936 resultados para pacs: data security


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Women, all over the world have contributed in various ways to the social, political and economic development of the Society. In fact, the World Resource Institute recognizes that "women have profound and preserve effect onn the well-being of their families, communities and local ecosystems" (Gamble and Well 1997:211). Women constitute more than 50 percent of the Agricultural (Fisheries being a sub sector), labour force. A study on Women in Fisheries showed that they participate in all aspects of the sector (capture, culture, processing, marketing research, training and Extension services). This paper reports the result of the study on women's contributions in the development of the Fisheries Industry particularly their roles in Fish Food Security, Poverty Alleviation and high rates of women's adoption of Fisheries technologies. The Case-study research methodology is used to study the "How" and "Why" Women's Contribution in Fish Food Security and Poverty Alleviation is at the index level recorded for the gender. The study made use of "Case Study" Research Instrument; documents, interview, artefacts, direct observation and archival records. The sampling techniques were purposive for research audiences and simple random for fisher-folks in the chosen locations. Analysed data showed among others that in Fisheries Research women occupy very important positions as Heads of Division/Section, Fisheries Liasion/Extension Officers and Fisheries Laboratory Chiefs etc. The paper also gave results of women production, processing, marketing and other services statistics; it also discusses the "whys" of women's low capacity in fisheries development of the nation and finally suggested ways in improving women's optimal capacity utilization in fisheries development

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The notions about women been limited to producing children like rates alone; cooking for the family, restricted within the fenced compound without any meaningful contributions in fish food production was dispelled during the course of the study. From the data gathered, the study revealed various contributions of women as regard fish food production as about 2% of the women are involved in direct fishing as this enhance food security of the family and the society. Also women dominate the entire post harvest and marketing sector and 70% started fishing business with their personal savings.Also, some of the women own boats and other fishing inputs, which they do give to the fishermen that could catch the fish and sell it to them. This has a way of enhancing fish catch and fish food security of the people as those men that would have sit idle for lack of fishing gears are now meaningfully engaged courtesy of the women financiers. Finally, the study also revealed that 46% of the women between N2,5000 to above N4,000 from marketing of fish, and also utilizenthe income generated to enhance the welfare of the households in the area of food, clothing and paying their children school fees hence reducing the level of poverty of their households

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This report is a literature review on Food and Nutrition Security in Solomon Islands, based on data from surveys conducted by Solomon Islands National Statistical Office, as well as from national and international organizations working in Solomon Islands. The purpose of the report is to present information outlining the current food and nutrition situation in Solomon Islands before implementation of the CGIAR Research Program on Aquatic Agricultural Systems (AAS), led by WorldFish. The aim of the AAS program is to enhance production in natural freshwater and/or coastal ecosystems to improve household livelihood, including income and food security. This report summarizes national statistics and also focuses in more detail on a subset of provinces: Guadalcanal, Malaita and Western. In 2012, the AAS program was rolled out in Guadalcanal, Central and Malaita Provinces, designated the Central Hub. In 2013, roll out is beginning in the Western Hub (Western and Isabel Provinces). The priority province for the Central Hub has been identified as Malaita.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This report is a literature review on Food and Nutrition Security in Timor-Leste based on data from surveys conducted by the Timor-Leste National Statistics Directorate, as well as from national and international organizations working in Timor-Leste. This review was supported by the Australian Centre for International Agricultural Research (ACIAR)-funded project “Strategy for Investment in Fisheries in East Timor”. This report describes the current food and nutrition situation in Timor-Leste for the purpose of planning and implementing interventions aimed at improving food and nutrition security, especially within aquatic agricultural systems. The potential role of aquaculture in improving food and nutrition security is considered, with reference to the recently endorsed Timor-Leste National Aquaculture Development Strategy (2012-2030) developed by the National Directorate of Fisheries and Agriculture, Ministry of Agriculture and Fisheries.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study provides an overview of the aquaculture sector in Ghana. It assesses the actual and potential contribution of aquaculture to poverty reduction and food security, and identifies enabling conditions for and drivers of the development of Ghana’s aquaculture sector. The study uses data collected from a variety of primary and secondary sources, including key informant interviews with actors within the aquaculture sector and relevant secondary literature.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

There is growing interest in Discovery Services for locating RFID and supply chain data between companies globally, to obtain product lifecycle information for individual objects. Discovery Services are heralded as a means to find serial-level data from previously unknown parties, however more realistically they provide a means to reduce the communications load on the information services, the network and the requesting client application. Attempts to design a standardised Discovery Service will not succeed unless security is considered in every aspect of the design. In this paper we clearly show that security cannot be bolted-on in the form of access control, although this is also required. The basic communication model of the Discovery Service critically affects who shares what data with whom, and what level of trust is required between the interacting parties. © 2009 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The fisheries sector in Cambodia contributes 8%–12% to national GDP and 25% - 30% to agricultural GDP, with an estimated 4.5 million people involved in fishing and associated trades. Fish and other aquatic animals are important food sources, contributing an estimated national average of 60% - 70% of total animal protein intake. Of the 2013 total fish production, 550,000 metric tons were harvested from freshwater habitats, of which rice field fisheries and small-scale family fisheries contributed approximately 20%. The productivity and value of rice field fisheries to households in rural Cambodia has been highlighted in a number of previous studies. The Fisheries Administration of the Ministry of Agriculture, Forestry and Fisheries plans to increase productivity from rice field fisheries and aquaculture at an annual rate of 15% to maintain supply for a growing population. This report draws mainly on the baseline and monitoring data from the Rice Field Fisheries Enhancement Project (RFFEP) during its implementation between 2012 and 2014. Reference is also made to the Fish on Farms project to highlight the relative contribution of fish from small-scale aquaculture compared to wild-caught fish.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Quantum key distribution (QKD) uniquely allows distribution of cryptographic keys with security verified by quantum mechanical limits. Both protocol execution and subsequent applications require the assistance of classical data communication channels. While using separate fibers is one option, it is economically more viable if data and quantum signals are simultaneously transmitted through a single fiber. However, noise-photon contamination arising from the intense data signal has severely restricted both the QKD distances and secure key rates. Here, we exploit a novel temporal-filtering effect for noise-photon rejection. This allows high-bit-rate QKD over fibers up to 90 km in length and populated with error-free bidirectional Gb/s data communications. With high-bit rate and range sufficient for important information infrastructures, such as smart cities and 10 Gbit Ethernet, QKD is a significant step closer towards wide-scale deployment in fiber networks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

'Data retention and the war against terrorism - a considered and proportionate response'. Journal of Information Law & Technology 2004 (3) RAE2008

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In rural Ethiopia, among other things, lack of adequate financial service is considered as the basic problem to alleviate rural poverty and to solve the problem of food insecurity. Commercial banks are restricted to urban centres. Providing rural financial service through RUSACCO to the poor has been proposed as a tool for economic development and for achieving food security. Evidence from research in this regard has been so far scanty, especially in rural Ethiopia. The aims of this study are to analyze the determinants of membership, to identify socioeconomic and demographic factors that influence members’ participation in RUSACCOs and to quantify the impact of RUSACCOs on member households’ food security. The study was conducted in two purposely selected woredas in the Amhara region one from food insecure (Lay Gayint woreda) and the other from food secure (Dejen woreda). Six RUSACCOs were selected randomly from these two woredas. Both qualitative and quantitative data were collected. Key informant interviews, focus group discussions and survey techniques were used to collect primary data. Collected data was then analyzed using mixed methods depending on the nature of data. For quantitative data analysis appropriate statistical models were used. The study result reveals that the number of members in each RUSACCO is very small. However, the majority of non-member respondents are willing to join RUSACCO. Lack of information about the benefits of RUSACCO membership is the main problem why many rural poor do not join RUSACCOs. Members participate in different aspects of the cooperatives, starting from attending general assembly up to board membership. They also participate actively in saving and borrowing activities of RUSACCO. The majority of the respondents believe the RUSACCO is a vital instrument in combating food insecurity. The empirical findings indicate that gender, marital status, occupation, educational level, participation in local leadership and participation in other income generation means determine the decision of rural poor to join a RUSACCO or not. The amount of saving is determined by household head occupation, farming experience and income level. While age of household head, primary occupation, farming experience, date of membership, annual total consumption expenditure, amount of saving and participation in other income generation activities influence members’ amount of borrowing by RUSACCO members. Finally, the study confirms that RUSACCO participation improves household food security. RUSACCO membership has made positive impact on household total consumption expenditure and food expenditure.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this work we introduce a new mathematical tool for optimization of routes, topology design, and energy efficiency in wireless sensor networks. We introduce a vector field formulation that models communication in the network, and routing is performed in the direction of this vector field at every location of the network. The magnitude of the vector field at every location represents the density of amount of data that is being transited through that location. We define the total communication cost in the network as the integral of a quadratic form of the vector field over the network area. With the above formulation, we introduce a mathematical machinery based on partial differential equations very similar to the Maxwell's equations in electrostatic theory. We show that in order to minimize the cost, the routes should be found based on the solution of these partial differential equations. In our formulation, the sensors are sources of information, and they are similar to the positive charges in electrostatics, the destinations are sinks of information and they are similar to negative charges, and the network is similar to a non-homogeneous dielectric media with variable dielectric constant (or permittivity coefficient). In one of the applications of our mathematical model based on the vector fields, we offer a scheme for energy efficient routing. Our routing scheme is based on changing the permittivity coefficient to a higher value in the places of the network where nodes have high residual energy, and setting it to a low value in the places of the network where the nodes do not have much energy left. Our simulations show that our method gives a significant increase in the network life compared to the shortest path and weighted shortest path schemes. Our initial focus is on the case where there is only one destination in the network, and later we extend our approach to the case where there are multiple destinations in the network. In the case of having multiple destinations, we need to partition the network into several areas known as regions of attraction of the destinations. Each destination is responsible for collecting all messages being generated in its region of attraction. The complexity of the optimization problem in this case is how to define regions of attraction for the destinations and how much communication load to assign to each destination to optimize the performance of the network. We use our vector field model to solve the optimization problem for this case. We define a vector field, which is conservative, and hence it can be written as the gradient of a scalar field (also known as a potential field). Then we show that in the optimal assignment of the communication load of the network to the destinations, the value of that potential field should be equal at the locations of all the destinations. Another application of our vector field model is to find the optimal locations of the destinations in the network. We show that the vector field gives the gradient of the cost function with respect to the locations of the destinations. Based on this fact, we suggest an algorithm to be applied during the design phase of a network to relocate the destinations for reducing the communication cost function. The performance of our proposed schemes is confirmed by several examples and simulation experiments. In another part of this work we focus on the notions of responsiveness and conformance of TCP traffic in communication networks. We introduce the notion of responsiveness for TCP aggregates and define it as the degree to which a TCP aggregate reduces its sending rate to the network as a response to packet drops. We define metrics that describe the responsiveness of TCP aggregates, and suggest two methods for determining the values of these quantities. The first method is based on a test in which we drop a few packets from the aggregate intentionally and measure the resulting rate decrease of that aggregate. This kind of test is not robust to multiple simultaneous tests performed at different routers. We make the test robust to multiple simultaneous tests by using ideas from the CDMA approach to multiple access channels in communication theory. Based on this approach, we introduce tests of responsiveness for aggregates, and call it CDMA based Aggregate Perturbation Method (CAPM). We use CAPM to perform congestion control. A distinguishing feature of our congestion control scheme is that it maintains a degree of fairness among different aggregates. In the next step we modify CAPM to offer methods for estimating the proportion of an aggregate of TCP traffic that does not conform to protocol specifications, and hence may belong to a DDoS attack. Our methods work by intentionally perturbing the aggregate by dropping a very small number of packets from it and observing the response of the aggregate. We offer two methods for conformance testing. In the first method, we apply the perturbation tests to SYN packets being sent at the start of the TCP 3-way handshake, and we use the fact that the rate of ACK packets being exchanged in the handshake should follow the rate of perturbations. In the second method, we apply the perturbation tests to the TCP data packets and use the fact that the rate of retransmitted data packets should follow the rate of perturbations. In both methods, we use signature based perturbations, which means packet drops are performed with a rate given by a function of time. We use analogy of our problem with multiple access communication to find signatures. Specifically, we assign orthogonal CDMA based signatures to different routers in a distributed implementation of our methods. As a result of orthogonality, the performance does not degrade because of cross interference made by simultaneously testing routers. We have shown efficacy of our methods through mathematical analysis and extensive simulation experiments.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Analysis of the generic attacks and countermeasures for block cipher based message authentication code algorithms (MAC) in sensor applications is undertaken; the conclusions are used in the design of two new MAC constructs Quicker Block Chaining MAC1 (QBC-MAC1) and Quicker Block Chaining MAC2 (QBC-MAC2). Using software simulation we show that our new constructs point to improvements in usage of CPU instruction clock cycle and energy requirement when benchmarked against the de facto Cipher Block Chaining MAC (CBC-MAC) based construct used in the TinySec security protocol for wireless sensor networks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We evaluated the impacts of wildlife on household food security and income in three semi-arid villages adjacent to Lake Manyara National Park (LMNP) and Mkomazi Game Reserve (MGR) in Northeastern Tanzania. Survey data were collected using both household interviews and human-wildlife conflict related archive information from the village government offices. Crop destruction by wildlife influenced both household food security and cash income. Crop damage to households was, on average, 0.08 ton/annum, equivalent to two months household loss of food and reduced household cash income by 1.3%. A combination of measures is proposed as incentives for conservation. These include provision of economic incentives, soft loans to initiate non-farm (e.g., ecotourism, business enterprises) projects to ease dependency on natural resources, increasing of reserves buffer zones and fencing of reserves.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Abstract In theory, improvements in healthy life expectancy should generate increases in the average age of retirement, with little effect on savings rates. In many countries, however, retirement incentives in social security programs prevent retirement ages from keeping pace with changes in life expectancy, leading to an increased need for life-cycle savings. Analyzing a cross-country panel of macroeconomic data, we find that increased longevity raises aggregate savings rates in countries with universal pension coverage and retirement incentives, though the effect disappears in countries with pay-as-you-go systems and high replacement rates.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper investigates the application of complex wavelet transforms to the field of digital data hiding. Complex wavelets offer improved directional selectivity and shift invariance over their discretely sampled counterparts allowing for better adaptation of watermark distortions to the host media. Two methods of deriving visual models for the watermarking system are adapted to the complex wavelet transforms and their performances are compared. To produce improved capacity a spread transform embedding algorithm is devised, this combines the robustness of spread spectrum methods with the high capacity of quantization based methods. Using established information theoretic methods, limits of watermark capacity are derived that demonstrate the superiority of complex wavelets over discretely sampled wavelets. Finally results for the algorithm against commonly used attacks demonstrate its robustness and the improved performance offered by complex wavelet transforms.