952 resultados para security architecture in Europe
Resumo:
Whilst hydrological systems can show resilience to short-term streamflow deficiencies during within-year droughts, prolonged deficits during multi-year droughts are a significant threat to water resources security in Europe. This study uses a threshold-based objective classification of regional hydrological drought to qualitatively examine the characteristics, spatio-temporal evolution and synoptic climatic drivers of multi-year drought events in 1962–64, 1975–76 and 1995–97, on a European scale but with particular focus on the UK. Whilst all three events are multi-year, pan-European phenomena, their development and causes can be contrasted. The critical factor in explaining the unprecedented severity of the 1975–76 event is the consecutive occurrence of winter and summer drought. In contrast, 1962–64 was a succession of dry winters, mitigated by quiescent summers, whilst 1995–97 lacked spatial coherence and was interrupted by wet interludes. Synoptic climatic conditions vary within and between multi-year droughts, suggesting that regional factors modulate the climate signal in streamflow drought occurrence. Despite being underpinned by qualitatively similar climatic conditions and commonalities in evolution and characteristics, each of the three droughts has a unique spatio-temporal signature. An improved understanding of the spatio-temporal evolution and characteristics of multi-year droughts has much to contribute to monitoring and forecasting capability, and to improved mitigation strategies.
Resumo:
Existing registry technologies such as UDDI can be enhanced to support capabilities for semantic reasoning and inquiry, which subsequently increases its usability range. The Grimoires registry was developed to provide such support through the use of metadata attachments to registry entities. The use of such attachments provides a way for allowing service operators to specify security assertions pertaining to registry entities owned by them. These assertions may however have to be reconciled with existing registry policies. A security architecture based on the XACML standard and deployed in the OMII framework is outlined to demonstrate how this goal is achieved in the registry.
Resumo:
Recent work has begun exploring the characterization and utilization of provenance in systems based on the Service Oriented Architecture (such as Web Services and Grid based environments). One of the salient issues related to provenance use within any given system is its security. In a broad sense, security requirements arise within any data archival and retrieval system, however provenance presents unique requirements of its own. These requirements are additionally dependent on the architectural and environmental context that a provenance system operates in. We seek to analyze the security considerations pertaining to a Service Oriented Architecture based provenance system. Towards this end, we describe the components of such a system and illustrate the security considerations that arise within it. Concurrently, we outline possible approaches to address them.
Resumo:
Includes bibliography
Resumo:
Rapid Manufacturing (RM) umfasst den Begriff der direkten und wirtschaftlichen Bauteilherstellung des Serienprodukts aus 3D-Daten. Die Hauptvorteile sind u.a. das Wegfallen von Werkzeugen und eine Designfreiheit in der Produktentwicklung, die noch vor wenigen Jahren undenkbar war. Wenngleich heute eine Vielzahl von Werkstoffen im Kunststoff- und Metallbereich einsetzbar sind, konzentriert sich die Verbreitung des RM allerdings auf besondere Technologie- und Wirtschaftszweige, aufgrund mangelnder Erfahrungswerte, teilweise abweichender Werkstoffeigenschaften, fehlender Standards und ungeeigneter Testmethoden. In der Praxis sind Ingenieure und Techniker stark darauf bedacht, auf etablierte Abläufe und Standards zurückzugreifen. Es ist daher schwer einen geeigneten RM-Prozess aufzubauen, wo wichtige Eingangsgrößen meist unbekannt sind. In diesem Bericht wird beschrieben, welche Informationskanäle es innerhalb Europas zum Thema RM gibt und welche Hochschulen und Forschungszentren Aktivitäten aufweisen. Darüber hinaus werden Anwendungsfelder des RM aufgeführt, die über die bekannten Anwendungsfelder hinaus gehen. Dazu gehören Anwendungen im Bereich der Elektrotechnik, Raumfahrtinstrumentation und der Mode. Obwohl nicht alle Anwendungen des RM in diesem Bericht aufgeführt werden, sind einige Schlüsselinformationen im Bereich innovativer Anwendungen von RM enthalten.
Resumo:
Sexpartite vaults constitute one of the most interesting chapters in European Gothic architecture. Originally, the use of the square cross-ribbed vault was limited to relatively small spaces, but when the need arose to cover spaces of considerable size, a new vault with very peculiar characteristics appeared. This new vault was a cross-ribbed vault that was reinforced in the centre by a rib that was parallel to the transverse ribs which effectively divided the vault in half. This configuration breaks the side arch into two fragments, creating a pair of windows on each side. The volumetrics of these vaults is extremely complex and the difficulties involved in their construction perhaps explain why they were abandoned in favour of the simple cross ribbed vault, now with rectangular sections. The existence of the sexpartite vault barely lasted more than fifty years, from the end of the XII century and the beginning of the XIII. Towards the end of the 19th century Viollet-le-Duc gave a succinct explanation of this type of vault. A. Choisy also, later, devotes some pages to the French sexpartite vault; since then, the subject has only been broached in a few references in later studies on Gothic architecture. However, despite its short period of existence, the sexpartite vault spread throughout Europe and was used to build important vaulting. Viollet-le-Duc's sexpartite vault could be considered to be the prototype of them all, while it is true that the studies that we have conducted so far lead us to affirm that there is a wide variety of vaults, with different volumetric spaces and different construction strategies. Therefore, we believe that this chapter of international Gothic deserves further study applying the knowledge and resources that are available today. This paper has been written to explore the most significant European sexpartite vaults. New measurement technology has led to a revolution in research into the history of construction, allowing studies to be conducted that were hitherto impossible. Thorough data collection using total station and photogrammetry has enabled us to identify the stereotomy of the voussoirs, tas-de-charges and keystones, as well as the bonding of the surfaces of the severies. A comparison of the construction techniques employed in the different vaults studied reveals common construction features and aspects that are specific to each country. Thus we are able to establish the relationship between sexpartite vaults in different European countries and their influence on each other.
Resumo:
Effectively addressing the issue of duplication in Europe’s defence systems will require a considerable amount of political will and, more importantly, a far-sighted vision of the way to go. Difficult choices will have to be made, and EU member states will have to invest in a complex exercise of coordination of defence and industrial policies and planning. However, the efficient management of EU defence budgets and the maintenance of a viable industrial base demand such efforts. After all, what is at stake is the EU’s ability to guarantee its own security. The author makes a series of proposals to address this issue ahead of the European Council of December 2013, which will be devoted to matters of security and defence.
Resumo:
This document provides statistical appendices underpinning the research presented in ENEPRI Research Report No. 117, “Performance of Long-Term Care Systems in Europe”, December 2012. Esther Mot is Senior Researcher in the Netherlands Bureau for Economic Policy Analysis (CPB) and Riemer Faber is researcher at CPB. Joanna Geerts is researcher and Peter Willemé is health economist in the Social Security Research Group at the Federal Planning Bureau (FPB).
Resumo:
None.
Resumo:
The goal of this publication is to attempt to assess the thirteen years (2001- -2014) of the West’s military presence in the countries of post-Soviet Central Asia, closely associated with the ISAF and OEF-A (Operation Enduring Freedom – Afghanistan) missions in Afghanistan. There will also be an analysis of the actual challenges for the region’s stability after 2014. The current and future security architecture in Central Asia will also be looked at closely, as will the actual capabilities to counteract the most serious threats within its framework. The need to separately handle the security system in Central Asia and security as such is dictated by the particularities of political situation in the region, the key mechanism of which is geopolitics understood as global superpower rivalry for influence with a secondary or even instrumental role of the five regional states, while ignoring their internal problems. Such an approach is especially present in Russia’s perception of Central Asia, as it views security issues in geopolitical categories. Because of this, security analysis in the Central Asian region requires a broader geopolitical context, which was taken into account in this publication. The first part investigates the impact of the Western (primarily US) military and political presence on the region’s geopolitical architecture between 2001 and 2014. The second chapter is an attempt to take an objective look at the real challenges to regional security after the withdrawal of the coalition forces from Afghanistan, while the third chapter is dedicated to analysing the probable course of events in the security dimension following 2014. The accuracy of predictions time-wise included in the below publication does not exceed three to five years due to the dynamic developments in Central Asia and its immediate vicinity (the former Soviet Union, Afghanistan, Pakistan, Iran), and because of the large degree of unpredictability of policies of one of the key regional actors – Russia (both in the terms of its activity on the international arena, and its internal developments).
Resumo:
Architecture.--Sculpture.--Painting.--Metal work.--Ivory and wood carving.--Glass and pottery.--Textile fabrics.--Mosaic.
Resumo:
Architecture of the Pacific covers a region of more than third of the earth’s surface. The sparse Pacific population spreads over some 30 000 islands, which graduate in size from small atolls to the largest island, Australia, a continent. Pacific architecture can be studied as four cultural units: Micronesia, Polynesia, Melanesia, and Australasia (Australia and New Zealand). While many of the islands of Micronesia lie above the Equator, the remaining Pacific islands are in the southern hemisphere. With the exception of Australia, most of the islands have a warm and humid tropical climate with high rainfalls and lush vegetation. Some islands lie in the cyclonic and earthquake belts. Two distinct racial groups settled the region. The indigenous people, the Micronesians, Melanesians, Polynesians, Australian Aborigines and New Zealand Maoris, migrated from Asia thousands of years ago. The second group, the recent immigrants, were Europeans, who occupied the region during the last two centuries, and pockets of Asians brought in by colonial administrations as labourers during the early twentieth century.