664 resultados para Munich
Resumo:
Nature-based solutions promoting green and blue urban areas have significant potential to decrease the vulnerability and enhance the resilience of cities in light of climatic change. They can thereby help to mitigate climate change-induced impacts and serve as proactive adaptation options for municipalities. We explore the various contexts in which nature-based solutions are relevant for climate mitigation and adaptation in urban areas, identify indicators for assessing the effectiveness of nature-based solutions and related knowledge gaps. In addition, we explore existing barriers and potential opportunities for increasing the scale and effectiveness of nature-based solution implementation. The results were derived from an inter- and transdisciplinary workshop with experts from research, municipalities, policy, and society. As an outcome of the workshop discussions and building on existing evidence, we highlight three main needs for future science and policy agendas when dealing with nature-based solutions: (i) produce stronger evidence on nature-based solutions for climate change adaptation and mitigation and raise awareness by increasing implementation; (ii) adapt for governance challenges in implementing nature-based solutions by using reflexive approaches, which implies bringing together new networks of society, nature-based solution ambassadors, and practitioners; (iii) consider socio-environmental justice and social cohesion when implementing nature-based solutions by using integrated governance approaches that take into account an integrative and transdisciplinary participation of diverse actors. Taking these needs into account, nature-based solutions can serve as climate mitigation and adaptation tools that produce additional cobenefits for societal well-being, thereby serving as strong investment options for sustainable urban planning.
Resumo:
Understanding the dynamics of urban ecosystem services is a necessary requirement for adequate planning, management, and governance of urban green infrastructure. Through the three-year Urban Biodiversity and Ecosystem Services (URBES) research project, we conducted case study and comparative research on urban biodiversity and ecosystem services across seven cities in Europe and the United States. Reviewing > 50 peer-reviewed publications from the project, we present and discuss seven key insights that reflect cumulative findings from the project as well as the state-of-the-art knowledge in urban ecosystem services research. The insights from our review indicate that cross-sectoral, multiscale, interdisciplinary research is beginning to provide a solid scientific foundation for applying the ecosystem services framework in urban areas and land management. Our review offers a foundation for seeking novel, nature-based solutions to emerging urban challenges such as wicked environmental change issues.
Resumo:
El prólogo del De rerum natura de Lucrecio (1.1-148) parece ser un tema gastado: ha sido tratado decenas de veces tanto por su excelente calidad como por los problemas que plantea. Pero esperamos poder dar un nuevo sentido y solución a ambos aspectos. En primer lugar, el himno a Venus no es una mera convención, sino que respira sentimiento religioso; Venus no personifica a la naturaleza, sino al placer y la felicidad y ni la hegemonía que se dice ejerce Venus, ni las plegarias que contiene el himno contradicen la teología epicúrea. Todavía más, nos parece que el himno constituye una auténtica epifanía religiosa muy propia de la teología epicúrea. En segundo lugar, suponiendo que el autor ha tomado como tema compartido los schemata o grados de dificultad de la intellectio retórica en el texto de 1.50-148, se intentan solucionar las dificultades de coherencia del texto.
Resumo:
La invocación del ideal del mos maiorum, entendido como conjunto de virtudes o rasgos ejemplares de los romanos, ha sido estudiada repetidamente en los textos de Cicerón. Analiza el tópico en relación con la discusión en torno a la identidad romana en textos del siglo I a.C. y delimita tres empleos diferentes: uno al que define como típicamente aristocrático, referido a la ascendencia noble de un individuo en particular; un segundo uso que, en vez de individualizar, amalgama a todos los ancestros en un mismo conjunto y establece una continuidad entre pasado y presente; finalmente, una tercera modalidad que propone una ruptura total entre el mundo de los antepasados y el de los contemporáneos. En este trabajo indagaremos el funcionamiento de este tópico en De diuinatione y De natura deorum de Cicerón. Desde nuestro punto de vista, el ideal del mos maiorum no solamente involucra virtudes éticas y morales sino que también supone una especial actitud con respecto a los dioses y el culto que resulta central en la definición de la identidad romana.
Resumo:
We present a dynamic distributed load balancing algorithm for parallel, adaptive finite element simulations using preconditioned conjugate gradient solvers based on domain-decomposition. The load balancer is designed to maintain good partition aspect ratios. It calculates a balancing flow using different versions of diffusion and a variant of breadth first search. Elements to be migrated are chosen according to a cost function aiming at the optimization of subdomain shapes. We show how to use information from the second step to guide the first. Experimental results using Bramble's preconditioner and comparisons to existing state-of-the-art balancers show the benefits of the construction.
Resumo:
The recently developed network-wide real-time signal control strategy TUC has been implemented in three traffic networks with quite different traffic and control infrastructure characteristics: Chania, Greece (23 junctions); Southampton, UK (53 junctions); and Munich, Germany (25 junctions), where it has been compared to the respective resident real-time signal control strategies TASS, SCOOT and BALANCE. After a short outline of TUC, the paper describes the three application networks; the application, demonstration and evaluation conditions; as well as the comparative evaluation results. The main conclusions drawn from this high-effort inter-European undertaking is that TUC is an easy-to-implement, inter-operable, low-cost real-time signal control strategy whose performance, after very limited fine-tuning, proved to be better or, at least, similar to the ones achieved by long-standing strategies that were in most cases very well fine-tuned over the years in the specific networks.
Resumo:
This paper describes how the recently developed network-wide real-time signal control strategy TUC has been implemented in three traffic networks with quite different traffic and control infrastructure characteristics: Chania, Greece (23 junctions); Southampton, U.K. (53 junctions); and Munich, Germany (25 junctions), where it has been compared to the respective resident real-time signal control strategies TASS, SCOOT and BALANCE. After a short outline of TUC, the paper describes the three application networks; the application, demonstration and evaluation conditions; as well as the comparative evaluation results. The main conclusions drawn from this high-effort inter-European undertaking is that TUC is an easy-to-implement, inter-operable, low-cost real-time signal control strategy whose performance, after limited fine-tuning, proved to be better or, at least, similar to the ones achieved by long-standing strategies that were in most cases very well fine-tuned over the years in the specific networks.
Resumo:
In previous work we showed how to verify a compiler for a small language with exceptions. In this article we show how to calculate, as opposed to verify, an abstract machine for this language. The key step is the use of Reynold's defunctionalization, an old program transformation technique that has recently been rejuvenated by the work of Danvy et al.
Resumo:
SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web form’s input and query strings used in web requests with malicious intent to compromise the security of an organisation’s confidential data stored at the back-end database. The database is the most valuable data source, and thus, intruders are unrelenting in constantly evolving new techniques to bypass the signature’s solutions currently provided in Web Application Firewalls (WAF) to mitigate SQLIA. There is therefore a need for an automated scalable methodology in the pre-processing of SQLIA features fit for a supervised learning model. However, obtaining a ready-made scalable dataset that is feature engineered with numerical attributes dataset items to train Artificial Neural Network (ANN) and Machine Leaning (ML) models is a known issue in applying artificial intelligence to effectively address ever evolving novel SQLIA signatures. This proposed approach applies numerical attributes encoding ontology to encode features (both legitimate web requests and SQLIA) to numerical data items as to extract scalable dataset for input to a supervised learning model in moving towards a ML SQLIA detection and prevention model. In numerical attributes encoding of features, the proposed model explores a hybrid of static and dynamic pattern matching by implementing a Non-Deterministic Finite Automaton (NFA). This combined with proxy and SQL parser Application Programming Interface (API) to intercept and parse web requests in transition to the back-end database. In developing a solution to address SQLIA, this model allows processed web requests at the proxy deemed to contain injected query string to be excluded from reaching the target back-end database. This paper is intended for evaluating the performance metrics of a dataset obtained by numerical encoding of features ontology in Microsoft Azure Machine Learning (MAML) studio using Two-Class Support Vector Machines (TCSVM) binary classifier. This methodology then forms the subject of the empirical evaluation.
Resumo:
We show a simulation model for capacity analysis in mobile systems using a geographic information system (GIS) based tool, used for coverage calculations and frequency assignment, and MATLAB. The model was developed initially for “narrowband” CDMA and TDMA, but was modified for WCDMA. We show also some results for a specific case in “narrowband” CDMA
Resumo:
The text analyses the intelligence activity against Poland in the period 1944-1989. The paper also contains a case study, i.e. an analysis of the American intelligence service activity held against Poland. While examining the research thesis, the author used the documents and analyses prepared by the Ministry of Internal Affairs. In order to best illustrate the point, the author presented a number of cases of persons who spied for the USA, which was possible thanks to the analysis of the training materials of the Ministry of Internal Affairs directed to the officers of the Security Service and the Citizens’ Militia. The text tackles the following issues: (1) to what extent did the character of the socio-political system influence the number of persons convicted for espionage against Poland in the period under examination?, (2) what was the level of interest of the foreign intelligence services in Poland before the year 1990?, (3) is it possible to indicate the specificity of the U.S. intelligence activity against Poland? 1) The analysis of data indicates that the period 1946-1956 witnessed a great number of convictions for espionage, which is often associated with the peculiar political situation in Poland of that time. Up to 1953, the countries of the Eastern bloc had reproduced the Stalin’s system, which only ceased due to the death of Stalin himself. Since then, the communist systems gradually transformed into the system of nomenklatura. Irrespective of these changes, Poland still witnessed a wave of repressions, which resulted from the threats continuously looming over the communist authorities – combating the anti-communist underground movement, fighting with the Ukrainian Insurgent Army, the Polish government-in-exile, possible revisionism of borders, social discontent related to the socio-political reforms. Hence, a great number of convictions for espionage at that time could be ascribed to purely political sentences. Moreover, equally significant was the fact that the then judicial practice was preoccupied assessing negatively any contacts and relations with foreigners. This excessive number of convictions could ensue from other criminal-law provisions, which applied with respect to the crimes against the State, including espionage. What is also important is the fact that in the Stalin’s period the judiciary personnel acquired their skills and qualifications through intensive courses in law with the predominant spirit of the theory of evidence and law by Andrey Vyshinsky. Additionally, by the decree of 1944 the Penal Code of the Polish Armed Forces was introduced; the code envisaged the increase in the number of offences classified as penalised with death penalty, whereas the high treason was subject to the military jurisdiction (the civilians were prosecuted in military courts till 1955; the espionage, however, still stood under the military jurisdiction). In 1946, there was introduced the Decree on particularly dangerous crimes in the period of the State’s recovery, which was later called a Small Penal Code. 2) The interest that foreign intelligence services expressed in relation to Poland was similar to the one they had in all countries of Eastern and Central Europe. In the case of Poland, it should be noted that foreign intelligence services recruited Polish citizens who had previously stayed abroad and after WWII returned to their home country. The services also gathered information from Poles staying in immigrant camps (e.g. in FRG). The activity of the American intelligence service on the territory of FRG and West Berlin played a key role. The documents of the Ministry of Internal Affairs pointed to the global range of this activity, e.g. through the recruitment of Polish sailors in the ports of the Netherlands, Japan, etc. In line with the development in the 1970s, espionage, which had so far concentrated on the defence and strategic sectors, became focused on science and technology of the People’s Republic of Poland. The acquisition of collaborators in academic circles was much easier, as PRL opened to academic exchange. Due to the system of visas, the process of candidate selection for intelligence services (e.g. the American) began in embassies. In the 1980s, the activity of the foreign intelligence services concentrated on the specific political situation in Poland, i.e. the growing significance of the “Solidarity” social movement. 3) The specificity of the American intelligence activity against Poland was related to the composition of the residency staff, which was the largest in comparison to other Western countries. The wide range of these activities can be proved by the quantitative data of convictions for espionage in the years 1944-1984 (however, one has to bear in mind the factors mentioned earlier in the text, which led to the misinterpretation of these data). Analysing the data and the documents prepared by the Ministry of Internal Affairs, one should treat them with caution, as, frequently, the Polish counter-intelligence service used to classify the ordinary diplomatic practice and any contacts with foreigners as espionage threats. It is clearly visible in the language of the training materials concerned with “secret service methods of the intelligence activity” as well as in the documents on operational activities of the Security Service in relation to foreigners. The level of interest the USA had in Poland was mirrored in the classification of diplomatic posts, according to which Warsaw occupied the second place (the so-called Group “B”) on the three-point scale. The CIA experienced spectacular defeats during their activity in Poland: supporting the Polish underground anti-communist organisation Freedom and Independence and the so-called Munich-Berg episode (both cases took place in the 1950s). The text focuses only on selected issues related to the espionage activities against Poland. Similarly, the analysis of the problem has been based on selected sources, which has limited the research scope - however, it was not the aim of the author to present the espionage activity against Poland in a comprehensive way. In order to assess the real threat posed by the espionage activity, one should analyse the case of persons convicted for espionage in the period 1944-1989, as the available quantitative data, mentioned in the text, cannot constitute an explicit benchmark for the scale of espionage activity. The inaccuracies in the interpretation of data and variables, which can affect the evaluation of this phenomenon, have been pointed out in the text.
Resumo:
info:eu-repo/semantics/nonPublished
Resumo:
PV energy is the direct conversion of solar radiation into electricity. In this paper, an analysis of the influence of parameters such as global irradiance or temperature in the performance of a PV installation has been carried out. A PV module was installed in a building at the University of Málaga, and these parameters were experimentally determined for different days and different conditions of irradiance and temperature. Moreover, IV curves were obtained under these conditions to know the open-circuit voltage and the short-circuit current of the module. With this information, and using the first law of thermodynamics, an energy analysis was performed to determine the energy efficiency of the installation. Similarly, using the second law of thermodynamics, an exergy analysis is used to obtain the exergy efficiency. The results show that the energy efficiency varies between 10% and 12% and the exergy efficiency between 14% and 17%. It was concluded that the exergy analysis is more suitable for studying the performance, and that only electric exergy must be considered as useful exergy. This exergy efficiency can be improved if heat is removed from the PV module surface, and an optimal temperature is reached.