908 resultados para Integration and security technologies


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The postwar development of the Intelligence Services in Japan has been based on two contrasting models: the centralized model of the USA and the collegiality of UK, neither of which has been fully developed. This has led to clashes of institutional competencies and poor anticipation of threats towards national security. This problem of opposing models has been partially overcome through two dimensions: externally through the cooperation with the US Intelligence Service under the Treaty of Mutual Cooperation and Security; and internally though the pre-eminence in the national sphere of the Department of Public Safety. However, the emergence of a new global communicative dimension requires that a communicative-viewing remodeling of this dual model is necessary due to the increasing capacity of the individual actors to determine the dynamics of international events. This article examines these challenges for the Intelligence Services of Japan and proposes a reform based on this new global communicative dimension.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

With growing demand for liquefied natural gas (LNG) and liquid transportation fuels, and concerns about climate change and causes of greenhouse gas emissions, this master’s thesis introduces a new value chain design for LNG and transportation fuels and respective fundamental business cases based on hybrid PV-Wind power plants. The value chains are composed of renewable electricity (RE) converted by power-to-gas (PtG), gas-to-liquids (GtL) or power-to-liquids (PtL) facilities into SNG (which is finally liquefied into LNG) or synthetic liquid fuels, mainly diesel, respectively. The RE-LNG or RE-diesel are drop-in fuels to the current energy system and can be traded everywhere in the world. The calculations for the hybrid PV-Wind power plants, electrolysis, methanation (H2tSNG), hydrogen-to-liquids (H2tL), GtL and LNG value chain are performed based on both annual full load hours (FLh) and hourly analysis. Results show that the proposed RE-LNG produced in Patagonia, as the study case, is competitive with conventional LNG in Japan for crude oil prices within a minimum price range of about 87 - 145 USD/barrel (20 – 26 USD/MBtu of LNG production cost) and the proposed RE-diesel is competitive with conventional diesel in the European Union (EU) for crude oil prices within a minimum price range of about 79 - 135 USD/barrel (0.44 – 0.75 €/l of diesel production cost), depending on the chosen specific value chain and assumptions for cost of capital, available oxygen sales and CO2 emission costs. RE-LNG or RE-diesel could become competitive with conventional fuels from an economic perspective, while removing environmental concerns. The RE-PtX value chain needs to be located at the best complementing solar and wind sites in the world combined with a de-risking strategy. This could be an opportunity for many countries to satisfy their fuel demand locally. It is also a specific business case for countries with excellent solar and wind resources to export carbon-neutral hydrocarbons, when the decrease in production cost is considerably more than the shipping cost. This is a unique opportunity to export carbon-neutral hydrocarbons around the world where the environmental limitations on conventional hydrocarbons are getting tighter.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This book presents research in the field of Geophysics, particularly referring to principles, applications and emerging technologies. Table of Contents: Preface pp. i-xxi Environmental Geophysics: Techniques, advantages and limitations (Pantelis Soupios and Eleni Kokinou, Department of Environmental and Natural Resources Engineering, Technological Educational Institute of Crete, Dynamics of the Ocean Floor, Helmholtz Centre for Ocean Research Kiel, Geomar)pp i-xxi Application of Innovative Geophysical Techniques in Coastal Areas (V. Di Fiore, M. Punzo, D. Tarallo, and G. Cavuoto, Institute for Marine Coastal Environment, National Research Council, Naples)pp. i-xxi Marine Geophysics of the Naples Bay (Southern Tyrrhenian sea, Italy): Principles, Applications and Emerging Technologies (Gemma Aiello and Ennio Marsella, Institute for Marine Coastal Environment, National Research Council, Naples)pp. i-xxi Oceanic Oscillation Phenomena: Relation to Synchronization and Stochastic Resonance (Shinya Shimokawa and Tomonori Matsuura, National Research Institute for Earth Science and Disaster Prevention, Univ. of Toyama)pp. i-xxi Assessment of ocean variability in the Sicily Channel from a numerical three-dimensional model using EOFs decomposition (R. Sorgente, A. Olita, A.F. Drago, A. Ribotti, L. Fazioli, and C. Tedesco, Institute for Marine Coastal Environment, National Research Council, Oristano)pp. i-xxi Monitoring Test of Crack Opening in Volcanic Tuff (Coroglio Cliff. Italy) Using Distributed Optical Fiber Sensor (A. Minardo, A. Coscetta, M. Caccavale, G. Esposito, F. Matano, M. Sacchi, R. Somma, G. Zeni, and L. Zeni, Department of Industrial and Information Eng., Second University of Naples Aversa, Institute for Marine Coastal Environment, National Research Council Naples, National Institute for Geophysics and Volcanology, Osservatorio Vesuviano Naples, Institute for Electromagnetic Sensing of the Environment, National Research Council Naples)pp. i-xxi

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The traditional process of filling the medicine trays and dispensing the medicines to the patients in the hospitals is manually done by reading the printed paper medicine chart. This process can be very strenuous and error-prone, given the number of sub-tasks involved in the entire workflow and the dynamic nature of the work environment. Therefore, efforts are being made to digitalise the medication dispensation process by introducing a mobile application called Smart Dosing application. The introduction of the Smart Dosing application into hospital workflow raises security concerns and calls for security requirement analysis. This thesis is written as a part of the smart medication management project at Embedded Systems Laboratory, A° bo Akademi University. The project aims at digitising the medicine dispensation process by integrating information from various health systems, and making them available through the Smart Dosing application. This application is intended to be used on a tablet computer which will be incorporated on the medicine tray. The smart medication management system include the medicine tray, the tablet device, and the medicine cups with the cup holders. Introducing the Smart Dosing application should not interfere with the existing process carried out by the nurses, and it should result in minimum modifications to the tray design and the workflow. The re-designing of the tray would include integrating the device running the application into the tray in a manner that the users find it convenient and make less errors while using it. The main objective of this thesis is to enhance the security of the hospital medicine dispensation process by ensuring the security of the Smart Dosing application at various levels. The methods used for writing this thesis was to analyse how the tray design, and the application user interface design can help prevent errors and what secure technology choices have to be made before starting the development of the next prototype of the Smart Dosing application. The thesis first understands the context of the use of the application, the end-users and their needs, and the errors made in everyday medication dispensation workflow by continuous discussions with the nursing researchers. The thesis then gains insight to the vulnerabilities, threats and risks of using mobile application in hospital medication dispensation process. The resulting list of security requirements was made by analysing the previously built prototype of the Smart Dosing application, continuous interactive discussions with the nursing researchers, and an exhaustive stateof- the-art study on security risks of using mobile applications in hospital context. The thesis also uses Octave Allegro method to make the readers understand the likelihood and impact of threats, and what steps should be taken to prevent or fix them. The security requirements obtained, as a result, are a starting point for the developers of the next iteration of the prototype for the Smart Dosing application.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This is a long-term study of the use of information and communication technologies by 30 older adults (ages 70–97) living in a large retirement community. The study spanned the years of 1996 to 2008, during which time the research participants grappled with the challenges of computer use while aging 12 years. The researcher, herself a ‘mature learner,’ used a qualitative research design which included observations and open-ended interviews. Using a strategy of “intermittent immersion,” she spent an average of two weeks per visit on site and participated in the lives of the research population in numerous ways, including service as their computer tutor. With e-mail and telephone contact, she was able to continue her interactions with participants throughout the 12-year period. A long-term perspective afforded the view of the evolution, devolution or cessation of the technology use by these older adults, and this process is chronicled in detail through five individual “profiles.” Three research questions dominated the inquiry: What function do computers serve in the lives of older adults? Does computer use foster or interfere with social ties? Is social support necessary for success in the face of challenging learning tasks? In answer to the first question, it became clear that computers were valued as a symbol of competence and intelligence. Some individuals brought their computers with them when transferred to the single-room residences of assisted living or nursing care facilities. Even when use had ceased, their computers were displayed to signal that their owners were or had once been keeping up to date. In answer to the second question, computer owners socialized around computing use (with in-person family members or friends) more than, or as much as, they socialized through their computers in the digital realm of the Internet. And in answer to the third question, while the existence of social support did facilitate computer exploration, more important was the social support network generated and developed among fellow computer users.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The growing research in vehicular network solutions provided the rise of interaction in these highly dynamic environments in the market. The developed architectures do not usually focus, however, in security aspects. Common security strategies designed for the Internet require IP. Since nodes' addresses in a vehicular network are too dynamic, such solutions would require cumbersome negotiations, which would make them unsuitable to these environments. The objective of this dissertation is to develop, and test a scalable, lightweight, layer 3 security protocol for vehicular networks, in which nodes of the network are able to set up long-term security associations with a Home Network, avoiding session renegotiations due to lack of connectivity and reduce the protocol stacking. This protocol allows to provide security independent of the nodes (vehicles) position, of its addressing and of the established path to access the Internet, allowing the mobility of vehicles and of its active sessions seamlessly without communication failures.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Problem This dissertation presents a literature-based framework for communication in science (with the elements partners, purposes, message, and channel), which it then applies in and amends through an empirical study of how geoscientists use two social computing technologies (SCTs), blogging and Twitter (both general use and tweeting from conferences). How are these technologies used and what value do scientists derive from them? Method The empirical part used a two-pronged qualitative study, using (1) purposive samples of ~400 blog posts and ~1000 tweets and (2) a purposive sample of 8 geoscientist interviews. Blog posts, tweets, and interviews were coded using the framework, adding new codes as needed. The results were aggregated into 8 geoscientist case studies, and general patterns were derived through cross-case analysis. Results A detailed picture of how geoscientists use blogs and twitter emerged, including a number of new functions not served by traditional channels. Some highlights: Geoscientists use SCTs for communication among themselves as well as with the public. Blogs serve persuasion and personal knowledge management; Twitter often amplifies the signal of traditional communications such as journal articles. Blogs include tutorials for peers, reviews of basic science concepts, and book reviews. Twitter includes links to readings, requests for assistance, and discussions of politics and religion. Twitter at conferences provides live coverage of sessions. Conclusions Both blogs and Twitter are routine parts of scientists' communication toolbox, blogs for in-depth, well-prepared essays, Twitter for faster and broader interactions. Both have important roles in supporting community building, mentoring, and learning and teaching. The Framework of Communication in Science was a useful tool in studying these two SCTs in this domain. The results should encourage science administrators to facilitate SCT use of scientists in their organization and information providers to search SCT documents as an important source of information.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Multimorbidity patients pose severe challenges to which information and communication technology (ICT) can help patients and doctors to answer with effective and efficient care.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The traditional process of filling the medicine trays and dispensing the medicines to the patients in the hospitals is manually done by reading the printed paper medicinechart. This process can be very strenuous and error-prone, given the number of sub-tasksinvolved in the entire workflow and the dynamic nature of the work environment.Therefore, efforts are being made to digitalise the medication dispensation process byintroducing a mobile application called Smart Dosing application. The introduction ofthe Smart Dosing application into hospital workflow raises security concerns and callsfor security requirement analysis. This thesis is written as a part of the smart medication management project at EmbeddedSystems Laboratory, A˚bo Akademi University. The project aims at digitising the medicine dispensation process by integrating information from various health systems, and making them available through the Smart Dosing application. This application is intended to be used on a tablet computer which will be incorporated on the medicine tray. The smart medication management system include the medicine tray, the tablet device, and the medicine cups with the cup holders. Introducing the Smart Dosing application should not interfere with the existing process carried out by the nurses, and it should result in minimum modifications to the tray design and the workflow. The re-designing of the tray would include integrating the device running the application into the tray in a manner that the users find it convenient and make less errors while using it. The main objective of this thesis is to enhance the security of the hospital medicine dispensation process by ensuring the security of the Smart Dosing application at various levels. The methods used for writing this thesis was to analyse how the tray design, and the application user interface design can help prevent errors and what secure technology choices have to be made before starting the development of the next prototype of the Smart Dosing application. The thesis first understands the context of the use of the application, the end-users and their needs, and the errors made in everyday medication dispensation workflow by continuous discussions with the nursing researchers. The thesis then gains insight to the vulnerabilities, threats and risks of using mobile application in hospital medication dispensation process. The resulting list of security requirements was made by analysing the previously built prototype of the Smart Dosing application, continuous interactive discussions with the nursing researchers, and an exhaustive state-of-the-art study on security risks of using mobile applications in hospital context. The thesis also uses Octave Allegro method to make the readers understand the likelihood and impact of threats, and what steps should be taken to prevent or fix them. The security requirements obtained, as a result, are a starting point for the developers of the next iteration of the prototype for the Smart Dosing application.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Secure computation involves multiple parties computing a common function while keeping their inputs private, and is a growing field of cryptography due to its potential for maintaining privacy guarantees in real-world applications. However, current secure computation protocols are not yet efficient enough to be used in practice. We argue that this is due to much of the research effort being focused on generality rather than specificity. Namely, current research tends to focus on constructing and improving protocols for the strongest notions of security or for an arbitrary number of parties. However, in real-world deployments, these security notions are often too strong, or the number of parties running a protocol would be smaller. In this thesis we make several steps towards bridging the efficiency gap of secure computation by focusing on constructing efficient protocols for specific real-world settings and security models. In particular, we make the following four contributions: - We show an efficient (when amortized over multiple runs) maliciously secure two-party secure computation (2PC) protocol in the multiple-execution setting, where the same function is computed multiple times by the same pair of parties. - We improve the efficiency of 2PC protocols in the publicly verifiable covert security model, where a party can cheat with some probability but if it gets caught then the honest party obtains a certificate proving that the given party cheated. - We show how to optimize existing 2PC protocols when the function to be computed includes predicate checks on its inputs. - We demonstrate an efficient maliciously secure protocol in the three-party setting.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

La medición objetiva del movimiento humano y la cuantificación del gasto energético debido a la actividad física es una necesidad identificada tanto en investigación como en clínica. Los métodos de referencia validados y bien definidos (el agua doblemente marcada, la calorimetría directa, la calorimetría indirecta) son caros y prácticamente se limitan a la investigación en el laboratorio. Por lo tanto, en los últimos años, se han desarrollado diferentes dispositivos de medición objetiva que son apropiados para los estudios de campo y clínicos. No hay ningún estándar de oro entre ellos, ya que todos tienen limitaciones. Los podómetros son ligeros, poco costosos, cuentan los pasos y aportan información sobre la actividad física total, pero no sobre el comportamiento y los patrones de actividad física. Los acelerómetros son caros, aportan información sobre patrón, frecuencia e intensidad de la actividad física, pero no sobre el tipo de actividad física. Los podómetros y acelerómetros únicamente recogen información sobre el movimiento del movimiento corporal, pero la validez en la estimación del gasto energético es limitada. La monitorización de la frecuencia cardíaca relaciona intensidad del ejercicio con gasto de energía, pero no aporta información sobre la actividad física. Los dispositivos GPS son portátiles, relativamente asequibles, no invasivos y recogen distancia, velocidad y elevación con hora y lugar exactos, pero quizás estén limitados para la evaluación de movimientos cortos de alta intensidad y elevado gasto energético. Los dispositivos de última generación combinan acelerometría con la medición de variables fisiológicas, comparten las ventajas de los dispositivos individuales y son más precisos. Para el cálculo del gasto energético se aplican algoritmos específicos de la actividad incluidos en el software del fabricante que pueden afectar a los resultados. La mayoría de los dispositivos estiman con mayor precisión el gasto energético a intensidades ligeras y moderadas, pero subestiman el gasto a intensidades muy ligeras y de mayor intensidad.