822 resultados para Computer and network security
Resumo:
Despite revived notions of a ‘cultural divide’ between East and West, Edward's Said's ‘Orientalism’ has received little attention from scholars of intelligence and diplomacy. This article brings to light for the first time a number of recently declassified documents of a different nature to usual assessments produced by Anglo-American analytic bodies: those focussed primarily on the issue of ‘national character’. Using and critiquing Said's thesis of Western ‘Orientalism’ it reveals some critical and enduring conceptualizations articulated by the diplomatic and intelligence community about Arab culture such as the role of Islam, rhetoric, political motivation and notions of ‘honour’. Such a critical approach demonstrates how diplomatic and intelligence history can also be a history of culture, ideas and institutional mentalité.
Resumo:
This article presents an experimental scalable message driven IoT and its security architecture based on Decentralized Information Flow Control. The system uses a gateway that exports SoA (REST) interfaces to the internet simplifying external applications whereas uses DIFC and asynchronous messaging within the home environment.
Resumo:
Climate change, a quintessential environmental problem, is generally recognised as the most important development challenge in the 21st century (IPCC, 2014). In addition to acknowledging its many significant direct consequences, climate change is increasingly used to frame discussions on other important global challenges, such as health, energy and food security. This chapter provides understanding of the intricate and complex relationship between climate change, environment and development.
Resumo:
Reflecting on the strategic commitment outlined in the Plan of Action for Gender Equality (2005-2015) and the priority issues of the Commonwealth Women’s Forum, this article assesses the extent to which the Commonwealth as an institution is supporting troop and police-contributing member states in addressing the gender imbalance in peacekeeping operations. Drawing on desk-based research, interviews with international policymakers and a statistical analysis of the International Peace Institute Peacekeeping Database, the article first outlines the Commonwealth’s gender and security policy perspective before examining data sets to determine the success of Commonwealth member states in integrating women into uniformed peacekeeping contingencies between 2009 and 2015. The article observes that, in spite of a renewed optimism and drive to propel women into leadership positions in politics, the judiciary, public bodies and private companies, security sector reform and the implementation of pillar one of the UN Security Council Resolution 1325, is notably absent from the Commonwealth’s gender agenda. It is argued that this policy gap suggests that national and international security architecture is regarded as an accepted domain of masculine privilege. A lack of political will among Commonwealth Heads of Government to mainstream gender equality and facilitate structural transformation of national security organs, and a chronically under resourced Commonwealth Secretariat limits the influence of the institution to that of arms-length promoter of international norms on women, peace and security.
Resumo:
Wireless Sensor Networks (WSNs) have been an exciting topic in recent years. The services offered by a WSN can be classified into three major categories: monitoring, alerting, and information on demand. WSNs have been used for a variety of applications related to the environment (agriculture, water and forest fire detection), the military, buildings, health (elderly people and home monitoring), disaster relief, and area or industrial monitoring. In most WSNs tasks like processing the sensed data, making decisions and generating emergency messages are carried out by a remote server, hence the need for efficient means of transferring data across the network. Because of the range of applications and types of WSN there is a need for different kinds of MAC and routing protocols in order to guarantee delivery of data from the source nodes to the server (or sink). In order to minimize energy consumption and increase performance in areas such as reliability of data delivery, extensive research has been conducted and documented in the literature on designing energy efficient protocols for each individual layer. The most common way to conserve energy in WSNs involves using the MAC layer to put the transceiver and the processor of the sensor node into a low power, sleep state when they are not being used. Hence the energy wasted due to collisions, overhearing and idle listening is reduced. As a result of this strategy for saving energy, the routing protocols need new solutions that take into account the sleep state of some nodes, and which also enable the lifetime of the entire network to be increased by distributing energy usage between nodes over time. This could mean that a combined MAC and routing protocol could significantly improve WSNs because the interaction between the MAC and network layers lets nodes be active at the same time in order to deal with data transmission. In the research presented in this thesis, a cross-layer protocol based on MAC and routing protocols was designed in order to improve the capability of WSNs for a range of different applications. Simulation results, based on a range of realistic scenarios, show that these new protocols improve WSNs by reducing their energy consumption as well as enabling them to support mobile nodes, where necessary. A number of conference and journal papers have been published to disseminate these results for a range of applications.
Resumo:
In the late seventies, Megiddo proposed a way to use an algorithm for the problem of minimizing a linear function a(0) + a(1)x(1) + ... + a(n)x(n) subject to certain constraints to solve the problem of minimizing a rational function of the form (a(0) + a(1)x(1) + ... + a(n)x(n))/(b(0) + b(1)x(1) + ... + b(n)x(n)) subject to the same set of constraints, assuming that the denominator is always positive. Using a rather strong assumption, Hashizume et al. extended Megiddo`s result to include approximation algorithms. Their assumption essentially asks for the existence of good approximation algorithms for optimization problems with possibly negative coefficients in the (linear) objective function, which is rather unusual for most combinatorial problems. In this paper, we present an alternative extension of Megiddo`s result for approximations that avoids this issue and applies to a large class of optimization problems. Specifically, we show that, if there is an alpha-approximation for the problem of minimizing a nonnegative linear function subject to constraints satisfying a certain increasing property then there is an alpha-approximation (1 1/alpha-approximation) for the problem of minimizing (maximizing) a nonnegative rational function subject to the same constraints. Our framework applies to covering problems and network design problems, among others.
Resumo:
This research is based on consumer complaints with respect to recently purchased consumer electronics. This research document will investigate the instances of development and device management as a tool used to aid consumer and manage consumer’s mobile products in order to resolve issues in or before the consumers is aware one exists. The problem at the present time is that mobile devices are becoming very advanced pieces of technology, and not all manufacturers and network providers have kept up the support element of End users. As such, the subject of the research is to investigate how device management could possibly be used as a method to promote research and development of mobile devices, and provide a better experience for the consumer. The wireless world is becoming increasingly complex as revenue opportunities are driven by new and innovative data services. We can no longer expect the customer to have the knowledge or ability to configure their own device. Device Management platforms can address the challenges of device configuration and support through new enabling technologies. Leveraging these technologies will allow a network operator to reduce the cost of subscriber ownership, drive increased ARPU (Average Revenue per User) by removing barriers to adoption, reduce churn by improving the customer experience and increase customer loyalty. DM technologies provide a flexible and powerful management method but are managing the same device features that have historically been configured manually through call centers or by the end user making changes directly on the device. For this reason DM technologies must be treated as part of a wider support solution. The traditional requirement for discovery, fault finding, troubleshooting and diagnosis are still as relevant with DM as they are in the current human support environment yet the current generation of solutions do little to address this problem. In the deployment of an effective Device Management solution the network operator must consider the integration of the DM platform, interfacing with many areas of the business, supported by knowledge of the relationship between devices, applications, solutions and services maintained on an ongoing basis. Complementing the DM solution with published device information, setup guides, training material and web based tools will ensure the quality of the customer experience, ensuring that problems are completely resolved, driving data usage by focusing customer education on the use of the wireless service In this way device management becomes a tool used both internally within the network or device vendor and by the customer themselves, with each user empowered to effectively manage the device without any prior knowledge or experience, confident that changes they apply will be relevant, accurate, stable and compatible. The value offered by an effective DM solution with an expert knowledge service will become a significant differentiator for the network operator in an ever competitive wireless market. This research document is intended to highlight some of the issues the industry faces as device management technologies become more prevalent, and offers some potential solutions to simplify the increasingly complex task of managing devices on the network, where device management can be used as a tool to aid customer relations and manage customer’s mobile products in order to resolve issues before the user is aware one exists. The research is broken down into the following, Customer Relationship Management, Device management, the role of knowledge with the DM, Companies that have successfully implemented device management, and the future of device management and CRM. And it also consists of questionnaires aimed at technical support agents and mobile device users. Interview was carried out with CRM managers within support centre to further the evidence gathered. To conclude, the document is to consider the advantages and disadvantages of device management and attempt to determine the influence it will have over customer support centre, and what methods could be used to implement it.
Resumo:
Background: Voice processing in real-time is challenging. A drawback of previous work for Hypokinetic Dysarthria (HKD) recognition is the requirement of controlled settings in a laboratory environment. A personal digital assistant (PDA) has been developed for home assessment of PD patients. The PDA offers sound processing capabilities, which allow for developing a module for recognition and quantification HKD. Objective: To compose an algorithm for assessment of PD speech severity in the home environment based on a review synthesis. Methods: A two-tier review methodology is utilized. The first tier focuses on real-time problems in speech detection. In the second tier, acoustics features that are robust to medication changes in Levodopa-responsive patients are investigated for HKD recognition. Keywords such as Hypokinetic Dysarthria , and Speech recognition in real time were used in the search engines. IEEE explorer produced the most useful search hits as compared to Google Scholar, ELIN, EBRARY, PubMed and LIBRIS. Results: Vowel and consonant formants are the most relevant acoustic parameters to reflect PD medication changes. Since relevant speech segments (consonants and vowels) contains minority of speech energy, intelligibility can be improved by amplifying the voice signal using amplitude compression. Pause detection and peak to average power rate calculations for voice segmentation produce rich voice features in real time. Enhancements in voice segmentation can be done by inducing Zero-Crossing rate (ZCR). Consonants have high ZCR whereas vowels have low ZCR. Wavelet transform is found promising for voice analysis since it quantizes non-stationary voice signals over time-series using scale and translation parameters. In this way voice intelligibility in the waveforms can be analyzed in each time frame. Conclusions: This review evaluated HKD recognition algorithms to develop a tool for PD speech home-assessment using modern mobile technology. An algorithm that tackles realtime constraints in HKD recognition based on the review synthesis is proposed. We suggest that speech features may be further processed using wavelet transforms and used with a neural network for detection and quantification of speech anomalies related to PD. Based on this model, patients' speech can be automatically categorized according to UPDRS speech ratings.
Resumo:
Location Models are usedfor planning the location of multiple service centers in order to serve a geographicallydistributed population. A cornerstone of such models is the measure of distancebetween the service center and a set of demand points, viz, the location of thepopulation (customers, pupils, patients and so on). Theoretical as well asempirical evidence support the current practice of using the Euclidian distancein metropolitan areas. In this paper, we argue and provide empirical evidencethat such a measure is misleading once the Location Models are applied to ruralareas with heterogeneous transport networks. This paper stems from the problemof finding an optimal allocation of a pre-specified number of hospitals in alarge Swedish region with a low population density. We conclude that the Euclidianand the network distances based on a homogenous network (equal travel costs inthe whole network) give approximately the same optimums. However networkdistances calculated from a heterogeneous network (different travel costs indifferent parts of the network) give widely different optimums when the numberof hospitals increases. In terms ofaccessibility we find that the recent closure of hospitals and the in-optimallocation of the remaining ones has increased the average travel distance by 75%for the population. Finally, aggregation the population misplaces the hospitalsby on average 10 km.
Resumo:
A customer is presumed to gravitate to a facility by the distance to it and the attractiveness of it. However regarding the location of the facility, the presumption is that the customer opts for the shortest route to the nearest facility.This paradox was recently solved by the introduction of the gravity p-median model. The model is yet to be implemented and tested empirically. We implemented the model in an empirical problem of locating locksmiths, vehicle inspections, and retail stores ofv ehicle spare-parts, and we compared the solutions with those of the p-median model. We found the gravity p-median model to be of limited use for the problem of locating facilities as it either gives solutions similar to the p-median model, or it gives unstable solutions due to a non-concave objective function.
Resumo:
The aim of this degree thesis is to see what research says about the use of computer and video games to support upper elementary pupils’ development in English reading comprehension in Swedish schools. Other goals are to see how online and offline gaming can be integrated in the Swedish schools and what attitudes teachers have towards gaming. The method used is a systematic literature review and the purpose is to analyze chosen articles and to find relevant content that answers the research questions. Five articles were chosen from different databases and were systematically analyzed in this thesis. The results show that online gaming as support for education can be rewarding for some upper elementary pupils in English learning. However, in English reading comprehension there is not much research found which means that more research needs to be made within this area. Moreover, involving online gaming in English language learning seems to be a challenge for teachers mostly because of their lack of knowledge about the subject, even though they are positive to gaming. The lack of knowledge about the subject could be altered with more education and courses in the area.
Resumo:
We develop a method for empirically measuring the difference in carbon footprint between traditional and online retailing (“e-tailing”) from entry point to a geographical area to consumer residence. The method only requires data on the locations of brick-and-mortar stores, online delivery points, and residences of the region’s population, and on the goods transportation networks in the studied region. Such data are readily available in most countries, so the method is not country or region specific. The method has been evaluated using data from the Dalecarlia region in Sweden, and is shown to be robust to all assumptions made. In our empirical example, the results indicate that the average distance from consumer residence to a brick-and-mortar retailer is 48.54 km in the studied region, while the average distance to an online delivery point is 6.7 km. The results also indicate that e-tailing increases the average distance traveled from the regional entry point to the delivery point from 47.15 km for a brick-and-mortar store to 122.75 km for the online delivery points. However, as professional carriers transport the products in bulk to stores or online delivery points, which is more efficient than consumers’ transporting the products to their residences, the results indicate that consumers switching from traditional to e-tailing on average reduce their CO2 footprints by 84% when buying standard consumer electronics products.
Resumo:
We develop a method for empirically measuring the difference in carbon footprint between traditional and online retailing (“e-tailing”) from entry point to a geographical area to consumer residence. The method only requires data on the locations of brick-and-mortar stores, online delivery points, and residences of the region’s population, and on the goods transportation networks in the studied region. Such data are readily available in most countries, so the method is not country or region specific. The method has been evaluated using data from the Dalecarlia region in Sweden, and is shown to be robust to all assumptions made. In our empirical example, the results indicate that the average distance from consumer residence to a brick-and-mortar retailer is 48.54 km in the studied region, while the average distance to an online delivery point is 6.7 km. The results also indicate that e-tailing increases the average distance traveled from the regional entry point to the delivery point from 47.15 km for a brick-and-mortar store to 122.75 km for the online delivery points. However, as professional carriers transport the products in bulk to stores or online delivery points, which is more efficient than consumers’ transporting the products to their residences, the results indicate that consumers switching from traditional to e-tailing on average reduce their CO2 footprints by 84% when buying standard consumer electronics products.
Predictive models for chronic renal disease using decision trees, naïve bayes and case-based methods
Resumo:
Data mining can be used in healthcare industry to “mine” clinical data to discover hidden information for intelligent and affective decision making. Discovery of hidden patterns and relationships often goes intact, yet advanced data mining techniques can be helpful as remedy to this scenario. This thesis mainly deals with Intelligent Prediction of Chronic Renal Disease (IPCRD). Data covers blood, urine test, and external symptoms applied to predict chronic renal disease. Data from the database is initially transformed to Weka (3.6) and Chi-Square method is used for features section. After normalizing data, three classifiers were applied and efficiency of output is evaluated. Mainly, three classifiers are analyzed: Decision Tree, Naïve Bayes, K-Nearest Neighbour algorithm. Results show that each technique has its unique strength in realizing the objectives of the defined mining goals. Efficiency of Decision Tree and KNN was almost same but Naïve Bayes proved a comparative edge over others. Further sensitivity and specificity tests are used as statistical measures to examine the performance of a binary classification. Sensitivity (also called recall rate in some fields) measures the proportion of actual positives which are correctly identified while Specificity measures the proportion of negatives which are correctly identified. CRISP-DM methodology is applied to build the mining models. It consists of six major phases: business understanding, data understanding, data preparation, modeling, evaluation, and deployment.
Resumo:
This thesis focuses on the adaptation of formal education to people’s technology- use patterns, theirtechnology-in-practice, where the ubiquitous use of mobile technologies is central. The research question is: How can language learning practices occuring in informal learning environments be effectively integrated with formal education through the use of mobile technology? The study investigates the technical, pedagogical, social and cultural challenges involved in a design science approach. The thesis consists of four studies. The first study systematises MALL (mobile-assisted language learning) research. The second investigates Swedish and Chinese students’ attitudes towards the use of mobile technology in education. The third examines students’ use of technology in an online language course, with a specific focus on their learning practices in informal learning contexts and their understanding of how this use guides their learning. Based on the findings, a specifically designed MALL application was built and used in two courses. Study four analyses the app use in terms of students’ perceived level of self-regulation and structuration. The studies show that technology itself plays a very important role in reshaping peoples’ attitudes and that new learning methods are coconstructed in a sociotechnical system. Technology’s influence on student practices is equally strong across borders. Students’ established technologies-in-practice guide the ways they approach learning. Hence, designing effective online distance education involves three interrelated elements: technology, information, and social arrangements. This thesis contributes to mobile learning research by offering empirically and theoretically grounded insights that shift the focus from technology design to design of information systems.