844 resultados para Network Architectures and Security


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Unipolar depression is among the leading cause of invalidity and disability-adjusted life-years. Many depressed patients do not respond to several antidepressant treatments. Several treatments have been investigated in resistant depression using electrical or magnetic stimulation of the brain. In this field, electroconvulsivotherapy remains to date the only treatment validated for efficacy and security. Novel neuromodulatory treatments used in neurological conditions are currently under investigation. Vagus nerve stimulation and deep brain stimulation may offer long-term efficacy and therefore justify expensive and highly specialized treatment programs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Due to the high cost of a large ATM network working up to full strength to apply our ideas about network management, i.e., dynamic virtual path (VP) management and fault restoration, we developed a distributed simulation platform for performing our experiments. This platform also had to be capable of other sorts of tests, such as connection admission control (CAC) algorithms, routing algorithms, and accounting and charging methods. The platform was posed as a very simple, event-oriented and scalable simulation. The main goal was the simulation of a working ATM backbone network with a potentially large number of nodes (hundreds). As research into control algorithms and low-level, or rather cell-level methods, was beyond the scope of this study, the simulation took place at a connection level, i.e., there was no real traffic of cells. The simulated network behaved like a real network accepting and rejecting SNMP ones, or experimental tools using the API node

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Most network operators have considered reducing LSR label spaces (number of labels used) as a way of simplifying management of underlaying virtual private networks (VPNs) and therefore reducing operational expenditure (OPEX). The IETF outlined the label merging feature in MPLS-allowing the configuration of multipoint-to-point connections (MP2P)-as a means of reducing label space in LSRs. We found two main drawbacks in this label space reduction a)it should be separately applied to a set of LSPs with the same egress LSR-which decreases the options for better reductions, and b)LSRs close to the edge of the network experience a greater label space reduction than those close to the core. The later implies that MP2P connections reduce the number of labels asymmetrically

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, different recovery methods applied at different network layers and time scales are used in order to enhance the network reliability. Each layer deploys its own fault management methods. However, current recovery methods are applied to only a specific layer. New protection schemes, based on the proposed partial disjoint path algorithm, are defined in order to avoid protection duplications in a multi-layer scenario. The new protection schemes also encompass shared segment backup computation and shared risk link group identification. A complete set of experiments proves the efficiency of the proposed methods in relation with previous ones, in terms of resources used to protect the network, the failure recovery time and the request rejection ratio

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The aim of this book is to survey on different Land Use Planning and safety approaches in vicinity of industrial plants. As this research is associated with three broad fields of Land Use Planning, safety and security, the set principle is to avoid unnecessary and over detailed information, but including the useful ones to provide a comprehensive resource which can be applicable for several purposes. Besides, the proposed method, which is explained in Chapter 7, can initiate a new field for future of Land Use Planning in vicinity of industrial plants.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper examines the importance that the current Convention on the Future of Europe is giving (or not) to the question of democratic accountability in European foreign and defence policy. As all European Union (EU) member states are parliamentary democracies1, and as there is a European Parliament (EP) which also covers CFSP (Common Foreign and Security Policy) and ESDP (European Security and Defence Policy2) matters, I will concentrate on parliamentary accountability rather than democratic accountability more widely defined. Where appropriate, I will also refer to the work of other transnational parliamentary bodies such as the North Atlantic Assembly or NAA (NATO´s Parliamentary Assembly) or the Western European Union (WEU) Parliamentary Assembly3. The article will consist of three sections. First, I will briefly put the question under study within its wider context (section 1). Then, I will examine the current level of parliamentary accountability in CFSP and defence matters (section 2). Finally, I will consider the current Convention debate and assess how much attention is being given to the question of accountability in foreign and defence policies (section 3). This study basically argues that, once again, there is very little interest in an issue that should be considered as vital for the future democratic development of a European foreign and defence policy. It is important to note however that this paper does not cover the wider debate about how to democratise and make the EU more transparent and closer to its citizens. It concentrates on its Second Pillar because its claim is that very little if any attention is being given to this question

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this article we compare regression models obtained to predict PhD students’ academic performance in the universities of Girona (Spain) and Slovenia. Explanatory variables are characteristics of PhD student’s research group understood as an egocentered social network, background and attitudinal characteristics of the PhD students and some characteristics of the supervisors. Academic performance was measured by the weighted number of publications. Two web questionnaires were designed, one for PhD students and one for their supervisors and other research group members. Most of the variables were easily comparable across universities due to the careful translation procedure and pre-tests. When direct comparison was notpossible we created comparable indicators. We used a regression model in which the country was introduced as a dummy coded variable including all possible interaction effects. The optimal transformations of the main and interaction variables are discussed. Some differences between Slovenian and Girona universities emerge. Some variables like supervisor’s performance and motivation for autonomy prior to starting the PhD have the same positive effect on the PhD student’s performance in both countries. On the other hand, variables like too close supervision by the supervisor and having children have a negative influence in both countries. However, we find differences between countries when we observe the motivation for research prior to starting the PhD which increases performance in Slovenia but not in Girona. As regards network variables, frequency of supervisor advice increases performance in Slovenia and decreases it in Girona. The negative effect in Girona could be explained by the fact that additional contacts of the PhD student with his/her supervisor might indicate a higher workload in addition to or instead of a better advice about the dissertation. The number of external student’s advice relationships and social support mean contact intensity are not significant in Girona, but they have a negative effect in Slovenia. We might explain the negative effect of external advice relationships in Slovenia by saying that a lot of external advice may actually result from a lack of the more relevant internal advice

Relevância:

100.00% 100.00%

Publicador:

Resumo:

MR connectomics is an emerging framework in neuro-science that combines diffusion MRI and whole brain tractography methodologies with the analytical tools of network science. In the present work we review the current methods enabling structural connectivity mapping with MRI and show how such data can be used to infer new information of both brain structure and function. We also list the technical challenges that should be addressed in the future to achieve high-resolution maps of structural connectivity. From the resulting tremendous amount of data that is going to be accumulated soon, we discuss what new challenges must be tackled in terms of methods for advanced network analysis and visualization, as well data organization and distribution. This new framework is well suited to investigate key questions on brain complexity and we try to foresee what fields will most benefit from these approaches.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The development of forensic intelligence relies on the expression of suitable models that better represent the contribution of forensic intelligence in relation to the criminal justice system, policing and security. Such models assist in comparing and evaluating methods and new technologies, provide transparency and foster the development of new applications. Interestingly, strong similarities between two separate projects focusing on specific forensic science areas were recently observed. These observations have led to the induction of a general model (Part I) that could guide the use of any forensic science case data in an intelligence perspective. The present article builds upon this general approach by focusing on decisional and organisational issues. The article investigates the comparison process and evaluation system that lay at the heart of the forensic intelligence framework, advocating scientific decision criteria and a structured but flexible and dynamic architecture. These building blocks are crucial and clearly lay within the expertise of forensic scientists. However, it is only part of the problem. Forensic intelligence includes other blocks with their respective interactions, decision points and tensions (e.g. regarding how to guide detection and how to integrate forensic information with other information). Formalising these blocks identifies many questions and potential answers. Addressing these questions is essential for the progress of the discipline. Such a process requires clarifying the role and place of the forensic scientist within the whole process and their relationship to other stakeholders.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Population viability analyses (PVA) are increasingly used in metapopulation conservation plans. Two major types of models are commonly used to assess vulnerability and to rank management options: population-based stochastic simulation models (PSM such as RAMAS or VORTEX) and stochastic patch occupancy models (SPOM). While the first set of models relies on explicit intrapatch dynamics and interpatch dispersal to predict population levels in space and time, the latter is based on spatially explicit metapopulation theory where the probability of patch occupation is predicted given the patch area and isolation (patch topology). We applied both approaches to a European tree frog (Hyla arborea) metapopulation in western Switzerland in order to evaluate the concordances of both models and their applications to conservation. Although some quantitative discrepancies appeared in terms of network occupancy and equilibrium population size, the two approaches were largely concordant regarding the ranking of patch values and sensitivities to parameters, which is encouraging given the differences in the underlying paradigms and input data.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This project focuses on studying and testing the benefits of the NX Remote Desktop technology in administrative use for Finnish Meteorological Institutes existing Linux Terminal Service Project environment. This was done due to the criticality of the system caused by growing number of users as the Linux Terminal Service Project system expands. Although many of the supporting tasks can be done via Secure Shell connection, testing graphical programs or desktop behaviour in such a way is impossible. At first basic technologies behind the NX Remote Desktop were studied, and after that started the testing of two possible programs, FreeNX and NoMachine NX server. Testing the functionality and bandwidth demands were first done in a closed local area network, and results were studied. The better candidate was then installed in a virtual server simulating actual Linux Terminal Service Project server at Finnish Meteorological Institute and connection from Internet was tested to see was there any problems with firewalls and security policies. The results are reported in this study. Studying and testing the two different candidates of NX Remote Desktop showed, that NoMachine NX Server provides better customer support and documentation. Security aspects of the Finnish Meteorological Institute had also to be considered, and since updates along with the new developing tools are announced in next version of the program, this version was the choice. Studies also show that even NoMachine promises a swift connection over an average of 20Kbit/s bandwidth, at least double of that is needed. This project gives an overview of available remote desktop products along their benefits. NX Remote Desktop technology is studied, and installation instructions are included. Testing is done in both, closed and the actual environment and problems and suggestions are studied and analyzed. The installation to the actual LTSP server is not yet made, but a virtual server is put up in the same place in the view of network topology. This ensures, that if the administrators are satisfied with the system, installation and setting up the system will go as described in this report.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The aim of this research was to structure a conceptual model of hope and hopelessness based on dictionary definitions, and to verify this model on the basis of the experiences of the severely depressive and non-depressive elderly. This research has produced a substantive theory of hope and hopelessness which is based on the experiences of the depressive and non-depressive elderly, and on the concept analysis of hope and hopelessness based on English dictionary definitions. The patients who participated in the research were 65 years old and older men and women (n=22) who had been admitted to a psychiatric hospital because of major depression, and another group: the non-depressive elderly (n=21), who were recruited from the pensioners’ clubs. The data were collected in interviews using the Clinical Assessment Tool, developed by Farran, Salloway and Clark (1990) and Farran, Wilken and Popovich (1992), and it produced 553 pages of written text, which were analysed using the ATLAS/ti programme. ATLAS/ti is a tool for analysing qualitative data and is based on Grounded Theory. The medical and nursing records of the depressive elderly completed source triangulation. The concept analysis of hope and hopelessness was made on the basis of the definitions of English dictionaries (n=103), using semantic analysis and the ATLAS/ti programme. The most important hope-promoting factors were human relations, health and managing in everyday living. Autonomy, self-determination and feeling of security were highly appreciated among the elderly. Hopelessness, on the other hand, was most often associated with the same factors: human relations, health and everyday living. Especially, losses of significant others were experienced as strongly hope-diminishing. Old age had brought freedom from duties concerning others, but now, when you finally had an opportunity to enjoy yourself, you could not accomplish anything; you were clasped in the arms of total inability, depression had come. The most obvious difference in the life course of the depressive and nondepressive elderly was the abundance of traumatic experiences in the childhood and youth of the depressive elderly. The continuous circulation of fearful thoughts was almost touchable, and suicidality was described in connection with these thoughts. You were afraid to be awake and also to go to sleep. Managing day by day was the goal. The research produced the Basic Social Process (BSP) of hope: achieving - maintaining - losing, which expresses a continuous balancing between Being without and Being with. The importance of the object of hope was combined with the amount of hope and disappointment. The process of approaching defined the realisation of hope and the process of withdrawal that of losing. Joy and security versus grief and insecurity defined the Being with and Being without. Two core categories were found. The first one “If only I could�? reflects lack of energy, lack of knowledge, lack of courage and lack of ability. The other one “There is always a loophole�? reflects deliberate tracing of possibilities and the belief in finding solutions, and managing.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

After the economic reforms of 1978, China started rising very fast and started engaging other countries in the region which has served to increase its confidence in the region. In the post cold war period, China was seen as a big threat for the region because of its claims on the South China Sea. Nevertheless, this image was eliminated when China engaged ASEAN and other multilateral and regional organizations. This paper is studying China’s economic and security policies towards ASEAN. Globalization Theory is the theory being used to explain the nature of China-ASEAN relations. This research paper argues that China’s rise is promoting peace in the region. With the engagement policy, China started promoting trade and security co operations based on mutual benefits and dialogues for the peaceful resolutions of the disputes in the region. This contributed greatly to improve China’s image in the region. Additionally, China’s posture during the economic crises of 1997 also greatly contributed to improve its image. Thus, the rise of China is providing opportunity to the other countries in East Asia. Chapter One: Background On China-ASEAN Relations The use of Soft Power and engagement policy by the Chinese government has helped to change China’s image in the region. By using these policies China has been able to clear the feeling of suspicion and mistrust among the Asian states. China has increased its participation in multilateral and regional organizations, such as ASEAN. Due to this China has been able to promote economic and security co-operation among countries in the region. Thus, from being a potential threat China became a potential co-operative partner. Chapter Two: A Look into ASEAN ASEAN was originally formed on 8th August 1967 in Bangkok, Thailand, by Indonesia, Malaysia, the Philippines, Singapore and Thailand. Nevertheless, ASEAN was not the first regional group created to act as forum for dialogue between the leaders of different countries. Thought, it is the only one which could work in the region. The aim of the foundation of ASEAN was to promote peace and stability in the Abstract 2 region and also contain the spread of communism in Southeast Asia. For this reason, China did not engage ASEAN until 1990. However, in 1978 with the establishment of the open up policy China started engaging other countries. It started building trust among its neighboring countries by using soft power. By 1992, China formalized its diplomatic ties with ASEAN as a group. The diplomatic ties between China and ASEAN focus on multilateralism and co-operation as the best way for a more peaceful Asia and the search for common security. Thus, security in the region is promoted through economic co-operation among the states. Therefore the relation between China – ASEAN emphasizes the five principles of peaceful coexistence, mutual benefits in economic co-operation, dialogue promoting trust and the peaceful settlement of disputes. Chapter Three: China-ASEAN Economic Relations Since 1978 The economic reform of 1978 has greatly contributed to the economic development of China. After the adoption of the open up policy, China has been able to establish economic and trade relations with the outside world. The realist school of thought had predicted that Asia will not be stable in the post cold war period. Nevertheless, this has not been the case in Asia. China is growing peacefully with the co-operation of countries in the region. China is establishing strong ties with its neighboring countries. China and ASEAN relations focus on mutual benefit instead of being a zero sum game. Thus these relations are aimed at encouraging trust and economic co-operation in the region. China and ASEAN have agreed on Free Trade to assure that the two parties benefit from the co-operation. The ACFTA will have a great impact on economic, political and security issues. This will enable China to increase its influence in Asia and counterbalance the influences that Japan and U.S have in the region. Chapter Four: China ASEAN Relations in the Security Perspective This Chapter is about China and ASEAN relations on security issue. The new security issues of the post cold war period need to be solved in multilateral way. China as a major power in the region, through its engagement policy has solved most Abstract 3 of the disputes in the region using multilateral means. China has also found ways to solve the dispute over Spratly Islands peacefully, through dialogue using ASEAN. Additionally, China signed the Treaty of Amity in 2003, promoted security initiatives through ARF, Declaration on Conduct of Parties in the South China Sea and documents covering non-traditional security threats, economic co-operation and agricultural co-operation in November 2002, and the Joint Declaration on Strategic. Chapter Five: Finding and Analysis This chapter provides a quantitative and qualitative analysis of the date collected throughout this research. It provides an analysis of how the rise of China is promoting peace in the region. China has been promoting mutual beneficial trade and security co-operation which has increased its influence in the region. China has also been able to solve most of the territorial and border dispute in the region through ASEAN. Thus, ASEAN has amended China’s relations with other countries in the region. Therefore, China’s foreign policy in the region has a big impact in shaping the dynamic relations in East Asia. Conclusion and Recommendations This paper concluded that the relationships between China and ASEAN are contributing to peace in the region. After China engaged ASEAN, it has been able to promote multilateral trade based on mutual benefit. This is clearly emphasized by the CAFTA. Additionally, China has solved most of the dispute in the region. It has also found way for a peaceful resolution of the dispute over Spratly Island. Nowadays, the ASEAN countries don’t see China as a threat to the region. Nevertheless, they’ve adopted deterrence measures such as establishing diplomatic relations with other big powers in the region to assure that the region continues to grow peacefully. Concerning this deterrence measures, I recommend as another way for a continued peaceful growth, the resolution of the outstanding dispute.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we analyse the decline of the Swiss corporate network between 1980 and 2000. We address the theoretical and methodological challenge of this transformation by the use of a combination of network analysis and multiple correspondence analysis (MCA). Based on a sample of top managers of the 110 largest Swiss companies in 1980 and 2000 we show that, beyond an adjustment to structural pressure, an explanation of the decline of the network has to include the strategies of the fractions of the business elites. We reveal that three factors contribute crucially to the decline of the Swiss corporate network: the managerialization of industrial leaders, the marginalization of law degree holders and the influx of hardly connected foreign managers.