866 resultados para (In)security feelings
Resumo:
As ligas com memória de forma Ni-Ti apresentam diversas características bastante úteis, das quais podemos realçar a sua elevada resistência à corrosão, às vibrações e geração de forças superiores quando comparadas com outros atuadores. Estas ligas apresentam diversas áreas de aplicabilidade em diferentes aéreas de pesquisa, como a metalomecânica, a robótica, aplicações espaciais, sendo mais relevante para este trabalho a sua aplicação em mecanismos de segurança para portas e acessos. Com este trabalho, pretendemos contribuir para uma forma eficaz de combate e contenção de incêndios em navios, através da apresentação de um mecanismo que vai permitir o corte de ventilação e isolamento no local do incêndio, permitindo criar uma fronteira de fumos que levará ao combate do incêndio por asfixia. O trabalho descreve um mecanismo idealizado com a utilização de ligas com memória de forma, que vai proceder à libertação de um flap, para isolamento da ventilação, na presença de temperatura proveniente do incêndio. Descreve também ensaios termomecânicos realizados, para determinação das características das molas e seu comportamento em determinadas situações chave. Para isto, irão ser utilizadas duas molas com diferentes gamas de temperatura, com o intuito de demonstrar a eficácia na utilização de diversos atuadores de ligas com memória de forma. Todos os testes foram feitos na presença de gamas de temperatura que se assemelham aos valores de atuação dos sistemas automáticos de extinção por água, pelo que os resultados obtidos, ilustram a verdadeira eficácia e utilidade do mecanismo, em casos reais.
Resumo:
Adaptability and invisibility are hallmarks of modern terrorism, and keeping pace with its dynamic nature presents a serious challenge for societies throughout the world. Innovations in computer science have incorporated applied mathematics to develop a wide array of predictive models to support the variety of approaches to counterterrorism. Predictive models are usually designed to forecast the location of attacks. Although this may protect individual structures or locations, it does not reduce the threat—it merely changes the target. While predictive models dedicated to events or social relationships receive much attention where the mathematical and social science communities intersect, models dedicated to terrorist locations such as safe-houses (rather than their targets or training sites) are rare and possibly nonexistent. At the time of this research, there were no publically available models designed to predict locations where violent extremists are likely to reside. This research uses France as a case study to present a complex systems model that incorporates multiple quantitative, qualitative and geospatial variables that differ in terms of scale, weight, and type. Though many of these variables are recognized by specialists in security studies, there remains controversy with respect to their relative importance, degree of interaction, and interdependence. Additionally, some of the variables proposed in this research are not generally recognized as drivers, yet they warrant examination based on their potential role within a complex system. This research tested multiple regression models and determined that geographically-weighted regression analysis produced the most accurate result to accommodate non-stationary coefficient behavior, demonstrating that geographic variables are critical to understanding and predicting the phenomenon of terrorism. This dissertation presents a flexible prototypical model that can be refined and applied to other regions to inform stakeholders such as policy-makers and law enforcement in their efforts to improve national security and enhance quality-of-life.
Resumo:
El propósito de esta monografía es comprender cuál ha sido el rol de la Unión Africana (UA), dentro de la misión de paz AMISOM en el periodo de 2007- 2013. Por ello, el trabajo abarca aspectos geopolíticos e históricos, que han influido en la configuración del conflicto armado de Somalía y que han llevado progresivamente a la creación, evolución e implementación de mecanismos como las misiones de paz. Además, se abarcan los planteamientos del neo-funcionalismo y el neo-regionalismo para comprender las estructuras y las dinámicas propias de la UA y así, comprender la naturaleza tanto de sus acciones, como de sus propósitos; propósitos que aclaman el fomento del panafricanismo. Desde aquí se puede entender como su rol ha contribuido con el crecimiento del mercado de la industria militar en la región, a costa de la responsabilidad de proteger. Por último, se concluye que dichas dinámicas han llevado a la creación de comunidades de inseguridad.
Resumo:
The Finnish legislation requires for a safe and secure learning environment. However, the comprehensive, risk based safety and security management (SSM) and the management commitment in the implementation and development of the SSM are not mentioned in the legislation. Multiple institutions, operators and researchers have studied and developed safety and security in educational institutions over the past decade. Typically the approach has been fragmented and without bringing up the importance of the comprehensive SSM. The development needs of the safety and security operations in universities have been studied. However, in universities of applied sciences (UASs) and in elementary schools (ESs), the performance level, strengths and weaknesses of the comprehensive SSM have not been studied. The objective of this study was to develop the comprehensive, risk based SSM of educational institutions by developing the new Asteri consultative auditing process and study its effects on auditees. Furthermore, the performance level in the comprehensive SSM in UASs and ESs were studied using Asteri and the TUTOR model developed by the Keski-Uusimaa Department for Rescue Services. In addition, strengths, development needs and differences were identified. In total, 76 educational institutions were audited between the years 2011 and 2014. The study is based on logical empiricism, and an observational applied research design was used. Auditing, observation and an electronic survey were used for data collection. Statistical analysis was used to analyze the collected information. In addition, thematic analysis was used to analyze the development areas of the organizations mentioned by the respondents in the survey. As one of the main contributions, this research presents the new Asteri consultative auditing process. Organizations with low performance levels on the audited subject benefit the most from the Asteri consultative auditing process. Asteri may be usable in many different types of audits, not only in SSM audits. As a new result, this study provides new knowledge on attitudes related to auditing. According to the research findings, auditing may generate negative attitudes and the auditor should take them into account when planning and preparing for audits. Negative attitudes can be compensated by producing added value, objectivity and positivity for the audit and, thus, improve the positive effects of auditing on knowledge and skills. Moreover, as the results of this study shows, auditing safety and security issues do not increase feelings of insecurity, but rather increase feelings of safety and security when using the new Asteri consultative auditing process with the TUTOR model. The results showed that the SSM in the audited UASs was statistically significantly more advanced than that in the audited ESs. However, there is still room for improvement in the ESs and the UASs as the approach to the SSM was fragmented. It can be assumed that the majority of Finnish UASs and ESs do not likely meet the basic level of the comprehensive, risk based the SSM.
Resumo:
Previous research suggests that hurt feelings can have powerful effects on individual and relational outcomes. This study examined a typology of hurtful events in couple relationships, together with integrative models predicting ongoing effects on victims and relationships. Participants were 224 students from introductory and third-year psychology classes, who completed open-ended and structured measures concerning an event in which a partner had hurt their feelings. By tailoring Leary et al.'s (1998) typology to the context of romantic relationships, five categories of hurtful events were proposed: active disassociation, passive disassociation, criticism, infidelity, and deception. Analyses assessing similarities and differences among the categories confirmed the utility of the typology. Structural equation modeling showed that longer-term effects on the victim were predicted by relationship anxiety and by the victim's immediate reactions to the event (negative emotions and self-perceptions; feelings of rejection and powerlessness). In contrast, ongoing effects on the relationship were predicted by avoidance, the victim's attributions and perceptions of offender remorse, and the victim's own behavior. The results highlight the utility of an integrated approach to hurt, incorporating emotional, cognitive, and behavioral responses, and dimensions of attachment security.
Resumo:
Power system real time security assessment is one of the fundamental modules of the electricity markets. Typically, when a contingency occurs, it is required that security assessment and enhancement module shall be ready for action within about 20 minutes’ time to meet the real time requirement. The recent California black out again highlighted the importance of system security. This paper proposed an approach for power system security assessment and enhancement based on the information provided from the pre-defined system parameter space. The proposed scheme opens up an efficient way for real time security assessment and enhancement in a competitive electricity market for single contingency case
Disentangling feelings from understanding and behavioural responses: A lesson from empathy in autism
Resumo:
The summit meeting between the two Korean heads of state, which took place in Pyongyang in June 2000, constitutes a major turning point in the peninsula's history. As the effects of the meeting are gradually unfolding, a period of detente no longer seems impossible. But major difficulties remain unsolved and Korea will continue to be one of the world's most volatile areas. The task of this essay is to identify and analyse some of the entrenched political patterns that will challenge policy-makers in the years ahead. To do so it is necessary to portray the conflict in Korea not only in conventional ideological and geopolitical terms, but also, and primarily, as a question of identity. From such a vantage-point two components are essential in the search for a more peaceful peninsula. Substantial progress has recently been made in the first realm, the need to approach security problems, no matter how volatile they seem. in a cooperative and dialogical, rather than merely a coercive manner. The second less accepted but perhaps more important factor, revolves around the necessity to recognize that dialogue has its limits, that the party on the other side of the DMZ cannot always be accommodated or subsumed into compromise. Needed is an ethics of difference: a willingness to accept that the other's sense of identity and politics may be inherently incompatible with one's own.