908 resultados para Integration and security technologies


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Responsibilization, or the shift of functions and risks from providers and producers to consumers, has become an increasingly common policy in service systems and marketplaces (e.g., financial, health, governmental). As responsibilization is often considered synonymous with consumer agency and well-being, the authors take a transformative service research perspective and draw on resource integration literature to investigate whether responsibilization is truly associated with well-being. The authors focus on expert services, for which responsibilization concerns are particularly salient, and question whether this expanding policy is in the public interest. In the process, they develop a conceptualization of resource integration under responsibilization that includes three levels of actors (consumer, provider, and service system), the identification of structural tensions to resource integration, and three categories of resource integration practices (access, appropriation, and management) necessary to negotiate responsibilization. The findings have important implications for health care providers, public and institutional policy makers, and other service systems, all of which must pay more active attention to the challenges consumers face in negotiating responsibilization and the resulting well-being outcomes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Responsibilization, or the shift in functions and risks from providers and producers to the consumer, has become an increasingly common policy in service systems and marketplaces (e.g., financial, health, governmental). Responsibilization is often presented as synonymous with consumer agency and well-being. We take a transformative service research perspective and utilize the resource integration framework to investigate whether responsibilization is truly associated with well-being. We focus on expert services, where responsibilization concerns are particularly salient, and question whether this expanding policy is in the public interest. In the process, we develop a conceptualization of resource integration under responsibilization that includes three levels of actors (consumer, provider and service system), the identification of structural tensions to resource integration and three categories of resource integration practices (access, appropriation and management) necessary to negotiate responsibilization. Our findings have important implications for health care providers, public policy makers, and other service systems, all of which must pay more active attention to the challenges consumers face in negotiating responsibilization and the resulting well-being outcomes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The general consensus on the security-development nexus is that both are key to achieving sustainable peace in war-torn societies. However, this debate has largely taken place among international actors, with little empirical evidence about how security and development relate to each other or are even considered by local actors. The current paper applies the security-development nexus to the case of land restitution in Colombia. Following decades of internal armed conflict, in 2012 the national government passed sweeping land restitution legislation amid on-going violence. Through in-depth interviews and focus groups with multiple actors involved in this process, ranging from international organizations to national government units, from regional institutions to local communities, the paper analyses the objectives, impact, challenges and opportunities for land restitution related to security and development. Undermining peacebuilding, a lack of coherence in the integration of security and development priorities limits the extent to which either supports, or is promoted by, land restitution efforts in Colombia. The paper concludes with reflections on how the security-development nexus may promote peacebuilding amid on-going conflict.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

With the increasing significance of information technology, there is an urgent need for adequate measures of information security. Systematic information security management is one of most important initiatives for IT management. At least since reports about privacy and security breaches, fraudulent accounting practices, and attacks on IT systems appeared in public, organizations have recognized their responsibilities to safeguard physical and information assets. Security standards can be used as guideline or framework to develop and maintain an adequate information security management system (ISMS). The standards ISO/IEC 27000, 27001 and 27002 are international standards that are receiving growing recognition and adoption. They are referred to as “common language of organizations around the world” for information security. With ISO/IEC 27001 companies can have their ISMS certified by a third-party organization and thus show their customers evidence of their security measures.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The human factor is often recognised as a major aspect of cyber-security research. Risk and situational perception are identified as key factors in the decision making process, often playing a lead role in the adoption of security mechanisms. However, risk awareness and perception have been poorly investigated in the field of eHealth wearables. Whilst end-users often have limited understanding of privacy and security of wearables, assessing the perceived risks and consequences will help shape the usability of future security mechanisms. This paper present a survey of the the risks and situational awareness in eHealth services. An analysis of the lack of security and privacy measures in connected health devices is described with recommendations to circumvent critical situations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The main drivers for the development and evolution of Cyber Physical Systems (CPS) are the reduction of development costs and time along with the enhancement of the designed products. The aim of this survey paper is to provide an overview of different types of system and the associated transition process from mechatronics to CPS and cloud-based (IoT) systems. It will further consider the requirement that methodologies for CPS-design should be part of a multi-disciplinary development process within which designers should focus not only on the separate physical and computational components, but also on their integration and interaction. Challenges related to CPS-design are therefore considered in the paper from the perspectives of the physical processes, computation and integration respectively. Illustrative case studies are selected from different system levels starting with the description of the overlaying concept of Cyber Physical Production Systems (CPPSs). The analysis and evaluation of the specific properties of a sub-system using a condition monitoring system, important for the maintenance purposes, is then given for a wind turbine.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Public Lightning is an important part of municipality’s nighttime landscape. Lighting can be used to enhance public safety and security while improving the aesthetic appeal of the surrounding properties but with the current global financial crisis, such lighting systems must also be sustainable. Most climate policy efforts focus on the state and international level, however national governments won’t be able to meet their international commitments without local action. In Portugal, the Public Lighting is responsible for 3% of energy consumption. The problem is that the trend is to increase (about 4-5% per year) which represents very high costs for the municipal authorities. In terms of numbers are analyzed in this thesis 45 of 278 existent in Continental Portugal what represents only 16,2 % of the counties. This where the local authorities in Portugal that had a Sustainable Energy Action Plan (SEAP) that had been accepted and made available in the Covenant of Mayors website until the end of year 2013. It is important that the Covenant of Mayors will increase the local authorities awareness for energy efficiency and especially to public lighting because there is still a long way to go in terms of energy consumption reduction. In future works it would be interesting to see the payback of the EolGreen post in a real scenario due to lack of energy consumption from the grid it would allow to have a pretty high initial investment even with the maintenance that those technologies need.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We propose three research problems to explore the relations between trust and security in the setting of distributed computation. In the first problem, we study trust-based adversary detection in distributed consensus computation. The adversaries we consider behave arbitrarily disobeying the consensus protocol. We propose a trust-based consensus algorithm with local and global trust evaluations. The algorithm can be abstracted using a two-layer structure with the top layer running a trust-based consensus algorithm and the bottom layer as a subroutine executing a global trust update scheme. We utilize a set of pre-trusted nodes, headers, to propagate local trust opinions throughout the network. This two-layer framework is flexible in that it can be easily extensible to contain more complicated decision rules, and global trust schemes. The first problem assumes that normal nodes are homogeneous, i.e. it is guaranteed that a normal node always behaves as it is programmed. In the second and third problems however, we assume that nodes are heterogeneous, i.e, given a task, the probability that a node generates a correct answer varies from node to node. The adversaries considered in these two problems are workers from the open crowd who are either investing little efforts in the tasks assigned to them or intentionally give wrong answers to questions. In the second part of the thesis, we consider a typical crowdsourcing task that aggregates input from multiple workers as a problem in information fusion. To cope with the issue of noisy and sometimes malicious input from workers, trust is used to model workers' expertise. In a multi-domain knowledge learning task, however, using scalar-valued trust to model a worker's performance is not sufficient to reflect the worker's trustworthiness in each of the domains. To address this issue, we propose a probabilistic model to jointly infer multi-dimensional trust of workers, multi-domain properties of questions, and true labels of questions. Our model is very flexible and extensible to incorporate metadata associated with questions. To show that, we further propose two extended models, one of which handles input tasks with real-valued features and the other handles tasks with text features by incorporating topic models. Our models can effectively recover trust vectors of workers, which can be very useful in task assignment adaptive to workers' trust in the future. These results can be applied for fusion of information from multiple data sources like sensors, human input, machine learning results, or a hybrid of them. In the second subproblem, we address crowdsourcing with adversaries under logical constraints. We observe that questions are often not independent in real life applications. Instead, there are logical relations between them. Similarly, workers that provide answers are not independent of each other either. Answers given by workers with similar attributes tend to be correlated. Therefore, we propose a novel unified graphical model consisting of two layers. The top layer encodes domain knowledge which allows users to express logical relations using first-order logic rules and the bottom layer encodes a traditional crowdsourcing graphical model. Our model can be seen as a generalized probabilistic soft logic framework that encodes both logical relations and probabilistic dependencies. To solve the collective inference problem efficiently, we have devised a scalable joint inference algorithm based on the alternating direction method of multipliers. The third part of the thesis considers the problem of optimal assignment under budget constraints when workers are unreliable and sometimes malicious. In a real crowdsourcing market, each answer obtained from a worker incurs cost. The cost is associated with both the level of trustworthiness of workers and the difficulty of tasks. Typically, access to expert-level (more trustworthy) workers is more expensive than to average crowd and completion of a challenging task is more costly than a click-away question. In this problem, we address the problem of optimal assignment of heterogeneous tasks to workers of varying trust levels with budget constraints. Specifically, we design a trust-aware task allocation algorithm that takes as inputs the estimated trust of workers and pre-set budget, and outputs the optimal assignment of tasks to workers. We derive the bound of total error probability that relates to budget, trustworthiness of crowds, and costs of obtaining labels from crowds naturally. Higher budget, more trustworthy crowds, and less costly jobs result in a lower theoretical bound. Our allocation scheme does not depend on the specific design of the trust evaluation component. Therefore, it can be combined with generic trust evaluation algorithms.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Only recently, during the past five years, consumer electronics has been evolving rapidly. Many products have started to include “smart home” capabilities, enabling communication and interoperability of various smart devices. Even more devices and sensors can be remote controlled and monitored through cloud services. While the smart home systems have become very affordable to average consumer compared to the early solutions decades ago, there are still many issues and things that need to be fixed or improved upon: energy efficiency, connectivity with other devices and applications, security and privacy concerns, reliability, and response time. This paper focuses on designing Internet of Things (IoT) node and platform architectures that take these issues into account, notes other currently used solutions, and selects technologies in order to provide better solution. The node architecture aims for energy efficiency and modularity, while the platform architecture goals are in scalability, portability, maintainability, performance, and modularity. Moreover, the platform architecture attempts to improve user experience by providing higher reliability and lower response time compared to the alternative platforms. The architectures were developed iteratively using a development process involving research, planning, design, implementation, testing, and analysis. Additionally, they were documented using Kruchten’s 4+1 view model, which is used to describe the use cases and different views of the architectures. The node architecture consisted of energy efficient hardware, FC3180 microprocessor and CC2520 RF transceiver, modular operating system, Contiki, and a communication protocol, AllJoyn, used for providing better interoperability with other IoT devices and applications. The platform architecture provided reliable low response time control, monitoring, and initial setup capabilities by utilizing web technologies on various devices such as smart phones, tablets, and computers. Furthermore, an optional cloud service was provided in order to control devices and monitor sensors remotely by utilizing scalable high performance technologies in the backend enabling low response time and high reliability.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The growing pressure to increase the quality of health services, as well as reducing costs, has caused healthcare organizations to increase the use of Information and Communication Technologies (ICT) through the development and adoption of Healthcare Information Systems (HIS). However, the need for exchange of information between HIS and between organizations has also increased, resulting in the problem of interoperability. This problem is considered complex, but the use of Service Oriented Architecture (SOA) appears as a good way to address this issue. This paper presents a systematic review, performed in order to find out how and in which contexts SOA is being used to ensure the interoperability of HIS.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis identifies and defines the new African sovereignty. It establishes a modern sovereignty in Africa hatched from the changing nature of sovereignty in which countries come together at various levels or grades of partial surrender of national sovereignty in order to work closer together for their mutual advantage and benefit. To this end, the narrative zooms in on the central issues within the realms of money matters whereby a new model of monetary sovereignty and monetary solutions is designed in an attempt to ease the recurring tensions and challenges of modern national sovereignty in the continent of Africa. As such, this discussion will offer a historical journey through the constitution of sovereignty, to the birth of the nation state and international public law. It develops the theory of the changing nature of sovereignty within the modern state and opens new lines of inquiry for Africa. In this regard, it draws from juxtaposing and mixing elements of regional and global financial integration as well as retaining national financial sovereignty features to form this new design which I dub continental sovereignty. At its core, the thesis will deal with the legal aspects that stem from the co-mingling of legal systems of nation states and communities at the regional and global levels within the context of financial integration. The argument is that the rule of law remains sacrosanct in monetary management. Effective financial integration is the result of properly structured and managed legal frameworks with robust laws and institutions whether at a national, regional or global level. However, the thesis reveals that in order to avoid undermining the progress of Africa’s financial integration project, any solution for Africa must be immersed within a broader global solution where development issues are addressed and resolved and Africa can form a more central part in all relevant international discussion fora. The work will expound these issues by applying them within a regional and global context, with the state of affairs in Africa forming the nucleus. This application consequently presents the six key themes of the thesis which will be considered therein. They are: a.) regional advantage: which exploits the possibilities of deeper and further financial integration between smaller communal arrangements; b.) regional risk and exposure: the extent to which this deeper form of financial integration can spiral out of control if effected too quickly and too ambitiously; c.) global advantage: which considers the merits of global financial integration and the influence exerted by financial laws on the global financial architecture; d.) global risk and exposure: which considers the challenges of global financial integration especially within the background of the Global Financial Crisis 2007-2008; e.) African challenge: which considers the extent to which this analysis impacts the African economic and financial integration agenda; and f.) development challenge: which examines the extent to which global development issues impact the African solution (continental sovereignty) and the need for any solution for the continent to be roped into a broader global solution within which Africa can form an important part. Even though the thesis requests an optimistic undertone on the progress made so far, it unearths the African problem of multiple national sovereignty and multiple overlapping regional sovereignty constituted as the ‘spaghetti bowl’ dilemma. As such, the unique contribution to knowledge on financial integration in Africa can be echoed in these words: Africa‘s financial integration agenda has had little success in authenticating a systematic and dependable legal framework for monetary management. Efforts made have been incomplete, substandard, and not carefully followed through particularly reflected in the impuissant nature of the judicial enforcement mechanisms. Thus, the thesis argues that, any meaningful answer to the problems dogging the continent is inter alia deeply entrenched within a new form of cooperative monetary sovereignty. In other words, the thesis does not prescribe the creation of new laws; rather it advocates the effective enforcement of existing laws.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dissertação (mestrado)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Elétrica, 2016.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

New motor rehabilitation therapies include virtual reality (VR) and robotic technologies. In limb rehabilitation, limb posture is required to (1) provide a limb realistic representation in VR games and (2) assess the patient improvement. When exoskeleton devices are used in the therapy, the measurements of their joint angles cannot be directly used to represent the posture of the patient limb, since the human and exoskeleton kinematic models differ. In response to this shortcoming, we propose a method to estimate the posture of the human limb attached to the exoskeleton. We use the exoskeleton joint angles measurements and the constraints of the exoskeleton on the limb to estimate the human limb joints angles. This paper presents (a) the mathematical formulation and solution to the problem, (b) the implementation of the proposed solution on a commercial exoskeleton system for the upper limb rehabilitation, (c) its integration into a rehabilitation VR game platform, and (d) the quantitative assessment of the method during elbow and wrist analytic training. Results show that this method properly estimates the limb posture to (i) animate avatars that represent the patient in VR games and (ii) obtain kinematic data for the patient assessment during elbow and wrist analytic rehabilitation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper reviews current research works at the authors’ Institutions to illustrate how mobile robotics and related technologies can be used to enhance economical fruition, control, protection and social impact of the cultural heritage. Robots allow experiencing on-line, from remote locations, tours at museums, archaeological areas and monuments. These solutions avoid travelling costs, increase beyond actual limits the number of simultaneous visitors, and prevent possible damages that can arise by over-exploitation of fragile environments. The same tools can be used for exploration and monitoring of cultural artifacts located in difficult to reach or dangerous areas. Examples are provided by the use of underwater robots in the exploration of deeply submerged archaeological areas. Besides, technologies commonly employed in robotics can be used to help exploring, monitoring and preserving cultural artifacts. Examples are provided by the development of procedures for data acquisition and mapping and by object recognition and monitoring algorithms.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this project we developed conductive thermoplastic resins by adding varying amounts of three different carbon fillers: carbon black (CB), synthetic graphite (SG) and multi–walled carbon nanotubes (CNT) to a polypropylene matrix for application as fuel cell bipolar plates. This component of fuel cells provides mechanical support to the stack, circulates the gases that participate in the electrochemical reaction within the fuel cell and allows for removal of the excess heat from the system. The materials fabricated in this work were tested to determine their mechanical and thermal properties. These materials were produced by adding varying amounts of single carbon fillers to a polypropylene matrix (2.5 to 15 wt.% Ketjenblack EC-600 JD carbon black, 10 to 80 wt.% Asbury Carbons’ Thermocarb TC-300 synthetic graphite, and 2.5 to 15 wt.% of Hyperion Catalysis International’s FIBRILTM multi-walled carbon nanotubes) In addition, composite materials containing combinations of these three fillers were produced. The thermal conductivity results showed an increase in both through–plane and in–plane thermal conductivities, with the largest increase observed for synthetic graphite. The Department of Energy (DOE) had previously set a thermal conductivity goal of 20 W/m·K, which was surpassed by formulations containing 75 wt.% and 80 wt.% SG, yielding in–plane thermal conductivity values of 24.4 W/m·K and 33.6 W/m·K, respectively. In addition, composites containing 2.5 wt.% CB, 65 wt.% SG, and 6 wt.% CNT in PP had an in–plane thermal conductivity of 37 W/m·K. Flexural and tensile tests were conducted. All composite formulations exceeded the flexural strength target of 25 MPa set by DOE. The tensile and flexural modulus of the composites increased with higher concentration of carbon fillers. Carbon black and synthetic graphite caused a decrease in the tensile and flexural strengths of the composites. However, carbon nanotubes increased the composite tensile and flexural strengths. Mathematical models were applied to estimate through–plane and in–plane thermal conductivities of single and multiple filler formulations, and tensile modulus of single–filler formulations. For thermal conductivity, Nielsen’s model yielded accurate thermal conductivity values when compared to experimental results obtained through the Flash method. For prediction of tensile modulus Nielsen’s model yielded the smallest error between the predicted and experimental values. The second part of this project consisted of the development of a curriculum in Fuel Cell and Hydrogen Technologies to address different educational barriers identified by the Department of Energy. By the creation of new courses and enterprise programs in the areas of fuel cells and the use of hydrogen as an energy carrier, we introduced engineering students to the new technologies, policies and challenges present with this alternative energy. Feedback provided by students participating in these courses and enterprise programs indicate positive acceptance of the different educational tools. Results obtained from a survey applied to students after participating in these courses showed an increase in the knowledge and awareness of energy fundamentals, which indicates the modules developed in this project are effective in introducing students to alternative energy sources.