Search results for "Security"

showing 10 items of 1693 documents

Scatter search for an uncapacitated p-hub median problem

2015

Scatter search is a population-based method that has been shown to yield high-quality outcomes for combinatorial optimization problems. It uses strategies for combining solution vectors that have proved effective in a variety of problem settings. In this paper, we present a scatter search implementation for an NP -hard variant of the classic p-hub median problem. Specifically, we tackle the uncapacitated r-allocation p-hub median problem, which consists of minimizing the cost of transporting the traffics between nodes of a network through special facilities that act as transshipment points. This problem has a significant number of applications in practice, such as the design of transportati…

education.field_of_studyMathematical optimizationGeneral Computer ScienceRelation (database)Transshipment (information security)PopulationCombinatorial optimization problemExtension (predicate logic)Management Science and Operations ResearchModeling and SimulationCombinatorial optimizationeducationMetaheuristicImplementationMathematicsComputers & Operations Research
researchProduct

An Initial Security Analysis of the Personal Transaction Protocol

2003

Our society is becoming increasingly dependent on the rapid access and processing of information. The number of handheld mobile devices with access to the Internet and network-based software and services is exploding. Research indicates [1] that by the end of 2002 there will be over 1 billion mobile phone owners globally with Internet access, and that this number is going to grow exponentially in the nearest future. By 2006 the number of interconnected mobile device users is expected exceed the worldwide Internet subscriber population. It is estimated that in a few years there will be three times as many of these devices worldwide as personal computers.

education.field_of_studybusiness.product_categorybusiness.industryPopulationComputer securitycomputer.software_genreMobile phoneAuthentication protocolDistributed transactionInternet accessThe InternetBusinesseducationMobile deviceDatabase transactioncomputer
researchProduct

Mobility and Unspoken Citizens’ Rights in EU-Documents

2015

The formulation of Union citizenship has concentrated on rights since the 1970s. In the Maastricht and subsequent EU treaties, Union citizenship is defined through rights. Against this background, discussion on rights in the EU documents on citizenship analysed in this article is surprisingly scarce. The research material consists of 15 documents produced by EU institutions in 2003–2007 as part of three programmes on citizenship. In the documents, the discussion on rights focuses on mobility instead of other aspects of rights. Electoral rights and fundamental rights are discussed a little, but in general, the minuscule discussion on rights is dominated by discussions on freedom of mobility,…

electoral rightsliikkuvuusarea of freedomsecurity and justiceUnion citizenshipEU-programmes on citizenshipperusoikeudet
researchProduct

Drones in cyber security environment

2019

Aerial unmanned vehicles (AUV) are currently used for a wide range of operations such as border surveillance, surveillance, reconnaissance, transport, aerial photography, traffic control, earth observation, communications, broadcasting and armed attacks. AUVs are presumed to be reliable, automated and autonomous machines. AUVs are extremely suitable for long missions that strain flight crews or put them to harm's way. Two advantages can be gained by eliminating the flight crew: 1) performance improves (range, endurance, increased payload and maneuverability, smaller physical size and lower observability) and; 2) the ability to take higher risks. UAV/RPAS/drone cyber security has largely foc…

elektroninen sodankäyntikybersodankäyntiintelligence and reconnaissancecyber securitysurveillancedroonittiedusteluunmanned aerial vehiclesmiehittämättömät ilma-aluksettarkkailucyber attacks
researchProduct

Food Security Is None Of Your Business? Food Supply Chain Management In Support Of A Sustainable Food System

2017

Food security is the principal outcome of any given food system and it can be defined in terms of a sustainable food system where the core goal is to feed everyone sustainably, equitably and healthily. A sustainable food system addresses needs for availability, affordability and accessibility, is diverse, ecologically-sound and resilient, and builds the capabilities and skills necessary for future generations. This paper identifies the essential elements of food supply chain management in support of a sustainable food system, which ultimately enhances food security. The existing food supply chain and food system literature is synthesized in order to study the correspondence between public i…

elintarviketuotantoInformation Systems and ManagementSupply chain managementFood securitykestävä kehitysFood industrybusiness.industryelintarvikeketjutManagement Science and Operations ResearchFood safetyManagement Information SystemsruokaturvaFood packagingCommerceSustainable food systemsustainable food systemFood supplyfood supply chain managementFood systemsStatistics Probability and UncertaintyMarketingbusinessOperations and Supply Chain Management: An International Journal
researchProduct

Justice in transitions: Widening considerations of justice in dietary transition

2021

Just transition is gaining increasing attention. The need to consider social justice in sustainability transitions is finally being acknowledged. Research on this issue has, to date, mainly concentrated on energy systems. In this paper, we examine how the elaboration of dietary transition widens the spectrum of justice questions in sustainability transitions research. We explicate the arising normative questions along the dimensions of distributive, procedural and recognitive justice; widening the considerations further to restorative and cosmopolitan justice. Dietary transition widens the justice considerations to basic needs, food security and nutrition. By doing so, it evokes socio-cultu…

eläinten oikeudetScrutiny020209 energy0507 social and economic geographyFood justice02 engineering and technologyEnvironmental Science (miscellaneous)ruokavaliotEconomic JusticePolitical science0202 electrical engineering electronic engineering information engineeringEnvironmental justiceDietary transitionFood securityruokajärjestelmätkestävä kehitysRenewable Energy Sustainability and the EnvironmentTransition (fiction)05 social sciencesJust transitionEnvironmental ethicssosiaalinen oikeudenmukaisuusScholarship13. Climate actionFood systemSustainabilityNormativesosiaalinen kestävyysBasic needsyhteiskunnallinen muutos050703 geographySocial Sciences (miscellaneous)
researchProduct

O tak zwanym szpiegu i terroryście koronnym

2017

The subject of this article is the authorization of intelligence services in preventing and combating the offences of espionage and terrorism. It describes the regulations of the Second Polish Republic regarding espionage, a draft Act on Intelligence Activities, the rule of law and opportunism, and most importantly new regulations under the anti-terrorism law

espionagestate securityterrorist offencelegalizing documents
researchProduct

Muistisairaan ihmisen kokemukset teknologiasta osana arkea - turvaa vai tunkeilevuutta

2018

Tässä tutkimuksessa selvitettiin muistisairaiden ihmisten arkea tukevan teknologian käyttöönottoa ja heidän sekä heidän läheistensä kokemuksia teknologian käytöstä. Tutkimuksen viitekehyksenä toimi Lawtonin ekologinen malli. Tutkimuksessa käytettiin etnografista näkökulmaa haastattelemalla ja havainnoimalla muistisairaita ihmisiä teknologian käyttötilanteissa. Ensimmäinen vaihe toteutettiin vuosina 2004-2007. Ensimmäisessä vaiheessa kohderyhmänä olivat 25 muistisairautta sairastavaa kotona yksin tai omaishoitajansa kanssa asuvaa henkilöä sekä heidän läheistään ja viisi vastaajaa kuntien kotihoidosta. Koteihin vietiin yhteensä 29 erilaista laitetta. Toinen keruuvaihe toteutettiin vuosina 201…

ethicalitykotihoitoLawtonin ekologinen mallitekniikka (laitteet)experienceomaishoitajatseurantaomaishoitomuistisairaudetautonomiapeople with dementiaapuvälineettracking technologymobilitystigmatliikkuvuusikääntyminensatelliittipaikannustechnologykokemuksetteknologiaetäseurantaliikkumineninsecuritymuistisairaatdementiaturvattomuus
researchProduct

Faith- based diplomacy and cultural security: Between pluralism and particularism

2023

Two basic approaches to faith-based diplomacy (FBD) have developed over the last twenty years. For some, it is a synonym of supra-denominational conflict prevention and resolution, and for others, it is an element of the state’s foreign policy exploited to achieve not just cultural but also political goals. The purpose of the chapter is to present the interrelationships between FBD and cultural security in the context of the “return of religion” and the “post-secular turn”. The conducted analysis, which is theoretical in nature, contributes to the discussion on the role of the religious determinant, pointing to the existence of two fundamentally separate approaches to the application of rel…

faith-based diplomacyforeign policypost-secularismcultural securitycultural violence
researchProduct

A cost efficiency analysis of flood proofing measures for hydraulic risk mitigation in an Urbanized riverine area

2020

Non-structural measures for flood risk mitigation are often more economically accessible, easier to implement, and are highly effective, especially in view of the pursuit of risk resilience objectives. Among the non-structural measures, more importance is increasingly being attributed to flood proofing interventions. There are two main types of flood proofing: dry proofing and wet proofing. An example of dry proofing is shielding, which involves the use of flood barriers that can be installed in the entrances of buildings or outside the buildings in order to avoid contact with the houses and deviate the water flow. Their use must be supported by a detailed hydraulic analysis to ensure the c…

flood risk managementlcsh:Hydraulic engineering010504 meteorology & atmospheric sciencesWater flowCost-benefit analysis; Flood inundation; Flood proofing; Flood risk managementGeography Planning and Development0211 other engineering and technologies02 engineering and technologyAquatic Science01 natural sciencesBiochemistrylcsh:Water supply for domestic and industrial purposeslcsh:TC1-978Resilience (network)Environmental planningRisk management0105 earth and related environmental sciencesWater Science and Technology021110 strategic defence & security studieslcsh:TD201-500Cost efficiencyFlood mythCost–benefit analysisbusiness.industryFlooding (psychology)Settore ICAR/02 - Costruzioni Idrauliche E Marittime E IdrologiaCost-benefit analysisflood proofingflood inundationDamagesEnvironmental sciencecost–benefit analysisbusiness
researchProduct