995 resultados para Security constraints
Resumo:
In the tropics, a large number of smallholder farms contribute significantly to food security by raising pigs and poultry for domestic consumption and for sale on local markets. The high cost and, sometimes, the lack of availability of commercial protein supplements is one of the main limitations to efficient animal production by smallholders. Locally-grown forages and grain legumes offer ecological benefits such as nitrogen fixation, soil improvement, and erosion control which contribute to improve cropping efficiency. Besides these agronomical assets, they can be used as animal feeds in mixed farming systems. In this paper we review options to include locally-grown forages and grain legumes as alternative protein sources in the diets of pigs and poultry in order to reduce farmers’ dependence on externally-purchased protein concentrates. The potential nutritive value of a wide range of forages and grain legumes is presented and discussed. The influence of dietary fibre and plant secondary metabolites contents and their antinutritive consequences on feed intake, digestive processes and animal performances are considered according to the varying composition in those compounds of the different plant species and cultivars covered in this review. Finally, methods to overcome the antinutritive attributes of the plant secondary metabolites using heat, chemical or biological treatment are reviewed regarding their efficiency and their suitability in low input farming systems.
Resumo:
Das Mahafaly Plateau im südwestlichen Madagaskar ist gekennzeichnet durch raue klimatische Bedingungen, vor allem regelmäßige Dürren und Trockenperioden, geringe Infrastruktur, steigende Unsicherheit, hohe Analphabetenrate und regelmäßige Zerstörung der Ernte durch Heuschreckenplagen. Da 97% der Bevölkerung von der Landwirtschaft abhängen, ist eine Steigerung der Produktivität von Anbausystemen die Grundlage für eine Verbesserung der Lebensbedingungen und Ernährungssicherheit in der Mahafaly Region. Da wenig über die Produktivität von traditionellen extensiven und neu eingeführten Anbaumethoden in diesem Gebiet bekannt ist, waren die Zielsetzungen der vorliegenden Arbeit, die limitierenden Faktoren und vielversprechende alternative Anbaumethoden zu identifizieren und diese unter Feldbedingungen zu testen. Wir untersuchten die Auswirkungen von lokalem Viehmist und Holzkohle auf die Erträge von Maniok, der Hauptanbaufrucht der Region, sowie die Beiträge von weiteren Faktoren, die im Untersuchungsgebiet ertragslimitierend sind. Darüber hinaus wurde in der Küstenregion das Potenzial für bewässerten Gemüseanbau mit Mist und Holzkohle untersucht, um zu einer Diversifizierung von Einkommen und Ernährung beizutragen. Ein weiterer Schwerpunkt dieser Arbeit war die Schätzung von Taubildung und deren Beitrag in der Jahreswasserbilanz durch Testen eines neu entworfenen Taumessgerätes. Maniok wurde über drei Jahre und in drei Versuchsfeldern in zwei Dörfern auf dem Plateau angebaut, mit applizierten Zeburindermistraten von 5 und 10 t ha-1, Holzkohleraten von 0,5 und 2 t ha-1 und Maniokpflanzdichten von 4500 Pflanzen ha-1. Maniokknollenerträge auf Kontrollflächen erreichten 1 bis 1,8 t Trockenmasse (TM) ha-1. Mist führte zu einer Knollenertragssteigerung um 30 - 40% nach drei Jahren in einem kontinuierlich bewirtschafteten Feld mit geringer Bodenfruchtbarkeit, hatte aber keinen Effekt auf den anderen Versuchsfeldern. Holzkohle hatte keinen Einfluss auf Erträge über den gesamten Testzeitraum, während die Infektion mit Cassava-Mosaikvirus zu Ertragseinbußen um bis zu 30% führte. Pflanzenbestände wurden felder-und jahresübergreifend um 4-54% des vollen Bestandes reduziert, was vermutlich auf das Auftreten von Trockenperioden und geringe Vitalität von Pflanzmaterial zurückzuführen ist. Karotten (Daucus carota L. var. Nantaise) und Zwiebeln (Allium cepa L. var. Red Créole) wurden über zwei Trockenzeiten mit lokal erhältlichem Saatgut angebaut. Wir testeten die Auswirkungen von lokalem Rindermist mit einer Rate von 40 t ha-1, Holzkohle mit einer Rate von 10 t ha-1, sowie Beschattung auf die Gemüseernteerträge. Lokale Bewässerungswasser hatte einen Salzgehalt von 7,65 mS cm-1. Karotten- und Zwiebelerträge über Behandlungen und Jahre erreichten 0,24 bis 2,56 t TM ha-1 beziehungsweise 0,30 bis 4,07 DM t ha-1. Mist und Holzkohle hatten keinen Einfluss auf die Erträge beider Kulturen. Beschattung verringerte Karottenerträge um 33% im ersten Jahr, während sich die Erträge im zweiten Jahr um 65% erhöhten. Zwiebelerträge wurden unter Beschattung um 148% und 208% im ersten und zweiten Jahr erhöht. Salines Bewässerungswasser sowie Qualität des lokal verfügbaren Saatgutes reduzierten die Keimungsraten deutlich. Taubildung im Küstendorf Efoetsy betrug 58,4 mm und repräsentierte damit 19% der Niederschlagsmenge innerhalb des gesamten Beobachtungszeitraum von 18 Monaten. Dies weist darauf hin, dass Tau in der Tat einen wichtigen Beitrag zur jährlichen Wasserbilanz darstellt. Tageshöchstwerte erreichten 0,48 mm. Die getestete Tauwaage-Vorrichtung war in der Lage, die nächtliche Taubildung auf der metallischen Kondensationsplatte zuverlässig zu bestimmen. Im abschließenden Kapitel werden die limitierenden Faktoren für eine nachhaltige Intensivierung der Landwirtschaft in der Untersuchungsregion diskutiert.
Resumo:
Recent studies of the current state of rural education and training (RET) systems in sub-Saharan Africa have assessed their ability to provide for the learning needs essential for more knowledgeable and productive small-scale rural households. These are most necessary if the endemic causes of rural poverty (poor nutrition, lack of sustainable livelihoods, etc.) are to be overcome. A brief historical background and analysis of the major current constraints to improvement in the sector are discussed. Paramount among those factors leading to its present 'malaise' is the lack of a whole-systems perspective and the absence of any coherent policy framework in most countries. There is evidence of some recent innovations, both in the public sector and through the work of non-governmental organisations (NGOs), civil society organisations (CSOs) and other private bodies. These provide hope of a new sense of direction that could lead towards meaningful 'revitalisation' of the sector. A suggested framework offers 10 key steps which, it is argued, could largely be achieved with modest internal resources and very little external support, provided that the necessary leadership and managerial capacities are in place. (C) 2006 Elsevier Ltd. All rights reserved.
Resumo:
The Brazilian pay-as-you-go social security program is analyzed in a historical perspective. Its contribution to income inequality, and the role played by the inflation as a balancing variable are discussed. It is shown that budgetary constraints due to the increasing informalization of the labor force can no longer be reconciled with protligate eligibility criteria. A tailor-made proposal for reform is presented as well as a plan for financing the transition from today's system to the proposed one.
Resumo:
We consider an exchange economy under incomplete financiaI markets with purely financiaI securities and finitely many agents. When portfolios are not constrained, Cass [4], Duffie [7] and Florenzano-Gourdel [12] proved that arbitrage-free security prices fully characterize equilibrium security prices. This result is based on a trick initiated by Cass [4] in which one unconstrained agent behaves as if he were in complete markets. This approach is unsatisfactory since it is asymmetric and no more valid when every agent is subject to frictions. We propose a new and symmetric approach to prove that arbitrage-free security prices still fully characterize equilibrium security prices in the more realistic situation where the financiaI market is constrained by convex restrictions, provided that financiaI markets are collectively frictionless.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
The deep economic recession that hit Sweden and Finland at the beginning of the 90s, and the fall in public revenues and rapidly growing public debts that followed on it, triggered a development of cutbacks and restructuring measures which has resulted in a scientific debate over what this has meant for these countries’ systems of social policy, traditionally resting on the Nordic welfare state paradigm. In this connection, questions of to what extent changes made can be ascribed mainly to the economic constraints posed by the recession at all, or rather, to other more long-term societal trends or phenomena, including globalisation, European integration and/or ideational or ideological shifts among influential (elite) groups, have often been touched upon. Applying an ideas-centred approach, this paper attempts to contribute to the knowledge on the reasoning of influential elite societal groups in social policy issues before, during and after the 90’s recession, by empirically analysing their statements on social security made in the press. A distinction is made between three different levels of proposed policy changes, reaching from minor alterations of single programs to changes of the policy paradigm. Results show that the 1990s did not only mean the emergence of suggestions for minor cutbacks in and alterations of prevailing programmes. The share of suggestions implying de facto a (further) departure from the basic features of the social security system also showed that the model was under continuous pressure throughout the 90s. However, many of the changes suggested were not justified by any clear references to a policy paradigm in either country (or not justified at all). Instead, references to “purely” structural justifications did become more common over time. In this respect, as regards social security, our results cannot confirm the fairly popular notion among many researchers of a clearly ideological attack on the welfare state. However, it remains uncertain whether and to what extent the increased proportion of references to “structural realities” in the 90s should be interpreted as an indication of a change in the idea of what the welfare state is and what the goals behind it are. Results further show that the patterns of the discussion in the two countries studied bore a remarkable resemblance at a general level, whereas there are indications of differences in the driving forces behind suggestions for similar reforms in these two countries.
Resumo:
Food security is the main concern in Africa as the production and productivity of crops are under continuous threat. Indigenous crops also known as orphan- or as underutilized- crops provide key contributions to food security under the present scenario of increasing world population and changing climate. Hence, these crops which belong to the major categories of cereals, legumes, fruits and root crops play a key role in the livelihood of the resource-poor farmers and consumers since they perform better than the major world crops under extreme soil and climate conditions prevalent in the continent. These indigenous crops have the major advantage that they fit well into the general socio-economic and ecological context of the region. However, despite their huge importance, African crops have generally received little attention by the global scientific community. With the current production systems, only a fraction of yield potential was achieved for most of these crops. In order to devise strategies towards boosting crop productivity in Africa, the current production constraints should be investigated and properly addressed. Key traits known to increase productivity and/or improve nutrition and diverse conventional and modern crop improvement techniques need to be implemented. Commitments in the value-chain from the research, production, marketing to distribution of improved seeds are required by relevant national and international institutions as well as African governments to promote food security in a sustainable manner. The review also presents major achievements and suggestions for stakeholders interested in African agriculture.
Resumo:
Development of irrigation, which is of crucial importance in Eritrea, is perceived by many as the main technique for improving the precarious food security situation in this Sahelian country in the Horn of Africa. The present publication presents the outcome of a nationwide workshop held in 2003, which brought together administrators, scientists, and members of public development agencies and NGOs. These workshop participants presented experiences, lessons learnt, and ideas about how to move forward in relation to development of irrigation in Eritrea. Specifically, the publication deals with the following broad themes, lessons learnt, and experiences in Eritrea: · spate irrigation systems and measurement of performance, as well as experience with modernisation of spate irrigation systems in Eritrea · small-scale irrigation systems and their potentials and pitfalls, including development of low-cost micro irrigation · climate and irrigation, including rainfall forecasts · socio-economic aspects of irrigation, including gender questions, institutional requirements, and irrigation and livelihoods The publication contains an extensive summary in the Tigrinya language, in order to facilitate access to the key findings by local non-English-speaking stakeholders in irrigation development.
Resumo:
Conventional dual-rail precharge logic suffers from difficult implementations of dual-rail structure for obtaining strict compensation between the counterpart rails. As a light-weight and high-speed dual-rail style, balanced cell-based dual-rail logic (BCDL) uses synchronised compound gates with global precharge signal to provide high resistance against differential power or electromagnetic analyses. BCDL can be realised from generic field programmable gate array (FPGA) design flows with constraints. However, routings still exist as concerns because of the deficient flexibility on routing control, which unfavourably results in bias between complementary nets in security-sensitive parts. In this article, based on a routing repair technique, novel verifications towards routing effect are presented. An 8 bit simplified advanced encryption processing (AES)-co-processor is executed that is constructed on block random access memory (RAM)-based BCDL in Xilinx Virtex-5 FPGAs. Since imbalanced routing are major defects in BCDL, the authors can rule out other influences and fairly quantify the security variants. A series of asymptotic correlation electromagnetic (EM) analyses are launched towards a group of circuits with consecutive routing schemes to be able to verify routing impact on side channel analyses. After repairing the non-identical routings, Mutual information analyses are executed to further validate the concrete security increase obtained from identical routing pairs in BCDL.
Resumo:
In today's internet world, web browsers are an integral part of our day-to-day activities. Therefore, web browser security is a serious concern for all of us. Browsers can be breached in different ways. Because of the over privileged access, extensions are responsible for many security issues. Browser vendors try to keep safe extensions in their official extension galleries. However, their security control measures are not always effective and adequate. The distribution of unsafe extensions through different social engineering techniques is also a very common practice. Therefore, before installation, users should thoroughly analyze the security of browser extensions. Extensions are not only available for desktop browsers, but many mobile browsers, for example, Firefox for Android and UC browser for Android, are also furnished with extension features. Mobile devices have various resource constraints in terms of computational capabilities, power, network bandwidth, etc. Hence, conventional extension security analysis techniques cannot be efficiently used by end users to examine mobile browser extension security issues. To overcome the inadequacies of the existing approaches, we propose CLOUBEX, a CLOUd-based security analysis framework for both desktop and mobile Browser EXtensions. This framework uses a client-server architecture model. In this framework, compute-intensive security analysis tasks are generally executed in a high-speed computing server hosted in a cloud environment. CLOUBEX is also enriched with a number of essential features, such as client-side analysis, requirements-driven analysis, high performance, and dynamic decision making. At present, the Firefox extension ecosystem is most susceptible to different security attacks. Hence, the framework is implemented for the security analysis of the Firefox desktop and Firefox for Android mobile browser extensions. A static taint analysis is used to identify malicious information flows in the Firefox extensions. In CLOUBEX, there are three analysis modes. A dynamic decision making algorithm assists us to select the best option based on some important parameters, such as the processing speed of a client device and network connection speed. Using the best analysis mode, performance and power consumption are improved significantly. In the future, this framework can be leveraged for the security analysis of other desktop and mobile browser extensions, too.
Resumo:
The recent crisis in Japan, which combined tsunami and technological events, shows that any crisis, especially those in developed and developing countries, is from here out a hybrid crisis, mixing natural factors and human/technological (NATECH). Faced with such dramatic events, which exceed any means available for emergency rescue service, it is necessary a) to remain prudent and b) to prepare. One of the means for preparing is unquestionably training. However, here, undoubtedly there are important constraints: How to train, for example, while reproducing vividly and realistically, an event? How to exceed the admittedly useful, although very limited, level of the table-top exercise? How also to avoid the unnecessary mobilization of dozens, even hundreds, of field and operation staffers to take part in an exercise which could lead to a disappointing outcome? A major crisis, a major exercise, in effect. The solution of virtual reality has emerged, in Europe and in the United States. It is also sometimes called “serious game”.
Resumo:
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.
Resumo:
How do local homeland security organizations respond to catastrophic events such as hurricanes and acts of terrorism? Among the most important aspects of this response are these organizations ability to adapt to the uncertain nature of these "focusing events" (Birkland 1997). They are often behind the curve, seeing response as a linear process, when in fact it is a complex, multifaceted process that requires understanding the interactions between the fiscal pressures facing local governments, the institutional pressures of working within a new regulatory framework and the political pressures of bringing together different levels of government with different perspectives and agendas. ^ This dissertation has focused on tracing the factors affecting the individuals and institutions planning, preparing, responding and recovering from natural and man-made disasters. Using social network analysis, my study analyzes the interactions between the individuals and institutions that respond to these "focusing events." In practice, it is the combination of budgetary, institutional, and political pressures or constraints interacting with each other which resembles a Complex Adaptive System (CAS). ^ To investigate this system, my study evaluates the evolution of two separate sets of organizations composed of first responders (Fire Chiefs, Emergency Management Coordinators) and community volunteers organized in the state of Florida over the last fifteen years. Using a social network analysis approach, my dissertation analyzes the interactions between Citizen Corps Councils (CCCs) and Community Emergency Response Teams (CERTs) in the state of Florida from 1996–2011. It is the pattern of interconnections that occur over time that are the focus of this study. ^ The social network analysis revealed an increase in the amount and density of connections between these organizations over the last fifteen years. The analysis also exposed the underlying patterns in these connections; that as the networks became more complex they also became more decentralized though not in any uniform manner. The present study brings to light a story of how communities have adapted to the ever changing circumstances that are sine qua non of natural and man-made disasters.^