908 resultados para Security policies


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Passive equipments operating in the 30-300 GHZ (millimeter wave) band are compared to those in the 300 GHz-3 THz (submillimeter band). Equipments operating in the submillimeter band can measure distance and also spectral information and have been used to address new opportunities in security. Solid state spectral information is available in the submillimeter region making it possible to identify materials, whereas in millimeter region bulk optical properties determine the image contrast. The optical properties in the region from 30 GHz to 3 THz are discussed for some typical inorganic and organic solids. in the millimeter-wave region of the spectrum, obscurants such as poor weather, dust, and smoke can be penetrated and useful imagery generated for surveillance. in the 30 GHZ-3 THZ region dielectrics such as plastic and cloth are also transparent and the detection of contraband hidden under clothing is possible. A passive millimeter-wave imaging concept based on a folded Schmidt camera has been developed and applied to poor weather navigation and security. The optical design uses a rotating mirror and is folded using polarization techniques. The design is very well corrected over a wide field of view making it ideal for surveillance, and security. This produces a relatively compact imager which minimizes the receiver count.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is well known that millimetre waves can pass through clothing. In short range applications such as in the scanning of people for security purposes, operating at W band can be an advantage. The size of the equipment is decreased when compared to operation at Ka band and the equipments have similar performance.

In this paper a W band mechanically scanned imager designed for imaging weapons and contraband hidden under clothing is discussed. This imager is based on a modified folded conical scan technology previously reported. In this design an additional optical element is added to give a Cassegrain configuration in image space. This increases the effective focal length and enables improved sampling of the image and provides more space for the receivers. This imager is constructed from low cost materials such as polystyrene, polythene and printed circuit board materials. The trade off between image spatial resolution and thermal sensitivity is discussed.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

China is gradually taking its place as a major regulator, exercising concurrent jurisdiction of the national security review along with the US and EU over high-profile cross-border mergers and acquisitions. The National Security Review (NSR) regulatory regime of foreign acquisitions has attracted significant attention recently with the establishment of China's counterpart to the Committee on Foreign Investment in the United States (CFIUS). Due to the intensified activities of sovereign wealth funds (SWFs) that are closely linked with states, CFIUS's broad discretion to deal with China's SWF-based investment may have a far-reaching impact on China's implementation of the newly enacted NSR regime. It is essential to design a mechanism that allows SWFs to maximise their positive attributes while safeguarding the apolitical integrity of the marketplace. Any disproportionate use of the NSR regime would inevitably bring about more unintended consequences, such as tit-for-tat protectionism. This represents an imminent threat to the tenuous recovery from the recent economic crisis, largely because of the increasingly intertwined and interdependent nature of the global financial markets. It is of utmost significance to evaluate the extent to which the updated legislation strikes a reasonable balance between preserving genuine national security interests and maintaining an open environment for investment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Much current cultural policy research focuses on activity traditionally viewed as arts practice: visual arts, music, literature and dance. Architecture’s role in the discussion of cultural policy is, however, less certain and thus less frequently interrogated. The study presented here both addresses this dearth of in-depth research while also contributing to the interdisciplinary discussion of cultural policy in wider terms. In seeking to better understand how architectural culture is regulated and administered in a specific case study, it unpacks how the complicated relationships of nominal and explicit policies on both sides of the Irish/Northern Irish border contributed to the significant expansion of arts-based buildings 1995-2008. It contrasts political and cultural motivations behind these projects during a period of significant economic growth, investment and inward immigration. Data has been gathered from both official published policies as well as interviews with elite actors in the decision-making field and architects who produced the buildings of interest in both countries. With the sizeable number of arts-based buildings now completed in both Republic of Ireland and Northern Ireland, one must wonder if this necklace of buildings is, like Jocasta’s, a thing of both beauty and redolent with a potential future curse. It is the goal of this project to contribute to the larger applied and critical discussion of these issues and to engage with future policy design, administration and, certainly, evaluation.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dual-rail encoding, return-to-spacer protocol, and hazard-free logic can be used to resist power analysis attacks by making energy consumed per clock cycle independent of processed data. Standard dual-rail logic uses a protocol with a single spacer, e.g., all-zeros, which gives rise to energy balancing problems. We address these problems by incorporating two spacers; the spacers alternate between adjacent clock cycles. This guarantees that all gates switch in every clock cycle regardless of the transmitted data values. To generate these dual-rail circuits, an automated tool has been developed. It is capable of converting synchronous netlists into dual-rail circuits and it is interfaced to industry CAD tools. Dual-rail and single-rail benchmarks based upon the advanced encryption standard (AES) have been simulated and compared in order to evaluate the method and the tool.

Relevância:

20.00% 20.00%

Publicador: