862 resultados para cyber security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A system capable of deployment as a microwave security sensor which can automatically reject background clutter is presented. The principle of operation is based on analog homodyne detection using 1. Q single side-band down conversion of an AM backscattered modulating signal envelope. A demonstrator is presented which operates with a carrier frequency of 2 GHz and 500 KHz backscattered signal. When deployed in a multipath rich open plan office environment the S/N ratio obtained at the detection output was better than 20 dB at 20 in range with 20 dBm EIRP in a 2 MHz detection bandwidth despite the presence of time varying and static clutter. (C) 2009 Wiley Periodicals, Inc. Microwave Opt Technol Lett 51: 2492-2495, 2009; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/mop.24636

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report circumambulates around the environmental issue, examining mobilizations in favour of public access to the seafront and protest events against the recent devastating forest fires. By framing this discussion within existing scholarly contributions on related dimensions of the environmental issue (environmental consciousness, grassroots environmental contestation) in Southern Europe in general and Greece in particular, it suggests that the environmental mobilization dynamic in Greece has been infused with a new, global, mobilizing resource that offers new avenues to evaluate the potency of Greek civil society. Finally, the article discusses the results of the 2007 national elections and ponders the chances of political ecology becoming a permanent feature of Greek parliamentary politics.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The research examines the relationships between three common trust considerations (vendor, Internet and third parties) and attitudes towards online purchasing. The study incorporates privacy and security concerns as a moderating variable and finds that these relationships vary depending on the level of concerns a consumer has when purchasing online. The study suggests that "fears" surrounding the Internet as a place to do business still hinder the use of it for e-commerce purposes, but that the presence of a reputable agent might in some manner mitigate this risk. In the context of business to consumer relationships trust in the vendor is important for the consumer to accept any risk associated with a transaction. Theoretical implications for online customer behavior theory are also discussed. © 2009 Elsevier Inc.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the struggle to assert and consolidate its power, the Hamas movement of the Palestinian territories has devised several strategies for control. In recognition that control of security remains a key goal for any power-seeker, following its election victory in January 2006, Hamas entered into a fierce and ultimately successful conflict with Fatah for control of the Palestinian Authority Ministry of Interior and Palestinian Security Forces (PSF) in the Gaza Strip. One way in which Hamas was able to achieve this objective was through the creation of its own internal ‘police’ force called the Tanfithya (Executive Force or EF). This article details an anatomy of the EF and the implications of this force in terms of Hamas' confrontation with opponents and its attempts at governance. It also examines the extent to which the EF can be considered to be a model of Islamic policing and its impact on secular rivals in the Gaza Strip.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper investigates the application of complex wavelet transforms to the field of digital data hiding. Complex wavelets offer improved directional selectivity and shift invariance over their discretely sampled counterparts allowing for better adaptation of watermark distortions to the host media. Two methods of deriving visual models for the watermarking system are adapted to the complex wavelet transforms and their performances are compared. To produce improved capacity a spread transform embedding algorithm is devised, this combines the robustness of spread spectrum methods with the high capacity of quantization based methods. Using established information theoretic methods, limits of watermark capacity are derived that demonstrate the superiority of complex wavelets over discretely sampled wavelets. Finally results for the algorithm against commonly used attacks demonstrate its robustness and the improved performance offered by complex wavelet transforms.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The article suggests that while the report of the Independent Commission on Policing (ICP) provides a police reform blueprint for Northern Ireland and elsewhere, it can also be seen as an attempt to engage more elliptically with contemporary debates in security governance vis-a-vis the increasingly fragmented nature of late-modern policing and the role of the state. A decade into the reform process in Northern Ireland and in spite of the networked approach postulated by the ICP, the public police continue to enjoy a pre-eminent place and little evidence exists of any significant weakening of state steering and rowing of security. The discussion proposes a tentative typology explaining the continued colonization of security spaces by the State using constituent attendant processes of compartmentalizing, crowding out and corralling.