866 resultados para Security and emergencies


Relevância:

100.00% 100.00%

Publicador:

Resumo:

One of the aspects related to biolaw is that related to security and health. In other words, using the expression of relevant authorities on this subject, “the securitization of health” and, those situations connected with the Security Council labour in the last decades, may constitute an interesting subject. Beginning with the role of the UN blue helmets in many countries where the expansion of HIV/AIDS is usual, followed by the expansion of some diseases in Haiti, together with the Ebola “crisis” in 2014 and connected with the efforts of the World Health Organization to fight against the zika...what is the role played by the United Nations Security Council on this field, trying to establish a relationship between security and health?

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Situational Awareness provides a user centric approach to security and privacy. The human factor is often recognised as the weakest link in security, therefore situational perception and risk awareness play a leading role in the adoption and implementation of security mechanisms. In this study we assess the understanding of security and privacy of users in possession of wearable devices. The findings demonstrate privacy complacency, as the majority of users trust the application and the wearable device manufacturer. Moreover the survey findings demonstrate a lack of understanding of security and privacy by the sample population. Finally the theoretical implications of the findings are discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Iowa Homeland Security and Emergency Management Department administers the E911 Program per Code of Iowa, Chapter 34A to protect the health, safety, and welfare of the people of Iowa. Iowa has 115 Public Safety Answering Points across 99 counties that handle both landline and wireless 911 calls for the citizens of Iowa.Enhanced 911 (E911) means a service which provides the user of a public telephone system the ability to reach a public safety answering point (PSAP) by dialing the digits 911.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This annual report highlights the many programs and initiatives with which the Iowa Homeland Security and Emergency Management Division is involved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The report provides information on services and policies that support a safe and secure environment, highlights programs that encourage members of the campus community to seek intervention and assistance for victimization, provides information on the alcohol and drug policies, outlines procedures for handling reports of sexual assault, and identifies campus representatives for reporting crimes and incidents that have impact on the college community. It is also about the College’s safety programs and security procedures and policies. In addition, you will discover our crime and fire safety statistics, who to call and what to do if you witness or are the victim of a crime, and tips to increase your safety awareness.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The use of environmental DNA (eDNA) analysis as a monitoring tool is becoming more and more widespread. The eDNA metabarcoding methods allow rapid community assessments of different target taxa. This work is focused on the validation of the environmental DNA metabarcoding protocol for biodiversity assessment of freshwater habitats. Scolo Dosolo was chosen as study area and three sampling points were defined for traditional and eDNA analyses. The gutter is a 205 m long anthropic canal located in Sala Bolognese (Bologna, Italy). Fish community and freshwater invertebrate metazoans were the target groups for the analysis. After a preliminary study in summer 2019, 2020 was devoted to the sampling campaign with winter (January), spring (May), summer (July) and autumn (October) surveys. Alongside with the water samplings for the eDNA study, also traditional fish surveys using the electrofishing technique were performed to assess fish community composition; census on invertebrates was performed using an entomological net and a surber sampler. After in silico analysis, the MiFish primer set amplifying a fragment of the 12s rRNA gene was selected for bony fishes. For invertebrates the FWHF2 + FWHR2N primer combination, that amplifies a region of the mitochondrial coi gene, was chosen. Raw reads were analyzed through a bioinformatic pipeline based on OBITools metabarcoding programs package and QIIME2. The OBITools pipeline retrieved seven fish taxa and 54 invertebrate taxa belonging to six different phyla, while QIIME2 recovered eight fish taxa and 45 invertebrate taxa belonging to the same six phyla as the OBITools pipeline. The metabarcoding results were then compared with the traditional surveys data and bibliographic records. Overall, the validated protocol provides a reliable picture of the biodiversity of the study area and an efficient support to the traditional methods.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The thesis aims to present a comprehensive and holistic overview on cybersecurity and privacy & data protection aspects related to IoT resource-constrained devices. Chapter 1 introduces the current technical landscape by providing a working definition and architecture taxonomy of ‘Internet of Things’ and ‘resource-constrained devices’, coupled with a threat landscape where each specific attack is linked to a layer of the taxonomy. Chapter 2 lays down the theoretical foundations for an interdisciplinary approach and a unified, holistic vision of cybersecurity, safety and privacy justified by the ‘IoT revolution’ through the so-called infraethical perspective. Chapter 3 investigates whether and to what extent the fast-evolving European cybersecurity regulatory framework addresses the security challenges brought about by the IoT by allocating legal responsibilities to the right parties. Chapters 4 and 5 focus, on the other hand, on ‘privacy’ understood by proxy as to include EU data protection. In particular, Chapter 4 addresses three legal challenges brought about by the ubiquitous IoT data and metadata processing to EU privacy and data protection legal frameworks i.e., the ePrivacy Directive and the GDPR. Chapter 5 casts light on the risk management tool enshrined in EU data protection law, that is, Data Protection Impact Assessment (DPIA) and proposes an original DPIA methodology for connected devices, building on the CNIL (French data protection authority) model.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Embedded systems are increasingly integral to daily life, improving and facilitating the efficiency of modern Cyber-Physical Systems which provide access to sensor data, and actuators. As modern architectures become increasingly complex and heterogeneous, their optimization becomes a challenging task. Additionally, ensuring platform security is important to avoid harm to individuals and assets. This study primarily addresses challenges in contemporary Embedded Systems, focusing on platform optimization and security enforcement. The initial section of this study delves into the application of machine learning methods to efficiently determine the optimal number of cores for a parallel RISC-V cluster to minimize energy consumption using static source code analysis. Results demonstrate that automated platform configuration is not only viable but also that there is a moderate performance trade-off when relying solely on static features. The second part focuses on addressing the problem of heterogeneous device mapping, which involves assigning tasks to the most suitable computational device in a heterogeneous platform for optimal runtime. The contribution of this section lies in the introduction of novel pre-processing techniques, along with a training framework called Siamese Networks, that enhances the classification performance of DeepLLVM, an advanced approach for task mapping. Importantly, these proposed approaches are independent from the specific deep-learning model used. Finally, this research work focuses on addressing issues concerning the binary exploitation of software running in modern Embedded Systems. It proposes an architecture to implement Control-Flow Integrity in embedded platforms with a Root-of-Trust, aiming to enhance security guarantees with limited hardware modifications. The approach involves enhancing the architecture of a modern RISC-V platform for autonomous vehicles by implementing a side-channel communication mechanism that relays control-flow changes executed by the process running on the host core to the Root-of-Trust. This approach has limited impact on performance and it is effective in enhancing the security of embedded platforms.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This report presents results of research on ways to reduce the detrimental effects of sulfate-tainted rock salt deicers on portland cement concrete used for highway pavements. Repetitious experiments on the influence of fly ash on the mortar phase of concrete showed significant improvement in resistance to deicing brines is possible. Fifteen to twenty percent by weight of fly ash replacement for portland cement was found to provide optimum improvement. Fly ashes from five sources were evaluated and all were found to be equally beneficial. Preliminary results indicate the type of coarse aggregate also plays an important role in terms of concrete resistance to freeze-thaw in deicing brines. This was particularly true for a porous ferroan dolomite thought to be capable of reaction with the brine. In this case fly ash improved the concrete, but not enough for satisfactory performance. An intermediate response was with a porous limestone where undesirable results were observed without fly ash and adequate performance was realized when 15% fly ash was added. The best combination for making deicer-resistant concrete was found to be with a non-porous limestone. Performance in brines was found to be adequate without fly ash, but better when fly ash was included. Consideration was given to treating existing hardened concrete made with poor aggregate and no fly ash to extend pavement life in the presence of deicers, particularly at joints. Sodium silicate was found to improve freeze-thaw resistance of mortar and is a good candidate for field usage because of its low cost and ease of handling.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The main consideration for base construction under the pavement, in the design of Iowa's interstate, was structural capacity. The material was dense graded with the aim of supporting the pavement and distributing the load as it is transferred to the underlying grade. The drainage characteristics of the base was apparently not given adequate consideration. On jointed portland cement concrete pavement, the water that is trapped immediately beneath the pavement causes severe problems. The traffic causes rapid movement of the water resulting in the hydraulic pressures or "pumping" (movement and redeposit of base fine material), further resulting in faulting between individual slabs. The objective of this evaluation is to determine if longitudinal subdrains are effective in preventing or reducing pumping, faulting and related deterioration. Results suggest that, based upon the flow from the outlets observed during periodic checks and evidence of water flow at the outlets, it appears that to date the subdrains are effective in draining the subbase and subgrade. Because of the limited data available at this time, however, the pavement condition and faulting results are inconclusive.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Construction of the interstate highway system began in 1956. This U.S. network of highway consists of more than 41,000 miles with 790 miles in Iowa. There have been many benefits of the controlled access roadway, but probably the most significant is the improved safety for the motorist. In Iowa, we have always endeavored to utilize quality locally available materials in our construction using the most economical or cost effective methods. Obviously when the effort is to build a cost effective system, there will be some portions of the network that will not perform as well as expected. In the design of our interstate, the main consideration for base construction under the pavement was structural capacity. The material was dense graded with the aim of supporting the pavement and distributing the load as it is transferred to the underlying grade. The drainage characteristic of the base was apparently not given adequate consideration. On jointed portland cement concrete (pcc) pavement, the water that is trapped immediately beneath the pavement causes severe problems. The traffic causes rapid movement of the water resulting in the hydraulic pressures or "pumping" (movement and redeposit of base fine material) resulting in faulting between individual slabs. Recognizing the need for maintaining this large national highway network, the Federal Highway Administration has initiated a funding program for resurfacing, restoration and rehabilitation (3R). Many miles of the system are more than 20 years old and in need of major maintenance. This new 3R Program necessitated a complete inventory of the Iowa interstate system to establish priorities and to identify those sections in need of immediate remedial treatments.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Contains information on Iowa Area Command Operation Plan 1, Military Support of Civil Defense, Iowa Area Command, consisting of the basic plan and Annexes "A" through "N", is furnished for information, guidance and necessary actions of Commanders concerned.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This report summarizes the analysis of transverse cracking in asphalt pavement by a five state study team from Iowa, Kansas, Nebraska, North Dakota, and Oklahoma. The study was initiated under the sponsorship of the Federal Highway Administration and four evaluation conferences were held during the course of the study. Each state conducted a crack inventory on their asphalt pavement. An effort was made to correlate this inventory with numerous factors that were considered to be pertinent to the cracking problem. One state did indicate that there was a correlation between transverse cracking severity and the subsurface geology. The other states were unable to identify any significant factors as being the primary contributors. The analysis of the problem was divided into, (1) mix design, (2) maintenance, and (3) 3R rehabilitation. Many potential factors to be considered were identified under each of these three study divisions. There were many conclusions as to good and bad practices. One major conclusions was that a more effective crack maintenance program with early sealing was essential. Some new practices were suggested as potentially more cost effective in design, construction and maintenance. The interchange of methods and procedures by individual states yielded benefits in that other states selected practices that would be an improvement to their program.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Institute has professionals with extensive experience in training, specifically with experience in the field of police and emergencies training. Moreover, it also has very talented people. But above all, our institution has public professionals with a desire to serve, who love security and emergency responders and want to provide them with the best knowledge to make them every day better professionals. In the quest for continuous training improvement, its during 2009 when e-learning begins to have a presence at the Institute. Virtual training methodology becomes a facilitator for the training of various professionals, avoiding geographical displacement and easing the class schedule.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Unauthorized accesses to digital contents are serious threats to international security and informatics. We propose an offline oblivious data distribution framework that preserves the sender's security and the receiver's privacy using tamper-proof smart cards. This framework provides persistent content protections from digital piracy and promises private content consumption.