675 resultados para Munich


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The recently developed network-wide real-time signal control strategy TUC has been implemented in three traffic networks with quite different traffic and control infrastructure characteristics: Chania, Greece (23 junctions); Southampton, UK (53 junctions); and Munich, Germany (25 junctions), where it has been compared to the respective resident real-time signal control strategies TASS, SCOOT and BALANCE. After a short outline of TUC, the paper describes the three application networks; the application, demonstration and evaluation conditions; as well as the comparative evaluation results. The main conclusions drawn from this high-effort inter-European undertaking is that TUC is an easy-to-implement, inter-operable, low-cost real-time signal control strategy whose performance, after very limited fine-tuning, proved to be better or, at least, similar to the ones achieved by long-standing strategies that were in most cases very well fine-tuned over the years in the specific networks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes how the recently developed network-wide real-time signal control strategy TUC has been implemented in three traffic networks with quite different traffic and control infrastructure characteristics: Chania, Greece (23 junctions); Southampton, U.K. (53 junctions); and Munich, Germany (25 junctions), where it has been compared to the respective resident real-time signal control strategies TASS, SCOOT and BALANCE. After a short outline of TUC, the paper describes the three application networks; the application, demonstration and evaluation conditions; as well as the comparative evaluation results. The main conclusions drawn from this high-effort inter-European undertaking is that TUC is an easy-to-implement, inter-operable, low-cost real-time signal control strategy whose performance, after limited fine-tuning, proved to be better or, at least, similar to the ones achieved by long-standing strategies that were in most cases very well fine-tuned over the years in the specific networks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In previous work we showed how to verify a compiler for a small language with exceptions. In this article we show how to calculate, as opposed to verify, an abstract machine for this language. The key step is the use of Reynold's defunctionalization, an old program transformation technique that has recently been rejuvenated by the work of Danvy et al.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web form’s input and query strings used in web requests with malicious intent to compromise the security of an organisation’s confidential data stored at the back-end database. The database is the most valuable data source, and thus, intruders are unrelenting in constantly evolving new techniques to bypass the signature’s solutions currently provided in Web Application Firewalls (WAF) to mitigate SQLIA. There is therefore a need for an automated scalable methodology in the pre-processing of SQLIA features fit for a supervised learning model. However, obtaining a ready-made scalable dataset that is feature engineered with numerical attributes dataset items to train Artificial Neural Network (ANN) and Machine Leaning (ML) models is a known issue in applying artificial intelligence to effectively address ever evolving novel SQLIA signatures. This proposed approach applies numerical attributes encoding ontology to encode features (both legitimate web requests and SQLIA) to numerical data items as to extract scalable dataset for input to a supervised learning model in moving towards a ML SQLIA detection and prevention model. In numerical attributes encoding of features, the proposed model explores a hybrid of static and dynamic pattern matching by implementing a Non-Deterministic Finite Automaton (NFA). This combined with proxy and SQL parser Application Programming Interface (API) to intercept and parse web requests in transition to the back-end database. In developing a solution to address SQLIA, this model allows processed web requests at the proxy deemed to contain injected query string to be excluded from reaching the target back-end database. This paper is intended for evaluating the performance metrics of a dataset obtained by numerical encoding of features ontology in Microsoft Azure Machine Learning (MAML) studio using Two-Class Support Vector Machines (TCSVM) binary classifier. This methodology then forms the subject of the empirical evaluation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We show a simulation model for capacity analysis in mobile systems using a geographic information system (GIS) based tool, used for coverage calculations and frequency assignment, and MATLAB. The model was developed initially for “narrowband” CDMA and TDMA, but was modified for WCDMA. We show also some results for a specific case in “narrowband” CDMA

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The text analyses the intelligence activity against Poland in the period 1944-1989. The paper also contains a case study, i.e. an analysis of the American intelligence service activity held against Poland. While examining the research thesis, the author used the documents and analyses prepared by the Ministry of Internal Affairs. In order to best illustrate the point, the author presented a number of cases of persons who spied for the USA, which was possible thanks to the analysis of the training materials of the Ministry of Internal Affairs directed to the officers of the Security Service and the Citizens’ Militia. The text tackles the following issues: (1) to what extent did the character of the socio-political system influence the number of persons convicted for espionage against Poland in the period under examination?, (2) what was the level of interest of the foreign intelligence services in Poland before the year 1990?, (3) is it possible to indicate the specificity of the U.S. intelligence activity against Poland? 1) The analysis of data indicates that the period 1946-1956 witnessed a great number of convictions for espionage, which is often associated with the peculiar political situation in Poland of that time. Up to 1953, the countries of the Eastern bloc had reproduced the Stalin’s system, which only ceased due to the death of Stalin himself. Since then, the communist systems gradually transformed into the system of nomenklatura. Irrespective of these changes, Poland still witnessed a wave of repressions, which resulted from the threats continuously looming over the communist authorities – combating the anti-communist underground movement, fighting with the Ukrainian Insurgent Army, the Polish government-in-exile, possible revisionism of borders, social discontent related to the socio-political reforms. Hence, a great number of convictions for espionage at that time could be ascribed to purely political sentences. Moreover, equally significant was the fact that the then judicial practice was preoccupied assessing negatively any contacts and relations with foreigners. This excessive number of convictions could ensue from other criminal-law provisions, which applied with respect to the crimes against the State, including espionage. What is also important is the fact that in the Stalin’s period the judiciary personnel acquired their skills and qualifications through intensive courses in law with the predominant spirit of the theory of evidence and law by Andrey Vyshinsky. Additionally, by the decree of 1944 the Penal Code of the Polish Armed Forces was introduced; the code envisaged the increase in the number of offences classified as penalised with death penalty, whereas the high treason was subject to the military jurisdiction (the civilians were prosecuted in military courts till 1955; the espionage, however, still stood under the military jurisdiction). In 1946, there was introduced the Decree on particularly dangerous crimes in the period of the State’s recovery, which was later called a Small Penal Code. 2) The interest that foreign intelligence services expressed in relation to Poland was similar to the one they had in all countries of Eastern and Central Europe. In the case of Poland, it should be noted that foreign intelligence services recruited Polish citizens who had previously stayed abroad and after WWII returned to their home country. The services also gathered information from Poles staying in immigrant camps (e.g. in FRG). The activity of the American intelligence service on the territory of FRG and West Berlin played a key role. The documents of the Ministry of Internal Affairs pointed to the global range of this activity, e.g. through the recruitment of Polish sailors in the ports of the Netherlands, Japan, etc. In line with the development in the 1970s, espionage, which had so far concentrated on the defence and strategic sectors, became focused on science and technology of the People’s Republic of Poland. The acquisition of collaborators in academic circles was much easier, as PRL opened to academic exchange. Due to the system of visas, the process of candidate selection for intelligence services (e.g. the American) began in embassies. In the 1980s, the activity of the foreign intelligence services concentrated on the specific political situation in Poland, i.e. the growing significance of the “Solidarity” social movement. 3) The specificity of the American intelligence activity against Poland was related to the composition of the residency staff, which was the largest in comparison to other Western countries. The wide range of these activities can be proved by the quantitative data of convictions for espionage in the years 1944-1984 (however, one has to bear in mind the factors mentioned earlier in the text, which led to the misinterpretation of these data). Analysing the data and the documents prepared by the Ministry of Internal Affairs, one should treat them with caution, as, frequently, the Polish counter-intelligence service used to classify the ordinary diplomatic practice and any contacts with foreigners as espionage threats. It is clearly visible in the language of the training materials concerned with “secret service methods of the intelligence activity” as well as in the documents on operational activities of the Security Service in relation to foreigners. The level of interest the USA had in Poland was mirrored in the classification of diplomatic posts, according to which Warsaw occupied the second place (the so-called Group “B”) on the three-point scale. The CIA experienced spectacular defeats during their activity in Poland: supporting the Polish underground anti-communist organisation Freedom and Independence and the so-called Munich-Berg episode (both cases took place in the 1950s). The text focuses only on selected issues related to the espionage activities against Poland. Similarly, the analysis of the problem has been based on selected sources, which has limited the research scope - however, it was not the aim of the author to present the espionage activity against Poland in a comprehensive way. In order to assess the real threat posed by the espionage activity, one should analyse the case of persons convicted for espionage in the period 1944-1989, as the available quantitative data, mentioned in the text, cannot constitute an explicit benchmark for the scale of espionage activity. The inaccuracies in the interpretation of data and variables, which can affect the evaluation of this phenomenon, have been pointed out in the text.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

info:eu-repo/semantics/nonPublished

Relevância:

10.00% 10.00%

Publicador:

Resumo:

PV energy is the direct conversion of solar radiation into electricity. In this paper, an analysis of the influence of parameters such as global irradiance or temperature in the performance of a PV installation has been carried out. A PV module was installed in a building at the University of Málaga, and these parameters were experimentally determined for different days and different conditions of irradiance and temperature. Moreover, IV curves were obtained under these conditions to know the open-circuit voltage and the short-circuit current of the module. With this information, and using the first law of thermodynamics, an energy analysis was performed to determine the energy efficiency of the installation. Similarly, using the second law of thermodynamics, an exergy analysis is used to obtain the exergy efficiency. The results show that the energy efficiency varies between 10% and 12% and the exergy efficiency between 14% and 17%. It was concluded that the exergy analysis is more suitable for studying the performance, and that only electric exergy must be considered as useful exergy. This exergy efficiency can be improved if heat is removed from the PV module surface, and an optimal temperature is reached.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

“Appeaser”; since the Second World War there is perhaps no other label that prime ministers and presidents in the English-speaking world have strived so hard to avoid. It is extraordinary how powerful and long-lasting the term appeasement, the name Neville Chamberlain and the place Munich have been in the discourse of post-war international relations. It is a reflection of the all-powerful historical legacy of the Second World War that these terms still resonate with policy makers and their publics well into the twenty-first century. Such a phenomenon deserves scholarly attention and R. Gerald Hughes has done justice to this topic in his very fine book The Postwar Legacy of Appeasement: British Foreign Policy Since 1945.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

La presente investigación pretendió incorporar el uso intensivo de TIC en los procedimientos establecidos y necesarios en los procesos de generación, distribución y control de la energía, lo que se expresa en un manual para el sistema de gestión humana de la organización analizada. La investigación partió de un levantamiento de un estado del arte, continuó con la realización de un análisis de actitudes y aptitudes de los colaboradores, basado en propuestas teóricas y mejores prácticas existentes del medio, y, por último, concluyó con un manual de gestión humana en el que se indican las competencias en los diferentes perfiles de la organización para el uso de TIC y su aplicación, con el propósito de alinearse con las perspectivas y objetivos de la organización analizada al tener como base la perdurabilidad y la competitividad de la misma.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El presente escrito se ocupa de estudiar el nexo de causalidad como elemento estructural de la responsabilidad cuando éste es difuso. Para ello, se pretende abordar la pérdida de la oportunidad como una teoría especial de causalidad que tiene lugar cuando el nexo causal no resulta claro, lo cual contradice la tesis preponderante de la doctrina y la jurisprudencia tradicional según la cual, la pérdida de la oportunidad es un criterio autónomo del daño. En su contenido se realiza una explicación del por qué se entiende la pérdida de la oportunidad como una teoría especial de causalidad y no como un criterio autónomo de daño, haciendo énfasis en el elemento de certeza que caracteriza al daño. Posteriormente, se advierte del tratamiento que la jurisprudencia le ha dado a la pérdida de la oportunidad. A su turno, el presente documento, indica la naturaleza jurídica de la pérdida de la oportunidad, afirmando que es una inferencia lógica que realiza el juez y no un hecho que altere el estado de las cosas como si sucede con el daño. Finalmente, se aborda la prueba de la teoría de la pérdida de la oportunidad mediante un cálculo de probabilidades y se identifican los pasos para realizar una adecuada reparación integral.