971 resultados para security protocols
Resumo:
In this paper we analyze the effects of social security policies in an unfunded, earnings-related social security system on the incentives to education investment and voluntary retirement, on growth and on income inequality. Growth is endogenously driven by human capital investment, individuals differ in their innate (learning) ability at birth, and the pension scheme includes a minimum pension. More skilled individuals spend more on education, minimum pensions reduce low skill individuals' incentives to invest in human capital, there is no monotonic relationship between per capita growth and income inequality.
Resumo:
Revised: 2006-11.-- Published as an article in: Journal of Public Economics 90(12), December, 2006, pp. 2323-2349.
Resumo:
(Document pdf contains 193 pages) Executive Summary (pdf, < 0.1 Mb) 1. Introduction (pdf, 0.2 Mb) 1.1 Data sharing, international boundaries and large marine ecosystems 2. Objectives (pdf, 0.3 Mb) 3. Background (pdf, < 0.1 Mb) 3.1 North Pacific Ecosystem Metadatabase 3.2 First federation effort: NPEM and the Korea Oceanographic Data Center 3.2 Continuing effort: Adding Japan’s Marine Information Research Center 4. Metadata Standards (pdf, < 0.1 Mb) 4.1 Directory Interchange Format 4.2 Ecological Metadata Language 4.3 Dublin Core 4.3.1. Elements of DC 4.4 Federal Geographic Data Committee 4.5 The ISO 19115 Metadata Standard 4.6 Metadata stylesheets 4.7 Crosswalks 4.8 Tools for creating metadata 5. Communication Protocols (pdf, < 0.1 Mb) 5.1 Z39.50 5.1.1. What does Z39.50 do? 5.1.2. Isite 6. Clearinghouses (pdf, < 0.1 Mb) 7. Methodology (pdf, 0.2 Mb) 7.1 FGDC metadata 7.1.1. Main sections 7.1.2. Supporting sections 7.1.3. Metadata validation 7.2 Getting a copy of Isite 7.3 NSDI Clearinghouse 8. Server Configuration and Technical Issues (pdf, 0.4 Mb) 8.1 Hardware recommendations 8.2 Operating system – Red Hat Linux Fedora 8.3 Web services – Apache HTTP Server version 2.2.3 8.4 Create and validate FGDC-compliant Metadata in XML format 8.5 Obtaining, installing and configuring Isite for UNIX/Linux 8.5.1. Download the appropriate Isite software 8.5.2. Untar the file 8.5.3. Name your database 8.5.4. The zserver.ini file 8.5.5. The sapi.ini file 8.5.6. Indexing metadata 8.5.7. Start the Clearinghouse Server process 8.5.8. Testing the zserver installation 8.6 Registering with NSDI Clearinghouse 8.7 Security issues 9. Search Tutorial and Examples (pdf, 1 Mb) 9.1 Legacy NSDI Clearinghouse search interface 9.2 New GeoNetwork search interface 10. Challenges (pdf, < 0.1 Mb) 11. Emerging Standards (pdf, < 0.1 Mb) 12. Future Activity (pdf, < 0.1 Mb) 13. Acknowledgments (pdf, < 0.1 Mb) 14. References (pdf, < 0.1 Mb) 15. Acronyms (pdf, < 0.1 Mb) 16. Appendices 16.1. KODC-NPEM meeting agendas and minutes (pdf, < 0.1 Mb) 16.1.1. Seattle meeting agenda, August 22–23, 2005 16.1.2. Seattle meeting minutes, August 22–23, 2005 16.1.3. Busan meeting agenda, October 10–11, 2005 16.1.4. Busan meeting minutes, October 10–11, 2005 16.2. MIRC-NPEM meeting agendas and minutes (pdf, < 0.1 Mb) 16.2.1. Seattle Meeting agenda, August 14-15, 2006 16.2.2. Seattle meeting minutes, August 14–15, 2006 16.2.3. Tokyo meeting agenda, October 19–20, 2006 16.2.4. Tokyo, meeting minutes, October 19–20, 2006 16.3. XML stylesheet conversion crosswalks (pdf, < 0.1 Mb) 16.3.1. FGDCI to DIF stylesheet converter 16.3.2. DIF to FGDCI stylesheet converter 16.3.3. String-modified stylesheet 16.4. FGDC Metadata Standard (pdf, 0.1 Mb) 16.4.1. Overall structure 16.4.2. Section 1: Identification information 16.4.3. Section 2: Data quality information 16.4.4. Section 3: Spatial data organization information 16.4.5. Section 4: Spatial reference information 16.4.6. Section 5: Entity and attribute information 16.4.7. Section 6: Distribution information 16.4.8. Section 7: Metadata reference information 16.4.9. Sections 8, 9 and 10: Citation information, time period information, and contact information 16.5. Images of the Isite server directory structure and the files contained in each subdirectory after Isite installation (pdf, 0.2 Mb) 16.6 Listing of NPEM’s Isite configuration files (pdf, < 0.1 Mb) 16.6.1. zserver.ini 16.6.2. sapi.ini 16.7 Java program to extract records from the NPEM metadatabase and write one XML file for each record (pdf, < 0.1 Mb) 16.8 Java program to execute the metadata extraction program (pdf, < 0.1 Mb) A1 Addendum 1: Instructions for Isite for Windows (pdf, 0.6 Mb) A2 Addendum 2: Instructions for Isite for Windows ADHOST (pdf, 0.3 Mb)
Resumo:
The objectives of these Technical Guidelines are to provide a focus on small-scale fisheries and their current and potential role in contributing to poverty alleviation and food security by expanding on the guidance on small-scale fisheries offered by the Code. The Guidelines are complementary to existing Technical Guidelines for Responsible Fisheries. Most small-scale fishers are in developing countries and many live in communities characterized by poverty and food insecurity. Small-scale fishing communities are faced with an array of serious problems, including overexploitation and depletion of resources, lack of alternative sources of employment, rapid population growth, migration of populations, displacement in coastal areas due to industrial development and tourism, pollution and environmental degradation and conflicts with large commercial fishing operations. However, small-scale fisheries are critical for food security and poverty alleviation in many countries. The first part of the Guidelines discusses the current contribution, role and importance of small-scale fisheries in poverty alleviation and food security. It examines the importance of small-scale fisheries for poverty alleviation at a national, local and household level. It also notes the nutritional qualities of fish and thus the particular role of fish in nutritional aspects of food security. The fact that about half of all fish caught for human consumption comes from small-scale fisheries underlines the importance of this subsector for the world fish supply. In many countries small-scale fisheries contribute to national food security both directly – where fish is a crucial part of the daily diet, and indirectly – by generating foreign exchange earnings that enable the purchase through trade of a range of food products. The second part of the Guidelines explores ways through which the contribution of small-scale fisheries to poverty alleviation and food security could be enhanced. A vision for the future of small-scale fisheries is presented as a goal towards which the subsector should develop. Ensuring greater participation by small-scale fishers and their communities in the formulation of policies, the development of related legislation and regulations, and in management decision-making and implementation processes, is vital to the realization of this vision. The central role of effective fisheries management, the importance of considering cross sectoral uses of fisheries and related resources, the special role of women in fish marketing, processing and value addition, the significant scope for trade, the critical role that adequate financing may have in enabling transitions for effective fisheries management and the role of knowledge in making informed decisions are all discussed in these Guidelines. (PDF contains 97 pages)
Resumo:
One of the major concerns in an Intelligent Transportation System (ITS) scenario, such as that which may be found on a long-distance train service, is the provision of efficient communication services, satisfying users' expectations, and fulfilling even highly demanding application requirements, such as safety-oriented services. In an ITS scenario, it is common to have a significant amount of onboard devices that comprise a cluster of nodes (a mobile network) that demand connectivity to the outside networks. This demand has to be satisfied without service disruption. Consequently, the mobility of the mobile network has to be managed. Due to the nature of mobile networks, efficient and lightweight protocols are desired in the ITS context to ensure adequate service performance. However, the security is also a key factor in this scenario. Since the management of the mobility is essential for providing communications, the protocol for managing this mobility has to be protected. Furthermore, there are safety-oriented services in this scenario, so user application data should also be protected. Nevertheless, providing security is expensive in terms of efficiency. Based on this considerations, we have developed a solution for managing the network mobility for ITS scenarios: the NeMHIP protocol. This approach provides a secure management of network mobility in an efficient manner. In this article, we present this protocol and the strategy developed to maintain its security and efficiency in satisfactory levels. We also present the developed analytical models to analyze quantitatively the efficiency of the protocol. More specifically, we have developed models for assessing it in terms of signaling cost, which demonstrates that NeMHIP generates up to 73.47% less signaling compared to other relevant approaches. Therefore, the results obtained demonstrate that NeMHIP is the most efficient and secure solution for providing communications in mobile network scenarios such as in an ITS context.
Resumo:
Much of fish consumed by the poor are caught by household members and traded in local markets. These fish are rarely or poorly included in national statistics, and it is therefore difficult to estimate precisely the real contribution of fish to the rural poor households. This report is the first global overview of the role played by fish in improving nutrition. Fish consumption patterns of the poor, the nutritional value of fish, and small-scale fisheries and aquaculture activities are considered. It also highlights the gap in knowledge where more research is needed.
Resumo:
A Human Security Index (HIS) enumerating 200 countries was introduced in 2008. A community-level HSI is under development in the USA. Coastal communities face large disparities in components of human security. How can a HSI support improved policies/services (such as environmental or public health forecasts or warnings) for improving lives? Several issues are discussed. (PDF contains 4 pages)
Resumo:
The World Food Summit in its meeting in Rome in 1999 estimated that 790 million people in the developing world do not have enough food to eat. This is more than the total populations of North America and Europe combined. Nigeria is one of the developing countries affected by hunger, deprivation and abject poverty by its citizenry inspite of its enormous natural and human resources. To reduce poverty and increase food supplies to the masses the Federal Government of Nigeria embarked on a programmed-tagged National Special Programme for Food Security (NSPFS) in the year 2002. The programme's broad objectives are to attain food security in the broadest sense and alleviate rural poverty in Nigeria. One of the areas of the programme's intervention is in the aquaculture and inland fisheries development because Nigeria imported 681mt of fish in 2003 with a total cost of about N50 million. The paper assesses the socio-economic conditions of one of the selected water bodies (Yamama Lake) with a view to introducing community-based fisheries management plan for the rational exploitation and management of the fishery and other aquatic resources of the water body thereby increasing fish supply and improving the living standard of the fisherfolk in the area. Data were collected using Participatory Rural Appraisal (PRA) tools and questionnaire administration
Resumo:
Women, all over the world have contributed in various ways to the social, political and economic development of the Society. In fact, the World Resource Institute recognizes that "women have profound and preserve effect onn the well-being of their families, communities and local ecosystems" (Gamble and Well 1997:211). Women constitute more than 50 percent of the Agricultural (Fisheries being a sub sector), labour force. A study on Women in Fisheries showed that they participate in all aspects of the sector (capture, culture, processing, marketing research, training and Extension services). This paper reports the result of the study on women's contributions in the development of the Fisheries Industry particularly their roles in Fish Food Security, Poverty Alleviation and high rates of women's adoption of Fisheries technologies. The Case-study research methodology is used to study the "How" and "Why" Women's Contribution in Fish Food Security and Poverty Alleviation is at the index level recorded for the gender. The study made use of "Case Study" Research Instrument; documents, interview, artefacts, direct observation and archival records. The sampling techniques were purposive for research audiences and simple random for fisher-folks in the chosen locations. Analysed data showed among others that in Fisheries Research women occupy very important positions as Heads of Division/Section, Fisheries Liasion/Extension Officers and Fisheries Laboratory Chiefs etc. The paper also gave results of women production, processing, marketing and other services statistics; it also discusses the "whys" of women's low capacity in fisheries development of the nation and finally suggested ways in improving women's optimal capacity utilization in fisheries development
Resumo:
The notions about women been limited to producing children like rates alone; cooking for the family, restricted within the fenced compound without any meaningful contributions in fish food production was dispelled during the course of the study. From the data gathered, the study revealed various contributions of women as regard fish food production as about 2% of the women are involved in direct fishing as this enhance food security of the family and the society. Also women dominate the entire post harvest and marketing sector and 70% started fishing business with their personal savings.Also, some of the women own boats and other fishing inputs, which they do give to the fishermen that could catch the fish and sell it to them. This has a way of enhancing fish catch and fish food security of the people as those men that would have sit idle for lack of fishing gears are now meaningfully engaged courtesy of the women financiers. Finally, the study also revealed that 46% of the women between N2,5000 to above N4,000 from marketing of fish, and also utilizenthe income generated to enhance the welfare of the households in the area of food, clothing and paying their children school fees hence reducing the level of poverty of their households
Resumo:
Quantum computing offers powerful new techniques for speeding up the calculation of many classically intractable problems. Quantum algorithms can allow for the efficient simulation of physical systems, with applications to basic research, chemical modeling, and drug discovery; other algorithms have important implications for cryptography and internet security.
At the same time, building a quantum computer is a daunting task, requiring the coherent manipulation of systems with many quantum degrees of freedom while preventing environmental noise from interacting too strongly with the system. Fortunately, we know that, under reasonable assumptions, we can use the techniques of quantum error correction and fault tolerance to achieve an arbitrary reduction in the noise level.
In this thesis, we look at how additional information about the structure of noise, or "noise bias," can improve or alter the performance of techniques in quantum error correction and fault tolerance. In Chapter 2, we explore the possibility of designing certain quantum gates to be extremely robust with respect to errors in their operation. This naturally leads to structured noise where certain gates can be implemented in a protected manner, allowing the user to focus their protection on the noisier unprotected operations.
In Chapter 3, we examine how to tailor error-correcting codes and fault-tolerant quantum circuits in the presence of dephasing biased noise, where dephasing errors are far more common than bit-flip errors. By using an appropriately asymmetric code, we demonstrate the ability to improve the amount of error reduction and decrease the physical resources required for error correction.
In Chapter 4, we analyze a variety of protocols for distilling magic states, which enable universal quantum computation, in the presence of faulty Clifford operations. Here again there is a hierarchy of noise levels, with a fixed error rate for faulty gates, and a second rate for errors in the distilled states which decreases as the states are distilled to better quality. The interplay of of these different rates sets limits on the achievable distillation and how quickly states converge to that limit.