908 resultados para Integration and security technologies


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Library of the Institute of Alajuela made an induction experience and training of users and ventured into the information literacy and engaged in the work of the teaching-learning as an integral part of the curriculum. The actions of the library in developing search strategies, location, selection and use of information brought inthe health service, changes to the role of the library, the librarian, the book and the information in the educational environment.By sharing this experience is intended to provide information that can motivate staff of educational institutions that wish toenter the field of information literacy as a strategy to support the development oflifelong independent learning skills and meaningful learning. Currently, the library should be a proactive part in the education of students but also teachers, administrative and family.This will result in a benefit to Costa Rica: the development of youth and their proper integration into the workplace.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Integration, inclusion, and equity constitute fundamental dimensions of democracy in post-World War II societies and their institutions. The study presented here reports upon the ways in which individuals and institutions both use and account for the roles that technologies, including ICT, play in disabling and enabling access for learning in higher education for all. Technological innovations during the 20th and 21st centuries, including ICT, have been heralded as holding significant promise for revolutionizing issues of access in societal institutions like schools, healthcare services, etc. (at least in the global North). Taking a socially oriented perspective, the study presented in this paper focuses on an ethnographically framed analysis of two datasets that critically explores the role that technologies, including ICT, play in higher education for individuals who are “differently abled” and who constitute a variation on a continuum of capabilities. Functionality as a dimension of everyday life in higher education in the 21st century is explored through the analysis of (i) case studies of two “differently abled” students in Sweden and (ii) current support services at universities in Sweden. The findings make visible the work that institutions and their members do through analyses of the organization of time and space and the use of technologies in institutional settings against the backdrop of individuals’ accountings and life trajectories. This study also highlights the relevance of multi-scale data analyses for revisiting the ways in which identity positions become framed or understood within higher education.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Historical evidence shows that chemical, process, and Oil&Gas facilities where dangerous substances are stored or handled are target of deliberate malicious attacks (security attacks) aiming at interfering with normal operations. Physical attacks and cyber-attacks may generate events with consequences on people, property, and the surrounding environment that are comparable to those of major accidents caused by safety-related causes. The security aspects of these facilities are commonly addressed using Security Vulnerability/Risk Assessment (SVA/SRA) methodologies. Most of these methodologies are semi-quantitative and non-systematic approaches that strongly rely on expert judgment, leading to security assessments that are not reproducible. Moreover, they do not consider the synergies with the safety domain. The present 3-year research is aimed at filling the gap outlined by providing knowledge on security attacks, as well as rigorous and systematic methods supporting existing SVA/SRA studies suitable for the chemical, process, and Oil&Gas industry. The different nature of cyber and physical attacks resulted in the development of different methods for the two domains. The first part of the research was devoted to the development and statistical analysis of security databases that allowed to develop new knowledge and lessons learnt on security threats. Based on the obtained background, a Bow-Tie based procedure and two reverse-HazOp based methodologies were developed as hazard identification approaches for physical and cyber threats respectively. To support the quantitative estimation of the security risk, a quantitative procedure based on the Bayesian Network was developed allowing to calculate the probability of success of physical security attacks. All the developed methods have been applied to case studies addressing chemical, process and Oil&Gas facilities (offshore and onshore) proving the quality of the results that can be achieved in improving site security. Furthermore, the outcomes achieved allow to step forward in developing synergies and promoting integration among safety and security management.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Unauthorized accesses to digital contents are serious threats to international security and informatics. We propose an offline oblivious data distribution framework that preserves the sender's security and the receiver's privacy using tamper-proof smart cards. This framework provides persistent content protections from digital piracy and promises private content consumption.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The objective of the present study was to assess the influence of decortication of the posterior elements of the vertebra (recipient bed) and the nature of the bone graft (cortical or cancellous bone) on graft integration and bone, cartilage and fiber neoformation in the interface between the vertebral recipient bed and the bone graft. Seventy-two male Wistar rats were divided into four experimental groups according to the presence or absence of decortication of the posterior vertebral elements and the use of a cortical or cancellous bone graft. Group I-the posterior elements were decorticated and cancellous bone used. Group II-the posterior elements were decorticated and cortical graft was used. Group III-the posterior elements were not decorticated and cancellous graft was used. Group IV-the posterior elements were not decorticated and cortical graft was used. The animals were killed 3, 6 and 9 weeks after surgery and the interface between the posterior elements and the bone graft was subjected to histomorphometric evaluation. Mean percent neoformed bone was 40.8% in group I (decortication and cancellous graft), 39.13% in group II (decortication and cortical graft), 6.13% in group III (non-decorticated and cancellous graft), and 9.27% in group IV (non-decorticated and cortical graft) for animals killed at 3 weeks (P = 0.0005). For animals killed at 6 weeks, the mean percent was 38.53% for group I, 40.40% for group II, 10.27% for group III, and 7.6% for group IV (P = 0.0005), and for animals killed at 9 weeks, the mean was 25.93% for group I, 30.6% for group II, 16.4% for group III, and 18.73% for group IV (P = 0.0026). The mean percent neoformed cartilage tissue was 8.36% for group I, 7.46% for group II, 11.1% for group III, and 9.13% for group IV for the animals killed at 3 weeks (P = 0.6544); 6.6% for group I, 8.07% for group, 7.47% for group III and 6.13% for group IV (P = 0.4889) for animals killed at 6 weeks, and 3.13% for group I, 4.06% for group II, 10.53% for group III and 12.07% for group IV (P = 0.0006) for animals killed at 9 weeks. Mean percent neoformed fibrous tissue was 11% for group I, 6.13% for group II, 26.27% for group III and 21.87% for group IV for animals killed at 3 weeks (P = 0.0008); 7.67% for group I, 7.1% for group II, 9.8% for group III and 10.4% for group IV (P = 0.7880) for animals killed at 6 weeks, and 3.73% for group I, 4.4% for group II, 6.67% for group III and 6.8% for group IV (P = 0.0214) for animals killed at 9 weeks. The statistically significant differences in percent tissue formation were related to decortication of the posterior elements. The use of a cortical or cancellous graft did not influence tissue neoformation. Ossification in the interface of the recipient graft bed was of the intramembranous type in the decorticated animals and endochondral type in the non-decorticated animals.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The summit meeting between the two Korean heads of state, which took place in Pyongyang in June 2000, constitutes a major turning point in the peninsula's history. As the effects of the meeting are gradually unfolding, a period of detente no longer seems impossible. But major difficulties remain unsolved and Korea will continue to be one of the world's most volatile areas. The task of this essay is to identify and analyse some of the entrenched political patterns that will challenge policy-makers in the years ahead. To do so it is necessary to portray the conflict in Korea not only in conventional ideological and geopolitical terms, but also, and primarily, as a question of identity. From such a vantage-point two components are essential in the search for a more peaceful peninsula. Substantial progress has recently been made in the first realm, the need to approach security problems, no matter how volatile they seem. in a cooperative and dialogical, rather than merely a coercive manner. The second less accepted but perhaps more important factor, revolves around the necessity to recognize that dialogue has its limits, that the party on the other side of the DMZ cannot always be accommodated or subsumed into compromise. Needed is an ethics of difference: a willingness to accept that the other's sense of identity and politics may be inherently incompatible with one's own.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We examine the potential impact of interconnectivity of value chain partnerships through electronic means (e-business practices) on the management of Public Sector Agriculture R&D in Australia. We review the changing forms of managing research and development, the forces driving these changes, and R&D processes that are theoretically consistent with the move towards value chain involvement and the increase in active constituents in Public Sector Agriculture R&D. We then explore the potential of emerging e-business models to change the patterns of inter-connectivity, speed and omnipresence of partners in the value chain. Three e-business R&D management practices are identified that provide the prerequisite flexibility necessary to take advantage of opportunistic markets. These R&D business practices are: compressing R&D to reduce time to market, fostering co-development to enter a market at the last moment and building flexible products that allow adjustment at the last possible moment. Some fundamental reallocation of existing resources will be required to meet these markets. Implications of these e-business practices for R&D management are discussed.