816 resultados para Information security
Resumo:
The agronomic and economic performance of genetically modified (GM) crops relative to their conventional counterparts has been largely investigated worldwide. As a result there is considerable information to conduct a meta-analysis to evaluate the agronomic and economic relative performance of GM crops vs. non GM crops by crop, GM trait, and country’s level of development. Such meta-analysis has been recently conducted showing that overall GM crops outperform non GM crops in both agronomic and economic terms (1). This paper focuses on the agronomic and economic performance of GM crops in developing and developed countries as well as the potential implications for global food security of adoption of GM crops by developing countries. The presumption that technology only benefits the developed world is not supported by the meta-analysis conducted. No evidence that GM technology benefits moredeveloped than developing countries was found. Indeed, the agronomic and economic performance of GM crops vs. conventional crops tends to be better for developing than for developed countries. Although it is manifested that the conventional agronomic practices in developing countries are different to those in developed countries, it is also apparent that GM crop adoption in developing countries may help to tackle the growing concerns over the scarcity of food globally.
Resumo:
Agriculture and food security are key sectors for intervention under climate change. Agricultural production is highly vulnerable even to 2C (low-end) predictions for global mean temperatures in 2100, with major implications for rural poverty and for both rural and urban food security. Agriculture also presents untapped opportunities for mitigation, given the large land area under crops and rangeland, and the additional mitigation potential of aquaculture. This paper presents a summary of current knowledge on options to support farmers, particularly smallholder farmers, in achieving food security through agriculture under climate change. Actions towards adaptation fall into two broad overlapping areas: (1) accelerated adaptation to progressive climate change over decadal time scales, for example integrated packages of technology, agronomy and policy options for farmers and food systems, and (2) better management of agricultural risks associated with increasing climate variability and extreme events, for example improved climate information services and safety nets. Maximization of agriculture’s mitigation potential will require investments in technological innovation and agricultural intensification linked to increased efficiency of inputs, and creation of incentives and monitoring systems that are inclusive of smallholder farmers. Food systems faced with climate change need urgent, broad-based action in spite of uncertainties.
Resumo:
Tremendous progress in plant proteomics driven by mass spectrometry (MS) techniques has been made since 2000 when few proteomics reports were published and plant proteomics was in its infancy. These achievements include the refinement of existing techniques and the search for new techniques to address food security, safety, and health issues. It is projected that in 2050, the world’s population will reach 9–12 billion people demanding a food production increase of 34–70% (FAO, 2009) from today’s food production. Provision of food in a sustainable and environmentally committed manner for such a demand without threatening natural resources, requires that agricultural production increases significantly and that postharvest handling and food manufacturing systems become more efficient requiring lower energy expenditure, a decrease in postharvest losses, less waste generation and food with longer shelf life. There is also a need to look for alternative protein sources to animal based (i.e., plant based) to be able to fulfill the increase in protein demands by 2050. Thus, plant biology has a critical role to play as a science capable of addressing such challenges. In this review, we discuss proteomics especially MS, as a platform, being utilized in plant biology research for the past 10 years having the potential to expedite the process of understanding plant biology for human benefits. The increasing application of proteomics technologies in food security, analysis, and safety is emphasized in this review. But, we are aware that no unique approach/technology is capable to address the global food issues. Proteomics-generated information/resources must be integrated and correlated with other omics-based approaches, information, and conventional programs to ensure sufficient food and resources for human development now and in the future.
Resumo:
This work presents a method of information fusion involving data captured by both a standard CCD camera and a ToF camera to be used in the detection of the proximity between a manipulator robot and a human. Both cameras are assumed to be located above the work area of an industrial robot. The fusion of colour images and time of light information makes it possible to know the 3D localization of objects with respect to a world coordinate system. At the same time this allows to know their colour information. Considering that ToF information given by the range camera contains innacuracies including distance error, border error, and pixel saturation, some corrections over the ToF information are proposed and developed to improve the results. The proposed fusion method uses the calibration parameters of both cameras to reproject 3D ToF points, expressed in a common coordinate system for both cameras and a robot arm, in 2D colour images. In addition to this, using the 3D information, the motion detection in a robot industrial environment is achieved, and the fusion of information is applied to the foreground objects previously detected. This combination of information results in a matrix that links colour and 3D information, giving the possibility of characterising the object by its colour in addition to its 3D localization. Further development of these methods will make it possible to identify objects and their position in the real world, and to use this information to prevent possible collisions between the robot and such objects.
Resumo:
This work presents a method of information fusion involving data captured by both a standard charge-coupled device (CCD) camera and a time-of-flight (ToF) camera to be used in the detection of the proximity between a manipulator robot and a human. Both cameras are assumed to be located above the work area of an industrial robot. The fusion of colour images and time-of-flight information makes it possible to know the 3D localization of objects with respect to a world coordinate system. At the same time, this allows to know their colour information. Considering that ToF information given by the range camera contains innacuracies including distance error, border error, and pixel saturation, some corrections over the ToF information are proposed and developed to improve the results. The proposed fusion method uses the calibration parameters of both cameras to reproject 3D ToF points, expressed in a common coordinate system for both cameras and a robot arm, in 2D colour images. In addition to this, using the 3D information, the motion detection in a robot industrial environment is achieved, and the fusion of information is applied to the foreground objects previously detected. This combination of information results in a matrix that links colour and 3D information, giving the possibility of characterising the object by its colour in addition to its 3D localisation. Further development of these methods will make it possible to identify objects and their position in the real world and to use this information to prevent possible collisions between the robot and such objects.
Resumo:
Facility management (FM), from a service oriented approach, addresses the functions and requirements of different services such as energy management, space planning and security service. Different service requires different information to meet the needs arising from the service. Object-based Building Information Modelling (BIM) is limited to support FM services; though this technology is able to generate 3D models that semantically represent facility’s information dynamically over the lifecycle of a building. This paper presents a semiotics-inspired framework to extend BIM from a service-oriented perspective. The extended BIM, which specifies FM services and required information, will be able to express building service information in the right format for the right purposes. The service oriented approach concerns pragmatic aspect of building’s information beyond semantic level. The pragmatics defines and provides context for utilisation of building’s information. Semiotics theory adopted in this paper is to address pragmatic issues of utilisation of BIM for FM services.
Resumo:
Wireless video sensor networks have been a hot topic in recent years; the monitoring capability is the central feature of the services offered by a wireless video sensor network can be classified into three major categories: monitoring, alerting, and information on-demand. These features have been applied to a large number of applications related to the environment (agriculture, water, forest and fire detection), military, buildings, health (elderly people and home monitoring), disaster relief, area and industrial monitoring. Security applications oriented toward critical infrastructures and disaster relief are very important applications that many countries have identified as critical in the near future. This paper aims to design a cross layer based protocol to provide the required quality of services for security related applications using wireless video sensor networks. Energy saving, delay and reliability for the delivered data are crucial in the proposed application. Simulation results show that the proposed cross layer based protocol offers a good performance in term of providing the required quality of services for the proposed application.
Resumo:
Multibiometrics aims at improving biometric security in presence of spoofing attempts, but exposes a larger availability of points of attack. Standard fusion rules have been shown to be highly sensitive to spoofing attempts – even in case of a single fake instance only. This paper presents a novel spoofing-resistant fusion scheme proposing the detection and elimination of anomalous fusion input in an ensemble of evidence with liveness information. This approach aims at making multibiometric systems more resistant to presentation attacks by modeling the typical behaviour of human surveillance operators detecting anomalies as employed in many decision support systems. It is shown to improve security, while retaining the high accuracy level of standard fusion approaches on the latest Fingerprint Liveness Detection Competition (LivDet) 2013 dataset.
Resumo:
Bakgrund: Internet används globalt inom många områden och aktuell forskning visar att gravida kvinnor använder Internet till att söka information om graviditet och förlossning. En graviditet innebär många frågor hos kvinnan och kvinnor söker efter information för att få en trygghet och försäkran om att allt är normalt med deras hälsa och barnet i magen. Syfte: Syftet är att undersöka gravida kvinnors informationssökning via Internet avseende graviditet och förlossning. Metod: Beskrivande tvärsnittstudie. Datainsamling skedde via en enkätundersökning och data analyserades med deskriptiv och jämförande ansats. Resultat: Nästan alla kvinnor i undersökningen använde Internet för att söka information om graviditet och förlossning. Kvinnorna söker information om barnets utveckling, kost/näring och graviditetslängd i hög utsträckning. Högutbildade kvinnor har andra kriterier för trovärdighet på hemsidor än kvinnor med lägre utbildning. Slutsats: Barnmorskor bör vara medvetna om gravida kvinnors användning av Internet samt själva skapa sig en uppfattning om informationen som de gravida kvinnorna läser på Internet. Vår studie visar att barnmorskors rekommendation av hemsidor på Internet har stor betydelse för gravida kvinnor.
Resumo:
This paper uses Shannon's information theory to give a quantitative definition of information flow in systems that transform inputs to outputs. For deterministic systems, the definition is shown to specialise to a simpler form when the information source and the known inputs jointly determine the inputs. For this special case, the definition is related to the classical security condition of non-interference and an equivalence is established between non-interference and independence of random variables. Quantitative information flow for deterministic systems is then presented in relational form. With this presentation, it is shown how relational parametricity can be used to derive upper and lower bounds on information flows through families of functions defined in the second order lambda calculus.
Resumo:
The paper investigates which of Shannon’s measures (entropy, conditional entropy, mutual information) is the right one for the task of quantifying information flow in a programming language. We examine earlier relevant contributions from Denning, McLean and Gray and we propose and motivate a specific quantitative definition of information flow. We prove results relating equivalence relations, interference of program variables, independence of random variables and the flow of confidential information. Finally, we show how, in our setting, Shannon’s Perfect Secrecy theorem provides a sufficient condition to determine whether a program leaks confidential information.
Resumo:
http://digitalcommons.winthrop.edu/dacusdocsnews/1013/thumbnail.jpg
Resumo:
Internal and external computer network attacks or security threats occur according to standards and follow a set of subsequent steps, allowing to establish profiles or patterns. This well-known behavior is the basis of signature analysis intrusion detection systems. This work presents a new attack signature model to be applied on network-based intrusion detection systems engines. The AISF (ACME! Intrusion Signature Format) model is built upon XML technology and works on intrusion signatures handling and analysis, from storage to manipulation. Using this new model, the process of storing and analyzing information about intrusion signatures for further use by an IDS become a less difficult and standardized process.
Resumo:
Medical images are private to doctor and patient. Digital medical images should be protected against unauthorized viewers. One way to protect digital medical images is using cryptography to encrypt the images. This paper proposes a method for encrypting medical images with a traditional symmetric cryptosystem. We use biometrics to protect the cryptographic key. Both encrypted image and cryptographic key can be transmitted over public networks with security and only the person that owns the biometrics information used in key protection can decrypt the medical image. © Springer Science+Business Media B.V. 2008.