Search results for "Security"

showing 10 items of 1693 documents

Mini-drones swarms and their potential in conflict situations

2020

The Unmanned Aerial Vehicles (UAV) commonly known as drones are currently used in a wide range of operations such as border monitoring, aerial reconnaissance, traffic control and military interventions in armed conflicts. These aerial vehicles are expected to be reliable, automated and sometimes autonomous machines, albeit the human factor continues to play a crucial role in programming and control. At their genesis, drones were complex, large and reserved to an exclusive club of technologically advanced military powers. They tended to be used against technologically weak military targets. Developments in the price, size and sophistication of drones has now enabled almost anyone to purchase…

sotilasoperaatiotComputerApplications_COMPUTERSINOTHERSYSTEMSsecuritydronetekoälymiehittämättömät ilma-aluksetsotatekniikkaparviälyswarming
researchProduct

Grandes expectativas y una oportunidad perdida. El Tribunal Especial para el Líbano y los objetivos del Consejo de Seguridad

2021

Entre los diversos tribunales penales internacionales ad hoc que se han creado desde finales del siglo XX, el Tribunal Especial para el Líbano destaca por su particularidad, tanto a nivel jurisdiccional como por su contribución al tratamiento de las víctimas. La labor del Tribunal Especial para el Líbano comenzó en 2009, dictando su primera sentencia de instancia el 18 de agosto de 2020. Mediante su constitución, el Consejo de Seguridad de Naciones Unidas apostó por no abandonar el camino iniciado en 1993 con la creación de los tribunales de Yugoslavia y Ruanda; sin embargo, el resultado no ha sido el esperado. Este trabajo pretende analizar las peculiaridades del Tribunal y su trabajo, rea…

special tribunal for lebanon:CIENCIAS JURÍDICAS Y DERECHO [UNESCO]UNESCO::CIENCIAS JURÍDICAS Y DERECHOunited nations security council
researchProduct

Intelligent solutions for real-life data-driven applications

2017

The subject of this thesis belongs to the topic of machine learning or, specifically, to the development of advanced methods for regression analysis, clustering, and anomaly detection. Industry is constantly seeking improved production practices and minimized production time and costs. In connection to this, several industrial case studies are presented in which mathematical models for predicting paper quality were proposed. The most important variables for the prediction models are selected based on information-theoretic measures and regression trees approach. The rest of the original papers are devoted to unsupervised machine learning. The main focus is developing advanced spectral cluster…

spectral clusteringregression treesanomaly detectionregression analysislaadunvalvontaregressioanalyysikoneoppiminenpaper machinebig datagraph segmentationcommunity detectionnetwork securityklusterianalyysitiedonlouhintatietoturvamutual informationpaperikoneetclusteringvariable selection
researchProduct

The Far-Reaching Consequences of Job Insecurity : A Review on Family-Related Outcomes

2017

Job insecurity (JI) appears a fairly stable job stressor in working life today and likely to impair employee well-being. This review article presents the key findings of studies examining the effects of perceived JI on family well-being (e.g., marital/parental role quality, work–family conflict). The results, based on 25 published peer-reviewed studies, suggest an association between JI and impaired family well-being. Thus, JI spills over into family life as proposed in the spillover theory of work–family interface. Furthermore, studies have found some evidence of crossover effects of JI from parents to children: parents’ JI relates to negative outcomes in children. These results support th…

spillovertyösuhdeturva050109 social psychologyperhe-elämäDevelopmental psychologySpillover effect0502 economics and business0501 psychology and cognitive sciencesjob insecuritytyöelämäAssociation (psychology)qualitative reviewWorking lifecrossoverJob insecurity05 social sciencesStressorCrossover effectsstressiFamily lifefamily outcomesPsychologyperheetSocial psychology050203 business & managementSocial Sciences (miscellaneous)
researchProduct

Bezpieczeństwo państwa a mniejszości narodowe

2017

National minorities, either today and in the past, certainly can be considered as a potential source of various types of threats to the security of State. States as the organizational form of different nations, not always peacefully co-exist, therefore a situation in which people of different nationalities residing in the territory of one country is inevitably more complex and raises many problems. Needs of State in terms of security, differ from those of groups and individual members of society. Threats may vary in nature and intensity and come from different directions, which depends on a wide variety of factors. This relation is not so simple because the State (and the members of the maj…

state security threatsstate securitynational minority politicsnational minoritynational minority discrimination
researchProduct

Control of Political Communication and State Security : Jamal Khashoggi Case

2018

W artykule podjęto problem analizy relacji pomiędzy, z jednej strony, prawem państwa do kontroli przepływu informacji w celu zapewnienia bezpieczeństwa a międzynarodowo uznawanymi prawami człowieka, w tym prawa człowieka do publicznego wyrażania poglądów, z drugiej. Przypadkiem, który poddano analizie, jest zamordowanie saudyjskiego dziennikarza Dżamala Chaszukdżi. W artykule wykorzystano metody jakościowej i ilościowej analizy zawartości mediów pod kątem wpływu relacji medialnych dotyczących morderstwa na reputację polityczną Królestwa Arabii Saudyjskiej w wymiarze politycznym i ekonomicznym

state securitymedia controlbezpieczeństwo państwapolitical communicationkomunikowanie politycznekontrola mediówChorzowskie Studia Polityczne
researchProduct

Italy in Uncertain Times: Europeanizing Foreign Policy in the Declining Proces of the American Hegemony

2019

Il libro analizza l'influenza dei cambiamenti nell'ordine internazionale egemonico a guida americana sulle variazioni nei pilastri tradizionali della politica estera italiana (USA, UE e multilateralismo) ed il ruolo che l'Italia gioca all'interno di quell'ordine. Per esplorare queste variazioni, il libro propone un'analisi del comportamento di voto e di sponsorizzazione dell'Italia alle Nazioni Unite nel periodo 2000-2017, guardando sia all'Assemblea Generale sia al Consiglio di Sicurezza, ed enfatizza l'importanza di quest'ultima sede per individuare i riflessi dei cambiamenti nel sistema internazionale sul comportamento italiano. Concentrandosi sul comportamento coalizionale, il libro esp…

statucoalizioniriforma del Consiglio di Sicurezzapolitica estera italianadisarmoMiddle powerItalian foreign policyHuman rightNazioni Unitediritti umaniSecurity Council reformordine egemonicoHegemonic orderUnited NationCoalitioneuropeizzazioneDisarmamentmedia potenzaSettore SPS/04 - Scienza PoliticaEuropeanization
researchProduct

Parent–Infant Attachment Insecurity and Emotional Eating in Adolescence: Mediation through Emotion Suppression and Alexithymia

2021

Contains fulltext : 233652.pdf (Publisher’s version ) (Open Access) Emotional eating (EE), the propensity to eat in response to emotions, is thought to have its origins in the early parent-infant relationship. This study tested the hypothesis that infant attachment insecurity results in EE in adolescence through the increased use of the emotion regulation strategy suppression of emotions and subsequent alexithymia. At the age of 15 months, parent-infant attachment security (n = 129) was observed with two abbreviated attachment measures: the shortened strange situation procedure (SSSP), and the shortened attachment Q-set (S-AQS). At the age of 12 years, children completed self-report questio…

strange situation procedureMaleParentsMediation (statistics)Adolescent030309 nutrition & dieteticsparent–child attachmentEmotionsStress-related disorders Donders Center for Medical Neuroscience [Radboudumc 13]Social Development050105 experimental psychologyArticleemotion suppressionExperimental Psychopathology and Treatment03 medical and health sciencesEatingAlexithymiaSurveys and QuestionnairesmedicineHumans0501 psychology and cognitive sciencesTX341-641Affective SymptomsParent-Child Relations0303 health sciencesNutrition and DieteticsParent-infant attachmentParentingNutrition. Foods and food supplyemotional eating05 social sciencesAttachment securityInfantFeeding BehaviorEmotional eatingmedicine.diseaseattachment Q-setInfant attachmentStrange situationFemalealexithymiaPsychologyAttachment measuresFood ScienceClinical psychologyNutrients
researchProduct

Attacking TrustZone on devices lacking memory protection

2021

AbstractARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some vendors offer ARM modules that do not fully comply with TrustZone specifications, which may lead to vulnerabilities in the system. In this paper, we present a DMA attack tutorial from the insecure world onto the secure world, and the design and implementation of this attack in a real insecure hardware.

sulautettu tietotekniikkaComputational Theory and MathematicsHardware and ArchitectureComputer Science (miscellaneous)esineiden internetTrustZonesecuritytietoturvaverkkohyökkäyksetSoftwarehaavoittuvuus
researchProduct

Towards Automated Classification of Firmware Images and Identification of Embedded Devices

2017

Part 4: Operating System and Firmware Security; International audience; Embedded systems, as opposed to traditional computers, bring an incredible diversity. The number of devices manufactured is constantly increasing and each has a dedicated software, commonly known as firmware. Full firmware images are often delivered as multiple releases, correcting bugs and vulnerabilities, or adding new features. Unfortunately, there is no centralized or standardized firmware distribution mechanism. It is therefore difficult to track which vendor or device a firmware package belongs to, or to identify which firmware version is used in deployed embedded devices. At the same time, discovering devices tha…

sulautettu tietotekniikkaComputer scienceVendorvulnerability02 engineering and technologycomputer.software_genreSoftware020204 information systems0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]tietoturvadata securityhaavoittuvuusbusiness.industryFirmwareFingerprint (computing)020206 networking & telecommunicationsubiquitous computingRandom forestIdentification (information)koneoppiminenmachine learningEmbedded systemUser interfaceHardware_CONTROLSTRUCTURESANDMICROPROGRAMMINGbusinesscomputerPrivate network
researchProduct