774,594 research outputs found

    The food environment within the primary school fringe

    Get PDF
    Purpose – The school fringe environment (peripheral 400m buffer) offers an important opportunity for young people to obtain food and drink. There is international evidence to suggest socio-economic influence on food outlet availability and healthfulness within these environments; however the situation in the UK is unclear. The purpose of this paper is to describe food outlet provision (frequency and type) within primary school fringes across the spectrum of deprivation. Design/methodology/approach – Ten primary schools in Newcastle upon Tyne were purposefully selected from a comprehensive list of all schools within the region. Two schools were chosen at random from each quintile of deprivation. A total of 400-metre buffer zones around schools were audited. School fringe food environments were classified using a Food Outlet Classification System. Access (i.e. frequency), and type of food outlets were compared to area level deprivation, obesity prevalence rates and area type. Findings – Food outlet frequency was highest in the most deprived school fringe area. Convenience stores and takeaways represented the greatest proportion of total food outlets across all school fringe environments. More total food outlets were observed in fringes with above national average obesity prevalence rates for children. Research limitations/implications – UK case study approach limits widespread and international applicability. Practical implications – Informs school, health and urban planning disciplines regarding current picture of UK school fringes. Originality/value – Provides evidence in UK context that area deprivation and Census 2001 Supergroup class show significant correlations with school fringe food environment

    ESPOONERBAC_{{ERBAC}}: Enforcing Security Policies In Outsourced Environments

    Full text link
    Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of service than in-house solutions. Despite all its benefits, data outsourcing raises serious security concerns for preserving data confidentiality. There are solutions for preserving confidentiality of data while supporting search on the data stored in outsourced environments. However, such solutions do not support access policies to regulate access to a particular subset of the stored data. For complex user management, large enterprises employ Role-Based Access Controls (RBAC) models for making access decisions based on the role in which a user is active in. However, RBAC models cannot be deployed in outsourced environments as they rely on trusted infrastructure in order to regulate access to the data. The deployment of RBAC models may reveal private information about sensitive data they aim to protect. In this paper, we aim at filling this gap by proposing \textbf{ESPOONERBAC\mathit{ESPOON_{ERBAC}}} for enforcing RBAC policies in outsourced environments. ESPOONERBAC\mathit{ESPOON_{ERBAC}} enforces RBAC policies in an encrypted manner where a curious service provider may learn a very limited information about RBAC policies. We have implemented ESPOONERBAC\mathit{ESPOON_{ERBAC}} and provided its performance evaluation showing a limited overhead, thus confirming viability of our approach.Comment: The final version of this paper has been accepted for publication in Elsevier Computers & Security 2013. arXiv admin note: text overlap with arXiv:1306.482

    Ad hoc categories

    Get PDF
    People construct ad hoc categories to achieve goals. For example, constructing the category of “things to sell at a garage sale” can be instrumental to achieving the goal of selling unwanted possessions. These categories differ from common categories (e.g., “fruit,” “furniture”) in that ad hoc categories violate the correlational structure of the environment and are not well established in memory. Regarding the latter property, the category concepts, concept-to-instance associations, and instance-to-concept associations structuring ad hoc categories are shown to be much less established in memory than those of common categories. Regardless of these differences, however, ad hoc categories possess graded structures (i.e., typicality gradients) as salient as those structuring common categories. This appears to be the result of a similarity comparison process that imposes graded structure on any category regardless of type

    A Flexible and Fast Event-Driven Simulator for wireless MAC protocols

    Get PDF
    Many multiple-access (MAC) protocols have been or are being proposed for wireless networks. As most of these multiple-access protocols are designed for specific applications (such as telephony) and analyzed accordingly, the analysis results can not always be adapted to situations where each user has a different behavior. Wireless MAC protocols for data communication are not straightforward to analyse. To quickly make a reliable judgement of the usability of a MAC protocol for specific situations, we designed a simulator that makes it simple to implement the protocol and test it in different configurations and with differently behaving users. Our simulator generates a large amount of quantitative performance information that can be processed with standard graph drawing tools and an integrated trace analyze

    Hybrid multi-objective network planning optimization algorithm

    Get PDF
    • …
    corecore