950 resultados para Attachment security
Resumo:
Bond formation and rearrangement reactions in gas phase electron attachment were studied through dissociative electron attachment (DEA) to pentafluorotoluene (PFT), pentafluoroaniline (PFA) and pentafluorophenol (PFP) in the energy range 0-14 eV. In the case of PFA and PFP, the dominant processes involve formation of [M - HF](-) through the loss of neutral HF. This fragmentation channel is most efficient at low incident electron energy and for PFP it is accompanied by a substantial conformational change of the anionic fragment. At higher energy, HF loss is also observed as well as a number of other fragmentation processes. Thermochemical threshold energies have been computed for all the observed fragments and classical trajectories of the electron attachment process were calculated to elucidate the fragmentation mechanisms. For the dominant reaction channel leading to the loss of HF from PFP, the minimum energy path was calculated using the nudged elastic band method.
Resumo:
The production of reports and the distribution of information have become integral to the operation of many non-governmental organizations. In this regard, the fact that the all-women organization of Checkpoint Watch publishes reports about the Israeli checkpoints in the occupied West Bank seems to comply with current trends. However, the reports—most of which are short repetitive descriptions of the banality and everydayness of the military checkpoints, counting the number of people and cars waiting, commenting on the manner in which the checks are performed and meticulously documenting what mostly amounts to minor incidents of humiliation and distress—do not seem to abide by any convention of reporting. This work analyzes the reporting praxis of the organization and claims that it should be understood as a form of activism in and of itself. Tracking the ways in which the reports address the Israeli public through the concept of parrhesia, the work suggests that this form of reporting enables the women activists to use their gendered marginality to make their way into the highly masculinized and militarized Israeli security discourse.
Resumo:
Going beyond the association between youth exposure to political violence and psychopathology, the current article examines within-person change in youth strength of identity with their ethno-political group and youth reports of the insecurity in their communities. Conceptually related but growing out of different paradigms, both group identity and emotional insecurity have been examined as key variables impacting youth responses to threats from other group members. The goal of the current study is to review previous studies examining these two key variables and to contribute new analyses, modeling within-person change in both variables and examining covariation in their growth. The current article uses data from 823 Belfast adolescents over 4 years. The results suggest youth are changing linearly over age in both constructs and that there are ethno-political group differences in how youth are changing. The results also indicate that change in insecurity is related to strength of identity at age 18, and strength of identity and emotional insecurity are related at age 18. Implications and directions for future work in the area of youth and political violence are discussed. © 2014 American Psychological Association.
Resumo:
African coastal regions are expected to experience the highest rates of population growth in coming decades. Fresh groundwater resources in the coastal zone of East Africa (EA) are highly vulnerable to seawater intrusion. Increasing water demand is leading to unsustainable and ill-planned well drilling and abstraction. Wells supplying domestic, industrial and agricultural needs are or have become, in many areas, too saline for use. Climate change, including weather changes and sea level rise, is expected to exacerbate this problem. The multiplicity of physical, demographic and socio-economic driving factors makes this a very challenging issue for management. At present the state and probable evolution of coastal aquifers in EA are not well documented. The UPGro project 'Towards groundwater security in coastal East Africa' brings together teams from Kenya, Tanzania, Comoros Islands and Europe to address this knowledge gap. An integrative multidisciplinary approach, combining the expertise of hydrogeologists, hydrologists and social scientists, is investigating selected sites along the coastal zone in each country. Hydrogeologic observatories have been established in different geologic and climatic settings representative of the coastal EA region, where focussed research will identify the current status of groundwater and identify future threats based on projected demographic and climate change scenarios. Researchers are also engaging with end users as well as local community and stakeholder groups in each area in order to understanding the issues most affecting the communities and searching sustainable strategies for addressing these.
Resumo:
The objectives of this study were to investigate the effect of laser-induced surface features on the morphology, attachment and viability of mesenchymal stem cells (MSCs) at different periods of time, and to evaluate the biocompatibility of different zones: laser-melted zone (MZ), heat-affected zone (HAZ) and base metal (BM) in laser-treated NiTi alloy. The surface morphology and composition were studied by scanning electron microscope (SEM) and X-ray photoemission spectroscopy (XPS), respectively. The cell morphology was examined by SEM while the cell counting and viability measurements were done by haemocytometer and 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT) colorimetric assay. The results indicated that the laser-induced surface features, such as surface roughening, presence of anisotropic dendritic pattern and complete surface Ni oxidation were beneficial to improve the biocompatibility of NiTi as evidenced by the highest cell attachment (4 days of culture) and viability (7 days of culture) found in the MZ. The biocompatibility of the MZ was the best, followed by the BM with the HAZ being the worst. The defective and porous oxide layer as well as the coarse grained structure might attribute to the inferior cell attachment (4 days of culture) and viability (7 days of culture) on the HAZ compared with the BM which has similar surface morphology.
Resumo:
In this paper, the impact of multiple active eavesdroppers on cooperative single carrier systems with multiple relays and multiple destinations is examined. To achieve the secrecy diversity gains in the form of opportunistic selection, a two-stage scheme is proposed for joint relay and destination selection, in which, after the selection of the relay with the minimum effective maximum signal-to-noise ratio (SNR) to a cluster of eavesdroppers, the destination that has the maximum SNR from the chosen relay is selected. In order to accurately assess the secrecy performance, the exact and asymptotic expressions are obtained in closed-form for several security metrics including the secrecy outage probability, the probability of non-zero secrecy rate, and the ergodic secrecy rate in frequency selective fading. Based on the asymptotic analysis, key design parameters such as secrecy diversity gain, secrecy array gain, secrecy multiplexing gain, and power cost are characterized, from which new insights are drawn. Moreover, it is concluded that secrecy performance limits occur when the average received power at the eavesdropper is proportional to the counterpart at the destination. Specifically, for the secrecy outage probability, it is confirmed that the secrecy diversity gain collapses to zero with outage floor, whereas for the ergodic secrecy rate, it is confirmed confirm that its slope collapses to zero with capacity ceiling.
Resumo:
Why did banking compliance fail so badly in the recent financial crisis and why, according to many, does it continue to do so? Rather than point to the lack of oversight of individuals in bank compliance roles, as many commentators do, in this paper I examine in depth the organizational context that surrounded people in such roles. I focus on those compliance personnel who did speak out about risky practices in their banks, who were forced to escalate the problem and 'whistle-blow' to external parties, and who were punished for doing so. Drawing on recent empirical data from a wider study, I argue that the concept of dependence corruption is useful in this setting, and that it can be extended to encompass interpersonal attachments. This, in turn, problematises the concept of dependence corruption because interpersonal attachments in organisational settings are inevitable. The paper engages with recent debates on whether institutional corruption is an appropriate lens for studying private-sector organisations by arguing for a focus on roles, rather than remaining at the level of institutional fields or individual organisations. Finally, the paper contributes to studies on banking compliance in the context of the recent crisis; without a deeper understanding of those who were forced to extremes to simply do their jobs, reform of the banking sector will prove difficult.
Resumo:
Software-as-a-service (SaaS) is a type of software service delivery model which encompasses a broad range of business opportunities and challenges. Users and service providers are reluctant to integrate their business into SaaS due to its security concerns while at the same time they are attracted by its benefits. This article highlights SaaS utility and applicability in different environments like cloud computing, mobile cloud computing, software defined networking and Internet of things. It then embarks on the analysis of SaaS security challenges spanning across data security, application security and SaaS deployment security. A detailed review of the existing mainstream solutions to tackle the respective security issues mapping into different SaaS security challenges is presented. Finally, possible solutions or techniques which can be applied in tandem are presented for a secure SaaS platform.
Resumo:
On 26 December 2003 an Israeli activist was shot by the Israeli Army while he was participating in a demonstration organized by Anarchists Against the Wall (AAtW) in the West Bank. This was the first time Israeli Soldiers have deliberately shot live bullets at a Jewish-Israeli activist. This paper is an attempt to understand the set of conditions, the enveloping frameworks, and the new discourses that have made this event, and similar shootings that soon followed, possible. Situating the actions of AAtW within a much wider context of securitization—of identities, movements, and bodies—we examine strategies of resistance which are deployed in highly securitized public spaces. We claim that an unexpected matrix of identity in which abnormality is configured as security threat render the bodies of activists especially precarious. The paper thus provides an account of the new rationales of security technologies and tactics which increasingly govern public spaces.