818 resultados para security and protection
Resumo:
The Agri-Food and aquaculture industries are vital to the economy of the island of Ireland with a gross annual output that is expected to double in the future. Identifying and understanding the potential influences of the anticipated climate variables on microorganisms that cause foodborne diseases, and their impact on these local industries, are essential. Investigating and monitoring foodborne pathogens and factors that influence their growth, transmission, pathogenesis and survival will facilitate assessment of the stability, security and vulnerability of the continuously evolving and increasing complex local food supply chain.
Resumo:
Biometric systems provide a valuable service in helping to identify individuals from their stored personal details. Unfortunately, with the rapidly increasing use of such systems, there is a growing concern about the possible misuse of that information. To counteract the threat, the European Union (EU) has introduced comprehensive legislation that seeks to regulate data collection and help strengthen an individual’s right to privacy. This article looks at the implications of the legislation for biometric system deployment. After an initial consideration of current privacy concerns, it examines what is meant by ‘personal data’ and its protection, in legislation terms. Also covered are issues around the storage of biometric data, including its accuracy, its security, and justification for what is collected. Finally, the privacy issues are illustrated through three biometric use cases: border security, online bank access control and customer profiling in stores.
Resumo:
This chapter examines the legal framework applicable to genetically modified organisms (GMOs) in Ireland, bearing in mind the limited presence of GMOs. As a member of the European Union (EU), a specific, process-based regime applies regarding the authorisation and regulation of GMOs. This is intended to ensure a high level of environmental and human health protection and also enable producer and consumer choice. This regime is highly harmonized, but allows some flexibility regarding its implementation and, soon, the potential to opt-out from cultivation in part or entirely. Although, Ireland has only legislated on the area to the extent and in the manner required by the EU, it may avail of the opt-out in future – understandable in light of the lack of any cultivation currently and the green image of Ireland.
Complementary horizontal legislation and common law principles, relevant to labelling and varying forms of liability, deal with most issues that might arise quite comprehensively. However, they are quite complicated, overlapping and untailored and it is worth considering whether specific legislation should be developed to deal with liability related to GMOs.
Overall, Ireland holds varying stances to different forms of GMOs, with the greatest acceptance and use of GM-feed for pragmatic reasons. It has not developed a specific Irish approach, copy-pasting EU legislation and relying upon existing law to deal with any issues. This is understandable in light of the high level of harmonization and limited presence of GMOs in Ireland, but nonetheless will need to be developed as the availability of GMOs increases.
Resumo:
Biofilms are communities of microbial cells that underpin diverse processes including sewage bioremediation, plant growth promotion, chronic infections and industrial biofouling. The cells resident in the biofilm are encased within a self-produced exopolymeric matrix that commonly comprises lipids, proteins that frequently exhibit amyloid-like properties, eDNA and exopolysaccharides. This matrix fulfils a variety of functions for the community, from providing structural rigidity and protection from the external environment to controlling gene regulation and nutrient adsorption. Critical to the development of novel strategies to control biofilm infections, or the capability to capitalize on the power of biofilm formation for industrial and biotechnological uses, is an in-depth knowledge of the biofilm matrix. This is with respect to the structure of the individual components, the nature of the interactions between the molecules and the three-dimensional spatial organization. We highlight recent advances in the understanding of the structural and functional role that carbohydrates and proteins play within the biofilm matrix to provide three-dimensional architectural integrity and functionality to the biofilm community. We highlight, where relevant, experimental techniques that are allowing the boundaries of our understanding of the biofilm matrix to be extended using Escherichia coli, Staphylococcus aureus, Vibrio cholerae, and Bacillus subtilis as exemplars.
Resumo:
Spermatogenesis is a complex process reliant upon interactions between germ cells (GC) and supporting somatic cells. Testicular Sertoli cells (SC) support GCs during maturation through physical attachment, the provision of nutrients, and protection from immunological attack. This role is facilitated by an active cytoskeleton of parallel microtubule arrays that permit transport of nutrients to GCs, as well as translocation of spermatids through the seminiferous epithelium during maturation. It is well established that chemical perturbation of SC microtubule remodelling leads to premature GC exfoliation demonstrating that microtubule remodelling is an essential component of male fertility, yet the genes responsible for this process remain unknown. Using a random ENU mutagenesis approach, we have identified a novel mouse line displaying male-specific infertility, due to a point mutation in the highly conserved ATPase domain of the novel KATANIN p60-related microtubule severing protein Katanin p60 subunit A-like1 (KATNAL1). We demonstrate that Katnal1 is expressed in testicular Sertoli cells (SC) from 15.5 days post-coitum (dpc) and that, consistent with chemical disruption models, loss of function of KATNAL1 leads to male-specific infertility through disruption of SC microtubule dynamics and premature exfoliation of spermatids from the seminiferous epithelium. The identification of KATNAL1 as an essential regulator of male fertility provides a significant novel entry point into advancing our understanding of how SC microtubule dynamics promotes male fertility. Such information will have resonance both for future treatment of male fertility and the development of non-hormonal male contraceptives.
Resumo:
EU Social and Labour Rights have developed incrementally, originally through a set of legislative initiatives creating selective employment rights, followed by a non-binding Charter of Social Rights. Only in 2009, social and labour rights became legally binding through the Charter of Fundamental Rights for the European Union (CFREU). By contrast, the EU Internal Market - an area without frontiers where goods, persons, services and capital can circulate freely – has been enshrined in legally enforceable Treaty provisions from 1958. These comprise the economic freedoms guaranteeing said free circulation and a system ensuring that competition is not distorted within the Internal Market (Protocol 27 to the Treaty of Lisbon). Tensions between Internal Market law and social and labour rights have been observed in analyses of EU case law and legislation. This study explores responses by socio-economic and political actors at national and EU levels to such tensions, focusing on collective labour rights, rights to fair working conditions and rights to social security and social assistance (Articles 12, 28, 31, 34 Charter of Fundamental Rights for the European Union). On the basis of the current Treaties and the CFREU, the constitutionally conditioned Internal Market emerges as a way to overcome the perception that social and labour rights limit Internal Market law, or vice versa. On this basis, alternative responses to perceived tensions are proposed, focused on posting of workers, furthering fair employment conditions through public procurement and enabling effective collective bargaining and industrial action in the Internal Market.
Resumo:
Seeds are traditionally considered as common or even public goods, their traits as ‘products of nature’. They are also essential to biodiversity, food security and food sovereignty. However, a suite of techno-legal interventions has legislated the enclosure of seeds: seed patents, plant variety protections, and stewardship agreements. These instruments create and protect private proprietary interests over plant material and point to the interface between seeds, capitalism, and law. In the following article, we consider the latest innovations, the bulk of which have been directed toward genetically disabling the reproductive capacities of seeds (terminator technology) or tying these capacities to outputs (‘round-up necessary’). In both instances, scarcity moves from artificial to real.
For the agro-industrial complex, the innovations are perfectly rational as they can simultaneously control supply and demand. For those outside the complex, however, the consequences are potentially ruinous. The practices of seed-saving and exchange no longer are feasible, even covertly. Contemporary genetic controls have upped the ante, by either disabling the reproductive capacity of seeds or, through cross-pollination and outcrossing, facilitating the autonomous spread of the genetic modifications that are importantly still traceable, identifiable and therefore capable of legal protection. In both instances, genuine scarcity becomes the new standard as private interests dominate what was a public sphere.
Resumo:
Synchrophasors have become an important part of the modern power system and numerous applications have been developed covering wide-area monitoring, protection and control. Most applications demand continuous transmission of synchrophasor data across large geographical areas and require an efficient communication framework. IEEE C37.118-2 evolved as one of the most successful synchrophasor communication standards and is widely adopted. However, it lacks a predefined security mechanism and is highly vulnerable to cyber attacks. This paper analyzes different types of cyber attacks on IEEE C37.118-2 communication system and evaluates their possible impact on any developed synchrophasor application. Further, the paper also recommends an efficent security mechanism that can provide strong protection against cyber attacks. Although, IEEE C37.118-2 has been widely adopted, there is no clear understanding of the requirements and limitations. To this aim, the paper also presents detailed performance evaluation of IEEE C37.118-2 implementations which could help determine required resources and network characteristics before designing any synchrophasor application.
Resumo:
Analysing public sentiment about future events, such as demonstration or parades, may provide valuable information while estimating the level of disruption and disorder during these events. Social media, such as Twitter or Facebook, provides views and opinions of users related to any public topics. Consequently, sentiment analysis of social media content may be of interest to different public sector organisations, especially in the security and law enforcement sector. In this paper we present a lexicon-based approach to sentiment analysis of Twitter content. The algorithm performs normalisation of the sentiment in an effort to provide intensity of the sentiment rather than positive/negative label. Following this, we evaluate an evidence-based combining function that supports the classification process in cases when positive and negative words co-occur in a tweet. Finally, we illustrate a case study examining the relation between sentiment of twitter posts related to English Defence League and the level of disorder during the EDL related events.
Resumo:
Successful root canal treatment requires management of the bacterial infection within the root canal space and protection of residual tooth structure with direct/indirect restorations. Long-term success depends upon prevention of re-infection of the root canal space as well as ensuring favorable distribution of the occlusal forces throughout the residual tooth structure. Appropriate planning and design of the final restoration prior to initiating root canal treatment is paramount in achieving this objective. This article describes simultaneous restorability assessment and access cavity preparation to optimize outcome of both endodontic and prosthodontic treatment of the endodontically involved tooth.
Resumo:
Schinus molle L. is commonly known as pink pepper or American pepper, of Anacardiaceae family, from subtropical regions of South America, introduced and naturalized in South Europe, including Portugal. In folk medicine, plant extracts and essential oil has related as having antibacterial, antiviral, antifungal, anti-inflammatory, antitumoral, antispasmodic, analgesic and antidepressive properties. The aim of present study was to evaluate the chemical composition and biological activities of essential oil extracted from leaves and fruits of S. molle. For this purpose, the essential oils were analyzed by gas chromatography (GC/FID) and antioxidant properties were evaluated by the free radical DPPH and by system β-carotene/linoleic acid methods. The antimicrobial activities were screened against pathogenic bacteria and fungi and food spoiling fungi by the disc diffusion assay and minimal inhibitory concentration (MIC) was determined for sensitive strains. Toxicity of essential oils were carried out by the brine shrimp mortality test (EC50) and acute lethal dose (DL50) determination after oral administration in Swiss mice The major components in leaf essential oil were α-phellandrene, β-phellandrene and limonene, while myrcene, α-phellandrene and 1,8-cineole are the main components in the fruit essential oil. The essential oils of leaf and fruit of S. molle showed antioxidant activity through the two mechanisms: the ability to capture free radicals and protection of lipid peroxidation. These oils exhibited also a broad microbial activity spectrum, against pathogenic bacteria Gram-positive and Gram-negative and Candida spp. The fruit essential oil showed high cytotoxicity against Artemia salina. Essential oils of leaves and fruits of S. molle showed significant antioxidant and microbial properties, so the studies continue to clarify more in deep its toxicity, including hepatotoxicity and nephrotoxicity, and to evaluate its medicinal or nutraceutical potential.
Resumo:
Adequate user authentication is a persistent problem, particularly with mobile devices, which tend to be highly personal and at the fringes of an organisation's influence. Yet these devices are being used increasingly in various business settings, where they pose a risk to security and privacy, not only from sensitive information they may contain, but also from the means they typically offer to access such information over wireless networks. User authentication is the first line of defence for a mobile device that falls into the hands of an unauthorised user. However, motivating users to enable simple password mechanisms and periodically update their authentication information is difficult at best. This paper examines some of the issues relating to the use of biometrics as a viable method of authentication on mobile wireless devices. It is also a critical analysis of some of the techniques currently employed and where appropriate, suggests novel hybrid ways in which they could be improved or modified. Both biometric technology and wireless setting based constraints that determine the feasibility and the performance of the authentication feature are specified. Some well known biometric technologies are briefly reviewed and their feasibility for wireless and mobile use is reviewed. Furthermore, a number of quantitative and qualitative parameters for evaluation are also presented. Biometric technologies are continuously advancing toward commercial implementation in wireless devices. When carefully designed and implemented, the advantage of biometric authentication arises mainly from increased convenience and coexistent improved security.
Resumo:
The broad capabilities of current mobile devices have paved the way for Mobile Crowd Sensing (MCS) applications. The success of this emerging paradigm strongly depends on the quality of received data which, in turn, is contingent to mass user participation; the broader the participation, the more useful these systems become. However, there is an ongoing trend that tries to integrate MCS applications with emerging computing paradigms such as cloud computing. The intuition is that such a transition can significantly improve the overall efficiency while at the same time it offers stronger security and privacy-preserving mechanisms for the end-user. In this position paper, we dwell on the underpinnings of incorporating cloud computing techniques to facilitate the vast amount of data collected in MCS applications. That is, we present a list of core system, security and privacy requirements that must be met if such a transition is to be successful. To this end, we first address several competing challenges not previously considered in the literature such as the scarce energy resources of battery-powered mobile devices as well as their limited computational resources that they often prevent the use of computationally heavy cryptographic operations and thus offering limited security services to the end-user. Finally, we present a use case scenario as a comprehensive example. Based on our findings, we posit open issues and challenges, and discuss possible ways to address them, so that security and privacy do not hinder the migration of MCS systems to the cloud.
Resumo:
Trabalho Final de Mestrado para obtenção do grau de Mestre em Engenharia Mecânica
Resumo:
Real-time systems demand guaranteed and predictable run-time behaviour in order to ensure that no task has missed its deadline. Over the years we are witnessing an ever increasing demand for functionality enhancements in the embedded real-time systems. Along with the functionalities, the design itself grows more complex. Posed constraints, such as energy consumption, time, and space bounds, also require attention and proper handling. Additionally, efficient scheduling algorithms, as proven through analyses and simulations, often impose requirements that have significant run-time cost, specially in the context of multi-core systems. In order to further investigate the behaviour of such systems to quantify and compare these overheads involved, we have developed the SPARTS, a simulator of a generic embedded real- time device. The tasks in the simulator are described by externally visible parameters (e.g. minimum inter-arrival, sporadicity, WCET, BCET, etc.), rather than the code of the tasks. While our current implementation is primarily focused on our immediate needs in the area of power-aware scheduling, it is designed to be extensible to accommodate different task properties, scheduling algorithms and/or hardware models for the application in wide variety of simulations. The source code of the SPARTS is available for download at [1].