Search results for "Security"
showing 10 items of 1693 documents
Combining Haar Wavelet and Karhunen Loeve Transforms for Medical Images Watermarking
2014
This paper presents a novel watermarking method, applied to the medical imaging domain, used to embed the patient’s data into the corresponding image or set of images used for the diagnosis. The main objective behind the proposed technique is to perform the watermarking of the medical images in such a way that the three main attributes of the hidden information (i.e., imperceptibility, robustness, and integration rate) can be jointly ameliorated as much as possible. These attributes determine the effectiveness of the watermark, resistance to external attacks, and increase the integration rate. In order to improve the robustness, a combination of the characteristics of Discrete Wavelet and K…
Toward a Theory of Information Systems Security Behaviors of Organizational Employees: A Dialectical Process Perspective
2019
Practice-/policy-oriented abstract: Understanding why employees do or do not comply with information systems security (ISS) procedures is an imperative in today’s organizations whose futures often depend on how well they protect and harness information assets. We use a predominantly inductive approach to develop a theoretical understanding of how employees’ reasons for engaging to ISS behaviors (ISSBs) change over time, using ideas from dialectics as our scaffolding. Our dialectical view of this process suggests that explanations for engaging in different ISSBs change over time as individuals seek to balance contradictory demands. Furthermore, our view suggests that new experiences and ext…
Institutional Dynamics in International Organizations: Lessons from the Recruitment Procedures of the European External Action Service
2014
Author's version of an article in the journal: Organization Studies. Also available from the publisher at: http://dx.doi.org/10.1177/0170840614544558 This article examines how organizational designs develop by proposing a novel theoretical framework that views organizational change as resulting from a dialectic process between interpretive agents. The key claim is that existing formal procedures (such as recruitment processes, our empirical focal point) are subject to involved actors’ interpretive efforts. This results in a bargaining situation based on the interpretations of the principal actors, which may induce a feedback loop whereby the original procedures are amended. The empirical re…
Associations of nutrition and body composition with cardiovascular disease risk factors in soldiers during a 6-month deployment
2020
Objectives This observational follow-up study investigated the associations of nutrition and body composition with cardiovascular disease (CVD) risk factors, including pro-inflammatory biomarkers, in soldiers during a 6-month deployment. Material and Methods Thirty-five male soldiers were assessed at months 0, 3 and 6, and their parameters, i.e., M±SD, were as follows: age 30.0±8.7 years, height 179±6 cm, and BMI 24.2±2.5 kg/m 2 . Three-day food diaries were used for monitoring macronutrient intake. Body composition was estimated using bioimpedance. Fasting blood samples for lipids and pro-inflammatory biomarkers were collected, and blood pressure measurements were performed. Results Carboh…
Nonmalleable encryption of quantum information
2008
We introduce the notion of "non-malleability" of a quantum state encryption scheme (in dimension d): in addition to the requirement that an adversary cannot learn information about the state, here we demand that no controlled modification of the encrypted state can be effected. We show that such a scheme is equivalent to a "unitary 2-design" [Dankert et al.], as opposed to normal encryption which is a unitary 1-design. Our other main results include a new proof of the lower bound of (d^2-1)^2+1 on the number of unitaries in a 2-design [Gross et al.], which lends itself to a generalization to approximate 2-design. Furthermore, while in prime power dimension there is a unitary 2-design with =…
A resilient distributed measurement system for smart grid application
2020
Since the production of energy from renewable energy sources is strongly increasing, the migration from the classical electric grid toward the smart grid is becoming a reality. Distribution System Operators, along with the control of the entire network and its stability, need to address the security and the reliability of the communication channels and the data itself. In this paper a solution is proposed to address these issues. It is based on a distributed measurement system that relies on a wireless network as well as a redundant Power Line communication system in order to transfer the electrical measures to a centralized SCADA server. The collected data are used to run a power flow algo…
A future European FDI screening system: solution or problem?
2019
The establishment of a mechanism at the European level for screening FDI, on the grounds of national security and public order, constitutes a major step in implementing the EU investment policy. To create an effective system, it must be based on clear common rules, provide certainty and ensure judicial redress.
La sécurité, la fondation de l'Etat centrafricain : contribution à la recherche de l'Etat de droit
2012
“Ensuring order and security” is a deep-seated desire shared by the whole of humanity. It is therefore reasonable to devote this thesis to the place occupied by insecurity in public debate in the Central African Republic, a state covering roughly the same surface area as France. Security implies that the weight of fear or terror is removed. If order and security are to be genuinely ensured in the Central African Republic, more is required than the absence of bloodshed and the protection of each citizen’s physical integrity. It is also essential that the rights of all be respected and that all citizens should be entitled to the protection of their rights as well as their possessions. Legal s…
"Table 1" of "Study of $e^+e^- \rightarrow p\bar{p}$ in the vicinity of $\psi(3770)$"
2014
Summary of results at center-of-mass energies from 3.65 to 3.90 GeV. N(SIG) is the number of E+ E- --> P P events; EPSILON is the detection efficiency; L is the integrated luminosity; (1 + DELTA)(DRESSED) is the initial state radiation correction factor without the vacuum polarization correction; and SIG(OBS), SIG(DRESSED) and SIG(BORN) are the observed cross section, the dressed cross section and the Born cross section, respectively.
"Table 1" of "Search for single top production in e+ e- collisions at s**(1/2) = 189-GeV - 202-GeV."
2000
SIG(C=LEPT) and SIG(C=HADR) are the cross sections upper limits evaluated for leptonic and hadronic decay modes of the W-boson, while SIG(C=COMB) are the values obtained by combining the leptonic and hadronic W-boson decay channels. All cross sections values are obtained under assumption of BR(TQ --> W+ BQ) = 100 %.