880 resultados para Network security constraints
Resumo:
In 2006, a medico-legal consultation service devoted to adult victims of interpersonal violence was set up at the Lausanne University Hospital Centre, Switzerland: the Violence Medical Unit. Most patients are referred to the consultation by the Emergency Department. They are received by forensic nurses for support, forensic examination (in order to establish medical report) and community orientation. Between 2007 and 2009, among community violence, aggressions by security agents of nightclubs on clients have increased from 6% to 10%. Most of the victims are young men who had drunk alcohol before the assault. 25.7% presented one or several fractures, all of them in the head area. These findings raise questions about the ability of security agents of nightclubs to deal adequately with obviously risky situations and ensure client security.
Resumo:
This article addresses the normative dilemma located within the application of `securitization,’ as a method of understanding the social construction of threats and security policies. Securitization as a theoretical and practical undertaking is being increasingly used by scholars and practitioners. This scholarly endeavour wishes to provide those wishing to engage with securitization with an alternative application of this theory; one which is sensitive to and self-reflective of the possible normative consequences of its employment. This article argues that discussing and analyzing securitization processes have normative implications, which is understood here to be the negative securitization of a referent. The negative securitization of a referent is asserted to be carried out through the unchallenged analysis of securitization processes which have emerged through relations of exclusion and power. It then offers a critical understanding and application of securitization studies as a way of overcoming the identified normative dilemma. First, it examines how the Copenhagen School’s formation of securitization theory gives rise to a normative dilemma, which is situated in the performative and symbolic power of security as a political invocation and theoretical concept. Second, it evaluates previous attempts to overcome the normative dilemma of securitization studies, outlining the obstacles that each individual proposal faces. Third, this article argues that the normative dilemma of applying securitization can be avoided by firstly, deconstructing the institutional power of security actors and dominant security subjectivities and secondly, by addressing countering or alternative approaches to security and incorporating different security subjectivities. Examples of the securitization of international terrorism and immigration are prominent throughout.
Resumo:
Since the independence processes in the African continent, armed conflicts, peace and security have raised concern and attention both at the domestic level and at the international scale. In recent years, all aspects have undergone significant changes which have given rise to intense debate. The end of some historical conflicts has taken place in a context of slight decrease in the number of armed conflicts and the consolidation of post-conflict reconstruction processes. Moreover, African regional organizations have staged an increasingly more active internal shift in matters related to peace and security, encouraged by the idea of promoting “African solutions to African problems”. This new scenario, has been accompanied by new uncertainties at the security level and major challenges at the operational level, especially for the African Union. This article aims to ascertain the state of affairs on all these issues and raise some key questions to consider.
Resumo:
Network airlines have been increasingly focusing their operations on hub airports through the exploitation of connecting traffic, allowing them to take advantage of economies of traffic density, which are unequivocal in the airline industry. Less attention has been devoted to airlines? decisions on point-to-point thin routes, which could be served using different aircraft technologies and different business models. This paper examines, both theoretically and empirically, the impact on airlines ?networks of the two major innovations in the airline industry in the last two decades: the regional jet technology and the low-cost business model. We show that, under certain circumstances, direct services on point-to-point thin routes can be viable and thus airlines may be interested in deviating passengers out of the hub.
Resumo:
Tal i com estableix la Carta de les Nacions Unides, el Consell de Seguretat determina l’existència d’una amenaça a la pau, un trencament de la pau o un acte d’agressió i decideix les mesures que han de fer-se servir per restaurar la pau i seguretat internacionals, també l’ús de la força. L’objectiu d’aquest article és explorar la legitimitat d’aquest ús de la força. Amb aquest objectiu, el text parteix d’una definició centrada en les seves dimensions legal, normativa i social. En segon lloc, s’analitzarà com aquestes dimensions estan representades als debats del Consell de Seguretat de la guerra d’Irak de 2003, un dels usos de la força més controvertits i que més debat ha generat als darrers anys. Finalment, l’anàlisi proposat permet treure algunes conclusions sobre les bases canviants de la legitimitat de l’ús de la força.
Resumo:
Avui en dia, estem assistint a una expansió de la tecnologia d’agents mòbils i noves aplicacions basades en aquesta s’estan obrint pas constantment. Les aplicacions han de demostrar la seva viabilitat sobretot en entorns heterogenis i complexos com les xarxes MANET. En aquest projecte es desenvolupa un sistema per simular el comportament dels agents mòbils, ampliant l’actual simulador de xarxa NS2, i també es comprova la viabilitat de l’implementació de l’ETTMA pel triatge de víctimes en situacions d’emergència.
Resumo:
Stable isotope and Ar-40/Ar-39 measurements,were made on samples associated with a major tectonic discontinuity in the Helvetic Alps, the basal thrust of the Diablerets nappe (external zone of the Alpine Belt) in order to determine both the importance of fluids in this thrust zone and the timing of thrusting. A systematic decrease in the delta(18)O values (up to 6 parts per thousand) of calcite, quartz, and white mica exists within a 10- to 70-m-wide zone over a distance of 37 km along the thrust, and they become more pronounced toward the root of the nappe. A similar decrease in the delta(13)C values of calcite is observed only in the deepest sections (up to 3 parts per thousand). The delta D-SMOW (SMOW = standard mean ocean water) values of white mica are -54 parts per thousand +/- 8 parts per thousand (n = 22) and are independent of the distance from the thrust. These variations are interpreted to reflect syntectonic solution reprecipitation during fluid passage along the thrust. The calculated delta(18)O and delta D values (versus SMOW) for the fluid in equilibrium with the analyzed minerals is 12 parts per thousand to 16 parts per thousand and -30 parts per thousand to +5 parts per thousand, respectively, for assumed temperatures of 250 to 450 degrees C. The isotopic and structural data are consistent with fluids derived from the deep-seated roots of the Helvetic nappes where large volumes of Mesozoic sediments were metamorphosed to the amphibolite facies, It is suggested that connate and metamorphic waters, overpressured by rapid tectonic burial in a subductive system escaped by upward infiltration along moderately dipping pathways until they reached the main shear zone at the base of the moving pile, where they were channeled toward the surface, This model also explains the mechanism by which large amounts of fluid were removed from the Mesozoic sediments during Alpine metamorphism. White mica Ar-49/Ar-39 ages vary from 27 Ma far from the Diablerets thrust to 15 Ma along the thrust. An older component is observed in micas far from the thrust, interpreted as a detrital signature, and indicates that regional metamorphic temperatures were less than about 350 degrees C. The;plateau and near plateau ages nearest the thrust are consistent with either neocrystallization of white mica or argon loss by recrystallization during thrusting, which may have been enhanced in the zones of highest fluid flow. The 15 Ma Ar-40/Ar-39 age plateau measured on white mica sampled exactly on the thrust surface dates the end of both fluid flow and tectonic transport.
Resumo:
Network airlines have been increasingly focusing their operations on hub airports through the exploitation of connecting traffic, allowing them to take advantage of economies of traffic density, which are unequivocal in the airline industry. Less attention has been devoted to airlines' decisions on point-to-point thin routes, which could be served using different aircraft technologies and different business models. This paper examines, both theoretically and empirically, the impact on airlines' networks of the two major innovations in the airline industry in the last two decades: the regional jet technology and the low-cost business model. We show that, under certain circumstances, direct services on point-to-point thin routes can be viable and thus airlines may be interested in deviating passengers out of the hub. Keywords: regional jet technology; low-cost business model; point-to-point network; hub-and-spoke network JEL Classi…fication Numbers: L13; L2; L93
Resumo:
We have analyzed the compositional properties of coding (protein encoding) and non-coding sequences of Plasmodium falciparum, a unicellular parasite characterized by an extremely AT-rich genome. GC% levels, base and dinucleotide frequencies were studied. We found that among the various factors that contribute to the properties of the sequences analyzed, the most relevant are the compositional constraints which operate on the whole genome
Resumo:
We use a difference-in-difference estimator to examine the effects of a merger involving three airlines. The novelty lies in the examination of this operation in two distinct scenarios: (1) on routes where two low-cost carriers and (2) on routes where a network and one of the low-cost airlines had previously been competing. We report a reduction in frequencies but no substantial effect on prices in the first scenario, while in the second we report an increase in prices but no substantial effect on frequencies. These results may be attributed to the differences in passenger types flying on these routes.
Neonatal dexamethasone induces premature microvascular maturation of the alveolar capillary network.
Resumo:
Postnatal glucocorticoid treatment of preterm infants was mimicked by treating newborn rats with dexamethasone (0.1-0.01 microg/g, days 1-4). This regimen has been shown to cause delayed alveolarization. Knowing that microvascular maturation (transformation of double- to single-layered capillary networks in alveolar septa) and septal thinning prevent further alveolarization, we measured septal maturation on electron photomicrographs in treated and control animals. In treated rats and before day 10, we observed a premature nonreversing microvascular maturation and a transient septal thinning, which both appeared focally. In vascular casts of both groups, we observed contacts between the two capillary layers of immature alveolar septa, which were predictive for capillary fusions. Studying serial electron microscopic sections of human lungs, we were able to confirm the postulated fusion process for the first time. We conclude that alveolar microvascular maturation indeed occurs by capillary fusion and that the dexamethasone-induced impairment of alveolarization is associated with focal premature capillary fusion.
Resumo:
Aim: The study aims to describe the activities of the Swiss Early Psychosis Project (SWEPP) which was founded in 1999 as a national network to further and disseminate knowledge on early psychosis (EP) and to enhance collaboration between healthcare groups. Methods: The present paper is a detailed account of the initiation and the development of the Swiss network. We describe all activities such as the several educational campaigns that were addressed to primary and secondary care groups since the early days. We also provide an overview of the current status of EP services throughout the country. Results: Today, most regions in Switzerland provide specialized EP inpatient and/or outpatient services with a clinical or combined clinical research approach that targets at-risk and/or first-episode populations. Some more recently initiated EP services have been launched as collaborative models between several local or regional psychiatric services. Conclusions: The increasing number of EP services and experts in Switzerland may mirror the catalyzing contribution of the Swiss Early Psychosis Project in this important field of health care. The country's small size and the increasing density of specialized services provide excellent bases for larger-scale networking activities in the future, both in clinical and research areas.
Resumo:
In the recent years most libraries have focused on mass digitization programs and keeping electronic born documents, showing and organizing them in a repository. While those repositories have evolved to a much more manageable systems focusing on the user expectations and introducing web 2.0 tools, digital preservation is still in the to-do list of most of them. There is quite a lot of studies focused on preservation and some complex models exist, unfortunately, very few practical systems are running and its quite difficult for a library to get involved in a solution already tested by others. The CBUC (Consortium of University Catalan Libraries) runs TDX, an ETD repository now keeping more than 10.000 full text thesis from any of the 12 university members. After 10 years running TDX a solid preservation system was needed to ensure every thesis would be kept as it was regardless what happens to the repository. The perfect solution was found in the MetaArchive cooperative, this is the effort of many insitutions to keep a copy of each other content through a newtwork using the LOCKSS software as a mechanism to keep track of any change. The presentation will shortly introduce what TDX and MetaArchive is but will, in a practical way, show how the LOCKSS network for presrervation works. Finally a summary of the benefits of the overall experience will be shown.
Resumo:
Since the early nineties, several hundreds of Chinese immigrants have settled in what has become known as the 'Chinese wholesalers area'. For the past two years, Chinese wholesalers in Aubervilliers have been calling on public authorities to address the problem of street robberies and violent thefts, which they experience on a daily basis. Yet, they have been encouraged by the authorities to ensure their own protection, by - amongst other things - installing surveillance cameras to film the streets. This is illegal according to French legislation on camera surveillance. Knowing this, why have surveillance cameras been adopted as a solution? This question guides the ethnographic analysis presented here of a situation where the installation of surveillance cameras was locally negotiated by the main actors involved - namely, the wholesalers' representatives and the police.