Search results for "Security"
showing 10 items of 1693 documents
Scatter search for an uncapacitated p-hub median problem
2015
Scatter search is a population-based method that has been shown to yield high-quality outcomes for combinatorial optimization problems. It uses strategies for combining solution vectors that have proved effective in a variety of problem settings. In this paper, we present a scatter search implementation for an NP -hard variant of the classic p-hub median problem. Specifically, we tackle the uncapacitated r-allocation p-hub median problem, which consists of minimizing the cost of transporting the traffics between nodes of a network through special facilities that act as transshipment points. This problem has a significant number of applications in practice, such as the design of transportati…
An Initial Security Analysis of the Personal Transaction Protocol
2003
Our society is becoming increasingly dependent on the rapid access and processing of information. The number of handheld mobile devices with access to the Internet and network-based software and services is exploding. Research indicates [1] that by the end of 2002 there will be over 1 billion mobile phone owners globally with Internet access, and that this number is going to grow exponentially in the nearest future. By 2006 the number of interconnected mobile device users is expected exceed the worldwide Internet subscriber population. It is estimated that in a few years there will be three times as many of these devices worldwide as personal computers.
Mobility and Unspoken Citizens’ Rights in EU-Documents
2015
The formulation of Union citizenship has concentrated on rights since the 1970s. In the Maastricht and subsequent EU treaties, Union citizenship is defined through rights. Against this background, discussion on rights in the EU documents on citizenship analysed in this article is surprisingly scarce. The research material consists of 15 documents produced by EU institutions in 2003–2007 as part of three programmes on citizenship. In the documents, the discussion on rights focuses on mobility instead of other aspects of rights. Electoral rights and fundamental rights are discussed a little, but in general, the minuscule discussion on rights is dominated by discussions on freedom of mobility,…
Drones in cyber security environment
2019
Aerial unmanned vehicles (AUV) are currently used for a wide range of operations such as border surveillance, surveillance, reconnaissance, transport, aerial photography, traffic control, earth observation, communications, broadcasting and armed attacks. AUVs are presumed to be reliable, automated and autonomous machines. AUVs are extremely suitable for long missions that strain flight crews or put them to harm's way. Two advantages can be gained by eliminating the flight crew: 1) performance improves (range, endurance, increased payload and maneuverability, smaller physical size and lower observability) and; 2) the ability to take higher risks. UAV/RPAS/drone cyber security has largely foc…
Food Security Is None Of Your Business? Food Supply Chain Management In Support Of A Sustainable Food System
2017
Food security is the principal outcome of any given food system and it can be defined in terms of a sustainable food system where the core goal is to feed everyone sustainably, equitably and healthily. A sustainable food system addresses needs for availability, affordability and accessibility, is diverse, ecologically-sound and resilient, and builds the capabilities and skills necessary for future generations. This paper identifies the essential elements of food supply chain management in support of a sustainable food system, which ultimately enhances food security. The existing food supply chain and food system literature is synthesized in order to study the correspondence between public i…
Justice in transitions: Widening considerations of justice in dietary transition
2021
Just transition is gaining increasing attention. The need to consider social justice in sustainability transitions is finally being acknowledged. Research on this issue has, to date, mainly concentrated on energy systems. In this paper, we examine how the elaboration of dietary transition widens the spectrum of justice questions in sustainability transitions research. We explicate the arising normative questions along the dimensions of distributive, procedural and recognitive justice; widening the considerations further to restorative and cosmopolitan justice. Dietary transition widens the justice considerations to basic needs, food security and nutrition. By doing so, it evokes socio-cultu…
O tak zwanym szpiegu i terroryście koronnym
2017
The subject of this article is the authorization of intelligence services in preventing and combating the offences of espionage and terrorism. It describes the regulations of the Second Polish Republic regarding espionage, a draft Act on Intelligence Activities, the rule of law and opportunism, and most importantly new regulations under the anti-terrorism law
Muistisairaan ihmisen kokemukset teknologiasta osana arkea - turvaa vai tunkeilevuutta
2018
Tässä tutkimuksessa selvitettiin muistisairaiden ihmisten arkea tukevan teknologian käyttöönottoa ja heidän sekä heidän läheistensä kokemuksia teknologian käytöstä. Tutkimuksen viitekehyksenä toimi Lawtonin ekologinen malli. Tutkimuksessa käytettiin etnografista näkökulmaa haastattelemalla ja havainnoimalla muistisairaita ihmisiä teknologian käyttötilanteissa. Ensimmäinen vaihe toteutettiin vuosina 2004-2007. Ensimmäisessä vaiheessa kohderyhmänä olivat 25 muistisairautta sairastavaa kotona yksin tai omaishoitajansa kanssa asuvaa henkilöä sekä heidän läheistään ja viisi vastaajaa kuntien kotihoidosta. Koteihin vietiin yhteensä 29 erilaista laitetta. Toinen keruuvaihe toteutettiin vuosina 201…
Faith- based diplomacy and cultural security: Between pluralism and particularism
2023
Two basic approaches to faith-based diplomacy (FBD) have developed over the last twenty years. For some, it is a synonym of supra-denominational conflict prevention and resolution, and for others, it is an element of the state’s foreign policy exploited to achieve not just cultural but also political goals. The purpose of the chapter is to present the interrelationships between FBD and cultural security in the context of the “return of religion” and the “post-secular turn”. The conducted analysis, which is theoretical in nature, contributes to the discussion on the role of the religious determinant, pointing to the existence of two fundamentally separate approaches to the application of rel…
A cost efficiency analysis of flood proofing measures for hydraulic risk mitigation in an Urbanized riverine area
2020
Non-structural measures for flood risk mitigation are often more economically accessible, easier to implement, and are highly effective, especially in view of the pursuit of risk resilience objectives. Among the non-structural measures, more importance is increasingly being attributed to flood proofing interventions. There are two main types of flood proofing: dry proofing and wet proofing. An example of dry proofing is shielding, which involves the use of flood barriers that can be installed in the entrances of buildings or outside the buildings in order to avoid contact with the houses and deviate the water flow. Their use must be supported by a detailed hydraulic analysis to ensure the c…