974 resultados para High-Security Pairings


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Modern multimedia communication tools must have high security, high availability and high quality of service (QoS). Any security implementation will directly impact on QoS. This paper will investigate how end-to-end security impacts on QoS in Voice over Internet Protocol (VoIP). The QoS is measured in terms of lost packet ratio, latency and jitter using different encryption algorithms, no security and just the use of IP firewalls in Local and Wide Area Networks (LAN and WAN). The results of laboratory tests indicate that the impact on the overall performance of VoIP depends upon the bandwidth availability and encryption algorithm used. The implementation of any encryption algorithm in low bandwidth environments degrades the voice quality due to increased loss packets and packet latency, but as bandwidth increases encrypted VoIP calls provided better service compared to an unsecured environment.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Twenty-seven patients undergoing treatment in a high-secure forensic facility participated in focus group interviews to elicit their perceptions of (1) the factors leading to aggressive behaviour; and (2) strategies to reduce the risk of such behaviour. The focus group interviews were audiotaped, transcribed and analysed using content analysis. The participants identified that a combination of patient, staff and environmental factors contributed to violence in the study wards. The cause of aggressive behaviour centred around five major themes: the environment; empty days; staff interactions; medication issues; and patient-centred factors. Potential strategies identified by patients to reduce aggressive behaviour included: early intervention; the provision of meaningful activities to reduce boredom; separation of acutely disturbed patients; improved staff attitudes; implementation of effective justice procedures; and a patient advocate to mediate during times of conflict. Findings suggested that social and organizational factors need to be addressed to change the punitive subculture inherent in forensic psychiatric facilities, and to ensure a balance between security and effective therapy.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

L'évolution des connaissances et des compétences en matière d'évaluation et de gestion du risque de violence a permis une indiscutable avancée. Néanmoins les instruments utilisés restent encore source de controverses et prêtent le flanc à de nombreuses critiques. Dans ce contexte le climat sécuritaire actuel fait peser une lourde pression sur les équipes soignantes qui ont aussi à faire face à la violence des patients. Une réflexion sur les possibilités et les limites autant du soin que de la privation de liberté permet, peut-être d'envisager ce qu'est un risque acceptable. Evolution of knowledge and skills in violence risk management and assessment allowed an indisputable progress. Nevertheless instruments used such as HCR-20 still remain source of controversy and gives occurrence to numerous criticisms. In this context, the current high security climate puts added pressure on the medical teams which also have to deal with the violence of patients. A reflection on the possibilities and the limits of care as well as freedom deprivation may allow us to envision what is an acceptable risk.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

BACKGROUND: Multimodality treatment suites for patients with cerebral arteriovenous malformations (AVM) have recently become available. This study was designed to evaluate feasibility, safety and impact on treatment of a new intraoperative flat-panel (FP) based integrated surgical and imaging suite for combined endovascular and surgical treatment of cerebral AVM. METHODS: Twenty-five patients with AVMs to treat with combined endovascular and surgical interventions were prospectively enrolled in this consecutive case series. The hybrid suite allows combined endovascular and surgical approaches with intraoperative scanner-like imaging (XperCT®) and intraoperative 3D rotational angiography (3D-RA). The impact of intraoperative multimodal imaging on feasibility, workflow of combined interventions, surgery, and unexpected imaging findings were analyzed. RESULTS: Twenty-five patients (mean age 38 ± 18.6 year) with a median Spetzler-Martin grade 2 AVM (range 1-4) underwent combined endovascular and surgical procedures. Sixteen patients presented with a ruptured AVM and nine with an unruptured AVM. In 16 % (n = 4) of cases, intraoperative imaging visualized AVM remnants ≤3 mm and allowed for completion of the resections in the same sessions. Complete resection was confirmed in all n = 16 patients who had follow-up angiography one year after surgery so far. All diagnostic and therapeutical steps, including angiographic control, were performed without having to move the patients CONCLUSION: The hybrid neurointerventional suite was shown to be a safe and useful setup which allowed for unconstrained combined microsurgical and neuroradiological workflow. It reduces the need for extraoperative angiographic controls and subsequent potential surgical revisions a second time, as small AVM remnants can be detected with high security.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Extracorporeal life support systems (ECLS) have become common in cardiothoracic surgery, but are still "Terra Incognita" in other medical fields due to the fact that perfusion units are normally bound to cardiothoracic centres. The Lifebridge B2T is an ECLS that is meant to be used as an easy and fast-track extracorporeal cardiac support to provide short-term perfusion for the transport of a patient to a specialized centre. With the Lifebridge B2T it is now possible to provide extracorporeal bypass for patients in hospitals without a perfusion unit. The Lifebridge B2T was tested on three calves to analyze the handling, performance and security of this system. The Lifebridge B2T safely can be used clinically and can provide full extracorporeal support for patients in cardiac or pulmonary failure. Flows up to 3.9 +/- 0.2l/min were reached, with an inflow pressure of -103 +/- 13mmHg, using a 21Fr. BioMedicus (Medtronic, Minneapolis, MN, USA) venous cannula. The "Plug and Play" philosophy, with semi-automatic priming, integrated check-list, a long battery time of over two hours and instinctively designed user interface, makes this device very interesting for units with high-risk interventions, such as catheterisation labs. If a system is necessary in an emergency unit, the Lifebridge can provide a high security level, even in centres not acquainted with cardiopulmonary bypass.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The Biblioteca de Catalunya (BC) was created in 1907 by the Institut d’Estudis Catalans (IEC). In 1914 the Mancomunitat de Catalunya gave the library its condition of cultural and public service, open to researchers and scholars. The library underwent several changes as a consequence of political events, along the most of 20th century. In 1981 it was recognized by law as national library and it recovered its foundational aim of gathering, preserving and disseminating the bibliographical output of Catalonia and the production related with the Catalan linguistic field. As the proud host of ANADP2, the BC wants to show the attendees to the conference how, since 2004, has positioned itself to face the challenge of the new informational and technological paradigm. The library strategy for oncoming years includes giving open and free access online to the digitization of many of his collections through the portals MDC (Digital Memory of Catalonia), ARCA (Old Catalan Serials Archive) and Google Books project; the creation of the Web Archive of Catalonia and, as the last step in the consolidation of its policy, a high-security preserving repository named COFRE, based on the international guidelines and initiatives and the experience of the BC itself.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A postgraduate seminar series with a title Critical Infrastructure Protection against Cyber Threats held at the Department of Military Technology of the National Defence University in the fall of 2013 and 2014. This book is a collection of some of talks that were presented in the seminar. The papers address origin of critical infrastructure protection, wargaming cyberwar in critical infrastructure defence, cyber-target categorization, supervisory control and data acquisition systems vulnerabilities, electric power as critical infrastructure, improving situational awareness of critical infrastructure and trust based situation awareness in high security cloud environment. This set of papers tries to give some insight to current issues of the network-centric critical infrastructure protection. The seminar has always made a publication of the papers but this has been an internal publication of the Finnish Defence Forces and has not hindered publication of the papers in international conferences. Publication of these papers in peer reviewed conferences has indeed been always the goal of the seminar, since it teaches writing conference level papers. We still hope that an internal publication in the department series is useful to the Finnish Defence Forces by offering an easy access to these papers.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Division of Electronics Engineering

Relevância:

80.00% 80.00%

Publicador:

Resumo:

La incidencia de terceros actores en las Relaciones Internacionales es cada vez más frecuente y ha llevado a muchas de estas interacciones a un grado de mayor hostilidad, hasta el punto de convertirse en focos de inseguridad para toda una región. Este tipo de situaciones se presenta en mayor medida en zonas como medio oriente que se caracterizan por ser complejos de seguridad de alta hostilidad en los que se desarrollan amplias agendas de seguridad. Un marco de análisis de dicha situación la podemos encontrar en el conflicto Líbano – Israel y la incidencia que ha tenido Hezbolá (actor no estatal) como agente de securitización lo que ha generado una mayor tensión entre los estados de Líbano e Israel y como consecuencia de ello un mayor grado de inseguridad para la región (Medio Oriente).

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper discusses the RFID implants for identification via a sensor network. Brain-computer implants linked in to a wireless network. Biometric identification via body sensors is also discussed. The use of a network as a means for remote and distance monitoring of humans opens up a range of potential uses. Where implanted identification is concerned this immediately offers high security access to specific areas by means of only an RFID device. If a neural implant is employed then clearly the information exchanged with a network can take on a much richer form, allowing for identification and response to an individual's needs based on the signals apparent on their nervous system.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This article examines the role of advertisement and promotion in the successful development of nationwide building societies in interwar Britain and the rapid overall growth of the building society movement. Major building societies are shown to have used extensive advertising to compensate for their initial lack of established national brands, promote home-ownership, and make savers aware of the attractive earnings and high security of building society savings. During a period when most building societies had very limited branch networks, extensive advertising increased the public profile of the major societies and thus assisted their rapid expansion via lower-cost modes such as agency networks.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The ever increasing spurt in digital crimes such as image manipulation, image tampering, signature forgery, image forgery, illegal transaction, etc. have hard pressed the demand to combat these forms of criminal activities. In this direction, biometrics - the computer-based validation of a persons' identity is becoming more and more essential particularly for high security systems. The essence of biometrics is the measurement of person’s physiological or behavioral characteristics, it enables authentication of a person’s identity. Biometric-based authentication is also becoming increasingly important in computer-based applications because the amount of sensitive data stored in such systems is growing. The new demands of biometric systems are robustness, high recognition rates, capability to handle imprecision, uncertainties of non-statistical kind and magnanimous flexibility. It is exactly here that, the role of soft computing techniques comes to play. The main aim of this write-up is to present a pragmatic view on applications of soft computing techniques in biometrics and to analyze its impact. It is found that soft computing has already made inroads in terms of individual methods or in combination. Applications of varieties of neural networks top the list followed by fuzzy logic and evolutionary algorithms. In a nutshell, the soft computing paradigms are used for biometric tasks such as feature extraction, dimensionality reduction, pattern identification, pattern mapping and the like.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

O Brasil é o sétimo maior consumidor mundial de águas engarrafadas. Os recipientes mais utilizados, galões plásticos de 20 litros, devem ser submetidos à inspeção individual e posteriormente a sanificação. Recentemente, enfermidades associadas a microrganismos emergentes têm despertado o interesse por novos sanitizantes. Entre estes, o gás ozônio é um dos mais atraentes em virtude da sua segurança e eficácia superiores aos desinfetantes convencionais, não gerando resíduos tóxicos. Neste trabalho, o ozônio foi avaliado como método alternativo na sanificação de galões de água de 20 litros, na cidade de Alfenas, MG. Trinta galões foram avaliados sem tratamento e trinta após a sanificação com água ozonizada (4mg/L/2minutos) quanto à contagem total de microrganismos aeróbios mesófilos heterotróficos, número mais provável (NMP) de coliformes totais e Escherichia coli, Staphyloccocus aureus e Pseudomonas spp. em 100mL de solução enxaguatória. A contagem média de unidades formadoras de colônias (UFC) de microrganismos heterotróficos no estágio de pré-lavagem foi de 5,7/cm² enquanto que o tratamento com a água ozonizada reduziu este valor para 0,003/cm², além de promover a negativação das análises para coliformes Pseudomonas ssp. e somente 13,3% das amostras apresentaram-se positivas para Staphylococcus aureus após a sanificação. Concluiu-se que o tratamento com utilização de ozônio foi eficiente, nas condições testadas.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The following is an analysis of the role of computer aided surgery by infralabyrinthine-subcochlear approach to the petrous apex for cholesterol granulomas with hearing preservation. In a retrospective case review from 1996 to 2008 six patients were analysed in our tertiary referral centre, otorhinolaryngology outpatient clinic. Excellent intraoperative localisation of the carotid artery, facial nerve and the entrance into the cholesterol cyst of the bone by means of the navigation system was seen. Additionally, the operation time decreased from an initial 4 h down to 2 h. The application of computer-aided surgery allows intraoperative monitoring of the position of the tip of the microsurgical instruments in case of a rare disease and in the delicate area of the petrous apex giving a high security level.