844 resultados para Network Architectures and Security


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose– The purpose of this study is to address a recent call for additional research on electronic word‐of‐mouth (eWOM). In response to this call, this study draws on the social network paradigm and the uses and gratification theory (UGT) to propose and empirically test a conceptual framework of key drivers of two types of eWOM, namely in‐group and out‐of‐group. Design/methodology/approach– The proposed model, which examines the impact of usage motivations on eWOM in‐group and eWOM out‐of‐group, is tested in a sample of 302 internet users in Portugal. Findings– Results from the survey show that the different drivers (i.e. mood‐enhancement, escapism, experiential learning and social interaction) vary in terms of their impact on the two different types of eWOM. Surprisingly, while results show a positive relationship between experiential learning and eWOM out‐of‐group, no relationship is found between experiential learning and eWOM in‐group. Research limitations/implications– This is the first study investigating the drivers of both eWOM in‐group and eWOM out‐of‐group. Additional research in this area will contribute to the development of a general theory of eWOM. Practical implications– By understanding the drivers of different eWOM types, this study provides guidance to marketing managers on how to allocate resources more efficiently in order to achieve the company's strategic objectives. Originality/value– No published study has investigated the determinants of these two types of eWOM. This is the first study offering empirical considerations of how the various drivers differentially impact eWOM in‐group and eWOM out‐of‐group.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The 2008-2009 financial crisis and related organizational and economic failures have meant that financial organizations are faced with a ‘tsunami’ of new regulatory obligations. This environment provides new managerial challenges as organizations are forced to engage in complex and costly remediation projects with short deadlines. Drawing from a longitudinal study conducted with nine financial institutions over twelve years, this paper identifies nine IS capabilities which underpin activities for managing regulatory themed governance, risk and compliance efforts. The research shows that many firms are now focused on meeting the Regulators’ deadlines at the expense of developing a strategic, enterprise-wide connected approach to compliance. Consequently, executives are in danger of implementing siloed compliance solutions within business functions. By evaluating the maturity of their IS capabilities which underpin regulatory adherence, managers have an opportunity to develop robust operational architectures and so are better positioned to face the challenges derived from shifting regulatory landscapes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The complexity of current and emerging architectures provides users with options about how best to use the available resources, but makes predicting performance challenging. In this work a benchmark-driven model is developed for a simple shallow water code on a Cray XE6 system, to explore how deployment choices such as domain decomposition and core affinity affect performance. The resource sharing present in modern multi-core architectures adds various levels of heterogeneity to the system. Shared resources often includes cache, memory, network controllers and in some cases floating point units (as in the AMD Bulldozer), which mean that the access time depends on the mapping of application tasks, and the core's location within the system. Heterogeneity further increases with the use of hardware-accelerators such as GPUs and the Intel Xeon Phi, where many specialist cores are attached to general-purpose cores. This trend for shared resources and non-uniform cores is expected to continue into the exascale era. The complexity of these systems means that various runtime scenarios are possible, and it has been found that under-populating nodes, altering the domain decomposition and non-standard task to core mappings can dramatically alter performance. To find this out, however, is often a process of trial and error. To better inform this process, a performance model was developed for a simple regular grid-based kernel code, shallow. The code comprises two distinct types of work, loop-based array updates and nearest-neighbour halo-exchanges. Separate performance models were developed for each part, both based on a similar methodology. Application specific benchmarks were run to measure performance for different problem sizes under different execution scenarios. These results were then fed into a performance model that derives resource usage for a given deployment scenario, with interpolation between results as necessary.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Environment monitoring applications using Wireless Sensor Networks (WSNs) have had a lot of attention in recent years. In much of this research tasks like sensor data processing, environment states and events decision making and emergency message sending are done by a remote server. A proposed cross layer protocol for two different applications where, reliability for delivered data, delay and life time of the network need to be considered, has been simulated and the results are presented in this paper. A WSN designed for the proposed applications needs efficient MAC and routing protocols to provide a guarantee for the reliability of the data delivered from source nodes to the sink. A cross layer based on the design given in [1] has been extended and simulated for the proposed applications, with new features, such as routes discovery algorithms added. Simulation results show that the proposed cross layer based protocol can conserve energy for nodes and provide the required performance such as life time of the network, delay and reliability.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Using Wireless Sensor Networks (WSNs) in healthcare systems has had a lot of attention in recent years. In much of this research tasks like sensor data processing, health states decision making and emergency message sending are done by a remote server. Many patients with lots of sensor data consume a great deal of communication resources, bring a burden to the remote server and delay the decision time and notification time. A healthcare application for elderly people using WSN has been simulated in this paper. A WSN designed for the proposed healthcare application needs efficient MAC and routing protocols to provide a guarantee for the reliability of the data delivered from the patients to the medical centre. Based on these requirements, A cross layer based on the modified versions of APTEEN and GinMAC has been designed and implemented, with new features, such as a mobility module and routes discovery algorithms have been added. Simulation results show that the proposed cross layer based protocol can conserve energy for nodes and provide the required performance such as life time of the network, delay and reliability for the proposed healthcare application.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Recent advancement in wireless communication technologies and automobiles have enabled the evolution of Intelligent Transport System (ITS) which addresses various vehicular traffic issues like traffic congestion, information dissemination, accident etc. Vehicular Ad-hoc Network (VANET) a distinctive class of Mobile ad-hoc Network (MANET) is an integral component of ITS in which moving vehicles are connected and communicate wirelessly. Wireless communication technologies play a vital role in supporting both Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication in VANET. This paper surveys some of the key vehicular wireless access technology standards such as 802.11p, P1609 protocols, Cellular System, CALM, MBWA, WiMAX, Microwave, Bluetooth and ZigBee which served as a base for supporting both Safety and Non Safety applications. It also analyses and compares the wireless standards using various parameters such as bandwidth, ease of use, upfront cost, maintenance, accessibility, signal coverage, signal interference and security. Finally, it discusses some of the issues associated with the interoperability among those protocols.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The network paradigm has been highly influential in spatial analysis in the globalisation era. As economies across the world have become increasingly integrated, so-called global cities have come to play a growing role as central nodes in the networked global economy. The idea that a city’s position in global networks benefits its economic performance has resulted in a competitive policy focus on promoting the economic growth of cities by improving their network connectivity. However, in spite of the attention being given to boosting city connectivity little is known about whether this directly translates to improved city economic performance and, if so, how well connected a city needs to be in order to benefit from this. In this paper we test the relationship between network connectivity and economic performance between 2000 and 2008 for cities with over 500,000 inhabitants in Europe and the USA to inform European policy.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Mobile Network Optimization (MNO) technologies have advanced at a tremendous pace in recent years. And the Dynamic Network Optimization (DNO) concept emerged years ago, aimed to continuously optimize the network in response to variations in network traffic and conditions. Yet, DNO development is still at its infancy, mainly hindered by a significant bottleneck of the lengthy optimization runtime. This paper identifies parallelism in greedy MNO algorithms and presents an advanced distributed parallel solution. The solution is designed, implemented and applied to real-life projects whose results yield a significant, highly scalable and nearly linear speedup up to 6.9 and 14.5 on distributed 8-core and 16-core systems respectively. Meanwhile, optimization outputs exhibit self-consistency and high precision compared to their sequential counterpart. This is a milestone in realizing the DNO. Further, the techniques may be applied to similar greedy optimization algorithm based applications.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Irrigation is a major husbandry tool, vital for world food production and security. The purpose of this review is twofold:- firstly drawing attention to the beneficial and deleterious aspects of irrigation resulting from interactions with the microbial world; secondly, forming a basis for encouraging further research and development. Irrigation is for example, a valuable component in the control of some soil borne pathogens such as Streptomyces scabies, the cause of potato common scab and Fusarium cubense, a cause of banana wilt. By contrast, applying irrigation encourages some foliar pathogens and factors such as splash dispersal of propagules and the retention of leaf wetness are important elements in the successful establishment of disease foci. Irrigation applied at low levels in the canopy directly towards the stem bases and root zones of plants also provides means encouraging disease development. Irrigation also offers means for the direct spread of microbes such as water borne moulds, Oomycetes, and plasmodial pathogens coming from populations present in the water supply. The presence of plant disease causing microbes in sources of irrigation has been associated with outbreaks of diseases such as clubroot (Plasmodiophora brassicae). Irrigation can be utilised as a means for applying agrochemicals, fungigation. The developing technologies of water restriction and root zone drying also have an impact on the success of disease causing organisms. This is an emerging technology and its interactions with benign and pathogenic microbes require consideration.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Little research so far has been devoted to understanding the diffusion of grassroots innovation for sustainability across space. This paper explores and compares the spatial diffusion of two networks of grassroots innovations, the Transition Towns Network (TTN) and Gruppi di Acquisto Solidale (Solidarity Purchasing Groups – GAS), in Great Britain and Italy. Spatio-temporal diffusion data were mined from available datasets, and patterns of diffusion were uncovered through an exploratory data analysis. The analysis shows that GAS and TTN diffusion in Italy and Great Britain is spatially structured, and that the spatial structure has changed over time. TTN has diffused differently in Great Britain and Italy, while GAS and TTN have diffused similarly in central Italy. The uneven diffusion of these grassroots networks on the one hand challenges current narratives on the momentum of grassroots innovations, but on the other highlights important issues in the geography of grassroots innovations for sustainability, such as cross-movement transfers and collaborations, institutional thickness, and interplay of different proximities in grassroots innovation diffusion.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper considers methods for regulating the trafficking of rhino horn and ivory, seen through the lens of compliance theories. It stresses the importance of the distinction between normative and instrumental motivations. It argues for a balanced set of strategies that include normative levers designed to change the behaviour of poachers, traffickers and consumers of these products. In particular it considers the options needed to achieve demand reduction in consumer countries, and those needed to provide incentives to local communities in producer countries to disengage from poaching.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Civil wars are the most common type of large scale violent conflict. They are long, brutal and continue to harm societies long after the shooting stops. Post-conflict countries face extraordinary challenges with respect to development and security. In this paper we examine how countries can recover economically from these devastating conflicts and how international interventions can help to build lasting peace. We revisit the aid and growth debate and confirm that aid does not increase growth in general. However, we find that countries experience increased growth after the end of the war and that aid helps to make the most of this peace dividend. However, aid is only growth enhancing when the violence has stopped, in violent post-war societies aid has no growth enhancing effect. We also find that good governance is robustly correlated with growth, however we cannot confirm that aid increases growth conditional on good policies. We examine various aspects of aid and governance by disaggregating the aid and governance variables. Our analysis does not provide a clear picture of which types of aid and policy should be prioritized. We find little evidence for a growth enhancing effect of UN missions and suggest that case studies may provide better insight into the relationship between security guarantees and economic stabilization.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A Universal Serial Bus (USB) Mass Storage Device (MSD), often termed a USB flash drive, is ubiquitously used to store important information in unencrypted binary format. This low cost consumer device is incredibly popular due to its size, large storage capacity and relatively high transfer speed. However, if the device is lost or stolen an unauthorized person can easily retrieve all the information. Therefore, it is advantageous in many applications to provide security protection so that only authorized users can access the stored information. In order to provide security protection for a USB MSD, this paper proposes a session key agreement protocol after secure user authentication. The main aim of this protocol is to establish session key negotiation through which all the information retrieved, stored and transferred to the USB MSD is encrypted. This paper not only contributes an efficient protocol, but also does not suffer from the forgery attack and the password guessing attack as compared to other protocols in the literature. This paper analyses the security of the proposed protocol through a formal analysis which proves that the information is stored confidentially and is protected offering strong resilience to relevant security attacks. The computational cost and communication cost of the proposed scheme is analyzed and compared to related work to show that the proposed scheme has an improved tradeoff for computational cost, communication cost and security.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Reflecting on the strategic commitment outlined in the Plan of Action for Gender Equality (2005-2015) and the priority issues of the Commonwealth Women’s Forum, this article assesses the extent to which the Commonwealth as an institution is supporting troop and police-contributing member states in addressing the gender imbalance in peacekeeping operations. Drawing on desk-based research, interviews with international policymakers and a statistical analysis of the International Peace Institute Peacekeeping Database, the article first outlines the Commonwealth’s gender and security policy perspective before examining data sets to determine the success of Commonwealth member states in integrating women into uniformed peacekeeping contingencies between 2009 and 2015. The article observes that, in spite of a renewed optimism and drive to propel women into leadership positions in politics, the judiciary, public bodies and private companies, security sector reform and the implementation of pillar one of the UN Security Council Resolution 1325, is notably absent from the Commonwealth’s gender agenda. It is argued that this policy gap suggests that national and international security architecture is regarded as an accepted domain of masculine privilege. A lack of political will among Commonwealth Heads of Government to mainstream gender equality and facilitate structural transformation of national security organs, and a chronically under resourced Commonwealth Secretariat limits the influence of the institution to that of arms-length promoter of international norms on women, peace and security.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Stingless bees (Meliponini) construct their own species-specific nest entrance. The size of this entrance is under conflicting selective pressures. Smaller entrances are easier to defend; however, a larger entrance accommodates heavier forager traffic. Using a comparative approach with 26 species of stingless bees, we show that species with greater foraging traffic have significantly larger entrances. Such a strong correlation between relative entrance area and traffic across the different species strongly suggests a trade-off between traffic and security. Additionally, we report on a significant trend for higher forager traffic to be associated with more guards and for those guards to be more aggressive. Finally, we discuss the nest entrance of Partamona, known in Brazil as boca de sapo, or toad mouth, which has a wide outer entrance but a narrow inner entrance. This extraordinary design allows these bees to finesse the defensivity/traffic trade-off.