy confronts a series of difficult challenges in coping with the emergence of an Islamic extremist threat in Southeast Asia. Australian policy makers are being drawn into unfamiliar linkages with moderate Islam, and into closer cooperation with Indonesia, the most populous Islamic nation in the world, in an attempt to offset Islamic extremists. Further, they must achieve those objectives at a time when important interests are at stake beyond Southeast Asia, when bipartisan agreement about the direction of foreign policy is waning, and when divisions over the appropriate trajectory of Australian security policy are intense. A delicacy almost unprecedented in Australian foreign policy will be required.
Resumo:
Despite reports that adopted persons are destined for poor psychological and relational adjustment, this conclusion remains controversial. Previous research on this topic has been inconclusive, and has failed to provide a complex assessment of the predictors of adjustment. For instance, whether attachment security plays a key role in later relationship outcomes remains unresolved. This paper presents the results of a longitudinal study of adults who were adopted as infants, and a comparison sample of adults who grew up with both biological parents. Two research questions were addressed: differences in attachment security between the two samples, and the predictive relations between initial attachment scales and relationship variables (e.g., risk in intimacy, loneliness) assessed at follow-up. Attachment profiles at Time 1 indicated less security in the adopted sample than the comparison sample, and these differences were maintained at follow-up. However, adoptees who had not searched for birth relatives did not differ from the comparison sample. Although sample (adopted / comparison) was an important predictor of some relationship variables, it became less influential when attachment measures were included. Discussion focused on the complex factors that influence attachment security, and the need for in-depth study of the relational experiences of adopted people.
Resumo:
Security and reliability of LDPC based public-key cryptosystems are discussed and analysed. We study attacks on the cryptosystem when partial knowledge of one or more of the private key components and/or of the plaintext have been acquired.
Resumo:
This paper briefly reviews CMOS image sensor technology and its utilization in security and medical applications. The role and future trends of image sensors in each of the applications are discussed. To provide the reader deeper understanding of the technology aspects the paper concentrates on the selected applications such as surveillance, biometrics, capsule endoscopy and artificial retina. The reasons for concentrating on these applications are due to their importance in our daily life and because they present leading-edge applications for imaging systems research and development. In addition, review of image sensors implementation in these applications allows the reader to investigate image sensor technology from the technical and from other views as well.
Resumo:
This research involves the design, development, and theoretical demonstration of models resulting in integrated misbehavior resolution protocols for ad hoc networked devices. Game theory was used to analyze strategic interaction among independent devices with conflicting interests. Packet forwarding at the routing layer of autonomous ad hoc networks was investigated. Unlike existing reputation based or payment schemes, this model is based on repeated interactions. To enforce cooperation, a community enforcement mechanism was used, whereby selfish nodes that drop packets were punished not only by the victim, but also by all nodes in the network. Then, a stochastic packet forwarding game strategy was introduced. Our solution relaxed the uniform traffic demand that was pervasive in other works. To address the concerns of imperfect private monitoring in resource aware ad hoc networks, a belief-free equilibrium scheme was developed that reduces the impact of noise in cooperation. This scheme also eliminated the need to infer the private history of other nodes. Moreover, it simplified the computation of an optimal strategy. The belief-free approach reduced the node overhead and was easily tractable. Hence it made the system operation feasible. Motivated by the versatile nature of evolutionary game theory, the assumption of a rational node is relaxed, leading to the development of a framework for mitigating routing selfishness and misbehavior in Multi hop networks. This is accomplished by setting nodes to play a fixed strategy rather than independently choosing a rational strategy. A range of simulations was carried out that showed improved cooperation between selfish nodes when compared to older results. Cooperation among ad hoc nodes can also protect a network from malicious attacks. In the absence of a central trusted entity, many security mechanisms and privacy protections require cooperation among ad hoc nodes to protect a network from malicious attacks. Therefore, using game theory and evolutionary game theory, a mathematical framework has been developed that explores trust mechanisms to achieve security in the network. This framework is one of the first steps towards the synthesis of an integrated solution that demonstrates that security solely depends on the initial trust level that nodes have for each other.^