809 resultados para privacy and security policies


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The paper presents an adaptive Fourier filtering technique and a relaying scheme based on a combination of a digital band-pass filter along with a three-sample algorithm, for applications in high-speed numerical distance protection. To enhance the performance of above-mentioned technique, a high-speed fault detector has been used. MATLAB based simulation studies show that the adaptive Fourier filtering technique provides fast tripping for near faults and security for farther faults. The digital relaying scheme based on a combination of digital band-pass filter along with three-sample data window algorithm also provides accurate and high-speed detection of faults. The paper also proposes a high performance 16-bit fixed point DSP (Texas Instruments TMS320LF2407A) processor based hardware scheme suitable for implementation of the above techniques. To evaluate the performance of the proposed relaying scheme under steady state and transient conditions, PC based menu driven relay test procedures are developed using National Instruments LabVIEW software. The test signals are generated in real time using LabVIEW compatible analog output modules. The results obtained from the simulation studies as well as hardware implementations are also presented.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Since its induction, the selective-identity (sID) model for identity-based cryptosystems and its relationship with various other notions of security has been extensively studied. As a result, it is a general consensus that the sID model is much weaker than the full-identity (ID) model. In this paper, we study the sID model for the particular case of identity-based signatures (IBS). The main focus is on the problem of constructing an ID-secure IBS given an sID-secure IBS without using random oracles-the so-called standard model-and with reasonable security degradation. We accomplish this by devising a generic construction which uses as black-box: i) a chameleon hash function and ii) a weakly-secure public-key signature. We argue that the resulting IBS is ID-secure but with a tightness gap of O(q(s)), where q(s) is the upper bound on the number of signature queries that the adversary is allowed to make. To the best of our knowledge, this is the first attempt at such a generic construction.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Executing authenticated computation on outsourced data is currently an area of major interest in cryptology. Large databases are being outsourced to untrusted servers without appreciable verification mechanisms. As adversarial server could produce erroneous output, clients should not trust the server's response blindly. Primitive set operations like union, set difference, intersection etc. can be invoked on outsourced data in different concrete settings and should be verifiable by the client. One such interesting adaptation is to authenticate email search result where the untrusted mail server has to provide a proof along with the search result. Recently Ohrimenko et al. proposed a scheme for authenticating email search. We suggest significant improvements over their proposal in terms of client computation and communication resources by properly recasting it in two-party settings. In contrast to Ohrimenko et al. we are able to make the number of bilinear pairing evaluation, the costliest operation in verification procedure, independent of the result set cardinality for union operation. We also provide an analytical comparison of our scheme with their proposal which is further corroborated through experiments.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper empirically studies the dynamic relationship between monetary and fiscal policies by analyzing the comovements between the Fed funds rate and the primary deficit/output ratio. Simple economic thinking establishes that a negative correlation between Fed rate and deficit arises whenever the two policy authorities share a common stabilization objective. However, when budget balancing concerns lead to a drastic deficit reduction the Fed may reduce the Fed rate in order to smooth the impact of fiscal policy, which results in a positive correlation between these two policy instruments. The empirical results show (i) a significant negative comovement between Fed rate and deficit and (ii) that deficit and output gap Granger-cause the Fed funds rate during the post-Volcker era, but the opposite is not true.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Listening to people, especially those who are poor, and involving them in policy making and decisions about service delivery processes are logical steps in building better services and improving policies aimed at poverty alleviation. This case describes a facilitated advocacy that helped to negotiate and support a role for poor people who farm and fish, to contribute recommendations for changes in services and policies that impact on their lives. The national Government of India’s Department of Animal Husbandry and Dairying and the Indian Council for Agricultural Research, both in the capital Delhi, have been linking with farmers and fishers and state government officials in the eastern states of Jharkhand, Orissa and West Bengal, in partnership with the STREAM Initiative of the intergovernmental Network of Aquaculture Centers in Asia Pacific and with the support of the UK Government Department for International Development, Natural resources Systems Program supporting farmers to have a voice(13 p.)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper draws together contributions to a scientific table discussion on obesity at the European Science Open Forum 2008 which took place in Barcelona, Spain. Socioeconomic dimensions of global obesity, including those factors promoting it, those surrounding the social perceptions of obesity and those related to integral public health solutions, are discussed. It argues that although scientific accounts of obesity point to large-scale changes in dietary and physical environments, media representations of obesity, which context public policy, pre-eminently follow individualistic models of explanation. While the debate at the forum brought together a diversity of views, all the contributors agreed that this was a global issue requiring an equally global response. Furthermore, an integrated ecological model of obesity proposes that to be effective, policy will need to address not only human health but also planetary health, and that therefore, public health and environmental policies coincide.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Nigeria, the country of many rivers is also rich in lakes, and wetlands, sustainable and wise use of these inland aquatic ecosystem and water resources has become a matter of widespread and intense concern. Unhealthy freshwater ecosystems and seriously diminishing and unequal availability of quality freshwater call for high quality limnological research and expertise to underpin the enhancement of sustainable fisheries and aquaculture development.In every regard of national health, agriculture and economics, the continued over exploitation and misuse of finite freshwater resources is directly causal to the progressively deteriorating fish production and general standard of living.The integration of basic understanding of inland ecosystems with applied problems and their solutions should be of fundamental concern to all stakeholders in our freshwater resource. This is a basic element in creating an attractive and security ensured economic for investment in fisheries development, including aquaculture. This is the focus of this paper

Relevância:

100.00% 100.00%

Publicador:

Resumo:

[EU]Gaur egungo sareetan egunetik egunera garraiatzen den paketeen trafikoa handituz doa eskariak horrela behartzen duelako. Beste alde batetik, gure sareen eta batez ere sare pribatuen segurtasuna gero eta garrantzitsuagoa da, bertan dauden datuen eskuragarritasuna mugatze aldera. Ondorioz segurtasun teknika hauek aplikatzeko ahalik eta denbora gutxien erabiltzea garrantzitsua da sareak duen datu garraiorako errendimendu altua manten dezan, segurtasuna bermatua. Proiektu honetan, enpresa eta erakundeetan oso arruntak diren firewall, segurtasun tekniken inguruko azterketa egingo da. Firewall ezagun baten eta driver baten arteko integrazioa burutuko da firewallak sarean duen errendimendua hobetze aldera.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Techniques are developed for estimating activity profiles in fixed bed reactors and catalyst deactivation parameters from operating reactor data. These techniques are applicable, in general, to most industrial catalytic processes. The catalytic reforming of naphthas is taken as a broad example to illustrate the estimation schemes and to signify the physical meaning of the kinetic parameters of the estimation equations. The work is described in two parts. Part I deals with the modeling of kinetic rate expressions and the derivation of the working equations for estimation. Part II concentrates on developing various estimation techniques.

Part I: The reactions used to describe naphtha reforming are dehydrogenation and dehydroisomerization of cycloparaffins; isomerization, dehydrocyclization and hydrocracking of paraffins; and the catalyst deactivation reactions, namely coking on alumina sites and sintering of platinum crystallites. The rate expressions for the above reactions are formulated, and the effects of transport limitations on the overall reaction rates are discussed in the appendices. Moreover, various types of interaction between the metallic and acidic active centers of reforming catalysts are discussed as characterizing the different types of reforming reactions.

Part II: In catalytic reactor operation, the activity distribution along the reactor determines the kinetics of the main reaction and is needed for predicting the effect of changes in the feed state and the operating conditions on the reactor output. In the case of a monofunctional catalyst and of bifunctional catalysts in limiting conditions, the cumulative activity is sufficient for predicting steady reactor output. The estimation of this cumulative activity can be carried out easily from measurements at the reactor exit. For a general bifunctional catalytic system, the detailed activity distribution is needed for describing the reactor operation, and some approximation must be made to obtain practicable estimation schemes. This is accomplished by parametrization techniques using measurements at a few points along the reactor. Such parametrization techniques are illustrated numerically with a simplified model of naphtha reforming.

To determine long term catalyst utilization and regeneration policies, it is necessary to estimate catalyst deactivation parameters from the the current operating data. For a first order deactivation model with a monofunctional catalyst or with a bifunctional catalyst in special limiting circumstances, analytical techniques are presented to transform the partial differential equations to ordinary differential equations which admit more feasible estimation schemes. Numerical examples include the catalytic oxidation of butene to butadiene and a simplified model of naphtha reforming. For a general bifunctional system or in the case of a monofunctional catalyst subject to general power law deactivation, the estimation can only be accomplished approximately. The basic feature of an appropriate estimation scheme involves approximating the activity profile by certain polynomials and then estimating the deactivation parameters from the integrated form of the deactivation equation by regression techniques. Different bifunctional systems must be treated by different estimation algorithms, which are illustrated by several cases of naphtha reforming with different feed or catalyst composition.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The 9th International Test Commission Conference (ITC) took place at the Miramar Palace in San Sebastian, Spain, between the 2nd and 5th of July, 2014. The Conference was titled, “Global and Local Challenges for Best Practices in Assessment.” The International Test Commission, ITC (www.intestcom.org), is an association of national psychological associations, test commissions, publishers, and other organizations, as well as individuals who are committed to the promotion of effective testing and assessment policies and to the proper development, evaluation, and uses of educational and psychological instruments. The ITC facilitates the exchange of information among members and stimulates their cooperation on problems related to the construction, distribution, and uses of psychological and educational tests and other psychodiagnostic tools. This volume contains the abstracts of the contributions presented at the 9th International Test Commission Conference. The four themes of the Conference were closely linked to the goals of the ITC: - Challenges and Opportunities in International Assessment. - Application of New Technoloogies and New Psychometric Models in Testing. - Standards and Guidelines for Best Testing Practices. - Testing in Multilingual and Multicultural Contexts.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

O presente estudo busca descrever e analisar a experiência de Ouvidoria da Educação construída na Secretaria Municipal de Educação de Nova Iguaçu durante a gestão iniciada em outubro de 2008 e encerrada em maio de 2010. Nele, é contextualizado o processo de construção da experiência das Ouvidorias no Brasil, as características urbanas, econômicas, políticas e sociais da cidade utilizada como recorte empírico da pesquisa, assim como o Programa Bairro Escola. Esta foi a denominação da política central de desenvolvimento de gestão pública do, então, prefeito Lindberg Farias. O tema se expressa no campo da Educação e o subtema é a Gestão Democrática, apresentando como questão central as condições e os limites de viabilização de um projeto de Ouvidoria na rede pública municipal comprometida com essa referência de gestão. Para efetivação da análise investigativa, a dissertação foi desenvolvida como um caso particular do possível um estudo de caso com a pesquisadora na condição de sujeito/objeto do estudo frente à ação real e utópica de humanização e sustentabilidade do projeto educativo. As interlocuções teóricas adotadas visaram uma abordagem microssociológica com: Pierre Bourdieu na apreensão da prática através do habitus, campo, interesse e espaço social; Foucault, desvelando as relações de poder; Gramsci com a identificação da hegemonia e ideologia; e Boaventura Santos na concepção do contra hegemônico e na fronteira das linhas abissais. A hipótese de trabalho é que a implantação da Ouvidoria da Educação, em um quadro global de um projeto de Educação Integral, tinha como base uma ação inovadora de democracia da gestão e na busca de construir uma governança da polis com um presente e futuro sustentável. Nesse âmbito, a Ouvidoria da Educação atuava como um possível canal de comunicação e instrumento estimulador da mobilização social dos sujeitos-cidadãos da Rede Municipal da Educação da cidade de Nova Iguaçu e disseminador de práticas sustentadas nos Direitos Humanos. Como conclusão, evidencia-se que uma política pública de Educação Integral só se efetiva concretamente no campo educacional quando, substancialmente, se desenvolve uma gestão democrática e propositiva de uma agenda da garantia dos direitos sociais aos diferentes atores escolares, de forma a ressignificar as relações de poder estabelecidas.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A realização da Internet das Coisas (Internet of Things, IoT) requer a integração e interação de dispositivos e serviços com protocolos de comunicação heterogêneos. Os dados gerados pelos dispositivos precisam ser analisados e interpretados em concordância com um modelo de dados em comum, o que pode ser solucionado com o uso de tecnologias de modelagem semântica, processamento, raciocínio e persistência de dados. A computação ciente de contexto possui soluções para estes desafios com mecanismos que associam os dados de contexto com dados coletados pelos dispositivos. Entretanto, a IoT precisa ir além da computação ciente de contexto, sendo simultaneamente necessário soluções para aspectos de segurança, privacidade e escalabilidade. Para integração destas tecnologias é necessário o suporte de uma infraestrutura, que pode ser implementada como um middleware. No entanto, uma solução centralizada de integração de dispositivos heterogêneos pode afetar escalabilidade. Assim esta integração é delegada para agentes de software, que são responsáveis por integrar os dispositivos e serviços, encapsulando as especificidades das suas interfaces e protocolos de comunicação. Neste trabalho são explorados os aspectos de segurança, persistência e nomeação para agentes de recursos. Para este fim foi desenvolvido o ContQuest, um framework, que facilita a integração de novos recursos e o desenvolvimento de aplicações cientes de contexto para a IoT, através de uma arquitetura de serviços e um modelo de dados. O ContQuest inclui soluções consistentes para os aspectos de persistência, segurança e controle de acesso tanto para os serviços de middleware, como para os Agentes de Recursos, que encapsulam dispositivos e serviços, e aplicações-clientes. O ContQuest utiliza OWL para a modelagem dos recursos e inclui um mecanismo de geração de identificadores únicos universais nas ontologias. Um protótipo do ContQuest foi desenvolvido e validado com a integração de três Agentes de Recurso para dispositivos reais: um dispositivo Arduino, um leitor de RFID e uma rede de sensores. Foi também realizado um experimento para avaliação de desempenho dos componentes do sistema, em que se observou o impacto do mecanismo de segurança proposto no desempenho do protótipo. Os resultados da validação e do desempenho são satisfatórios