947 resultados para Libyan Data Protection Authority


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Includes bibliography

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents an interactive simulation environment for distance protection, developed with ATP and foreign models based on ANSI C. Files in COMTRADE format are possible to generate after ATP simulation. These files can be used to calibrate real relays. Also, the performance of relay algorithms with real oscillography events is possible to assess by using the ATP option for POSTPROCESS PLOT FILE (PPF). The main purpose of the work is to develop a tool to allow the analysis of diverse fault cases and to perform coordination studies, as well as, to allow the analysis of the relay's performance in the face of a real event. © 2011 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Detecting misbehavior (such as transmissions of false information) in vehicular ad hoc networks (VANETs) is a very important problem with wide range of implications, including safety related and congestion avoidance applications. We discuss several limitations of existing misbehavior detection schemes (MDS) designed for VANETs. Most MDS are concerned with detection of malicious nodes. In most situations, vehicles would send wrong information because of selfish reasons of their owners, e.g. for gaining access to a particular lane. It is therefore more important to detect false information than to identify misbehaving nodes. We introduce the concept of data-centric misbehavior detection and propose algorithms which detect false alert messages and misbehaving nodes by observing their actions after sending out the alert messages. With the data-centric MDS, each node can decide whether an information received is correct or false. The decision is based on the consistency of recent messages and new alerts with reported and estimated vehicle positions. No voting or majority decisions is needed, making our MDS resilient to Sybil attacks. After misbehavior is detected, we do not revoke all the secret credentials of misbehaving nodes, as done in most schemes. Instead, we impose fines on misbehaving nodes (administered by the certification authority), discouraging them to act selfishly. This reduces the computation and communication costs involved in revoking all the secret credentials of misbehaving nodes. © 2011 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This publication summarizes the "Report on application of the Brasilia Declaration and the Regional Strategy for the Implementation in Latin America and the Caribbean of the Madrid International Plan of Action on Ageing", which will be presented at the Third Regional Intergovernmental Conference on Ageing in Latin America and the Caribbean, to be held in San José from 8 to 11 May 2012.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Every port is unique. Although all ports exist for the same basic purpose (to act as an interface in the transfer from one mode of transport to another), no two are ever organized in the same way.Ports may be classified according to: Physical conditions: location (geographical position, man-made or natural harbour, estuary location, difficult weather conditions, tides, etc.) and size (large, small or medium-sized). Use: commercial (general cargo, bulk solids, bulk liquids, oil, break bulk, mixed), passenger, sport and leisure, fishing, mixed, etc. Ownership: private, municipal, regional or State-owned. The Port Authority's role in management of the port: Overall control, i.e. the Port Authority plans, sets up and operates the whole range of services. Facilitator, i.e. the Port Authority plans and sets up the infrastructure and the superstructure, but services are provided by private companies. Landlord, i.e. the Port Authority allows private companies to be responsible for the superstructure and provide port services. Different combinations of port types will therefore give rise to different kinds of organization and different information flows, which means that the associated information systems may differ significantly from port to port. Since this paper relates to the port of Barcelona, with its own specific characteristics, the contents may not always be applicable to other ports.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This report pursues three complementary aims. Firstly, it presents the first generation of country case studies on social protection systems in Latin America and the Caribbean, published in the ECLAC Project Documents collection; and it provides justifications for developing such systems. Secondly, it sets out a classificatory approach to social protection system in the region, which aims to provide a comparative basis for interpreting national cases. Lastly, using standardized data and case studies, it identifies major trends in the changes the region is undergoing in terms of social protection.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study investigated the effect of a calcium lactate pre-rinse on sodium fluoride protection in an in vitro erosion-remineralization model simulating two different salivary flow rates. Enamel and dentin specimens were randomly assigned to 6 groups (n = 8), according to the combination between rinse treatments - deionized water (DIW), 12 mm NaF (NaF) or 150 mm calcium lactate followed by NaF (CaL + NaF) and unstimulated salivary flow rates - 0.5 or 0.05 ml/min simulating normal and low salivary flow rates, respectively. The specimens were placed into custom-made devices, creating a sealed chamber on the specimen surface connected to a peristaltic pump. Citric acid was injected into the chamber for 2 min, followed by artificial saliva (0.5 or 0.05 ml/min) for 60 min. This cycle was repeated 4x/day for 3 days. Rinse treatments were performed daily 30 min after the 1st and 4th erosive challenges, for 1 min each time. Surface loss was determined by optical profilometry. KOH-soluble fluoride and structurally bound fluoride were determined in specimens at the end of the experiment. Data were analyzed by 2-way ANOVA and Tukey tests (alpha = 0.05). NaF and CaL + NaF exhibited significantly lower enamel and dentin loss than DIW, with no difference between them for normal flow conditions. The low salivary flow rate increased enamel and dentin loss, except for CaL + NaF, which presented overall higher KOH-soluble and structurally bound fluoride levels. The results suggest that the NaF rinse was able to reduce erosion progression. Although the CaL prerinse considerably increased F availability, it enhanced NaF protection against dentin erosion only under hyposalivatory conditions. (C) 2014 S. Karger AG, Basel

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Introduction: Authority records interchange requires establishing and using metadata standards, such as MARC 21 Format for Authority Data, format used by several cataloging agencies, and Metadata Authority Description Schema (MADS), that has received little attention and it is a little widespread standard among agencies. Purpose: Presenting an introductory study about Metadata Authority Description Schema (MADS). Methodology: Descriptive and exploratory bibliographic research. Results: The paper address the MADS creation context, its goals and its structure and key issues related to conversion of records from MARC 21 to MADS. Conclusions: The study concludes that, despite its limitations, MADS might be used to create simple authority records in Web environment and beyond libraries context.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study aimed to assess measurements of temperature and relative humidity obtained with HOBO a data logger, under various conditions of exposure to solar radiation, comparing them with those obtained through the use of a temperature/relative humidity probe and a copper-constantan thermocouple psychrometer, which are considered the standards for obtaining such measurements. Data were collected over a 6-day period (from 25 March to 1 April, 2010), during which the equipment was monitored continuously and simultaneously. We employed the following combinations of equipment and conditions: a HOBO data logger in full sunlight; a HOBO data logger shielded within a white plastic cup with windows for air circulation; a HOBO data logger shielded within a gill-type shelter (multi-plate prototype plastic); a copper-constantan thermocouple psychrometer exposed to natural ventilation and protected from sunlight; and a temperature/relative humidity probe under a commercial, multi-plate radiation shield. Comparisons between the measurements obtained with the various devices were made on the basis of statistical indicators: linear regression, with coefficient of determination; index of agreement; maximum absolute error; and mean absolute error. The prototype multi-plate shelter (gill-type) used in order to protect the HOBO data logger was found to provide the best protection against the effects of solar radiation on measurements of temperature and relative humidity. The precision and accuracy of a device that measures temperature and relative humidity depend on an efficient shelter that minimizes the interference caused by solar radiation, thereby avoiding erroneous analysis of the data obtained.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wavelength-routed networks (WRN) are very promising candidates for next-generation Internet and telecommunication backbones. In such a network, optical-layer protection is of paramount importance due to the risk of losing large amounts of data under a failure. To protect the network against this risk, service providers usually provide a pair of risk-independent working and protection paths for each optical connection. However, the investment made for the optical-layer protection increases network cost. To reduce the capital expenditure, service providers need to efficiently utilize their network resources. Among all the existing approaches, shared-path protection has proven to be practical and cost-efficient [1]. In shared-path protection, several protection paths can share a wavelength on a fiber link if their working paths are risk-independent. In real-world networks, provisioning is usually implemented without the knowledge of future network resource utilization status. As the network changes with the addition and deletion of connections, the network utilization will become sub-optimal. Reconfiguration, which is referred to as the method of re-provisioning the existing connections, is an attractive solution to fill in the gap between the current network utilization and its optimal value [2]. In this paper, we propose a new shared-protection-path reconfiguration approach. Unlike some of previous reconfiguration approaches that alter the working paths, our approach only changes protection paths, and hence does not interfere with the ongoing services on the working paths, and is therefore risk-free. Previous studies have verified the benefits arising from the reconfiguration of existing connections [2] [3] [4]. Most of them are aimed at minimizing the total used wavelength-links or ports. However, this objective does not directly relate to cost saving because minimizing the total network resource consumption does not necessarily maximize the capability of accommodating future connections. As a result, service providers may still need to pay for early network upgrades. Alternatively, our proposed shared-protection-path reconfiguration approach is based on a load-balancing objective, which minimizes the network load distribution vector (LDV, see Section 2). This new objective is designed to postpone network upgrades, thus bringing extra cost savings to service providers. In other words, by using the new objective, service providers can establish as many connections as possible before network upgrades, resulting in increased revenue. We develop a heuristic load-balancing (LB) reconfiguration approach based on this new objective and compare its performance with an approach previously introduced in [2] and [4], whose objective is minimizing the total network resource consumption.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Disease transmission between wildlife and livestock is a worldwide issue. Society needs better methods to prevent interspecies transmission to reduce disease risks. Producers have successfully used livestock protection dogs (LPDs) for thousands of years to reduce predation. We theorized that LPDs raised and bonded with cattle could be used to also reduce risk of bovine tuberculosis (Myobacterium bovis; TB) transmission between white-tailed deer (Odocoileus virginianus) and cattle by minimizing contact between the 2 species and use of cattle feed by deer. We evaluated 4 LPDs over 5 months, utilizing 2 data collection methods (direct observation and motion-activated video) on deer farms that supported higher densities than wild populations. Dogs were highly effective in preventing deer from using concentrated cattle feed (hay bales), likely the greatest risk factor of TB transmission on farms. Dogs also prevented deer from approaching cattle in core areas of pastures (near hay bales) and were very effective throughout pastures. Our research supports the theory that LPDs, specifically trained to remain with cattle, may be a practical tool to minimize potential for livestock to contract TB from infected deer in small-scale cattle operations. Where disease is present in deer, it may be possible to reduce the potential for disease transmission by employing LPDs.