844 resultados para Network Architectures and Security
Resumo:
The chapter examines the compex roles of corruption in state-buioding environments. The first section briefly outlines how statebuilding is conceptualized in this discussion. The second section examines the concept of corruption,and argues that the organization, rather than the scale of corruption, offers a better lens through which its impact can be analyzed. The third section examines the complex relationship between corruption and statebuilding through the lenses of two key aspects of statebuilding – elite settlements, and the provision of public services – and briefly discusses both the complex relationship between corruption and security, and the impact of aid on corruption in statebuilding environments. The fourth section concludes the chapter with a reflection on the implications of the analysis for understanding contemporary statebuilding efforts and policy.
Resumo:
The Nyasaland Emergency in 1959 proved a decisive turning point in the history of the Federation of Rhodesia and Nyasaland, which from 1953 to 1963 brought together the territories of Northern Rhodesia (Zambia), Southern Rhodesia (Zambia) and Nyasaland (Malawi) under a settler-dominated federal government. The British and Nyasaland governments defended the emergency by claiming to have gathered intelligence which showed that the Nyasaland African Congress was preparing a campaign of sabotage and murder. The Devlin Commission, appointed to investigate the emergency, dismissed the evidence of a ‘murder plot’, criticised the Nyasaland government's handling of the Emergency and, notoriously, described Nyasaland as a ‘police state’. This article has two principal aims. First, using the recently declassified papers of the Intelligence and Security Department (ISD) of the Colonial Office, it seeks to provide the first detailed account of what the British government knew of the intelligence relating to the ‘murder plot’ and how they assessed it, prior to the outbreak of the emergency. It demonstrates that officials in the ISD and members of the Security Service adopted a far more cautious attitude towards the intelligence than did Conservative ministers, and had greater qualms about allowing it into the public domain to justify government policy. Second, the article examines the implications of Devlin's use of the phrase ‘police state’ for Nyasaland and for the late colonial state in general. It contrasts Devlin's use of the term with that of security experts in the ISD, who routinely applied it to policing systems that diverged from their own preferred model. Hence, whereas Devlin compared policing in Nyasaland unfavourably with that in Southern Rhodesia, implying, ironically, that Nyasaland was ‘under-policed’ (because there were fewer police per head of population in Nyasaland than in Southern Rhodesia), the ISD regarded the intensive system of policing operated by the British South Africa Police in Southern Rhodesia as characteristic of a ‘police state’. The article suggests that the frequent use of the term ‘police state’ was indicative of broader anxieties about what Britain's legacy would be for the post-independence African state.
Resumo:
Presents findings from separate research projects conducted in the UK and the USA on the impact of e-commerce on retailers and retail property. Examines differences between UK and US retailers along several dimensions: Internet strategies, perceptions of the Internet, barriers to e-commerce growth, and future space requirements. Overall, findings indicate that UK and US retailers have similar attitudes about e-commerce. Specifically, retailers in both samples perceive little threat or impact from e-commerce. Second, barriers to e-commerce growth are similar for UK and US retailers and include fulfillment and security issues. Third, UK and US retailers indicate that their retail space needs will remain the same or increase in the short term, despite the threat of e-commerce. Finally, both sets of retailers believe that entertainment is an important strategy if shopping centers are to remain viable.
Resumo:
The Sea and Land Surface Temperature Radiometer (SLSTR) is a nine channel visible and infrared high precision radiometer designed to provide climate data of global sea and land surface temperatures. The SLSTR payload is destined to fly on the Ocean and Medium-Resolution Land Mission for the ESA/EU Global Monitoring for Environment and Security (GMES) Programme Sentinel-3 mission to measure the sea and land temperature and topography for near real-time environmental and atmospheric climate monitoring of the Earth. In this paper we describe the optical layout of infrared optics in the instrument, spectral thin-film multilayer design, and system channel throughput analysis for the combined interference filter and dichroic beamsplitter coatings to discriminate wavelengths at 3.74, 10.85 & 12.0 μm. The rationale for selection of thin-film materials, deposition technique, and environmental testing, inclusive of humidity, thermal cycling and ionizing radiation testing are also described.
Resumo:
With the fast development of the Internet, wireless communications and semiconductor devices, home networking has received significant attention. Consumer products can collect and transmit various types of data in the home environment. Typical consumer sensors are often equipped with tiny, irreplaceable batteries and it therefore of the utmost importance to design energy efficient algorithms to prolong the home network lifetime and reduce devices going to landfill. Sink mobility is an important technique to improve home network performance including energy consumption, lifetime and end-to-end delay. Also, it can largely mitigate the hot spots near the sink node. The selection of optimal moving trajectory for sink node(s) is an NP-hard problem jointly optimizing routing algorithms with the mobile sink moving strategy is a significant and challenging research issue. The influence of multiple static sink nodes on energy consumption under different scale networks is first studied and an Energy-efficient Multi-sink Clustering Algorithm (EMCA) is proposed and tested. Then, the influence of mobile sink velocity, position and number on network performance is studied and a Mobile-sink based Energy-efficient Clustering Algorithm (MECA) is proposed. Simulation results validate the performance of the proposed two algorithms which can be deployed in a consumer home network environment.
Resumo:
Modern neurostimulation approaches in humans provide controlled inputs into the operations of cortical regions, with highly specific behavioral consequences. This enables causal structure–function inferences, and in combination with neuroimaging, has provided novel insights into the basic mechanisms of action of neurostimulation on dis- tributed networks. For example,more recent work has established the capacity of transcranialmagnetic stimulation (TMS) to probe causal interregional influences, and their interaction with cognitive state changes. Combinations of neurostimulation and neuroimaging now face the challenge of integrating the known physiological effects of neu- rostimulationwith theoretical and biologicalmodels of cognition, for example,when theoretical stalemates between opposing cognitive theories need to be resolved. This will be driven by novel developments, including biologically informedcomputational network analyses for predicting the impactofneurostimulationonbrainnetworks, as well as novel neuroimaging and neurostimulation techniques. Such future developments may offer an expanded set of tools withwhich to investigate structure–function relationships, and to formulate and reconceptualize testable hypotheses about complex neural network interactions and their causal roles in cognition
Resumo:
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyzes the technical, procedural, and managerial responses to securing these systems.
Resumo:
This book is highly topical considering the recent resurgence of violence by the PKK, the incursions into Northern Iraq by the Turkish army and security forces and Turkey’s EU accession negotiations. Turkey has become an increasingly important player in Middle Eastern geopolitics. More than two decades of serious conflict in Turkey are proving to be a barrier to improved relations between Turkey and the EU. This book is the first study to address fully the legal and political dimensions of the conflict, and their impact on mechanisms for conflict resolution in the region, offering a scholarly exploration of a debate that is often politically and emotionally highly charged. Kerim Yildiz and Susan Breau look at the practical application of the law of armed conflicts to the ongoing situation in Turkey and Northern Iraq. The application of the law in this region also means addressing larger questions in international law, global politics and conflict resolution. Examples include belligerency in international law, whether the ‘war on terror’ has resulted in changes to the law of armed conflict and terrorism and conflict resolution. The Kurdish Conflict explores the practical possibilities of conflict resolution in the region, examining the political dynamics of the region, and suggesting where lessons can be drawn from other peace processes, such as in Northern Ireland. This book will be of great value to policy-makers, regional experts, and others interested in international humanitarian law and conflict resolution.
Resumo:
Purpose – The purpose of this study is to address a recent call for additional research on electronic word-of-mouth (eWOM). In response to this call, this study draws on the social network paradigm and the uses and gratification theory (UGT) to propose and empirically test a conceptual framework of key drivers of two types of eWOM, namely in-group and out-of-group. Design/methodology/approach – The proposed model, which examines the impact of usage motivations on eWOM in-group and eWOM out-of-group, is tested in a sample of 302 internet users in Portugal. Findings – Results from the survey show that the different drivers (i.e. mood-enhancement, escapism, experiential learning and social interaction) vary in terms of their impact on the two different types of eWOM. Surprisingly, while results show a positive relationship between experiential learning and eWOM out-of-group, no relationship is found between experiential learning and eWOM in-group. Research limitations/implications – This is the first study investigating the drivers of both eWOM in-group and eWOM out-of-group. Additional research in this area will contribute to the development of a general theory of eWOM. Practical implications – By understanding the drivers of different eWOM types, this study provides guidance to marketing managers on how to allocate resources more efficiently in order to achieve the company's strategic objectives. Originality/value – No published study has investigated the determinants of these two types of eWOM. This is the first study offering empirical considerations of how the various drivers differentially impact eWOM in-group and eWOM out-of-group.
Resumo:
This article is the guest editors' introduction to a special issue on using Social Network Research in the field of Human Resource Management. The goals of the special issue are: (1) to draw attention to the points of integration between the two fields, (2) to showcase research that applies social network perspectives and methodology to issues relevant to HRM and (3) to identify common challenges where future collaborative efforts could contribute to advancements in both fields.
Resumo:
Precipitation forecast data from the ERA-Interim reanalysis (33 years) are evaluated using the daily England and Wales Precipitation (EWP) observations obtained from a rain gauge network. Observed and reanalysis daily precipitation data are both described well by Weibull distributions with indistinguishable shapes but different scale parameters, such that the reanalysis underestimates the observations by an average factor of 22%. The correlation between the observed and ERA-Interim time series of regional, daily precipitation is 0.91. ERA-Interim also captures the statistics of extreme precipitation including a slightly lower likelihood of the heaviest precipitation events (>15 mm day− 1 for the regional average) than indicated by the Weibull fit. ERA-Interim is also closer to EWP for the high precipitation events. Since these carry weight in longer accumulations, a smaller underestimation of 19% is found for monthly mean precipitation. The partition between convective and stratiform precipitation in the ERA-Interim forecast is also examined. In summer both components contribute equally to the total precipitation amount, while in winter the stratiform precipitation is approximately double convective. These results are expected to be relevant to other regions with low orography on the coast of a continent at the downstream end of mid-latitude stormtracks.
Resumo:
Expert systems have been increasingly popular for commercial importance. A rule based system is a special type of an expert system, which consists of a set of ‘if-then‘ rules and can be applied as a decision support system in many areas such as healthcare, transportation and security. Rule based systems can be constructed based on both expert knowledge and data. This paper aims to introduce the theory of rule based systems especially on categorization and construction of such systems from a conceptual point of view. This paper also introduces rule based systems for classification tasks in detail.
Resumo:
Observations of atmospheric conditions and processes in citiesare fundamental to understanding the interactions between the urban surface and weather/climate, improving the performance of urban weather, air quality and climate models, and providing key information for city end-users (e.g. decision-makers, stakeholders, public). In this paper, Shanghai's urban integrated meteorological observation network (SUIMON) and some examples of intended applications are introduced. Its characteristics include being: multi- purpose (e.g. forecast, research, service), multi-function (high impact weather, city climate, special end-users), multi-scale (e.g. macro/meso-, urban-, neighborhood, street canyon), multi-variable (e.g. thermal, dynamic, chemical, bio-meteorological, ecological), and multi- platform (e.g. radar, wind profiler, ground-based, satellite based, in-situ observation/ sampling). Underlying SUIMON is a data management system to facilitate exchange of data and information. The overall aim of the network is to improve coordination strategies and instruments; to identify data gaps based on science and user driven requirements; and to intelligently combine observations from a variety of platforms by using a data assimilation system that is tuned to produce the best estimate of the current state of the urban atmosphere.