Search results for "Security"

showing 10 items of 1693 documents

Biological Standards and Biosecurity: The Unexplored Link

2021

AbstractThe issue of standardisation in Synthetic Biology has important implications at both the technical and governance levels. At the former, standardisation in biology (a still-ongoing process) is expected to exponentially increase the potential of synthetic biology by democratising, easing and expanding our ability to engineer life. Indeed, it has to be stressed that Synthetic Biology is -or at least aims at being- a fully engineering discipline. And engineering, from industrial to electronics, largely relies on standards. A standard is a part, piece, device or procedure with well-established properties, and which can reliably be used in a broad range of industrial applications. Standa…

Synthetic biologyNuts and boltsProcess (engineering)Corporate governanceBiosecurityManufacturing engineering
researchProduct

Infrastructure and system programming for digital ecosystems used in natural disaster management

2009

Researchers in most fields of activity must concentrate their efforts to eradicate or at least to mitigate the negative effects of “global warming”, which affect the entire planet. Within this context, we strongly believe that IT&C specialists should also approach the issue. Therefore, this paper presents the results and solutions obtained during the development of a research contract dealing on the one hand with real-time data collection and data centralization in a decision making system, and on the other with the dissemination of information among the people exposed to the effects of natural disasters such as: floods, storms, tsunamis, or other natural disasters which may destroy propert…

System programmingData collectionFlood mythGlobal warmingInformation DisseminationContext (language use)BusinessNatural disasterComputer securitycomputer.software_genreDisseminationEnvironmental planningcomputer2009 3rd IEEE International Conference on Digital Ecosystems and Technologies
researchProduct

Information systems security issues in the context of developing countries

2018

This chapter explores the current state of information systems security (ISS) in developing countries and suggests a way forward. A systematic literature review is conducted applying the approach suggested in reference [1]. In total, 41 articles were evaluated, 17 of which were analysed as part of the review. The review shows that the proliferation of technology in developing countries is increasing; however, ISS risk is also increasing in tandem. The reasons are lack of robust infrastructure, security education and skilled manpower. The review also revealed that while most of the technologies created are for the organizations in the developed world, developing countries are blindly impleme…

Systematic reviewRisk analysis (engineering)State (polity)Security educationmedia_common.quotation_subjectInformation systems securityDeveloping countryContext (language use)BusinessDeveloped countrymedia_common
researchProduct

L'harmonisation du droit pharmaceutique en Afrique de l’Ouest : le cas de l’UEMOA

2018

Health protection, the setting up of health security highly depend on an organization of the pharmaceutical market by the establishment of a common pharmaceutical market. In West Africa, particularly within WAEMU, the absence of such of market eases the rise in illicit drug market and impedes a free movement of health products between States. Yet, economic development involves an effective and secured health system. WAEMU’s member States awareness is emerging gradually, hence the necessity to join forces for better health protection ; therefore the long-awaited legal integration can be done through several means ; harmonization, unification, standardization. Harmonization is the means of le…

Sécurité sanitaire[SHS.DROIT]Humanities and Social Sciences/Law[SHS.DROIT] Humanities and Social Sciences/LawUnificationHarmonizationHarmonisationIntégration juridiqueLegal integrationPharmaceutical rightUemoaHealth securityDroit pharmaceutiqueWaemu
researchProduct

Ksiądz prymas Stefan Wyszyński na uroczystościach milenijnych w Opolu i Kamieniu Śląskim (13-14 sierpnia 1966 r.) - historia i aktualność przesłania

2022

W dniach 13 i 14 sierpnia 1966 r. ks. prymas Stefan Wyszyński wziął udział w uroczystościach liturgicznych w Opolu i Kamieniu Śląskim w ramach obchodów milenium chrztu w Polsce. Wygłosił wtedy kazania w Opolu 13 i 14 sierpnia, a także 14 sierpnia w Kamieniu Śląskim. Zaangażowanie ówczesnych lokalnych władz, milicji czy Służby Bezpieczeństwa w niwelowanie znaczenia tych obchodów, a zarazem treść przesłania, z jakim do swoich rodaków zwrócił się w Opolu i Kamieniu Śląskim z 1966 r. prymas Wyszyński, dowodzą, że trudno było pozostać obojętnym wobec tego nauczania. Chociaż uwarunkowania społeczno-polityczne zmieniły się, postać prymasa i jego nauczanie wciąż inspirują. Artykuł pt. Ksiądz prymas…

Służba BezpieczeństwaKs. prymas Stefan WyszyńskiMillennium celebrations of the Baptism of Poland in OpolePrimate Wyszyński's sermonsFr. Primate Stefan Wyszyńskiuroczystości milenijne chrztu Polski w Opolukazania prymasa WyszyńskiegoSecurity Service
researchProduct

An analytical model of a new packet marking algorithm for TCP flows

2005

In Differentiated Services networks, packets may receive a different treatment according to their Differentiateo Services Code Point (DSCP) label. As a consequence, packet marking schemes can also be devised to differentiate packets belonging to a same TCP flow, with the goal of improving the performance experienced. This paper presents an analytical model for an adaptive packet marking scheme proposed in our previous work. The model combines three specific sub-models aimed at describing (i) the TCP sources aggregate, (ii) the marker, and (iii) the network status. Preliminary simulation results show quite accurate predictions for throughput and average queue occupancy. Besides, the research…

TCP accelerationComputer Networks and CommunicationsComputer scienceTransmission Control ProtocolTCP tuningThroughputRandom early detectionRound-trip delay timeH-TCPActive queue managementTCP sequence prediction attackComputer securitycomputer.software_genrelaw.inventionTCP Westwood plusTCP Friendly Rate ControlPacket switchinglawInternet ProtocolZeta-TCPQueueNetwork packetbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSToken bucketTelecommunications networkTCP global synchronizationDifferentiated servicesNetwork servicebusinesscomputerComputer network
researchProduct

Bivariate analysis of taekwondo actions: The effectiveness of techniques and tactics in an Olympic taekwondo championship.

2020

This paper describes the effectiveness of technical-tactical actions performed during a tournament. A total of 14,145 actions of the 2012 London Olympic Games were analysed. Differences emerged in the use of tactics, techniques, zones, legs and guard to score. Regarding tactics, anticipatory counterattacks were the most effective for scoring one and three points. Circular techniques were the most effective for scoring one point, linear to score three points, and spin techniques to score two and four points. Actions to the chest results in a score of one to two points and actions to the head in a score of three to four points. The rear leg was more effective in scoring one, two and four poin…

Taekwondo athletesGuard (information security)taekwondo athletesbiologyAthletesEffective patternsApplied psychologyPerformance analysistaekwondo athletes.Physical Therapy Sports Therapy and RehabilitationBivariate analysisbiology.organism_classificationObservational methodologyEducación Física y Deportivaeffective patternsTournamentobservational methodologylcsh:Sports medicineChampionshipperformance analysislcsh:RC1200-1245PsychologyObservational methodology
researchProduct

The principal as a key actor in promoting teachers’ innovativeness – analyzing the innovativeness of teaching staff with variance-based partial least…

2018

The study examines the correlation between collective innovativeness of the teaching staff and the principal’s leadership style as well as additional school structure characteristics. The construct...

Teaching staff05 social sciencesPrincipal (computer security)050301 educationRegression analysisVariance (accounting)Structural equation modelingEducation0502 economics and businessMathematics educationKey (cryptography)Leadership styleConstruct (philosophy)Psychology0503 education050203 business & managementSchool Effectiveness and School Improvement
researchProduct

Empowering team leadership and safety performance in nuclear power plants: A multilevel approach

2013

Abstract Despite the large body of work on team leadership, hardly any literature has dealt with team leadership in safety performance settings. The goal of the present study is to analyze how team leader behaviors influence team members’ safety performance in nuclear power plants. For this purpose, an empowering leadership approach was assessed. We consider a multilevel model in which safety performance is divided into three types of behaviors. The sample was composed of 479 workers in 54 groups from two Spanish nuclear power plants. The results suggested that leaders’ empowering behaviors generated higher safety compliance behaviors and higher safety participation behaviors by team member…

Team compositionEngineeringbusiness.industryApplied psychologyMultilevel modelPublic Health Environmental and Occupational HealthHuman factors and ergonomicsPoison controlPsychological safetyBuilding and ConstructionShared leadershipComputer securitycomputer.software_genreOccupational safety and healthEmpirical researchSafety Risk Reliability and QualitybusinessSafety ResearchcomputerSafety Science
researchProduct

Agricultural Residue Management for Sustainable Power Generation: The Poland Case Study

2021

The European Union has set targets for renewable energy utilization. Poland is a member of the EU, and its authorities support an increase in renewable energy use. The background of this study is based on the role of renewable energy sources in improving energy security and mitigation of climate change. Agricultural waste is of a significant role in bioenergy. However, there is a lack of integrated methodology for the measurement of its potential. The possibility of developing an integrated evaluation methodology for renewable energy potential and its spatial distribution was assumed as the hypothesis. The novelty of this study is the integration of two renewable energy sources: crop residu…

TechnologyCrop residueQH301-705.5QC1-999020209 energyBiomass02 engineering and technology010501 environmental sciences01 natural sciencesBiogasEnvironmental protectionBioenergyby-productemission0202 electrical engineering electronic engineering information engineeringmedia_common.cataloged_instancewasteGeneral Materials ScienceBiology (General)European unionQD1-999Instrumentationagriculture0105 earth and related environmental sciencesmedia_commonFluid Flow and Transfer Processesbusiness.industryTPhysicsProcess Chemistry and TechnologyGeneral Engineeringcarbon dioxideEnergy securityEngineering (General). Civil engineering (General)Computer Science ApplicationsRenewable energyChemistryElectricity generationEnvironmental scienceTA1-2040businessenergyApplied Sciences
researchProduct