994 resultados para Secure Base
Resumo:
Este trabalho consiste em um estudo sobre a relação entre subjetividade e meio, mais especificamente, sobre a formação subjetiva no contexto da violência nas favelas cariocas. A reflexão proposta traz, como principal referencial teórico, a noção, adotada, entre outros, por John Bowlby e Donald Winnicott, de uma constituição subjetiva marcada pela intersubjetividade. Dito de outro modo, a subjetividade aqui é resultante do encontro do indivíduo com o meio (inicialmente a própria figura materna); o que significa que um não pode ser compreendido a não ser na interação com outro. Desse pressuposto comum, tais autores partem para construir percursos teóricos independentes, que ora se aproximam, ora se distanciam. Contemporâneos e membros da Sociedade Psicanalítica Britânica da época, Bowlby e Winnicott fizeram parte do chamado Middle Group. Tal vertente psicanalítica, sob a influência da biologia de Darwin, da etologia e da literatura, apresenta como característica fundamental a de conferir uma importância inédita ao ambiente no processo do desenvolvimento emocional. A adaptação dos cuidados maternos às necessidades do bebê, nos estágios precoces de seu desenvolvimento, ganha a função primordial de sobrevivência e desempenha aqui um papel decisivo para a saúde mental do sujeito. Bowlby utilizar-se-á da idéia de que os pais, ou cuidadores, funcionam como uma espécie de base segura a partir da qual a criança pode explorar o mundo com a confiança de que será acolhida caso precise. Para ele, o comportamento de apego sustenta o processo de subjetivação e representa um elemento constituinte da natureza humana, que se manifesta através da propensão para estabelecer laços íntimos. Já Winnicott adotará a idéia de uma maternagem suficientemente boa, capaz de garantir à criança a continuidade de sua existência. Interrupções nessa provisão dos cuidados precoces são, para estes autores, potenciais agentes patogênicos. À luz dessa perspectiva teórica, serão apresentadas as narrativas biográficas de três moradores de uma favela da zona sul carioca representativa dos constantes e violentos confrontos que vêm ocorrendo entre os integrantes do tráfico de drogas daquela localidade com a polícia, com outras facções rivais e entre eles próprios. A experiência da provisão materna, em ambientes prejudicados por um determinado tipo de violência contextualizada, é o que tais histórias pessoais tentam retratar.
Resumo:
When we look to perform a work for developing a framework to create a business and take it correctly, there are always some persons looking as a challenge those bases and finding a mistake. The way to work in these situations is not a matter of law, is a matter of devoting time to identify these situations. It is always said that the evil goes a step ahead. The business ethics have been altered for quite time by some would-be entrepreneurs. These people have learned to play with business ethics to show your business as prosperous as something that is sought to highlight and adulterate their results quickly. Once the company reaches an international dimension, many companies take on global responsibility and, in these cases where you can see if the objective has been to obtain a rapid capital increase or growth is in line with its proportions. A business ethics is based on establishing a strong base so that interest is encouraged from an early time. Good staff, organizational level should be achieved and not only at the company but, out of the company too. Thus, you can create a secure base to convince potential investors and employees about the business. There are no freeways in business ethics and all fast track can be or a genius or leads to failure. We must find where these jumps are occurring, such errors or corrections to business ethics and their rules. Thus we can differentiate a company or an entrepreneur who is working correctly from the cloaking. Starting from the basics of business ethics and studying the different levels from the personal to the prospect that the company shows in the world. Lets see where these changes are occurring and how we can fight against them and anticipate the market to possible cases of fraud or strange movements seeking to attract the unwary
Resumo:
Pain self-efficacy and anxiety have each been shown to contribute substantially to pain intensity and pain-related disability. Although adult attachment theory has been related separately to chronic pain, anxiety, and self-efficacy, it has not before been investigated with either pain self-efficacy or anxiety in the context of chronic pain. This study investigated the interrelations between these aspects of the chronic pain experience and their relative contributions towards pain intensity and disability. A clinical sample of 152 chronic pain patients participated in this study, completing self-report measures of attachment, self-efficacy, pain intensity, and disability, prior to attending a multidisciplinary pain clinic. Results revealed that fearful and preoccupied (anxious) attachment categories were associated with low pain self-efficacy, while high scores on the attachment dimension of comfort with closeness were linked with high pain self-efficacy, particularly for males. Insecure attachment (whether defined in terms of categories or dimensions) was related to higher levels of anxiety. Pain self-efficacy proved a stronger predictor of pain intensity than did anxiety and was a stronger predictor of disability than pain intensity or anxiety. In addition, comfort with closeness moderated the associations between pain self-efficacy and disability, pain self-efficacy and pain intensity, and anxiety and disability. Together, these findings support the value of adopting an attachment theoretical approach in the context of chronic pain. Treatment considerations and future research directions are considered. (c) 2006 International Association for the Study of Pain. Published by Elsevier B.V. All rights reserved.
Resumo:
This qualitative study used grounded theory methods and purposeful sampling to explore perceptions on caring and being cared-for. Twenty-four adolescent male participants, identified as at-risk for school failure, completed a two phase interview process exploring these phenomena within three relationships; the relationship with the friend, with the most caring person they knew and with the teacher they felt cared for them. ^ Each participant was asked a predetermined set of open questions in an initial semi-structured interview. In addition each participant was encouraged to explore his own reflections on caring. A second interview allowed for member checking and for the participant to continue sharing his meaning of caring and being cared-for. ^ Line by line analysis with open, axial and selective coding was applied to interview transcripts along with a constant comparative method. Results indicated that the core category integrating all other categories was attachment bonding. Participants' stories manifested characteristics of proximity seeking, secure base, safe haven and distress upon involuntary separation from an attachment figure. ^ Strategies facilitating attachment bonding were influenced by the power positions of the relational players. Participants responded positively to the one-caring when they felt cared-for. Results further indicated that participants did not need to feel a sense of belonging in order to feel cared-for. Teacher behaviors indicating openness for authentic connections with students were specific to teacher's friendliness and professional competence. Teachers who nurtured feelings of being cared-for were uncommon in the participants' educational experience. ^ The number of adolescent males leaving high school prematurely is both a personal problem and a social problem. Despite a “mask” of indifference often exhibited by adolescent males at-risk for school failure, teachers might consider the social/emotional needs of these students when implementing the curriculum. In addition, policy makers might consider the social/emotional needs of this vulnerable population when developing programs meant to foster psychological well-being and connectedness for adolescent males at-risk for school failure. ^
Resumo:
Dissertação de Mestrado apresentada ao Instituto Superior de Psicologia Aplicada para obtenção de grau de Mestre na especialidade de Psicologia Clínica.
Resumo:
Dissertação de Mestrado apresentada no ISPA – Instituto Universitário para obtenção do grau de Mestre em Psicologia especialidade de Psicologia Clínica.
Resumo:
Dissertação de Mestrado apresentada no ISPA – Instituto Universitário para obtenção do grau de Mestre em Psicologia especialidade de Psicologia Clínica.
Resumo:
Tese de Doutoramento apresentada à Universidade Fernando Pessoa como parte dos requisitos para obtenção do grau de Doutror em Ciências da Terra.
Resumo:
In this paper, we study the information-theoretical security of a downlink multiuser cooperative relaying network with multiple intermediate amplify-and-forward (AF) relays, where there exist multiple eavesdroppers which can overhear the message. To prevent the wiretap and strength the network security, we select one best relay and user pair, so that the selected user can receive the message from the base station assisted by the selected relay. The relay and user selection is performed by maximizing the ratio of the received signal-to-noise ratio (SNR) at the user to the eavesdroppers, which is based on both the main and eavesdropper links. For the considered system, we derive the closed-form expression of the secrecy outage probability, and provide the asymptotic expression in high main-to-eavesdropper ratio (MER) region. From the asymptotic analysis, we can find that the system diversity order is equivalent to the number of relays regardless of the number of users and eavesdroppers.
Resumo:
In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multi-antenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the cellular base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, we propose a new power transfer policy, namely, best power beacon (BPB) power transfer. To characterize the power transfer reliability of the proposed policy, we derive new closed-form expressions for the exact power outage probability and the asymptotic power outage probability with large antenna arrays at PBs. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), and 2) nearest receiver selection (NRS). To assess the secrecy performance, we derive new expressions for the secrecy throughput considering the two receiver selection schemes using the BPB power transfer policies. We show that secrecy performance improves with increasing densities of PBs and D2D receivers because of a larger multiuser diversity gain. A pivotal conclusion is reached that BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead.
Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model
Resumo:
In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multiantenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the primary base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, three wireless power transfer (WPT) policies are proposed: 1) co-operative power beacons (CPB) power transfer, 2) best power beacon (BPB) power transfer, and 3) nearest power beacon (NPB) power transfer. To characterize the power transfer reliability of the proposed three policies, we derive new expressions for the exact power outage probability. Moreover, the analysis of the power outage probability is extended to the case when PBs are equipped with large antenna arrays. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), where the receiver with the strongest channel is selected; and 2) nearest receiver selection (NRS), where the nearest receiver is selected. To assess the secrecy performance, we derive new analytical expressions for the secrecy outage probability and the secrecy throughput considering the two receiver selection schemes using the proposed WPT policies. We presented Monte carlo simulation results to corroborate our analysis and show: 1) secrecy performance improves with increasing densities of PBs and D2D receivers due to larger multiuser diversity gain; 2) CPB achieves better secrecy performance than BPB and NPB but consumes more power; and 3) BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead. A pivotal conclusion- is reached that with increasing number of antennas at PBs, NPB offers a comparable secrecy performance to that of BPB but with a lower complexity.
Resumo:
Il y a des problemes qui semblent impossible a resoudre sans l'utilisation d'un tiers parti honnete. Comment est-ce que deux millionnaires peuvent savoir qui est le plus riche sans dire a l'autre la valeur de ses biens ? Que peut-on faire pour prevenir les collisions de satellites quand les trajectoires sont secretes ? Comment est-ce que les chercheurs peuvent apprendre les liens entre des medicaments et des maladies sans compromettre les droits prives du patient ? Comment est-ce qu'une organisation peut ecmpecher le gouvernement d'abuser de l'information dont il dispose en sachant que l'organisation doit n'avoir aucun acces a cette information ? Le Calcul multiparti, une branche de la cryptographie, etudie comment creer des protocoles pour realiser de telles taches sans l'utilisation d'un tiers parti honnete. Les protocoles doivent etre prives, corrects, efficaces et robustes. Un protocole est prive si un adversaire n'apprend rien de plus que ce que lui donnerait un tiers parti honnete. Un protocole est correct si un joueur honnete recoit ce que lui donnerait un tiers parti honnete. Un protocole devrait bien sur etre efficace. Etre robuste correspond au fait qu'un protocole marche meme si un petit ensemble des joueurs triche. On demontre que sous l'hypothese d'un canal de diusion simultane on peut echanger la robustesse pour la validite et le fait d'etre prive contre certains ensembles d'adversaires. Le calcul multiparti a quatre outils de base : le transfert inconscient, la mise en gage, le partage de secret et le brouillage de circuit. Les protocoles du calcul multiparti peuvent etre construits avec uniquements ces outils. On peut aussi construire les protocoles a partir d'hypoth eses calculatoires. Les protocoles construits a partir de ces outils sont souples et peuvent resister aux changements technologiques et a des ameliorations algorithmiques. Nous nous demandons si l'efficacite necessite des hypotheses de calcul. Nous demontrons que ce n'est pas le cas en construisant des protocoles efficaces a partir de ces outils de base. Cette these est constitue de quatre articles rediges en collaboration avec d'autres chercheurs. Ceci constitue la partie mature de ma recherche et sont mes contributions principales au cours de cette periode de temps. Dans le premier ouvrage presente dans cette these, nous etudions la capacite de mise en gage des canaux bruites. Nous demontrons tout d'abord une limite inferieure stricte qui implique que contrairement au transfert inconscient, il n'existe aucun protocole de taux constant pour les mises en gage de bit. Nous demontrons ensuite que, en limitant la facon dont les engagements peuvent etre ouverts, nous pouvons faire mieux et meme un taux constant dans certains cas. Ceci est fait en exploitant la notion de cover-free families . Dans le second article, nous demontrons que pour certains problemes, il existe un echange entre robustesse, la validite et le prive. Il s'effectue en utilisant le partage de secret veriable, une preuve a divulgation nulle, le concept de fantomes et une technique que nous appelons les balles et les bacs. Dans notre troisieme contribution, nous demontrons qu'un grand nombre de protocoles dans la litterature basee sur des hypotheses de calcul peuvent etre instancies a partir d'une primitive appelee Transfert Inconscient Veriable, via le concept de Transfert Inconscient Generalise. Le protocole utilise le partage de secret comme outils de base. Dans la derniere publication, nous counstruisons un protocole efficace avec un nombre constant de rondes pour le calcul a deux parties. L'efficacite du protocole derive du fait qu'on remplace le coeur d'un protocole standard par une primitive qui fonctionne plus ou moins bien mais qui est tres peu couteux. On protege le protocole contre les defauts en utilisant le concept de privacy amplication .
Resumo:
La seguridad agroalimentaria debe ser prioridad para los gobiernos de Brasil y Argentina, debido a que deben garantizar la producción y el abastecimiento de los alimentos básicos para las futuras generaciones, entendido como alimentos básicos aquellos que más se consumen, ya sea en su forma original o por medio de sus subproductos, estos productos son el trigo, el maíz y el arroz. El garantizar la producción y el abastecimiento de estos productos en el corto y largo plazo, implica entender cuáles de los procesos productivos aplicados en la realización de los productos base de alimentación no son compatibles con el medio ambiente, generando impactos negativos sobre este. Estos impactos ambientales generados a partir de la agricultura, son identificados como el uso excesivo de recursos naturales entre ellos el agua, así como su contaminación por agentes toxico como los agroquímicos y fertilizantes. Asimismo, el uso de estos agentes tóxicos, genera la infertilidad de los suelos afectando directamente la producción en el largo plazo. Entender los impactos ambientales, implica desarrollar estrategias transversales que le permitan a los garantizar un desarrollo sostenible a lo largo de todo el ciclo del producto; estas estrategias deben estar acompañadas por un rendimiento y eficiencia de los cultivos, de nada sirve implementar estrategias compatibles con el medio ambiente si no se cumple con el principal objetivo de la producción de estos producto, que es garantizar el abastecimiento y alimentación para las generaciones presentes y futuras.
Resumo:
Most of the proposed key management protocols for wireless sensor networks (WSNs) in the literature assume that a single base station is used and that the base station is trustworthy. However, there are applications in which multiple base stations are used and the security of the base stations must be considered. This paper investigates a key management protocol in wireless sensor networks which include multiple base stations. We consider the situations in which both the base stations and the sensor nodes can be compromised. The proposed key management protocol, mKeying, includes two schemes, a key distribution scheme, mKeyDist, supporting multiple base stations in the network, and a key revocation scheme, mKeyRev, used to efficiently remove the compromised nodes from the network. Our analyses show that the proposed protocol is efficient and secure against the compromise of the base stations and the sensor nodes.
Resumo:
Homeostatic regulation allows organisms to secure basic physiological processes in a varying environment. To counteract fluctuations in ambient carbonate system speciation due to elevated seawater pCO2 (hypercapnia), many aquatic crustaceans excrete/accumulate acid-base equivalents through their gills; however, not much is known about the role of ammonia in this response. The present study investigated the effects of hypercapnia on acid-base and ammonia regulation in the Dungeness crab, Metacarcinus magister on the whole animal and isolated gill levels. Hemolymph pCO2 and [HCO3]- increased in M. magister acclimated to elevated pCO2 (330 Pa), while pH remained stable. Additionally, hemolymph [Na+], [Ca2+], and [SO4]2- were significantly increased. When challenged with varying pH during gill perfusion, the pH of the artificial hemolymph remained relatively unchanged. Overall, ammonia production and excretion, as well as oxygen consumption, were reduced in crabs acclimated to elevated pCO2, demonstrating that either (amino acid) oxidation is reduced in response to this particular stress, or nitrogenous wastes are excreted in an alternative form.