890 resultados para Interception of communications


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There is increasing interest in evaluating the environmental effects on crop architectural traits and yield improvement. However, crop models describing the dynamic changes in canopy structure with environmental conditions and the complex interactions between canopy structure, light interception, and dry mass production are only gradually emerging. Using tomato (Solanum lycopersicum L.) as a model crop, a dynamic functional-structural plant model (FSPM) was constructed, parameterized, and evaluated to analyse the effects of temperature on architectural traits, which strongly influence canopy light interception and shoot dry mass. The FSPM predicted the organ growth, organ size, and shoot dry mass over time with high accuracy (>85%). Analyses of this FSPM showed that, in comparison with the reference canopy, shoot dry mass may be affected by leaf angle by as much as 20%, leaf curvature by up to 7%, the leaf length: width ratio by up to 5%, internode length by up to 9%, and curvature ratios and leaf arrangement by up to 6%. Tomato canopies at low temperature had higher canopy density and were more clumped due to higher leaf area and shorter internodes. Interestingly, dry mass production and light interception of the clumped canopy were more sensitive to changes in architectural traits. The complex interactions between architectural traits, canopy light interception, dry mass production, and environmental conditions can be studied by the dynamic FSPM, which may serve as a tool for designing a canopy structure which is 'ideal' in a given environment.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A majority of national governments across the EU have long tried to cordon off their practices of mass interception of communications data and cyber-hacking of foreign companies and diplomats from supranational scrutiny by the EU institutions and courts, arguing that they remain within the remit of their ‘exclusive competence’ on grounds of national security. In light of the revelations that some EU member states (namely the UK, France, Germany and Sweden) are running their own secret interception programmes, however, the question of whether the EU can and should intervene becomes more pressing. This commentary, by a team of JHA specialists at CEPS, offers four important legal reasons why the covert surveillance programmes of member states should not be regarded as falling outside the scope of EU intervention.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Intercontinental Ballistic Missiles are capable of placing a nuclear warhead at more than 5,000 km away from its launching base. With the lethal power of a nuclear warhead a whole city could be wiped out by a single weapon causing millions of deaths. This means that the threat posed to any country from a single ICBM captured by a terrorist group or launched by a 'rogue' state is huge. This threat is increasing as more countries are achieving nuclear and advanced launcher capabilities. In order to suppress or at least reduce this threat the United States created the National Missile Defense System which involved, among other systems, the development of long-range interceptors whose aim is to destroy incoming ballistic missiles in their midcourse phase. The Ballistic Missile Defense is a high-profile topic that has been the focus of political controversy lately when the U.S. decided to expand the Ballistic Missile system to Europe, with the opposition of Russia. However the technical characteristics of this system are mostly unknown by the general public. The Interception of an ICBM using a long range Interceptor Missile as intended within the Ground-Based Missile Defense System by the American National Missile Defense (NMD) implies a series of problems of incredible complexity: - The incoming missile has to be detected almost immediately after launch. - The incoming missile has to be tracked along its trajectory with a great accuracy. - The Interceptor Missile has to implement a fast and accurate guidance algorithm in order to reach the incoming missile as soon as possible. - The Kinetic Kill Vehicle deployed by the interceptor boost vehicle has to be able to detect the reentry vehicle once it has been deployed by ICBM, when it offers a very low infrared signature, in order to perform a final rendezvous manoeuvre. - The Kinetic Kill Vehicle has to be able to discriminate the reentry vehicle from the surrounding debris and decoys. - The Kinetic Kill Vehicle has to be able to implement an accurate guidance algorithm in order to perform a kinetic interception (direct collision) of the reentry vehicle, at relative speeds of more than 10 km/s. All these problems are being dealt simultaneously by the Ground-Based Missile Defense System that is developing very complex and expensive sensors, communications and control centers and long-range interceptors (Ground-Based Interceptor Missile) including a Kinetic Kill Vehicle. Among all the technical challenges involved in this interception scenario, this thesis focuses on the algorithms required for the guidance of the Interceptor Missile and the Kinetic Kill Vehicle in order to perform the direct collision with the ICBM. The involved guidance algorithms are deeply analysed in this thesis in part III where conventional guidance strategies are reviewed and optimal guidance algorithms are developed for this interception problem. The generation of a realistic simulation of the interception scenario between an ICBM and a Ground Based Interceptor designed to destroy it was considered as necessary in order to be able to compare different guidance strategies with meaningful results. As a consequence, a highly representative simulator for an ICBM and a Kill Vehicle has been implemented, as detailed in part II, and the generation of these simulators has also become one of the purposes of this thesis. In summary, the main purposes of this thesis are: - To develop a highly representative simulator of an interception scenario between an ICBM and a Kill Vehicle launched from a Ground Based Interceptor. -To analyse the main existing guidance algorithms both for the ascent phase and the terminal phase of the missiles. Novel conclusions of these analyses are obtained. - To develop original optimal guidance algorithms for the interception problem. - To compare the results obtained using the different guidance strategies, assess the behaviour of the optimal guidance algorithms, and analyse the feasibility of the Ballistic Missile Defense system in terms of guidance (part IV). As a secondary objective, a general overview of the state of the art in terms of ballistic missiles and anti-ballistic missile defence is provided (part I).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Communications are important for relationships within a marketing channel from both a theoretical and managerial perspective. Yet it is a problematic area for scholars. Thus, this research addresses the problem of how do customers of a financial services institution perceive communications with an ideal institution? This study's case research methodology used in-depth interviews with 34 carefully selected customers of a building society. The factors that make up customers' attitudes about corporate communications for an ideal financial services institution were identified and actual perceptions were compared against that ideal. The findings confirmed the importance of communications for customers in a relationship with a financial services provider and suggested communication priorities for customers in this context. In addition, the findings suggested sources of communication dissatisfaction for customers. These findings build upon the literature that speculates about customer perceptions of communications with organizations but provides little evidence to support hypotheses. The contributions arose from the emphasis on the customers' own attitudes and the patterns found within them.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

For any discipline to be regarded as a professional undertaking by which its members may be treated as true “professionals” in a specific area, practitioners must clearly understand that discipline’s history as well as the place and significance of that history in current practice as well as its relevance to available technologies and artefacts at the time. This is common for many professional disciplines such as medicine, pharmacy, engineering, law and so on but not yet, this paper submits, in information technology. Based on twenty five elapsed years of experience in developing and delivering Cybersecurity courses at undergraduate and postgraduate levels, this paper proposes a rationale and set of differing perspectives for the planning and development of curricula relevant to the delivery of appropriate courses in the history of cybersecurity or information assurance to information and communications technology (ICT) students and thus to potential information technology professionals.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This report presents a discussion of communications strategies to influence policy outcomes. It is based on a series of interviews with projects, NGOs and regional organisations to review current activities and assess the implications for STREAM of developing a communications strategy within a livelihoods framework. The main message of the report is that in order to fulfil its guiding principles. STREAM must acknowledge that policy change is related to governance and civil society, and requires a broad range of partnerships and a broad range of voices in the policy-making arena. (Pdf contains 49 pages).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Canopy interception of incident precipitation is a critical component of the forest water balance during each of the four seasons. Models have been developed to predict precipitation interception from standard meteorological variables because of acknowledged difficulty in extrapolating direct measurements of interception loss from forest to forest. No known study has compared and validated canopy interception models for a leafless deciduous forest stand in the eastern United States. Interception measurements from an experimental plot in a leafless deciduous forest in northeastern Maryland (39°42'N, 75°5'W) for 11 rainstorms in winter and early spring 2004/05 were compared to predictions from three models. The Mulder model maintains a moist canopy between storms. The Gash model requires few input variables and is formulated for a sparse canopy. The WiMo model optimizes the canopy storage capacity for the maximum wind speed during each storm. All models showed marked underestimates and overestimates for individual storms when the measured ratio of interception to gross precipitation was far more or less, respectively, than the specified fraction of canopy cover. The models predicted the percentage of total gross precipitation (PG) intercepted to within the probable standard error (8.1%) of the measured value: the Mulder model overestimated the measured value by 0.1% of PG; the WiMo model underestimated by 0.6% of PG; and the Gash model underestimated by 1.1% of PG. The WiMo model’s advantage over the Gash model indicates that the canopy storage capacity increases logarithmically with the maximum wind speed. This study has demonstrated that dormant-season precipitation interception in a leafless deciduous forest may be satisfactorily predicted by existing canopy interception models.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This paper traces the history of store (retailer-controlled) and national (manufacture controlled)brands; identifies the key historical characteristics of the past 200 years of marketing history;describes the four main time periods of U.S. retail marketing (1800 - 2000); and comments on the most likely developments within the current phases of brand marketing. Will the future focus on technology and new forms of communications? The Internet exemplifies an unconventional retailing environment, with etailer numbers growing rapidly. The central proposition of this paper is that a "cycle of control" - a pattern of marketing developments within the history of retailing and national marketing communications - Can indicate the success of marketing strategies in the future.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The purpose of this paper is to extend marketing knowledge into perceived risk in online transactions beyond the current positivistic, hypotheses-driven research by providing qualitative insights into how individuals construct their accounts of perceived risk online. Additionally, the study reported in this paper aims to explore how communication sources influence both these subjective constructions and individuals' behavioural experiences with transaction activity on the web. Design/methodology/approach - The study was developed within a grounded theory method.Ten in-depth interviews were conducted which were analysed using constant comparison of incidents procedures to provide rich descriptions of the interviewees' subjective perceptions and lived experiences with online transaction activity. Findings - The findings provide insights into how the human clement is present in individuals'perceptions and constructions of their accounts of the risk involved online.The findings also identify the influence of mass communication sources on the construction of these accounts. The study provides insights into whether change agent communication sources, such as marketers or web designers,influence consumers' behaviours towards online transaction activity through mediating their perceptions of the risks involved. The study also reveals how social communication networks influence the interviewees' decisions to use the web (or transaction activities, in particular online purchasing, and how the group in this study might act as a communication source to influence others. Research limitations/Implications - While the findings cannot be generalised to the internet population overall, the sample used was able to provide relevant information regarding the phenomenon of interest. Future research should continue to examine perceived risk and the influence of communications sources, such as e-mail, discussion groups and virtual communities. Originality/value - The value of the paper lies in permitting the participants to account for perceived risk for themselves. The findings ex.plore what this means at increasing levels of personal relevance and the influence of communication sources to create, sustain or mediate perceptions of this phenomenon.