822 resultados para Computer and network security
Resumo:
© 2015. Published by The Company of Biologists Ltd. Acknowledgements We thank Wenjuan Xu and Xin Xu (Hein Lab) for their excellent instruction in microvessel techniques, Dr David Heeley (Biochemistry Department, MUN) for assistance with selecting an appropriate (non-vasoactive) protein stabilizer, Dr Zou (SFIRC, Aberdeen) for advice with regards to the use of rIL-1β and Gordon Nash (Gamperl Lab) for his assistance with the rIL-1β purification protocol. Funding This research was supported by a Natural Sciences and Engineering Research Council of Canada Discovery Grant [RGPIN249926] and Accelerator Supplement [RGPAS412325-2011] to A.K.G. a National Institutes of Health Grant [EY018420] to T.W.H., and a doctoral fellowship from Fundaçã o para a Ciência e a Tecnologia, Portugal [SFRH/BD/27497/2006] to I.A.S.F.C. Deposited in PMC for release after 12 months.
Resumo:
The poison frogs (family Dendrobatidae) are terrestrial anuran amphibians displaying a wide range of coloration and toxicity. These frogs generally have been considered to be aposematic, but relatively little research has been carried out to test the predictions of this hypothesis. Here we use a comparative approach to test one prediction of the hypothesis of aposematism: that coloration will evolve in tandem with toxicity. Recently, we developed a phylogenetic hypothesis of the evolutionary relationships among representative species of poison frogs, using sequences from three regions of mitochondrial DNA. In our analysis, we use that DNA-based phylogeny and comparative analysis of independent contrasts to investigate the correlation between coloration and toxicity in the poison frog family (Dendrobatidae). Information on the toxicity of different species was obtained from the literature. Two different measures of the brightness and extent of coloration were used. (i) Twenty-four human observers were asked to rank different photos of each different species in the analysis in terms of contrast to a leaf-littered background. (ii) Color photos of each species were scanned into a computer and a computer program was used to obtain a measure of the contrast of the colors of each species relative to a leaf-littered background. Comparative analyses of the results were carried out with two different models of character evolution: gradual change, with branch lengths proportional to the amount of genetic change, and punctuational change, with all change being associated with speciation events. Comparative analysis using either method or model indicated a significant correlation between the evolution of toxicity and coloration across this family. These results are consistent with the hypothesis that coloration in this group is aposematic.
Resumo:
This talk, which was the keynote address of the NAS Colloquium on Human-Machine Communication by Voice, discusses the past, present, and future of human-machine communications, especially speech recognition and speech synthesis. Progress in these technologies is reviewed in the context of the general progress in computer and communications technologies.
Resumo:
The energy demand for operating Information and Communication Technology (ICT) systems has been growing, implying in high operational costs and consequent increase of carbon emissions. Both in datacenters and telecom infrastructures, the networks represent a significant amount of energy spending. Given that, there is an increased demand for energy eficiency solutions, and several capabilities to save energy have been proposed. However, it is very dificult to orchestrate such energy eficiency capabilities, i.e., coordinate or combine them in the same network, ensuring a conflict-free operation and choosing the best one for a given scenario, ensuring that a capability not suited to the current bandwidth utilization will not be applied and lead to congestion or packet loss. Also, there is no way in the literature to do this taking business directives into account. In this regard, a method able to orchestrate diferent energy eficiency capabilities is proposed considering the possible combinations and conflicts among them, as well as the best option for a given bandwidth utilization and network characteristics. In the proposed method, the business policies specified in a high-level interface are refined down to the network level in order to bring highlevel directives into the operation, and a Utility Function is used to combine energy eficiency and performance requirements. A Decision Tree able to determine what to do in each scenario is deployed in a Software Defined Network environment. The proposed method was validated with diferent experiments, testing the Utility Function, checking the extra savings when combining several capabilities, the decision tree interpolation and dynamicity aspects. The orchestration proved to be valid to solve the problem of finding the best combination for a given scenario, achieving additional savings due to the combination, besides ensuring a conflict-free operation.
Resumo:
Desde seu lançamento, em 2002, a Norma IEC 61850 vem evoluindo para se tornar o padrão adotado nos Sistemas de Automação de Subestações. Dentre seus vários aspectos, destacam- se os serviços de tempo real, que permitem a implementação de funções de automação e de proteção dentro da subestação através da troca de mensagens específicas entre Dispositivos Eletrônicos Inteligentes através de um barramento digital de rede de dados. O objetivo central deste trabalho é explorar algumas das questões que envolvem a implementação de uma classe de serviços de tempo real: a transmissão de valores amostrados através de Serviços SMV, definidos pela Norma IEC 61850-9. Primeiramente, apresenta-se um breve resumo das principais características da Norma IEC 61850 que possibilitam o atendimento dos três requisitos por ela estabelecidos como base: a interoperabilidade entre dispositivos de diferentes fabricantes, a versatilidade na configuração e reconfiguração do Sistema de Automação da Subestação, e a possibilidade de implementação de novas tecnologias. Em seguida, explora-se com maior profundidade todos os aspectos relevantes à implementação dos Serviços SMV. Devido à complexidade deste assunto, o autor propõe abordá-lo sob a ótica de cinco tópicos interdependentes: variações da Norma IEC 61850-9, confiabilidade do barramento de processo, sincronismo de tempo, análise da qualidade da medição e segurança cibernética. Com base nos resultados apresentados neste estudo, propõem-se duas plataformas, um protótipo de Transformador de Potencial Óptico e um protótipo de Relé de Proteção Diferencial para transformadores de potência, com o objetivo de explorar alguns dos aspectos pertinentes à implementação de um barramento de processo de acordo com a Norma IEC 61850-9. Também foram realizados testes de geração e transmissão de mensagens contendo valores de amostras de tensão/corrente do sistema elétrico (denominadas de SV Messages) com a finalidade de implementá-las de fato e avaliar as ferramentas de mercado disponíveis. Por fim foi proposto um modelo para a simulação do sistema de potência em conjunto com a rede de comunicação utilizando o programa Matlab/Simulink. O autor espera que este trabalho contribua para esclarecer os vários conceitos envolvidos na implementação do barramento de processo definido pela Norma IEC 61850-9, auxiliando na pesquisa e no desenvolvimento de novas ferramentas e dispositivos, e no aprimoramento da Norma IEC 61850.
Resumo:
A general trend in the study of international retirement migration has been the increased attention paid to the social contacts and network connections of the migrants in both the destination and the origin areas. These studies have examined the extent to which migrants build social relationships with their neighbours and the host society while also maintaining social links with their countries of origin, addressing the central role that leisure travel plays in sustaining increasingly dispersed social networks and maintaining the social capital of these networks and of the individuals involved in them. Using a case study approach to examine British retirement migration to Spain, we explore the relevance of transnational social networks in the context of international retirement migration, particularly the intensity of bidirectional visiting friends and relatives (VFR) tourism flows and the migrants’ social contacts with friends and/or family back in their home country. Building on the concept of social capital and Putnam's distinction between bonding and bridging social capital, we propose a framework for the analysis of the migrants’ international social networks. The results of a study conducted based on a sample of 365 British retirees living in the coast of Alicante (Spain) show both the strength of the retirees’ international bonding social capital and the role of ‘VFR's travel and communication technologies in sustaining the migrants’ transnational social practices and, ultimately, their international bonding social capital. It also provides evidence for the reinforcing links between tourism-related mobility and amenity-seeking migration in later life.
Resumo:
Interacting with a computer system in the operating room (OR) can be a frustrating experience for a surgeon, who currently has to verbally delegate to an assistant every computer interaction task. This indirect mode of interaction is time consuming, error prone and can lead to poor usability of OR computer systems. This thesis describes the design and evaluation of a joystick-like device that allows direct surgeon control of the computer in the OR. The device was tested extensively in comparison to a mouse and delegated dictation with seven surgeons, eleven residents, and five graduate students. The device contains no electronic parts, is easy to use, is unobtrusive, has no physical connection to the computer and makes use of an existing tool in the OR. We performed a user study to determine its effectiveness in allowing a user to perform all the tasks they would be expected to perform on an OR computer system during a computer-assisted surgery. Dictation was found to be superior to the joystick in qualitative measures, but the joystick was preferred over dictation in user satisfaction responses. The mouse outperformed both joystick and dictation, but it is not a readily accepted modality in the OR.
Resumo:
A Rede Nacional de Cuidados Continuados (RNCCI) foi criada em 2006 pelo decreto-lei nº 101/2006, no âmbito do Ministério da Saúde e da Segurança Social. A RNCCI tem como missão prestar os cuidados adequados, de saúde e apoio social, a todas as pessoas que, independentemente da idade, se encontrem em situação de dependência, e articula-se com os serviços de saúde e sociais já existentes. Para cumprir a sua missão, a RNCCI, necessita de uma equipa multidisciplinar, na qual integram vários profissionais, tais como: médicos, enfermeiros, assistentes sociais, psicólogos, entre muitos outros, de entre estes os enfermeiros são os profissionais que maior percentagem detêm na constituição da mesma. Daí que seja pertinente a realização de estudos de investigação, com enfermeiros e estudantes de enfermagem, nesta nova valência de cuidados. O presente estudo incide sobre os conhecimentos dos estudantes de enfermagem sobre a RNCCI, que frequentam o terceiro e quarto ano na Escola Superior de Saúde do Instituto Politécnico de Bragança. Sendo a questão de investigação deste estudo: “Quais os conhecimentos dos alunos de enfermagem do terceiro e quarto ano da licenciatura em enfermagem sobre a RNCCI?”. Foi realizado um estudo de natureza quantitativa, descritivo, correlacional, num plano transversal. Optou-se por um processo de amostragem não probabilística de conveniência, que refletisse a distribuição da população por ano de escolaridade. Assim, considerou-se uma amostra de 120 alunos (75 % da população), selecionados acidentalmente, visando a disponibilidade, rapidez e o menor custo na recolha de dados. Concluiu-se que os alunos de enfermagem de uma forma geral apresentam conhecimentos sobre a RNCCI. Destacando-se uma percentagem de 90% de respostas corretas referentes sobre a RNCCI. No entanto 75% dos alunos responderam erradamente às afirmações relacionados com o processo de referenciação e tipologia das respostas da RNCCI. Comparando estes resultados com estudos realizados com enfermeiros que exercem funções na RNCCI, verifica-se que os alunos não apresentam conhecimentos suficientes para desencadear funções ou processos relacionados com a RNCCI, apesar de terem conhecimentos gerais da mesma, pois apresentam consideráveis falhas desde logo no processo de referenciação, assim como profissionais que já trabalham na área. Tais factos constatados salientam a importância de formação teórica e/ou prática, no plano curricular da licenciatura de enfermagem, preparando os futuros enfermeiros para exercerem as suas funções na RNCCI, e não só. Pois os enfermeiros que trabalham nos cuidados de saúde primários e secundários, também eles necessitam de ter conhecimentos sobre a RNCCI, verificando-se muito frequentemente é durante o internamento que se inicia o processo de referenciação. Sugerindo que o conhecimento dos alunos sobre a RNCCI, são adquiridos na sua maioria durante a realização do ensino clínico, onde acompanham este tipo de atividades. Embora a formação base da licenciatura, permita uma vasta aquisição de competências teórico-práticas, e a integração de formação sobre a RNCCI, seja considerada pelos alunos de enfermagem, como importante ou muito importante, a mesma pode considerar-se atualmente praticamente inexistente.
Resumo:
The goal of this publication is to attempt to assess the thirteen years (2001- -2014) of the West’s military presence in the countries of post-Soviet Central Asia, closely associated with the ISAF and OEF-A (Operation Enduring Freedom – Afghanistan) missions in Afghanistan. There will also be an analysis of the actual challenges for the region’s stability after 2014. The current and future security architecture in Central Asia will also be looked at closely, as will the actual capabilities to counteract the most serious threats within its framework. The need to separately handle the security system in Central Asia and security as such is dictated by the particularities of political situation in the region, the key mechanism of which is geopolitics understood as global superpower rivalry for influence with a secondary or even instrumental role of the five regional states, while ignoring their internal problems. Such an approach is especially present in Russia’s perception of Central Asia, as it views security issues in geopolitical categories. Because of this, security analysis in the Central Asian region requires a broader geopolitical context, which was taken into account in this publication. The first part investigates the impact of the Western (primarily US) military and political presence on the region’s geopolitical architecture between 2001 and 2014. The second chapter is an attempt to take an objective look at the real challenges to regional security after the withdrawal of the coalition forces from Afghanistan, while the third chapter is dedicated to analysing the probable course of events in the security dimension following 2014. The accuracy of predictions time-wise included in the below publication does not exceed three to five years due to the dynamic developments in Central Asia and its immediate vicinity (the former Soviet Union, Afghanistan, Pakistan, Iran), and because of the large degree of unpredictability of policies of one of the key regional actors – Russia (both in the terms of its activity on the international arena, and its internal developments).
Resumo:
Summary. Mainstream thinking about the role of the European Union in East Asia usually rests on non-traditional security threats such as human and environmental security. In contrast, and within the context of the continuing instability on the Korean peninsula, this Policy Brief looks at the potential for EU-Republic of Korea cooperation on hard security matters. This Policy Brief surmises that there is much room for cooperation that chimes with the objectives of the European Security Strategy and its Implementation Report. The Policy Brief concludes that the EU and Member States will need to balance desirability and ambition if coherent and effective EU-ROK cooperation is to emerge.
Resumo:
In 2009 the European Union (EU) reached a crucial moment in its history, in which the terms Europe and crisis became conjoined: the European sovereign-debt crisis, or Euro-crisis. Yet enlargement remains on the agenda, with the EU’s next enlargement starting on 1st July 2013 with the accession of Croatia, Iceland and FYROM looking set to follow in the near future, and probably other Western Balkan states and possibly Turkey in the long term. Enlargement therefore will soon come back into focus. Focusing on climate and energy security policy, this working paper first reflects upon the impact of the 2004/2007 enlargement on the EU. A reflection on the EU’s recent past with some of the lessons that can be learnt then follows, with a consideration that predictions of decision- and policy-making gridlock were not realised, that newer member states have proved influential, and that prospective member states cannot be expected to be passive nor impotent. The latter part of this paper evaluates the potential prospects and outcomes of these lessons with regard to future enlargement from within (Scotland and Catalonia), and without (Turkey), and the political factors which may dictate whether these possible enlargements are realised.
Resumo:
From the Introduction. Transatlantic relations have undergone significant changes within the past twenty-five years. During the Cold War era, the United States and Western Europe were bound together by a perceived common threat from the Soviet Union. Consequently, economic issues commanded less attention than security issues. After the Cold War ended, economic issues were thought to be the glue that would hold the transatlantic relationship together. Much attention was given for several years to fostering economic cooperation through the development of intergovernmental initiatives. After the terrorist incidents of September 11, 2001 in the United States, and the subsequent wars in Iraq and Afghanistan, security issues again came to the forefront of the relationship. However, in contrast to the earlier era that was mainly characterized by close cooperation, disagreements between the United States and major countries of Western Europe about how to deal with the terrorist threat created severe strains in the relationship. By 2003, the third year of the George W Bush administration, transatlantic political relations had reached perhaps their lowest point since World War II. They have gradually improved since then, but with a significant setback from Wikileaks revelations, and even more serious strains resulting from the revelations by Edward Snowden concerning United States surveillance activities. Security issues have come to the forefront also in connection with regional unrest in the Middle East, EU nations’ dependence on Russian oil and gas, and Russian intrusions into Ukraine.
Resumo:
With the EU-enlargement process well underway, this paper focuses on social citizenship as a conceptual frame for analyzing the restructuring of social institutions in applicant countries in East Central Europe. So far, comparative welfare state analysis has concentrated mainly on the developed economies of the OECD-countries; there is little systematic analytical work on the transitions in post-communist Europe. Theoretically, this paper builds on comparative welfare state analysis as well as on new institutionalism. The initial hypothesis is built on the assumption that emerging patterns of social support and social security diverge from the typology described in the comparative welfare state literature inasmuch as the transformation of postcommunist societies is distinctly different from the building of welfare states in Europe. The paper argues that institutionbuilding is shaped by and embedded in the process of European integration and part of governance in the EU. Anticipating full membership in the European Union, the applicant countries have to adapt to the rules and regulations of the EU, including the "social acquis." Therefore, framing becomes an important feature of institutional changes. The paper seeks to identify distinct patterns and problems of the institutionalization of social citizenship.
Resumo:
European Union energy policy calls for nothing less than a profound transformation of the EU's energy system: by 2050 decarbonised electricity generation with 80-95% fewer greenhouse gas emissions, increased use of renewables, more energy efficiency, a functioning energy market and increased security of supply are to be achieved. Different EU policies (e.g., EU climate and energy package for 2020) are intended to create the political and regulatory framework for this transformation. The sectorial dynamics resulting from these EU policies already affect the systems of electricity generation, transportation and storage in Europe, and the more effective the implementation of new measures the more the structure of Europe's power system will change in the years to come. Recent initiatives such as the 2030 climate/energy package and the Energy Union are supposed to keep this dynamic up. Setting new EU targets, however, is not necessarily the same as meeting them. The impact of EU energy policy is likely to have considerable geo-economic implications for individual member states: with increasing market integration come new competitors; coal and gas power plants face new renewable challengers domestically and abroad; and diversification towards new suppliers will result in new trade routes, entry points and infrastructure. Where these implications are at odds with powerful national interests, any member state may point to Article 194, 2 of the Lisbon Treaty and argue that the EU's energy policy agenda interferes with its given right to determine the conditions for exploiting its energy resources, the choice between different energy sources and the general structure of its energy supply. The implementation of new policy initiatives therefore involves intense negotiations to conciliate contradicting interests, something that traditionally has been far from easy to achieve. In areas where this process runs into difficulties, the transfer of sovereignty to the European level is usually to be found amongst the suggested solutions. Pooling sovereignty on a new level, however, does not automatically result in a consensus, i.e., conciliate contradicting interests. Rather than focussing on the right level of decision making, European policy makers need to face the (inconvenient truth of) geo-economical frictions within the Union that make it difficult to come to an arrangement. The reminder of this text explains these latter, more structural and sector-related challenges for European energy policy in more detail, and develops some concrete steps towards a political and regulatory framework necessary to overcome them.
Resumo:
Russia’s increasingly aggressive policy and its enhanced military activity in the Nordic-Baltic region has led to revaluations in Sweden’s and Finland’s security and defence policies and a rethinking of the formats of their military co-operation. While remaining outside NATO, the two states have been developing closer bilateral defence co-operation and working more closely with the United States, while at the same time developing co-operation with NATO. Sweden and Finland perceive the United States as the guarantor of regional and European security. From their point of view, the United States is currently the country that has both the necessary military capabilities and the political will to react in the event of a conflict between Russia and NATO in the Nordic-Baltic region, in which both countries would inevitably become involved despite their non-aligned status. For Sweden and Finland, intensified co-operation with the United States offers an alternative to NATO membership, which is currently out of the question for domestic political reasons. Meanwhile, the US has also become increasingly aware of the strategic importance of the two states, which, for the purposes of contingency planning, are in fact an extension of NATO’s north-eastern flank.