950 resultados para Attachment security
Resumo:
Throughout the European Union there is an increasing amount of wind generation being dispatched-down due to the binding of power system operating constraints from high levels of wind generation. This paper examines the impact a system non-synchronous penetration limit has on the dispatch-down of wind and quantifies the significance of interconnector counter-trading to the priority dispatching of wind power. A fully coupled economic dispatch and security constrained unit commitment model of the Single Electricity Market of the Republic of Ireland and Northern Ireland and the British Electricity Trading and Transmission Arrangement was used in this study. The key finding was interconnector counter-trading reduces the impact the system non-synchronous penetration limit has on the dispatch-down of wind. The capability to counter-trade on the interconnectors and an increase in system non-synchronous penetration limit from 50% to 55% reduces the dispatch-down of wind by 311 GW h and decreases total electricity payments to the consumer by €1.72/MW h. In terms of the European Union electricity market integration, the results show the importance of developing individual electricity markets that allow system operators to counter-trade on interconnectors to ensure the priority dispatch of the increasing levels of wind generation.
Resumo:
This article explores whether or to what extent the contemporary espionage novel is able to map and interrogate transformations in the post-9/11security environment. It asks how well a form or genre of writing, typically handcuffed to the machinations and demands of the Cold War and state sovereignty, is able to adapt to a new security environment characterized by strategies of “risk assessment” and “resilience-building” and by modes or regimes of power not reducible to, or wholly controlled by, the state. In doing so, it thinks about the capacities of this type of fiction for “resisting” the formations of power it wants to make visible and is partly complicit with.
Resumo:
Even before the Russian air force launched its first strikes over Syria, there was already a Russian presence on the battleground. These were not the spetsnaz, Kremlin’s special forces, but war correspondents from the leading Russian media outlets. This was as clear a sign as any that the Russia’s priority has shifted from Ukraine, where these reporters spent most of the past 18 months, to Syria.
There is, however, no unanimity on Russia’s latest escalation in Syria. As Russian state TV stations report successes of Russia’s high-precision weapons projecting an image of a high-tech Russian military equal to the US, doubts persist about the latest adventure in the Middle East.
Resumo:
A relay network in which a source wishes to convey a confidential message to a legitimate destination with the assistance of trusted relays is considered. In particular, cooperative beamforming and user selection techniques are applied to protect the confidential message. The secrecy rate (SR) and secrecy outage probability (SOP) of the network are investigated first, and a tight upper bound for the SR and an exact formula for the SOP are derived. Next, asymptotic approximations for the SR and SOP in the high signal-to-noise ratio (SNR) regime are derived for two different schemes: i) cooperative beamforming and ii) multiuser selection. Further, a new concept of cooperative diversity gain, namely, adapted cooperative diversity gain (ACDG), which can be used to evaluate security level of a cooperative relaying network, is investigated. It is shown that the ACDG of cooperative beamforming is equal to the conventional cooperative diversity gain of traditional multiple-input single-output networks, while the ACDG of the multiuser scenario is equal to that of traditional single-input multiple-output networks.
Resumo:
Cyber-security research in the field of smart grids is often performed with a focus on either the power and control domain or the Information and Communications Technology (ICT) domain. The characteristics of the power equipment or ICT domain are commonly not collectively considered. This work provides an analysis of the physical effects of cyber-attacks on microgrids – a smart grid construct that allows continued power supply when disconnected from a main grid. Different types of microgrid operations are explained (connected, islanded and synchronous-islanding) and potential cyber-attacks and their physical effects are analyzed. A testbed that is based on physical power and ICT equipment is presented to validate the results in both the physical and ICT domain.
Resumo:
Most cryptographic devices should inevitably have a resistance against the threat of side channel attacks. For this, masking and hiding schemes have been proposed since 1999. The security validation of these countermeasures is an ongoing research topic, as a wider range of new and existing attack techniques are tested against these countermeasures. This paper examines the side channel security of the balanced encoding countermeasure, whose aim is to process the secret key-related data under a constant Hamming weight and/or Hamming distance leakage. Unlike previous works, we assume that the leakage model coefficients conform to a normal distribution, producing a model with closer fidelity to real-world implementations. We perform analysis on the balanced encoded PRINCE block cipher with simulated leakage model and also an implementation on an AVR board. We consider both standard correlation power analysis (CPA) and bit-wise CPA. We confirm the resistance of the countermeasure against standard CPA, however, we find with a bit-wise CPA that we can reveal the key with only a few thousands traces.
Resumo:
The positive relationships between urban green space and health have been well documented. Little is known, however, about the role of residents’ emotional attachment to local green spaces in these relationships, and how attachment to green spaces and health may be promoted by the availability of accessible and usable green spaces. The present research aimed to examine the links between self-reported health, attachment to green space, and the availability of accessible and usable green spaces. Data were collected via paper-mailed surveys in two neighborhoods (n = 223) of a medium-sized Dutch city in the Netherlands. These neighborhoods differ in the perceived and objectively measured accessibility and usability of green spaces, but are matched in the physically available amount of urban green space, as well as in demographic and socio-economic status, and housing conditions. Four dimensions of green space attachment were identified through confirmatory factor analysis: place dependence, affective attachment, place identity and social bonding. The results show greater attachment to local green space and better self-reported mental health in the neighborhood with higher availability of accessible and usable green spaces. The two neighborhoods did not differ, however, in physical and general health. Structural Equation Modelling confirmed the neighborhood differences in green space attachment and mental health, and also revealed a positive path from green space attachment to mental health. These findings convey the message that we should make green places, instead of green spaces.
Resumo:
Analysing public sentiment about future events, such as demonstration or parades, may provide valuable information while estimating the level of disruption and disorder during these events. Social media, such as Twitter or Facebook, provides views and opinions of users related to any public topics. Consequently, sentiment analysis of social media content may be of interest to different public sector organisations, especially in the security and law enforcement sector. In this paper we present a lexicon-based approach to sentiment analysis of Twitter content. The algorithm performs normalisation of the sentiment in an effort to provide intensity of the sentiment rather than positive/negative label. Following this, we evaluate an evidence-based combining function that supports the classification process in cases when positive and negative words co-occur in a tweet. Finally, we illustrate a case study examining the relation between sentiment of twitter posts related to English Defence League and the level of disorder during the EDL related events.
Resumo:
BACKGROUND: Cigarette smoking is one of the most significant risk factors in the development and further advancement of inflammatory periodontal disease, however, the role of either nicotine or its primary metabolite cotinine in the progression of periodontitis is unclear. This study aimed to investigate the effects of nicotine and cotinine on the attachment and growth of fibroblasts derived from human periodontal ligament (PDL).
METHODS: Primary cultures were prepared from the roots of extracted premolar teeth. Cells were used at both low (P3 to P5) and high (P11 to P13) passage. Cell numbers were determined over 14 days using either the 3-(4,5-dimethylthiazol-2-yl)-2, 5-diphenyl tetrazolium bromide (MTT) assay or with a Coulter counter. Cultures were exposed to culture medium supplemented with 1) 15% fetal calf serum (FCS) only; 2) 1% FCS only; 3) 1% FCS and nicotine (concentration range 5 ng/ml to 10 mg/ml); or 4) 1% FCS and cotinine (concentration range 0.5 ng/ml to 10 microg/ml).
RESULTS: Nicotine significantly (P <0.05, by ANOVA) inhibits attachment and growth of low passage cells at concentrations >1 mg/ml and high passage PDL fibroblasts at concentrations >0.5 mg/ml. Cotinine, at the highest concentration used (10 microg/ml), appeared to inhibit attachment and growth of both low and high passage fibroblasts but this was not statistically significant (P >0.05, by ANOVA).
CONCLUSIONS: Tobacco products inhibit attachment and growth of human PDL fibroblasts. This may partly explain the role of these substances in the progression of periodontitis.
Resumo:
We present two physical layer secure transmission schemes for multi-user multi-relay networks, where the communication from M users to the base station is assisted by direct links and by N decode-and-forward relays. In this network, we consider that a passive eavesdropper exists to overhear the transmitted information, which entails exploiting the advantages of both direct and relay links for physical layer security enhancement. To fulfill this requirement, we investigate two criteria for user and relay selection and examine the achievable secrecy performance. Criterion I performs a joint user and relay selection, while Criterion II performs separate user and relay selections, with a lower implementation complexity. We derive a tight lower bound on the secrecy outage probability for Criterion I and an accurate analytical expression for the secrecy outage probability for Criterion II. We further derive the asymptotic secrecy outage probabilities at high transmit signal-to-noise ratios and high main-to-eavesdropper ratios for both criteria. We demonstrate that the secrecy diversity order is min (MN, M + N) for Criterion I, and N for Criterion II. Finally, we present numerical and simulation results to validate the proposed analysis, and show the occurrence condition of the secrecy outage probability floor