883 resultados para Collateral requirements
Resumo:
In this research, an agent-based model (ABM) was developed to generate human movement routes between homes and water resources in a rural setting, given commonly available geospatial datasets on population distribution, land cover and landscape resources. ABMs are an object-oriented computational approach to modelling a system, focusing on the interactions of autonomous agents, and aiming to assess the impact of these agents and their interactions on the system as a whole. An A* pathfinding algorithm was implemented to produce walking routes, given data on the terrain in the area. A* is an extension of Dijkstra's algorithm with an enhanced time performance through the use of heuristics. In this example, it was possible to impute daily activity movement patterns to the water resource for all villages in a 75 km long study transect across the Luangwa Valley, Zambia, and the simulated human movements were statistically similar to empirical observations on travel times to the water resource (Chi-squared, 95% confidence interval). This indicates that it is possible to produce realistic data regarding human movements without costly measurement as is commonly achieved, for example, through GPS, or retrospective or real-time diaries. The approach is transferable between different geographical locations, and the product can be useful in providing an insight into human movement patterns, and therefore has use in many human exposure-related applications, specifically epidemiological research in rural areas, where spatial heterogeneity in the disease landscape, and space-time proximity of individuals, can play a crucial role in disease spread.
Resumo:
More and more software projects today are security-related in one way or the other. Requirements engineers often fail to recognise indicators for security problems which is a major source of security problems in practice. Identifying security-relevant requirements is labour-intensive and errorprone. In order to facilitate the security requirements elicitation process, we present an approach supporting organisational learning on security requirements by establishing company-wide experience resources, and a socio-technical network to benefit from them. The approach is based on modelling the flow of requirements and related experiences. Based on those models, we enable people to exchange experiences about security-requirements while they write and discuss project requirements. At the same time, the approach enables participating stakeholders to learn while they write requirements. This can increase security awareness and facilitate learning on both individual and organisational levels. As a basis for our approach, we introduce heuristic assistant tools which support reuse of existing security-related experiences. In particular, they include Bayesian classifiers which issue a warning automatically when new requirements seem to be security-relevant. Our results indicate that this is feasible, in particular if the classifier is trained with domain specific data and documents from previous projects. We show how the ability to identify security-relevant requirements can be improved using this approach. We illustrate our approach by providing a step-by-step example of how we improved the security requirements engineering process at the European Telecommunications Standards Institute (ETSI) and report on experiences made in this application.
Resumo:
Building secure systems is difficult for many reasons. This paper deals with two of the main challenges: (i) the lack of security expertise in development teams, and (ii) the inadequacy of existing methodologies to support developers who are not security experts. The security standard ISO 14508 (Common Criteria) together with secure design techniques such as UMLsec can provide the security expertise, knowledge, and guidelines that are needed. However, security expertise and guidelines are not stated explicitly in the Common Criteria. They are rather phrased in security domain terminology and difficult to understand for developers. This means that some general security and secure design expertise are required to fully take advantage of the Common Criteria and UMLsec. In addition, there is the problem of tracing security requirements and objectives into solution design,which is needed for proof of requirements fulfilment. This paper describes a security requirements engineering methodology called SecReq. SecReq combines three techniques: the Common Criteria, the heuristic requirements editorHeRA, andUMLsec. SecReqmakes systematic use of the security engineering knowledge contained in the Common Criteria and UMLsec, as well as security-related heuristics in the HeRA tool. The integrated SecReq method supports early detection of security-related issues (HeRA), their systematic refinement guided by the Common Criteria, and the ability to trace security requirements into UML design models. A feedback loop helps reusing experiencewithin SecReq and turns the approach into an iterative process for the secure system life-cycle, also in the presence of system evolution.
Resumo:
Tese dout., Aquacultura, Universidade do Algarve, 2008
Resumo:
Epithelial tissues are essential during morphogenesis and organogenesis. During development, epithelial tissues undergo several different remodeling processes, from cell intercalation to cell change shape. An epithelial cell has a highly polarized structure, which is important to maintain tissue integrity. The mechanisms that regulate and maintain apicobasal polarity and epithelial integrity are mostly conserved among all species and in different tissues within the same organism. aPKC-PAR complex localizes in the apical domain of polarized cells, and its function is essential for apicobasal polarization and epithelial integrity. In this work we characterized two novel alleles of aPKC: a temperature sensitive allele (aPKCTS), which has a point mutation on a kinase domain, and another allele with a point mutation on a highly conserved amino acid within the PB1 domain of aPKC (aPKCPB1). Analysis of the aPKCTS mutant phenotypes, lead us to propose that during development different epithelial tissues have differential requirements of aPKC activity. More specifically, our work suggests de novo formation of adherens junctions (AJs) is particularly sensitive to sub-optimal levels of apkc activity. Analysis of the aPKCPB1 allele, suggests that aPKC is likely to have an apical structural function mostly independent of its kinase activity. Altogether our work suggests that although loss of aPKC function is associated to similar epithelial phenotypes (e.g., loss of apicobasal polarization and epithelial integrity), the requirements of aPKC activity within these tissues are nevertheless likely to vary.
Resumo:
The ecdysteroid, 20-hydroxyecdysone or beta-ecdysone, is a steroid hormone which plays a crucial role in molting, metamor- phosis and reproduction of arthropods. This ecdysteroid and its analogues have high potential to be used as insecticides. Previous studies in our laboratory have demonstrated that Vitex glabrata R.Br. (commonly known as Khai-Nao), an indigenous herbaceous plant of Thailand, synthesized and accumulated high quantity of 20-hydroxyecdysone. Therefore, the aim of this study was to investigate the effect of precursor and elicitors feeding on cell growth and 20-hydroxyecdysone production of V. glabrata suspension cultures. Plant cells were cultured in half strength MS medium containing 30 g/l glucose and supplemented with 2.0 mg/l 6- benzylaminopurine (BAP) and 1.0 mg/l 2,4-dichlorophenoxyacetic acid (2,4-D). Cells were incubated on a rotary shaker at 120 rpm under continuous light of 2000 lux at 25 °C. Sterilized cholesterol (5 and 10 mg/l) as precursor was added to the cell cultures on the day of inoculation, while chitosan (50, 100 and 200 mg/l) and methyl jusmonate (100 and 200 mM) as elicitors were added to the cell cultures on day 6 after cultivation.