999 resultados para reactive security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The conventional approach in the discipline of International Relations is to treat terrorist organizations as "non-state" actors of international relations. However, this approach is problematic due to the fact that most terrorist organizations are backed or exploited by some states. In this article, I take issue with the non-stateness of terrorist organizations and seek to answer the question of why so many states, at times, support terrorist organizations. I argue that in the face of rising threats to national security in an age of devastating wars, modern nation states tend to provide support to foreign terrorist organizations that work against their present and imminent enemies. I elaborate on my argument studying three cases of state support for terrorism: Iranian support for Hamas, Syrian support for the PKK, and American support for the MEK. The analyses suggest that, for many states, terror is nothing but war by other means.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Liberal-Institutionalism and Structural Realism expectations about international organizations are confronted by looking at if and how US-controlled international aid is granted, and particularly if it is related or not to political affinity and to United Nations Security Council (UNSC) non-permanent membership. A preliminary assessment suggests that these relations only hold for the period of the Cold War, and, even then, only when UNSC non-permanent membership is in years in which the Security Council was deemed very important.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The United States has gone further than any country in the "privatization of security". Other countries may find the economic or financial logic in the use of contractors persuasive. The US experience with contracting out security, particularly in Iraq, was problematic, and can serve as a cautionary tale in order that other countries might learn how to avoid the pitfalls.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

One hundred and twenty subjects with Chagas' cardiopathy and 120 non-infected subjects were randomly selected from first time claimants of sickness benefits in the National Institute of Social Security (INPS) in Goiás. Cases of Chagas' cardiopathy were defined based on serological test, history of residence in an endemic area and, clinical and/or electrocardiogram (ECG) alterations suggestive of Chagas' cardiomyopathy. Controls were defined as subjects with at least two negative serological tests. Case and controls were compared in the analysis for age, sex, place of birth, migration history, socio-economic level, occupation, physical exertion at work, age at affiliation and years of contribution to the social security scheme, clinical course of their disease and ECG abnormalities. Chagas' disease patients were younger than other subjects and predominantly of rural origin. Non-infected subjects presented a better socio-economic level, were performing more skilled activities and had less changes of job than cases. No important difference was observed in relation to age at affiliation to INPS. About 60% of cases have claimed for benefits within the first four years of contribution while among controls this proportion was 38.5%. Cases were involved, proportionally more than controls, in "heavy" activities. A risk of 2.3 (95%CL 1.5 - 4.6) and 1.8 (95%CL 1.2- 3.5) was obtained comparing respectively "heavy" and "moderate" physical activity against "light". A relative risk of 8.5 (95%CL 4.9 - 14.8) associated with the presence of cardiopathy was estimated comparing the initial sample of seropositive subjects and controls. A high relative risk was observed in relation to right bundle branch block (RR = 37.1 95%CL = 8.8 - 155.6) and left anterior hemiblock (RR = 4.4, 95%CL = 2.1 - 9.1).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A família de especificações WS-* define um modelo de segurança para web services, baseado nos conceitos de claim, security token e Security Token Service (STS). Neste modelo, a informação de segurança dos originadores de mensagens (identidade, privilégios, etc.) é representada através de conjuntos de claims, contidos dentro de security tokens. A emissão e obtenção destes security tokens, por parte dos originadores de mensagens, são realizadas através de protocolos legados ou através de serviços especiais, designados de Security Token Services, usando as operações e os protocolos definidos na especificação WS-Trust. O conceito de Security Token Service não é usado apenas no contexto dos web services. Propostas como o modelo dos Information Cards, aplicável no contexto de aplicações web, também utilizam este conceito. Os Security Token Services desempenham vários papéis, dependendo da informação presente no token emitido. São exemplos o papel de Identity Provider, quando os tokens emitidos contêm informação de identidade, ou o papel de Policy Decision Point, quando os tokens emitidos definem autorizações. Este documento descreve o projecto duma biblioteca software para a realização de Security Token Services, tal como definidos na norma WS-Trust, destinada à plataforma .NET 3.5. Propõem-se uma arquitectura flexível e extensível, de forma a suportar novas versões das normas e as diversas variantes que os Security Token Services possuem, nomeadamente: o tipo dos security token emitidos e das claims neles contidas, a inferência das claims e os métodos de autenticação das entidades requerentes. Apresentam-se aspectos de implementação desta arquitectura, nomeadamente a integração com a plataforma WCF, a sua extensibilidade e o suporte a modelos e sistemas externos à norma. Finalmente, descrevem-se as plataformas de teste implementadas para a validação da biblioteca realizada e os módulos de extensão da biblioteca para: suporte do modelo associado aos Information Cards, do modelo OpenID e para a integração com o Authorization Manager.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

One of the major problems that prevents the spread of elections with the possibility of remote voting over electronic networks, also called Internet Voting, is the use of unreliable client platforms, such as the voter's computer and the Internet infrastructure connecting it to the election server. A computer connected to the Internet is exposed to viruses, worms, Trojans, spyware, malware and other threats that can compromise the election's integrity. For instance, it is possible to write a virus that changes the voter's vote to a predetermined vote on election's day. Another possible attack is the creation of a fake election web site where the voter uses a malicious vote program on the web site that manipulates the voter's vote (phishing/pharming attack). Such attacks may not disturb the election protocol, therefore can remain undetected in the eyes of the election auditors. We propose the use of Code Voting to overcome insecurity of the client platform. Code Voting consists in creating a secure communication channel to communicate the voter's vote between the voter and a trusted component attached to the voter's computer. Consequently, no one controlling the voter's computer can change the his/her's vote. The trusted component can then process the vote according to a cryptographic voting protocol to enable cryptographic verification at the server's side.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work addresses the effects of catalyst deactivation and investigates methods to reduce their impact on the reactive distillation columns performance. The use of variable feed quality and reboil ratio are investigated using a rigorous dynamic model developed in gPROMS and applied to an illustrative example, i.e., the olefin metathesis system, wherein 2-pentene reacts to form 2-butene and 3-hexene. Three designs and different strategies on column energy supply to tackle catalyst deactivation are investigated and the results compared.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Optical colour sensors based on multilayered a-SiC:H heterostructures can act as voltage controlled optical filters in the visible range. In this article we investigate the application of these structures for Fluorescence Resonance Energy Transfer (FRET) detection, The characteristics of a-SiC:H multilayered structure are studied both theoretically and experimentally in several wavelengths corresponding to different fluorophores. The tunable optical p-i'(a-SiC:H)-n/p-i(a-Si:H)-n heterostructures were produced by PECVD and tested for a proper fine tuning in the violet, cyan and yellow wavelengths. The devices were characterized through transmittance and spectral response measurements, under different electrical bias and frequencies. Violet, cyan and yellow signals were applied in simultaneous and results have shown that they can be recovered under suitable applied bias. A theoretical analysis supported by numerical simulation is presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The reactive power management is an important task in future power systems. The control of reactive power allows the increase of distributed energy resources penetration as well as the optimal operation of distribution networks. Currently, the control of reactive power is only controlled in large power units and in high and very high voltage substations. In this paper a reactive power control in smart grids paradigm is proposed, considering the management of distributed energy resources and of the distribution network by an aggregator namely Virtual Power Player (VPP).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Distribution systems are the first volunteers experiencing the benefits of smart grids. The smart grid concept impacts the internal legislation and standards in grid-connected and isolated distribution systems. Demand side management, the main feature of smart grids, acquires clear meaning in low voltage distribution systems. In these networks, various coordination procedures are required between domestic, commercial and industrial consumers, producers and the system operator. Obviously, the technical basis for bidirectional communication is the prerequisite of developing such a coordination procedure. The main coordination is required when the operator tries to dispatch the producers according to their own preferences without neglecting its inherent responsibility. Maintenance decisions are first determined by generating companies, and then the operator has to check and probably modify them for final approval. In this paper the generation scheduling from the viewpoint of a distribution system operator (DSO) is formulated. The traditional task of the DSO is securing network reliability and quality. The effectiveness of the proposed method is assessed by applying it to a 6-bus and 9-bus distribution system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Urban Computing (UrC) provides users with the situation-proper information by considering context of users, devices, and social and physical environment in urban life. With social network services, UrC makes it possible for people with common interests to organize a virtual-society through exchange of context information among them. In these cases, people and personal devices are vulnerable to fake and misleading context information which is transferred from unauthorized and unauthenticated servers by attackers. So called smart devices which run automatically on some context events are more vulnerable if they are not prepared for attacks. In this paper, we illustrate some UrC service scenarios, and show important context information, possible threats, protection method, and secure context management for people.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a methodology to address reactive power compensation using Evolutionary Particle Swarm Optimization (EPSO) technique programmed in the MATLAB environment. The main objective is to find the best operation point minimizing power losses with reactive power compensation, subjected to all operational constraints, namely full AC power flow equations, active and reactive power generation constraints. The methodology has been tested with the IEEE 14 bus test system demonstrating the ability and effectiveness of the proposed approach to handle the reactive power compensation problem.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a Unit Commitment model with reactive power compensation that has been solved by Genetic Algorithm (GA) optimization techniques. The GA has been developed a computational tools programmed/coded in MATLAB. The main objective is to find the best generations scheduling whose active power losses are minimal and the reactive power to be compensated, subjected to the power system technical constraints. Those are: full AC power flow equations, active and reactive power generation constraints. All constraints that have been represented in the objective function are weighted with a penalty factors. The IEEE 14-bus system has been used as test case to demonstrate the effectiveness of the proposed algorithm. Results and conclusions are dully drawn.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The transducer consists of a semiconductor device based on two stacked -i-n heterostructures that were designed to detect the emissions of the fluorescence resonance energy transfer between fluorophores in the cyan (470 nm) and yellow (588 nm) range of the spectrum. This research represents a preliminary study on the use of such wavelength-sensitive devices as photodetectors for this kind of application. The device was characterized through optoelectronic measurements concerning spectral response measurements under different electrical and optical biasing conditions. To simulate the fluorescence resonance energy transfer (FRET) pairs, a chromatic time-dependent combination of cyan and yellow wavelengths was applied to the device. The generated photocurrent was measured under reverse and forward bias to read out the output photocurrent signal. A different wavelength-biasing light was also superimposed. Results show that under reverse bias, the photocurrent signal presents four separate levels, each one assigned to the different wavelength combinations of the FRET pairs. If a blue background is superimposed, the yellow channel is enhanced and the cyan suppressed, while under red irradiation, the opposite behavior occurs. So, under suitable biasing light, the transducer is able to detect separately the cyan and yellow fluorescence pairs. An electrical model, supported by a numerical simulation, supports the transduction mechanism of the device.