865 resultados para Privacy Based Access Control


Relevância:

40.00% 40.00%

Publicador:

Resumo:

Theory suggests that carotenoid-based signals are used in animal communication because they contain specific information about parasite resistance or immunocompetence. This implies that honesty of carotenoid-based signals is maintained by a trade-off between pigmentation and immune function for carotenoids, assuming that the carotenoids used for coloration are also immunoenhancing. We tested this hypothesis by altering the diets of nestling great tits (Paris major) with supplementary beadlets containing the carotenoids that are naturally ingested with food or beadlets containing the carotenoids that are incorporated into the feathers; a control group received beadlets containing no carotenoids. We simultaneously immune challenged half of the nestlings of each supplementation group, using a two-factorial design. Activatior of the immune system led to reduced color expression. However, only nestlings fed with the naturally ingested carotenoids and not with the carotenoids deposited in the feathers showed an increased cellular immune response. This shows that the carotenoids used for ornamentation do not promote the immune function, which conflicts with the trade-off hypothesis. Our results indicate that honesty of carotenoid-based signals is maintained by an individual's physiological limitation to absorb and/or transport carotenoids and by access to carotenoids, indicating that preferences for carotenoid-based traits in sexual selection or parent-offspring interactions select for competitive individuals, rather than specifically for immune function.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Invasive plant species threaten natural areas by reducing biodiversity and altering ecosystem functions. They also impact agriculture by reducing crop and livestock productivity. Millions of dollars are spent on invasive species control each year, and traditionally, herbicides are used to manage invasive species. Herbicides have human and environmental health risks associated with them; therefore, it is essential that land managers and stakeholders attempt to reduce these risks by utilizing the principles of integrated weed management. Integrated weed management is a practice that incorporates a variety of measures and focuses on the ecology of the invasive plant to manage it. Roadways are high risk areas that have high incidence of invasive species. Roadways act as conduits for invasive species spread and are ideal harborages for population growth; therefore, roadways should be a primary target for invasive species control. There are four stages in the invasion process which an invasive species must overcome: transport, establishment, spread, and impact. The aim of this dissertation was to focus on these four stages and examine the mechanisms underlying the progression from one stage to the next, while also developing integrated weed management strategies. The target species were Phragmites australis, common reed, and Cisrium arvense, Canada thistle. The transport and establishment risks of P. australis can be reduced by removing rhizome fragments from soil when roadside maintenance is performed. The establishment and spread of C. arvense can be reduced by planting particular resistant species, e.g. Heterotheca villosa, especially those that can reduce light transmittance to the soil. Finally, the spread and impact of C. arvense can be mitigated on roadsides through the use of the herbicide aminopyralid. The risks associated with herbicide drift produced by application equipment can be reduced by using the Wet-Blade herbicide application system.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Slope stability analysis is a major area of research in geotechnical engineering. That being said, very little is written in the geotechnical engineering literature on the design of box-cuts. The goal of this thesis will be to investigate the proper design of a boxcuts, and to design a box-cut for access to an underground copper mine. Issues that need to be considered in the box-cut design include, long term dewatering design, slope stability analysis, and erosion control. The soils at the project site were extremely low permeability, as a result a system of ejectors was designed both to improve the stability of the slopes and prevent flooding. Based on the results of limit equilibrium analysis and finite element analysis, a slope design of two horizontal on one vertical was selection, with a rock fill buttress providing reinforcement. Finally, Michigan DOT standards for seeding were used to provide erosion control

Relevância:

40.00% 40.00%

Publicador:

Resumo:

For a microgrid with a high penetration level of renewable energy, energy storage use becomes more integral to the system performance due to the stochastic nature of most renewable energy sources. This thesis examines the use of droop control of an energy storage source in dc microgrids in order to optimize a global cost function. The approach involves using a multidimensional surface to determine the optimal droop parameters based on load and state of charge. The optimal surface is determined using knowledge of the system architecture and can be implemented with fully decentralized source controllers. The optimal surface control of the system is presented. Derivations of a cost function along with the implementation of the optimal control are included. Results were verified using a hardware-in-the-loop system.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In power electronic basedmicrogrids, the computational requirements needed to implement an optimized online control strategy can be prohibitive. The work presented in this dissertation proposes a generalized method of derivation of geometric manifolds in a dc microgrid that is based on the a-priori computation of the optimal reactions and trajectories for classes of events in a dc microgrid. The proposed states are the stored energies in all the energy storage elements of the dc microgrid and power flowing into them. It is anticipated that calculating a large enough set of dissimilar transient scenarios will also span many scenarios not specifically used to develop the surface. These geometric manifolds will then be used as reference surfaces in any type of controller, such as a sliding mode hysteretic controller. The presence of switched power converters in microgrids involve different control actions for different system events. The control of the switch states of the converters is essential for steady state and transient operations. A digital memory look-up based controller that uses a hysteretic sliding mode control strategy is an effective technique to generate the proper switch states for the converters. An example dcmicrogrid with three dc-dc boost converters and resistive loads is considered for this work. The geometric manifolds are successfully generated for transient events, such as step changes in the loads and the sources. The surfaces corresponding to a specific case of step change in the loads are then used as reference surfaces in an EEPROM for experimentally validating the control strategy. The required switch states corresponding to this specific transient scenario are programmed in the EEPROM as a memory table. This controls the switching of the dc-dc boost converters and drives the system states to the reference manifold. In this work, it is shown that this strategy effectively controls the system for a transient condition such as step changes in the loads for the example case.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this paper, an Insulin Infusion Advisory System (IIAS) for Type 1 diabetes patients, which use insulin pumps for the Continuous Subcutaneous Insulin Infusion (CSII) is presented. The purpose of the system is to estimate the appropriate insulin infusion rates. The system is based on a Non-Linear Model Predictive Controller (NMPC) which uses a hybrid model. The model comprises a Compartmental Model (CM), which simulates the absorption of the glucose to the blood due to meal intakes, and a Neural Network (NN), which simulates the glucose-insulin kinetics. The NN is a Recurrent NN (RNN) trained with the Real Time Recurrent Learning (RTRL) algorithm. The output of the model consists of short term glucose predictions and provides input to the NMPC, in order for the latter to estimate the optimum insulin infusion rates. For the development and the evaluation of the IIAS, data generated from a Mathematical Model (MM) of a Type 1 diabetes patient have been used. The proposed control strategy is evaluated at multiple meal disturbances, various noise levels and additional time delays. The results indicate that the implemented IIAS is capable of handling multiple meals, which correspond to realistic meal profiles, large noise levels and time delays.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The development of the Internet has made it possible to transfer data ‘around the globe at the click of a mouse’. Especially fresh business models such as cloud computing, the newest driver to illustrate the speed and breadth of the online environment, allow this data to be processed across national borders on a routine basis. A number of factors cause the Internet to blur the lines between public and private space: Firstly, globalization and the outsourcing of economic actors entrain an ever-growing exchange of personal data. Secondly, the security pressure in the name of the legitimate fight against terrorism opens the access to a significant amount of data for an increasing number of public authorities.And finally,the tools of the digital society accompany everyone at each stage of life by leaving permanent individual and borderless traces in both space and time. Therefore, calls from both the public and private sectors for an international legal framework for privacy and data protection have become louder. Companies such as Google and Facebook have also come under continuous pressure from governments and citizens to reform the use of data. Thus, Google was not alone in calling for the creation of ‘global privacystandards’. Efforts are underway to review established privacy foundation documents. There are similar efforts to look at standards in global approaches to privacy and data protection. The last remarkable steps were the Montreux Declaration, in which the privacycommissioners appealed to the United Nations ‘to prepare a binding legal instrument which clearly sets out in detail the rights to data protection and privacy as enforceable human rights’. This appeal was repeated in 2008 at the 30thinternational conference held in Strasbourg, at the 31stconference 2009 in Madrid and in 2010 at the 32ndconference in Jerusalem. In a globalized world, free data flow has become an everyday need. Thus, the aim of global harmonization should be that it doesn’t make any difference for data users or data subjects whether data processing takes place in one or in several countries. Concern has been expressed that data users might seek to avoid privacy controls by moving their operations to countries which have lower standards in their privacy laws or no such laws at all. To control that risk, some countries have implemented special controls into their domestic law. Again, such controls may interfere with the need for free international data flow. A formula has to be found to make sure that privacy at the international level does not prejudice this principle.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

We use electronic communication networks for more than simply traditional telecommunications: we access the news, buy goods online, file our taxes, contribute to public debate, and more. As a result, a wider array of privacy interests is implicated for users of electronic communications networks and services. . This development calls into question the scope of electronic communications privacy rules. This paper analyses the scope of these rules, taking into account the rationale and the historic background of the European electronic communications privacy framework. We develop a framework for analysing the scope of electronic communications privacy rules using three approaches: (i) a service-centric approach, (ii) a data-centric approach, and (iii) a value-centric approach. We discuss the strengths and weaknesses of each approach. The current e-Privacy Directive contains a complex blend of the three approaches, which does not seem to be based on a thorough analysis of their strengths and weaknesses. The upcoming review of the directive announced by the European Commission provides an opportunity to improve the scoping of the rules.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The ever increasing popularity of apps stems from their ability to provide highly customized services to the user. The flip side is that in order to provide such services, apps need access to very sensitive private information about the user. This leads to malicious apps that collect personal user information in the background and exploit it in various ways. Studies have shown that current app vetting processes which are mainly restricted to install time verification mechanisms are incapable of detecting and preventing such attacks. We argue that the missing fundamental aspect here is a comprehensive and usable mobile privacy solution, one that not only protects the user's location information, but also other equally sensitive user data such as the user's contacts and documents. A solution that is usable by the average user who does not understand or care about the low level technical details. To bridge this gap, we propose privacy metrics that quantify low-level app accesses in terms of privacy impact and transforms them to high-level user understandable ratings. We also provide the design and architecture of our Privacy Panel app that represents the computed ratings in a graphical user-friendly format and allows the user to define policies based on them. Finally, experimental results are given to validate the scalability of the proposed solution.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Driven by privacy-related fears, users of Online Social Networks may start to reduce their network activities. This trend can have a negative impact on network sustainability and its business value. Nevertheless, very little is understood about the privacy-related concerns of users and the impact of those concerns on identity performance. To close this gap, we take a systematic view of user privacy concerns on such platforms. Based on insights from focus groups and an empirical study with 210 subjects, we find that (i) Organizational Threats and (ii) Social Threats stemming from the user environment constitute two underlying dimensions of the construct “Privacy Concerns in Online Social Networks”. Using a Structural Equation Model, we examine the impact of the identified dimensions of concern on the Amount, Honesty, and Conscious Control of individual self-disclosure on these sites. We find that users tend to reduce the Amount of information disclosed as a response to their concerns regarding Organizational Threats. Additionally, users become more conscious about the information they reveal as a result of Social Threats. Network providers may want to develop specific mechanisms to alleviate identified user concerns and thereby ensure network sustainability.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

PURPOSE Patients with Alzheimer's disease (AD) have an increased risk of developing seizures or epilepsy. Little is known about the role of risk factors and about the risk of developing seizures/epilepsy in patients with vascular dementia (VD). The aim of this study was to assess incidence rates (IRs) of seizures/epilepsy in patients with AD, VD, or without dementia, and to identify potential risk factors of seizures or epilepsy. METHODS We conducted a follow-up study with a nested case-control analysis using the United Kingdom-based General Practice Research Database (GPRD). We identified patients aged ≥65 years with an incident diagnosis of AD or VD between 1998 and 2008 and a matched comparison group of dementia-free patients. Conditional logistic regression was used to estimate the odds ratio (OR) with a 95% confidence interval (CI) of developing seizures/epilepsy in patients with AD or VD, stratified by age at onset and duration of dementia as well as by use of antidementia drugs. KEY FINDINGS Among 7,086 cases with AD, 4,438 with VD, and 11,524 matched dementia-free patients, we identified 180 cases with an incident diagnosis of seizures/epilepsy. The IRs of epilepsy/seizures for patients with AD or VD were 5.6/1,000 person-years (py) (95% CI 4.6-6.9) and 7.5/1,000 py (95% CI 5.7-9.7), respectively, and 0.8/1,000 py (95% CI 0.6-1.1) in the dementia-free group. In the nested case-control analysis, patients with longer standing (≥3 years) AD had a slightly higher risk of developing seizures or epilepsy than those with a shorter disease duration, whereas in patients with VD the contrary was observed. SIGNIFICANCE Seizures or epilepsy were substantially more common in patients with AD and VD than in dementia-free patients. The role of disease duration as a risk factor for seizures/epilepsy seems to differ between AD and VD.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Recent studies in laying hens have shown that feather peckers eat more feathers than nonpeckers. We hypothesized that food pellets containing feathers would decrease the birds' appetite for feathers and thereby also decrease feather pecking. To separate the effect of feathers from that of insoluble fiber per se, additional control groups were fed pellets containing similar amounts of cellulose. Sixty (experiment 1) and 180 (experiment 2) 1-d-old Lohmann-Selected Leghorn birds were divided into 12 groups of 5 (experiment 1) and 15 (experiment 2) birds, respectively, and kept on slatted floors. During the rearing period, 4 groups each had ad libitum access to either a commercial pelleted diet, a pelleted diet containing 5% (experiment 1) or 10% (experiment 2) of chopped feathers, respectively, or a pelleted diet containing 5% (experiment 1) or 10% (experiment 2) of cellulose, respectively. In the consecutive laying period, all groups received a commercial pelleted diet. In experiment 1, feather pecking was recorded weekly from wk 5 to wk 16. In the laying period, observations were made in wk 18, 20, 22, 23, 24, 25, 26, 27, 28, and 30. In experiment 2, feather pecking was recorded weekly from wk 5 to 11, in wk 16 to wk 18, and in wk 20 and 21. At the end of the rearing period, plumage condition per individual hen was scored. Scores from 1 (denuded) to 4 (intact) were given for each of 6 body parts. The addition of 10% of feathers to the diet reduced the number of severe feather-pecking bouts (P < 0.0129) and improved plumage condition of the back area (P < 0.001) significantly compared with control diets. The relationship between feather pecking/eating and the gastrointestinal consequences thereof, which alter feather pecking-behavior, are unclear. Understanding this relationship might be crucial for understanding the causation of feather pecking in laying hens.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

OBJECTIVES It is still debated if pre-existing minority drug-resistant HIV-1 variants (MVs) affect the virological outcomes of first-line NNRTI-containing ART. METHODS This Europe-wide case-control study included ART-naive subjects infected with drug-susceptible HIV-1 as revealed by population sequencing, who achieved virological suppression on first-line ART including one NNRTI. Cases experienced virological failure and controls were subjects from the same cohort whose viraemia remained suppressed at a matched time since initiation of ART. Blinded, centralized 454 pyrosequencing with parallel bioinformatic analysis in two laboratories was used to identify MVs in the 1%-25% frequency range. ORs of virological failure according to MV detection were estimated by logistic regression. RESULTS Two hundred and sixty samples (76 cases and 184 controls), mostly subtype B (73.5%), were used for the analysis. Identical MVs were detected in the two laboratories. 31.6% of cases and 16.8% of controls harboured pre-existing MVs. Detection of at least one MV versus no MVs was associated with an increased risk of virological failure (OR = 2.75, 95% CI = 1.35-5.60, P = 0.005); similar associations were observed for at least one MV versus no NRTI MVs (OR = 2.27, 95% CI = 0.76-6.77, P = 0.140) and at least one MV versus no NNRTI MVs (OR = 2.41, 95% CI = 1.12-5.18, P = 0.024). A dose-effect relationship between virological failure and mutational load was found. CONCLUSIONS Pre-existing MVs more than double the risk of virological failure to first-line NNRTI-based ART.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Selective expression of opsins in genetically defined neurons makes it possible to control a subset of neurons without affecting nearby cells and processes in the intact brain, but light must still be delivered to the target brain structure. Light scattering limits the delivery of light from the surface of the brain. For this reason, we have developed a fiber-optic-based optical neural interface (ONI), which allows optical access to any brain structure in freely moving mammals. The ONI system is constructed by modifying the small animal cannula system from PlasticsOne. The system for bilateral stimulation consists of a bilateral cannula guide that has been stereotactically implanted over the target brain region, a screw cap for securing the optical fiber to the animal's head, a fiber guard modified from the internal cannula adapter, and a bare fiber whose length is customized based on the depth of the target region. For unilateral stimulation, a single-fiber system can be constructed using unilateral cannula parts from PlasticsOne. We describe here the preparation of the bilateral ONI system and its use in optical stimulation of the mouse or rat brain. Delivery of opsin-expressing virus and implantation of the ONI may be conducted in the same surgical session; alternatively, with a transgenic animal no opsin virus is delivered during the surgery. Similar procedures are useful for deep or superficial injections (even for neocortical targets, although in some cases surface light-emitting diodes or cortex-apposed fibers can be used for the most superficial cortical targets).