720 resultados para Notions of security
A simulation analysis of spoke-terminals operating in LTL Hub-and-Spoke freight distribution systems
Resumo:
DUE TO COPYRIGHT RESTRICTIONS ONLY AVAILABLE FOR CONSULTATION AT ASTON UNIVERSITY LIBRARY AND INFORMATION SERVICES WITH PRIOR ARRANGEMENT The research presented in this thesis is concerned with Discrete-Event Simulation (DES) modelling as a method to facilitate logistical policy development within the UK Less-than-Truckload (LTL) freight distribution sector which has been typified by “Pallet Networks” operating on a hub-and-spoke philosophy. Current literature relating to LTL hub-and-spoke and cross-dock freight distribution systems traditionally examines a variety of network and hub design configurations. Each is consistent with classical notions of creating process efficiency, improving productivity, reducing costs and generally creating economies of scale through notions of bulk optimisation. Whilst there is a growing abundance of papers discussing both the network design and hub operational components mentioned above, there is a shortcoming in the overall analysis when it comes to discussing the “spoke-terminal” of hub-and-spoke freight distribution systems and their capabilities for handling the diverse and discrete customer profiles of freight that multi-user LTL hub-and-spoke networks typically handle over the “last-mile” of the delivery, in particular, a mix of retail and non-retail customers. A simulation study is undertaken to investigate the impact on operational performance when the current combined spoke-terminal delivery tours are separated by ‘profile-type’ (i.e. retail or nonretail). The results indicate that a potential improvement in delivery performance can be made by separating retail and non-retail delivery runs at the spoke-terminal and that dedicated retail and non-retail delivery tours could be adopted in order to improve customer delivery requirements and adapt hub-deployed policies. The study also leverages key operator experiences to highlight the main practical implementation challenges when integrating the observed simulation results into the real-world. The study concludes that DES be harnessed as an enabling device to develop a ‘guide policy’. This policy needs to be flexible and should be applied in stages, taking into account the growing retail-exposure.
Resumo:
Александър В. Архангелски, Митрофан М. Чобан, Екатерина П. Михайлова - Въведени са понятията o-хомогенно пространство, lo-хомогенно пространство, do-хомогенно пространство и co-хомогенно пространство. Показано е, че ако lo-хомогенно пространство X има отворено подпространство, което е q-пълно, то и самото X е q-пълно. Показано е, че ако lo-хомогенно пространство X съдържа навсякъде гъсто екстремално несвързано подпространство, тогава X е екстремално несвързано.
Resumo:
Report published in the Proceedings of the National Conference on "Education and Research in the Information Society", Plovdiv, May, 2014
Resumo:
2000 Mathematics Subject Classification: 53C42, 53C15.
Resumo:
SSince the external dimension of the European Union’s Justice and Home Affairs (JHA) began to be considered, a substantial amount of literature has been dedicated to discussing how the EU is cooperating with non-member states in order to counter problems such as terrorism, organized crime and illegal migration. According to the EU, the degree of security interconnectedness has become so relevant that threats can only be adequately controlled if there is effective concerted regional action. This reasoning has led the EU to develop a number of instruments, which have resulted in the exporting of certain elements of its JHA policies, either through negotiation or socialization. Although the literature has explored how this transfer has been applied to the field of terrorism and immigration, very little has been written on the externalisation of knowledge, practice and norms in the area of organized crime. This article proposes to bridge this gap by looking at EU practice in the development of the external dimension of organized crime policies, through the theoretical lens of the EU governance framework.
Resumo:
The purpose of this study was to determine if the political culture of the Miami Cuban exile community was a significant factor in creating the environment that led to the 1996 fiscal crisis of the City of Miami. The study performed an ethnographic case study that utilized a triangulation strategy which included both qualitative and quantitative methods. Focus groups were conducted to ascertain qualitative and quantitative data as to differences among ethnic and generational groups regarding notions of governance, public administration practices, and overall political values and core beliefs. Quantitative data was obtained through a five year and seven month review of newspaper articles from two periodicals based in Miami-Dade County. A review was also conducted of secondary data in audit and management reports, blue ribbon commission studies, Certified Public Manager (CPM) enrollment, and legal case decisions to examine the administrative practices of the City of Miami leading up to and subsequent to its fiscal crisis. The study found that a political subculture of caudillismo was present in Cuban exile core areas of Miami that appears to have had an influence on the administrative practices and notions of governance that led to the fiscal crisis. The author concludes that an imported foreign political culture has imposed itself as a subculture in core areas of the exile community and that the operationalization of this subculture has manifested itself in non-mainstream notions of governance and public administration practices. ^
Resumo:
Mediation techniques provide interoperability and support integrated query processing among heterogeneous databases. While such techniques help data sharing among different sources, they increase the risk for data security, such as violating access control rules. Successful protection of information by an effective access control mechanism is a basic requirement for interoperation among heterogeneous data sources. ^ This dissertation first identified the challenges in the mediation system in order to achieve both interoperability and security in the interconnected and collaborative computing environment, which includes: (1) context-awareness, (2) semantic heterogeneity, and (3) multiple security policy specification. Currently few existing approaches address all three security challenges in mediation system. This dissertation provides a modeling and architectural solution to the problem of mediation security that addresses the aforementioned security challenges. A context-aware flexible authorization framework was developed in the dissertation to deal with security challenges faced by mediation system. The authorization framework consists of two major tasks, specifying security policies and enforcing security policies. Firstly, the security policy specification provides a generic and extensible method to model the security policies with respect to the challenges posed by the mediation system. The security policies in this study are specified by 5-tuples followed by a series of authorization constraints, which are identified based on the relationship of the different security components in the mediation system. Two essential features of mediation systems, i. e., relationship among authorization components and interoperability among heterogeneous data sources, are the focus of this investigation. Secondly, this dissertation supports effective access control on mediation systems while providing uniform access for heterogeneous data sources. The dynamic security constraints are handled in the authorization phase instead of the authentication phase, thus the maintenance cost of security specification can be reduced compared with related solutions. ^
Resumo:
Security remains a top priority for organizations as their information systems continue to be plagued by security breaches. This dissertation developed a unique approach to assess the security risks associated with information systems based on dynamic neural network architecture. The risks that are considered encompass the production computing environment and the client machine environment. The risks are established as metrics that define how susceptible each of the computing environments is to security breaches. ^ The merit of the approach developed in this dissertation is based on the design and implementation of Artificial Neural Networks to assess the risks in the computing and client machine environments. The datasets that were utilized in the implementation and validation of the model were obtained from business organizations using a web survey tool hosted by Microsoft. This site was designed as a host site for anonymous surveys that were devised specifically as part of this dissertation. Microsoft customers can login to the website and submit their responses to the questionnaire. ^ This work asserted that security in information systems is not dependent exclusively on technology but rather on the triumvirate people, process and technology. The questionnaire and consequently the developed neural network architecture accounted for all three key factors that impact information systems security. ^ As part of the study, a methodology on how to develop, train and validate such a predictive model was devised and successfully deployed. This methodology prescribed how to determine the optimal topology, activation function, and associated parameters for this security based scenario. The assessment of the effects of security breaches to the information systems has traditionally been post-mortem whereas this dissertation provided a predictive solution where organizations can determine how susceptible their environments are to security breaches in a proactive way. ^
Resumo:
Catastrophic failure from intentional terrorist attacks on surface transportation infrastructure could he detrimental to the society. In order to minimize the vulnerabilities and to ensure a safe transportation system, the issue of security for transportation structures, primarily bridges, which are subjected to man-made hazards is investigated in this study. A procedure for identifying and prioritizing "critical bridges" using a screening and prioritization processes is established. For each of the "critical" bridges, a systematic risk-based assessment approach is proposed that takes into account the combination of threat occurrence likelihood, its consequences, and the socioeconomic importance of the bridge. A series of effective security countermeasures are compiled in the four categories of deterrence, detection, defense and mitigation to help reduce the vulnerability of critical bridges. The concepts of simplified equivalent I-shape cross section and virtual materials are proposed for integration into a nonlinear finite element model, which helps assess the performance of reinforced concrete structures with and without composite retrofit or hardening measures under blast loading. A series of parametric studies are conducted for single column and two-column pier frame systems as well as for an entire bridge. The parameters considered include column height, column type, concrete strength, longitudinal steel reinforcement ratio, thickness, fiber angle and tensile strength of the fiber reinforced polymer (FRP) tube, shape of the cross section, damping ratio and different bomb sizes. The study shows the benefits of hardening with composites against blast loading. The effect of steel reinforcement on blast resistance of the structure is more significant than the effect of concrete compressive strength. Moreover, multiple blasts do not necessarily lead to a more severe destruction than a single detonation at a strategically vulnerable location on the bridges.
Resumo:
This multi-disciplinary research project explores the religious and cultural foundations within the "master commemorative narratives" that frame Israeli and Iranian political discourse. In articulating their grievances against one another, Israeli and Iranian leaders express the tensions between religion, nationalism, and modernity in their own societies. The theoretical and methodological approach of this dissertation is constructivist-interpretivist. The concept of "master commemorative narratives" is adapted from Yael Zerubavel's study of ritualized remembrance in Israeli political culture, and applied to both Israeli and Iranian foreign policy. Israel’s master commemorative narrative draws heavily upon the language of the Hebrew Bible, situating foreign policy discourse within a paradigm of covenantal patrimony, exile, and return, despite the unrelenting hostility of eternal enemies and "the nations." Iran’s master commemorative narrative expresses Iranian suspicion of foreign encroachment and interference, and of the internal corruption that they engender, sacralizing resistance to the forces of evil in the figurative language and myths of pre-Islamic tradition and of Shi'a Islam. Using a constructivist-interpretive methodological approach, this research offers a unique interpretive analysis of the parallels between these narratives, where they intersect, and where they come into conflict. It highlights both the broad appeal and the diverse challenges to the components of these "master" narratives within Israeli and Iranian politics and society. The conclusion of this study explains the ways in which the recognition of religious and cultural conflicts through the optic of master commemorative narratives can complement the perspectives of other theoretical approaches and challenge the conventions of Security Studies. It also suggests some of the potential practical applications of this research in devising more effective international diplomacy.
Resumo:
What actors and processes at what levels of analysis and through what mechanisms have pushed Iran's nuclear program (INP) towards being designated as a proliferation threat (securitization)? What actors and processes at what levels of analysis and through what mechanisms have pushed Iran's nuclear program away from being designated as an existential threat (de-securitization)? What has been the overall balance of power and interaction dynamics of these opposing forces over the last half-century and what is their most likely future trajectory? ^ Iran's nuclear story can be told as the unfolding of constant interaction between state and non-state forces of "nuclear securitization" and "nuclear de-securitization." Tracking the crisscrossing interaction between these different securitizing and de-securitizing actors in a historical context constitutes the central task of this project. ^ A careful tracing of "security events" on different analytical levels reveals the broad contours of the evolutionary trajectory of INP and its possible future path(s). Out of this theoretically conscious historical narrative, one can make informed observations about the overall thrust of INP along the securitization - de-securitization continuum. ^ The main contributions of this work are three fold: First, it brings a fresh theoretical perspective on Iran's proliferation behavior by utilizing the "securitization" theory tracing the initial indications of the threat designation of INP all the way back to the mid 1970s. Second, it gives a solid and thematically grounded historical texture to INP by providing an intimate engagement with the persons, processes, and events of Tehran's nuclear pursuit over half a century. Third, it demonstrates how INP has interacted with and even at times transformed the NPT as the keystone of the non-proliferation regime, and how it has affected and injected urgency to the international discourse on nuclear proliferation specifically in the Middle East.^
Resumo:
A difficult transition to a new paradigm of Democratic Security and the subsequent process of military restructuring during the nineties led El Salvador, Honduras, Guatemala and Nicaragua to re-consider their old structures and functions of their armed forces and police agencies. This study compares the institutions in the four countries mentioned above to assess their current condition and response capacity in view of the contemporary security challenges in Central America. This report reveals that the original intention of limiting armies to defend and protect borders has been threatened by the increasing participation of armies in public security. While the strength of armies has been consolidated in terms of numbers, air and naval forces have failed to become strengthened or sufficiently developed to effectively combat organized crime and drug trafficking and are barely able to conduct air and sea operations. Honduras has been the only country that has maintained a proportional distribution of its armed forces. However, security has been in the hands of a Judicial Police, supervised by the Public Ministry. The Honduran Judicial Police has been limited to exercising preventive police duties, prohibited from carrying out criminal investigations. Nicaragua, meanwhile, possesses a successful police force, socially recognized for maintaining satisfactory levels of security surpassing the Guatemalan and El Salvadoran police, which have not achieved similar results despite of having set up a civilian police force separate from the military. El Salvador meanwhile, has excelled in promoting a Police Academy and career professional education, even while not having military attachés in other countries. Regarding budgetary issues, the four countries allocate almost twice the amount of funding on their security budgets in comparison to what is allocated to their defense budgets. However, spending in both areas is low when taking into account each country's GDP as well as their high crime rates. Regional security challenges must be accompanied by a professionalization of the regional armies focused on protecting and defending borders. Therefore, strong institutional frameworks to support the fight against crime and drug trafficking are required. It will require the strengthening of customs, greater control of illicit arms trafficking, investment in education initiatives, creating employment opportunities and facilitating significant improvements in the judicial system, as well as its accessibility to the average citizen.
Resumo:
Hearing of the news of the death of Diana, Princess of Wales, in a traffic accident, is taken as an analogue for being a percipient but uninvolved witness to a crime, or a witness to another person's sudden confession to some illegal act. This event (known in the literature as a “reception event”) has previously been hypothesized to cause one to form a special type of memory commonly known as a “flashbulb memory” (FB) (Brown and Kulik, 1977). FB's are hypothesized to be especially resilient against forgetting, highly detailed including peripheral details, clear, and inspiring great confidence in the individual for their accuracy. FB's are dependent for their formation upon surprise, emotional valence, and impact, or consequentiality to the witness of the initiating event. FB's are thought to be enhanced by frequent rehearsal. FB's are very important in the context of criminal investigation and litigation in that investigators and jurors usually place great store in witnesses, regardless of their actual accuracy, who claim to have a clear and complete recollection of an event, and who express this confidently. Therefore, the lives, or at least the freedom, of criminal defendants, and the fortunes of civil litigants hang on the testimony of witnesses professing to have FB's. ^ In this study, which includes a large and diverse sample (N = 305), participants were surveyed within 2–4 days after hearing of the fatal accident, and again at intervals of 2 and 4 weeks, 6, 12, and 18 months. Contrary to the FB hypothesis, I found that participants' FB's degraded over time beginning at least as early as two weeks post event. At about 12 months the memory trace stabilized, resisting further degradation. Repeated interviewing did not have any negative affect upon accuracy, contrary to concerns in the literature. Analysis by correlation and regression indicated no effect or predictive power for participant age, emotionality, confidence, or student status, as related to accuracy of recall; nor was participant confidence in accuracy predicted by emotional impact as hypothesized. Results also indicate that, contrary to the notions of investigators and jurors, witnesses become more inaccurate over time regardless of their confidence in their memories, even for highly emotional events. ^
Resumo:
This paper deals with finding the maximum number of security policies without conflicts. By doing so we can remove security loophole that causes security violation. We present the problem of maximum compatible security policy and its relationship to the problem of maximum acyclic subgraph, which is proved to be NP-hard. Then we present a polynomial-time approximation algorithm and show that our result has approximation ratio for any integer with complexity .
Resumo:
This thesis compares two perspectives on the production of Holocaust memory: a novel that leads up to The Holocaust in Britain and one that reflects the hindsight perspective of a liberator in the Soviet Union. The novels are Virginia Woolf’s BETWEEN THE ACTS and Vasily Grossman’s LIFE AND FATE. The analysis offers a locus of analysis for the diasporic literary energy created by the catastrophe in the 20th and 21st centuries. The project offers a theorized standpoint on the role of literature on official historical archives. Proposing a method through which contemporary readers can engage the diasporic event of The Holocaust, the project adopts both the extended metaphor and literal expression of soundscapes. Soundscapes encompass the immaterial processes of memorialization and the literal sonic textures developed in Holocaust novels. The critical perspective incorporates contemporary notions of narratology, archival practices, and cultural manifestations of language into the notion of literary ethnomusicology.