999 resultados para reactive security
Resumo:
The classical theory of collision induced emission (CIE) from pairs of dissimilar rare gas atoms was developed in Paper I [D. Reguera and G. Birnbaum, J. Chem. Phys. 125, 184304 (2006)] from a knowledge of the straight line collision trajectory and the assumption that the magnitude of the dipole could be represented by an exponential function of the inter-nuclear distance. This theory is extended here to deal with other functional forms of the induced dipole as revealed by ab initio calculations. Accurate analytical expression for the CIE can be obtained by least square fitting of the ab initio values of the dipole as a function of inter-atomic separation using a sum of exponentials and then proceeding as in Paper I. However, we also show how the multi-exponential fit can be replaced by a simpler fit using only two analytic functions. Our analysis is applied to the polar molecules HF and HBr. Unlike the rare gas atoms considered previously, these atomic pairs form stable bound diatomic molecules. We show that, interestingly, the spectra of these reactive molecules are characterized by the presence of multiple peaks. We also discuss the CIE arising from half collisions in excited electronic states, which in principle could be probed in photo-dissociation experiments.
Resumo:
Mobile technologies have brought about major changes in police equipment and police work. If a utopian narrative remains strongly linked to the adoption of new technologies, often formulated as 'magic bullets' to real occupational problems, there are important tensions between their 'imagined' outcomes and the (unexpected) effects that accompany their daily 'practical' use by police officers. This article offers an analysis of police officers' perceptions and interactions with security devices. In so doing, it develops a conceptual typology of strategies for coping with new technology inspired by Le Bourhis and Lascoumes: challenging, neutralizing and diverting. To that purpose, we adopt an ethnographic approach that focuses on the discourses, practices and actions of police officers in relation to three security devices: the mobile digital terminal, the mobile phone and the body camera. Based on a case study of a North American municipal police department, the article addresses how these technological devices are perceived and experienced by police officers on the beat.
Resumo:
This study uses event-related brain potentials (ERPs) to investigate the electrophysiological correlates of numeric conflict monitoring in math-anxious individuals, by analyzing whether math anxiety is related to abnormal processing in early conflict detection (as shown by the N450 component) and/or in a later, response-related stage of processing (as shown by the conflict sustained potential; Conflict-SP). Conflict adaptation effects were also studied by analyzing the effect of the previous trial"s congruence in current interference. To this end, 17 low math-anxious (LMA)and 17 high math-anxious (HMA) individuals were presented with a numerical Stroop task. Groups were extreme in math anxiety but did not differ in trait or state anxiety or in simple math ability. The interference effect of the current trial (incongruent-congruent) and the interference effect preceded by congruence and by incongruity were analyzed both for behavioral measures and for ERPs. A greater interference effect was found for response times in the HMA group than in the LMA one. Regarding ERPs, the LMA group showed a greater N450 component for the interference effect preceded by congruence than when preceded by incongruity, while the HMA group showed greater Conflict-SP amplitude for the interference effect preceded by congruence than when preceded by incongruity. Our study showed that the electrophysiological correlates of numeric interference in HMA individuals comprise the absence of a conflict adaptation effect in the first stage of conflict processing (N450) and an abnormal subsequent up-regulation of cognitive control in order to overcome the conflict (Conflict-SP). More concretely, our study shows that math anxiety is related to a reactive and compensatory recruitment of control resources that is implemented only when previously exposed to a stimuli presenting conflicting information
Resumo:
Exposing the human bronchial epithelial cell line BEAS-2B to the nitric oxide (NO) donor sodium 1-(N,N-diethylamino)diazen-1-ium-1, 2-diolate (DEA/NO) at an initial concentration of 0.6 mM while generating superoxide ion at the rate of 1 microM/min with the hypoxanthine/xanthine oxidase (HX/XO) system induced C:G-->T:A transition mutations in codon 248 of the p53 gene. This pattern of mutagenicity was not seen by 'fish-restriction fragment length polymorphism/polymerase chain reaction' (fish-RFLP/PCR) on exposure to DEA/NO alone, however, exposure to HX/XO led to various mutations, suggesting that co-generation of NO and superoxide was responsible for inducing the observed point mutation. DEA/NO potentiated the ability of HX/XO to induce lipid peroxidation as well as DNA single- and double-strand breaks under these conditions, while 0.6 mM DEA/NO in the absence of HX/XO had no significant effect on these parameters. The results show that a point mutation seen at high frequency in certain common human tumors can be induced by simultaneous exposure to reactive oxygen species and a NO source.
Resumo:
Introduction: The Violence Medical Unit (VMU), a specialised forensic medical consultation, was created at the Lausanne university Hospital in 2006. All patients consulting at the ED for interpersonal violencerelated injury are referred to the VMU, which provides forensic documentation of the injury and referral to the relevant community based victim-support organisations within 48 hours of the ED visit. This frees the ED medical staff from forensic injury documentation and legal/social referral, tasks for which they lack both time and training. Among community violence, assaults by nightclub security agents against patrons have increased from 6% to 10% between 2007 and 2009. We set out to characterise the demographics, assault mechanisms, subsequent injuries, prior alcohol intake and ED & VMU costs incurred by this group of patients. Methods: We retrospectively included all patients consulting at the VMU due to assault by nightclub security agents from January 2007 to December 2009. Data was obtained from ED & VMU medical, nursing and administrative records. Results: Our sample included 70 patients, of which 64 were referred by the CHUV ED. The victims were typically young (median age 29) males (93%). 77% of assaults occurred on the weekend between 12 PM and 4 AM, and 73% of the victims were under the influence of alcohol. 83% of the patients were punched, kicked and/or head-butted; 9% had been struck with a blunt instrument. 80% of the injuries were in the head and neck area and 19% of the victims sustained fractures. 21% of the victims were prescribed medical leave. Total ED & VMU costs averaged 1048 SFr. Conclusion: Medical staff treating this population of assault victims must be aware of the assault mechanisms and injury patterns, in particular the high probability of fractures, in order to provide adequate diagnosis and care. Associated inebriation mandates liberal use of radiology, as delayed or missed diagnosis may have medical, medicolegal and legal implications. Emergency medical services play an important role in detecting and reporting of such incidents. Centralised management of the forensic documentation facilitates referral to victim support organisations and epidemiological data collection. Magnitudes and trends of the different types of violence can be determined, and this information can be then impact public safety management policies.
Resumo:
Peer-reviewed
Resumo:
Phase encoded nano structures such as Quick Response (QR) codes made of metallic nanoparticles are suggested to be used in security and authentication applications. We present a polarimetric optical method able to authenticate random phase encoded QR codes. The system is illuminated using polarized light and the QR code is encoded using a phase-only random mask. Using classification algorithms it is possible to validate the QR code from the examination of the polarimetric signature of the speckle pattern. We used Kolmogorov-Smirnov statistical test and Support Vector Machine algorithms to authenticate the phase encoded QR codes using polarimetric signatures.
Resumo:
We expose the ubiquitous interaction between an information screen and its’ viewers mobile devices, highlights the communication vulnerabilities, suggest mitigation strategies and finally implement these strategies to secure the communication. The screen infers information preferences’ of viewers within its vicinity transparently from their mobile devices over Bluetooth. Backend processing then retrieves up-to-date versions of preferred information from content providers. Retrieved content such as sporting news, weather forecasts, advertisements, stock markets and aviation schedules, are systematically displayed on the screen. To maximise users’ benefit, experience and acceptance, the service is provided with no user interaction at the screen and securely upholding preferences privacy and viewers anonymity. Compelled by the personal nature of mobile devices, their contents privacy, preferences confidentiality, and vulnerabilities imposed by screen, the service’s security is fortified. Fortification is predominantly through efficient cryptographic algorithms inspired by elliptic curves cryptosystems, access control and anonymity mechanisms. These mechanisms are demonstrated to attain set objectives within reasonable performance.
Resumo:
Peer-reviewed
Resumo:
Security issues in telecommunication networks have become more important due to the development of the industry. The number of network elements and services has increased in the radio network as in the core network side, which has increased the number of security related issues. Ericsson has developed an OSS-RC product for operation and maintenance porpoises into the telecommunication networks. OSS-RC is used in a number of telecommunications operators, which have Ericsson's products used in their telecommunication networks. Ericsson provides product installation and maintenance support and guidance, but despite this, the product may have security related issues, either due to lack of following the instructions, human error or defect in the product itself or in a third party products attached. Ericsson’s Operation and Maintenance Security Service for OSS-RC networks aims to provide tools for checking the security level of the O&M product so that it meets all requirements and Ericsson’s own security related rules. Each customer has a unique telecommunications network structure and services, and so the security service has to be to create individually depending on the customer. The purpose of this thesis is to define the basic instructions for creating the security service for different customers.
Resumo:
Nicotine, an oxidizing agent, is certainly one of the most widely used alkaloids in the world. It is, together with its main metabolite, cotinine, responsible for tobacco-dependence. The use of tobacco is closely associated with lung disease, morphological leukocyte modification and generation of oxidant species. The aim of this study was to look for a possible relationship between cotinine, oxidant species generation and oxidative processes. After studying the action of cotinine in some chemical oxidation models and on the enzymatic kinetics of peroxidases (myeloperoxidase and horseradish peroxidase), we concluded that cotinine does not act directly upon H2O2, HOCl, taurine chloramines, horseradish peroxidase or myeloperoxidase.
Resumo:
Svavel förekommer i kol och olja och oxideras vid förbränning till svaveldioxid (SO2). Årligen utsläpps stora mängder svaveldioxid som åstadkommer sura regn, minskning av stratosfäriskt ozon och sjukdomar. Av dessa orsaker är det nödvändigt att minska utsläppen av svaveldioxid. Den teknologi som rör planering av reaktorer och processer för rökgasavsvavling (FGD) har utvecklats kraftigt och idag använder man olika typer av lösningar. De vanligaste alternativen för FGD är våtskrubber- och semitorra skrubbersystem (Spray Dry Scrubbers, SDS) och injektionsprocesser för absorbenter. SDS-processer har studerats bland annat av Ahlbeck [4] och Klingspor [5] och injektionsprocesser av Alvfors [6]. Kalksten, som i huvusak består av kalciumkarbonat, används i rökgasavsvavling på grund av sin förmåga att binda svavel i form av sulfatsalter. Den vanligaste rökgasavsvavlingsmetoden är våtskrubbning, där det sedimentära stenmaterialets upplösningshastighet är en av de faktorer som påverkar resultatet mest. Utvärdering av kalkstensreaktivitet är därför speciellt viktig vid planering och drift av anläggningar för rökgasavsvavling. Målsättningen med detta arbete var att modellera upplösningen av olika typers kalksten för att få en kvantitativ utvärdering av kvaliteten på de analyserade proverna. Därtill testades även karbonatbiprodukter från stålindustrin för att utvärdera möjligheter att använda andra råmaterial. Det transienta förloppet har analyserats, varvid upplösningshastigheten modellerades bl.a. i avseende på tid och pH. Under arbetets gång har antalet empiriska korrelationer minskats till fördel för fysikaliska modeller av diffusiva och konvektiva masstransportfenomen. En målsättning var att skapa en effektiv och snabb metod för att testa olika absorbenter för rökgasavsvavling under transienta förlopp. I arbetet användes PSD-analys, gjordes pH-mätningar och andra utvärderingar av de fysikaliska parametrar som ingår i beräkningarna. On-line mätningar för de icke-stationära variablerna tid och pH ger möjlighet att eliminera osäkerheter. Vissa modeller kan vara komplicerade. En modell för upplösningshastigheten med mer detaljerad utvärdering av parametrar och färre approximationer är därför nödvändig då man vill utvärdera reaktionshastigheten för fasta partiklar i sur miljö. Arbetet utfördes under fyra år och fem peer review-artiklar ingår i avhandlingen.