790 resultados para Edemiological surveillance


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Description based on: 1976.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

O século XXI introduziu profundas mudanças no espaço onde a atuação militar se desenvolve. Esta mutação, que agora inclui o domínio físico e cognitivo na ação militar, impõe a adoção de novos conceitos de operação e estruturas organizacionais mais ágeis, de forma a fazerem face a um ambiente altamente volátil, imprevisível e complexo. Tal contexto torna as organizações, hoje mais do que nunca, dependentes de informação (e dos sistemas que as geram), e no âmbito das organizações militares, uma capacidade em particular assume, na atualidade, uma preponderância fulcral para o sucesso destas, que se designa por Intelligence, Surveillance & Reconnaissance (ISR). Considerando a complexidade de sistemas, processos e pessoas que envolvem toda esta capacidade, torna-se relevante estudar como a Força Aérea Portuguesa (FAP) está a acomodar este conceito no interior da sua estrutura, uma vez que a sua adaptação requer uma organização da era da informação, onde o trabalho em rede assume particular destaque. A presente investigação analisa formas de estruturas organizacionais contemporâneas e cruza-as com as recomendações da Organização do Tratado do Atlântico Norte (também designada por Aliança), comparando-as posteriormente com a atualidade da FAP. No final, são efetuadas propostas tangíveis, que podem potenciar as capacidades existentes, de onde se destaca a criação de uma matriz de análise quanto à eficiência organizacional, uma nova forma de organização das capacidades residentes no que ao ISR concerne, bem como o modo de potenciar o trabalho em rede com base nos meios existentes. Abstract: The 21st century has caused profound changes in the areas where military action takes place. This mutation, which now includes the physical and cognitive domain in military action, requires the adoption of new concepts of operation and more agile organizational structures in order to cope with a highly volatile, unpredictable and complex environment. Thus, more than ever, this makes the present organizations dependent of information (and the systems that generate them), in the case of military organizations, a particular capability undertakes today a strong impact on the success of military organizations. It is known as Intelligence, Surveillance& Reconnaissance (ISR). Taking into account the complexity of systems, processes and people involving all this capability, it is relevant to study how the Portuguese Air Force (PAF) is accommodating this concept within its structure, since the adaptation requires an organization adapted to the information era, where networking is particularly prominent. This research aims to analyze contemporary forms of organizational structures and cross them with the recommendations of the North Atlantic Treaty Organization (also known as Alliance), later comparing them with today's PAF. At the end of this investigation, some tangible proposals are made which can enhance existing capabilities: we can highlight the creation of an analysis matrix for organizational efficiency, a new form of organization of the resident capabilities in the ISR concerns, as well as the way of enhancing networking, based on existing means.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The implementation of the WFD in the French overseas takes into account local, morphological, climatic and socioeconomic peculiarities, as well as specificities of their ecosystems. This document provide an up-to-date assessment of the state of characteristics of the coastal water bodies, of development of indicators and of WFD monitoring programs in each of the French overseas departments: Martinique, Guadeloupe, French Guyana, Reunion Island and Mayotte.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While governments are capturing as much data as they can about us for security reasons, private companies are doing the same in a practice that has become known as “Big Data”. Martin Hirst (p.19) explains how the data we generate is leading to a “surveillance economy” in which businesses build data profiles that enable them to target their advertising at people more effectively, while Benjamin Shiller (p.22) explains how your online purchasing decisions will enable merchants to alter their prices to extract the maximum value from individual customers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Seeking better understanding of the relationship between criminal law and surveillance demands investigating the evolving nature of sovereignty in an era of transnational digital information flows. While territorial boundaries determine the limits of police investigative and surveillance powers under the criminal law, several recent United States (US) examples demonstrate how new forms of extraterritorial surveillance that enable police to access online communications by foreign citizens and digital information stored in offshore locations are authorized by US courts. This discussion outlines how the processes of mutual legal assistance that ordinarily govern the search, seizure and transfer of digital evidence from one jurisdiction to another are increasingly considered to undermine police efficiency, even though they protect the due process rights afforded to crime suspects under established principles of sovereignty (Palmer and Warren 2013).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter argues that theories about privacy would benefit from embracing deliberative democratic theory on the grounds that it addresses harms to democracy, and widens our understandings of privacy infringements in social networking environments. We first explore how social networking services (SNS) have evolved through different phases and how they enable political deliberation. Subsequently, we discuss more traditional individualistic and intersubjective theories of privacy in relation to social networking and point out their limitations in identifying and redressing social networking-related harms. We then critique emerging claims concerning the social value of privacy in the context of the social Web. Here we point out how these theories might identify non-individualized harms, yet, at the same time, suffer important challenges in application. We conclude by arguing that deliberative democratic theory can add some critical insights into the privacy harms encountered on the contemporary “social Web” that are only imperfectly understood by individualistic and social conceptions of privacy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Bhutan is a low-middle-income country with poor roads, rapidly increasing motor vehicle use and heavy alcohol consumption. We estimated the proportion of emergency department patients presenting with injury who had positive blood alcohol. We sought to breathalyse and interview all adult patients (≥18 years) presenting with injury at the Jigme Dorji Wangchuck National Referral Hospital in the capital city Thimphu, from April to October 2015. Breath tests and interviews were conducted with 339 (91%) of 374 eligible adult patients. A third (34%) were alcohol-positive and 22% had blood alcohol concentrations >0.08 g/dL. The highest alcohol-positive fractions were for assault (71%), falls (31%) and traffic crashes (30%). Over a third (36%) of patients had a delay of >2 h between injury and breath test. The results underestimate blood alcohol concentrations at the time of injury so the true prevalence of pre-injury alcohol impairment is greater than our estimates suggest. Countermeasures are urgently needed, particularly roadside random breath testing and alcohol controls.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we present a novel anomaly detection framework for multiple heterogeneous yet correlated time series, such as the medical surveillance series data. In our framework, we propose an anomaly detection algorithm from the viewpoint of trend and correlation analysis. Moreover, to efficiently process huge amount of observed time series, a new clustering-based compression method is proposed. Experimental results indicate that our framework is more effective and efficient than its peers. © 2012 Springer-Verlag Berlin Heidelberg.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Compared to traditional wired video sensor networks to supervise a residential district, Wireless Video-based Sensor Networks (WVSN) can provide more detail and precise information while reduce the cost. However, state-of-the-art low cost wireless video-based sensors have very constrained resources such as low bandwidth, small storage, limited processing capability, and limited energy resource. Also, due to the special sensing range of video-based sensors, cluster-based routing is not as effective as it apply to traditional sensor networks. This paper provides a novel real-time change mining algorithm based on an extracted profile model of moving objects learnt from frog's eyes. Example analysis shows the extracted profile would not miss any important semantic images to send to the Base Station for further hazards detection, while efficiently reducing futile video stream data to the degree that nowadays wireless video sensor can realize. Thus it makes WVSN available to surveillance of residential districts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter argues that theories about privacy would benefit from embracing deliberative democratic theory on the grounds that it addresses harms to democracy, and widens our understandings of privacy infringements in social networking environments. We fi rst explore how social networking services (SNS) have evolved through diff erent phases and how they enable political deliberation. Subsequently, we discuss more traditional individualistic and intersubjective theories of privacy in relation to social networking and point out their limitations in identifying and redressing social networking-related harms. We then critique emerging claims concerning the social value of privacy in the context of the social Web. Here we point out how these theories might identify non-individualized harms, yet, at the same time, suff er important challenges in application. We conclude by arguing that deliberative democratic theory can add some critical insights into the privacy harms encountered on the contemporary “social Web” that are only imperfectly understood by individualistic and social conceptions of privacy