854 resultados para Standards, Military


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Les poissons vivant au sein d’une rivière sont soumis à des variations circadiennes de température pouvant influencer la croissance, la digestion et le métabolisme standard. Les modèles bioénergétiques utilisant les fonctions métaboliques pour déterminer la croissance d’un poisson ont souvent été élaborés avec des poissons acclimatés à des températures constantes. Ces modèles pourraient sous-estimer l’énergie dépensée par un poisson soumis à des températures fluctuantes. En utilisant la respirométrie par débit intermittent, les objectifs de ce travail étaient : (1) de quantifier les différences entre les taux métaboliques standards de poissons acclimatés à une température constante (20.2 oC ± 0.5 oC) et à des fluctuations circadiennes de température (19.8 oC ± 2.0 oC; 19.5 oC ± 3.0 oC) et (2) comparer deux méthodologies pour calculer les taux métaboliques standards de poissons sujets aux fluctuations circadiennes de températures : respirométrie (a) en température constante ou (b) en température fluctuante. Les poissons acclimatés à des fluctuations circadiennes de température ont des taux métaboliques standards plus élevés que des poissons acclimatés à une température constante. À 20.2 oC ± 0.5 oC, les taux métabolique standards ont été de 25% à 32% plus bas pour des poissons maintenus à une température constante que pour des poissons gardés sous des fluctuations circadiennes de température. Les méthodologies utilisées pour estimer les taux métaboliques standards de poissons sujets aux fluctuations de température offrent des résultats similaires.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The article discusses the present status of weblogs and examines whether legal standards applicable to traditional press and media should be applied to that specific forum. The analysis is based on two key documents: the Draft Report on the concentration and pluralism in the media in European Union (2007/2253(INI)) of the European Parliament Committee on Culture and Education presented in March 2008 and a landmark decision of the Polish Supreme Court from July 26, 2007 (IV KK 174/07) in the light of present judicial tendency in other European countries. The first of the mentioned documents calls for the “clarification of the legal status of different categories of weblog authors and publishers as well as disclosure of interests and voluntary labelling of weblogs”. It emphasizes that the “undetermined and unindicated status of authors and publishers of weblogs causes uncertainties regarding impartiality, reliability, source protection, applicability of ethical codes and the assignment of liability in the event of lawsuits”. The position of the European Parliament, expressed in the document, raises serious questions on the limits of freedom of thought and speech on the Internet and on the degree of acceptable state control. A recent Polish Supreme Court decision, which caused quite a stir in the Polish Internet community, seems to head in the very direction recommended by the EP Culture Committee. In a case of two editors of a web journal (“czasopismo internetowe”) called “Szyciepoprzemysku”, available on-line, accused of publishing a journal without the proper registration, the Polish Supreme Court stated that “journals and periodicals do not lose the character of a press release due solely to the fact that they appear in the form of an  Internet transmission”, and that ‘’the publishing of press in an electronic form, available on the Internet, requires  registration”. The decision was most surprising, as prior lower courts decisions declined the possibility to register Internet periodicals. The accused were acquitted in the name of the constitutional principle of the rule of law (art. 7 of the Polish Constitution) and the ensuing obligation to protect the trust of a citizen to the state (a conviction in this case would break the collateral estoppel rule), however the decision quickly awoke media frenzy and raised the fear of a need to register all websites that were regularly updated. The spokesman of the Polish Supreme Court later explained that the sentence of the Court was not intended to cause a mass registration of all Internet “periodicals” and that neither weblogs nor Internet sites, that were regularly updated, needed registration. Such an interpretation of the Polish press law did not appear clear based only on the original text of the judgment and the decision as such still raises serious practical questions. The article aims to examine the status of Internet logs as press and seeks the compromise between the concerns expressed by European authorities and the freedom of thought and speech exercised on the Internet.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective: The goal of this study was to identify rates, characteristies, and predictors of mental health treatment seeking by military members with posttraumatic stress disorder (PTSD). Method: Our sample was drawn from the 2002 Canadian Community Health Survey-Canadian Forces Supplement (CCHS-CF) dataset. The CCHS-CF is the first epidemiologic survey of PTSD and other mental health conditions in the Canadian military and includes 8441 nationally representative Canadian Forces (CF) members. Of those, 549 who met the criteria for lifetime PTSD were included in our analyses. To identify treatment rates and characteristics, we examined frequency of treatment contact by professional and facility type. To identify predictors of treatment seeking, we conducted a binary logistic regression with lifetime treatment seeking as the outcome variable. Results: About two-thirds of those with PTSD consulted with a professional regarding mental health problems. The most frequently consulted professionals, during both the last year and lifetime, included social workers and counsellors, medical doctors and general practitioners, and psychiatrists. Consultations during the last year most often took place in a CF facility. Treatment seeking was predicted by cumulative lifetime trauma exposure, index traumatic event type, PTSD symptom interference, and comorbid major depressive disorder. Those with comorbid depression were 3.75 times more likely to have sought treatment than those without. Conclusions: Although a significant portion of military members with PTSD sought mental health treatment, 1 in 3 never did. Trauma-related and illness and (or) need factors predicted treatment seeking. Of all the predictors of treatment seeking, comorbid depression most increased the likelihood of seeking treatment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Article

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The emerging U.S. approach linking free trade to domestic labor protections is a practical framework on which to base substantive and procedural rights. Nevertheless, much more can be done in future agreements to improve these safeguards for workers in a way that will maximize the gains from trade and reduce the most harmful effects of development. In order to improve future agreements, the U.S. should expand access to consultations within the dispute resolution mechanism, focus complaints on core rights such as organization and bargaining, encourage the development of small independent unions in corporatist cultures, and incorporate the ILO into the dispute settlement process. Finally, the civil law systems of Central America and the Anglo-American common law system may have fundamentally different understandings of the rule of law. This difference in understanding may pose a significant disadvantage for developing or civil law systems entering treaties with the U.S., and should be better understood by both sides in order to maintain the credibility of the law and the effectiveness of the treaty.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A feasible way of implementing a temporal database is by mapping temporal data model onto a conventional data model followed by a commercial database management system. Even though extensions were proposed to standard SQL for supporting temporal databases, such proposals have not yet come across standardization processes. This paper attempts to implement database operators such as aggregates and universal quantifier for temporal databases, implemented on top of relational database systems, using currently available SQL standards.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

n the recent years protection of information in digital form is becoming more important. Image and video encryption has applications in various fields including Internet communications, multimedia systems, medical imaging, Tele-medicine and military communications. During storage as well as in transmission, the multimedia information is being exposed to unauthorized entities unless otherwise adequate security measures are built around the information system. There are many kinds of security threats during the transmission of vital classified information through insecure communication channels. Various encryption schemes are available today to deal with information security issues. Data encryption is widely used to protect sensitive data against the security threat in the form of “attack on confidentiality”. Secure transmission of information through insecure communication channels also requires encryption at the sending side and decryption at the receiving side. Encryption of large text message and image takes time before they can be transmitted, causing considerable delay in successive transmission of information in real-time. In order to minimize the latency, efficient encryption algorithms are needed. An encryption procedure with adequate security and high throughput is sought in multimedia encryption applications. Traditional symmetric key block ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are not efficient when the data size is large. With the availability of fast computing tools and communication networks at relatively lower costs today, these encryption standards appear to be not as fast as one would like. High throughput encryption and decryption are becoming increasingly important in the area of high-speed networking. Fast encryption algorithms are needed in these days for high-speed secure communication of multimedia data. It has been shown that public key algorithms are not a substitute for symmetric-key algorithms. Public key algorithms are slow, whereas symmetric key algorithms generally run much faster. Also, public key systems are vulnerable to chosen plaintext attack. In this research work, a fast symmetric key encryption scheme, entitled “Matrix Array Symmetric Key (MASK) encryption” based on matrix and array manipulations has been conceived and developed. Fast conversion has been achieved with the use of matrix table look-up substitution, array based transposition and circular shift operations that are performed in the algorithm. MASK encryption is a new concept in symmetric key cryptography. It employs matrix and array manipulation technique using secret information and data values. It is a block cipher operated on plain text message (or image) blocks of 128 bits using a secret key of size 128 bits producing cipher text message (or cipher image) blocks of the same size. This cipher has two advantages over traditional ciphers. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the key avalanche effect produced in the ciphertext output is better than that of AES.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work presents a triple-mode sigma-delta modulator for three wireless standards namely GSM/WCDMA and Bluetooth. A reconfigurable ADC has been used to meet the wide bandwidth and high dynamic range requirements of the multi-standard receivers with less power consumption. A highly linear sigma-delta ADC which has reduced sensitivity to circuit imperfections has been chosen in our design. This is particularly suitable for wide band applications where the oversampling ratio is low. Simulation results indicate that the modulator achieves a peak SNDR of 84/68/68 dB over a bandwidth of 0.2/3.84/1.5 MHz with an oversampling ratio 128/8/8 in GSM/WCDMA/Bluetooth modes respectively

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The article examines the commodity chain trap of marine fishery in Kerala, at both material and value terms, and its ramifications in the globalised fishery chains. The marketing chains both material and value, are very complex in nature since they involve many types of markets and large number of intermediaries and participants. The article also scrutinizes the sensitivity of consumers’ and country’s responses in terms of dietary and hygienic standards relating to seafood trade. In addition, it discusses the devastating effect about the recent stipulations like the US Bio- Terrorism Act and Shrimp anti-dumping duty on the Kerala fishery products

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Each player in the financial industry, each bank, stock exchange, government agency, or insurance company operates its own financial information system or systems. By its very nature, financial information, like the money that it represents, changes hands. Therefore the interoperation of financial information systems is the cornerstone of the financial services they support. E-services frameworks such as web services are an unprecedented opportunity for the flexible interoperation of financial systems. Naturally the critical economic role and the complexity of financial information led to the development of various standards. Yet standards alone are not the panacea: different groups of players use different standards or different interpretations of the same standard. We believe that the solution lies in the convergence of flexible E-services such as web-services and semantically rich meta-data as promised by the semantic Web; then a mediation architecture can be used for the documentation, identification, and resolution of semantic conflicts arising from the interoperation of heterogeneous financial services. In this paper we illustrate the nature of the problem in the Electronic Bill Presentment and Payment (EBPP) industry and the viability of the solution we propose. We describe and analyze the integration of services using four different formats: the IFX, OFX and SWIFT standards, and an example proprietary format. To accomplish this integration we use the COntext INterchange (COIN) framework. The COIN architecture leverages a model of sources and receivers’ contexts in reference to a rich domain model or ontology for the description and resolution of semantic heterogeneity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Este artículo muestra cómo con bajo coste y riesgo se puede desarrollar un sistema de planificación de viaje multimodal, basado en un enfoque de código abierto y estándares ‘de facto’. Se ha desarrollado completamente una solución de código abierto para un sistema de información de transporte público puerta a puerta basado en estándares ‘de facto’. El cálculo de rutas se realiza mediante Graphserver, mientras que la cartografía se basa en OpenStreetMap. También se ha demostrado cómo exportar una base de datos real de horarios de transporte público como la del operador ETM (Empresa de Transporte Metropolitano de València) a la especificación de Google Transit, para permitir el cálculo de rutas, tanto desde nuestro prototipo como desde Google Transit