Home

Results 81 - 90 of 33,448 for lit scuba. Search took 8.284 seconds.  
Sort by date/Sort by relevance
Chapter 9 237 European Union Figure 9.3: GERD by source of funds and performing sector, 2013 or latest available year (%) By source of funds -n = data refer to n years before reference year Source: Eurostat, January 2015 Business enterprise Government Higher education Private non-prot Abroad 77 72 69 69 69 69 68 68 65 65 65 64 61 61 58 54 54 54 53 50 48 48 46 44 35 31 28 25 15 13 5 15 9 9 5 4 15 2 13 7 12 23 30 11 18 10 15 19 26 9 6 20 27 27 49 29 20 14 10 23 14 22 22 26 28 17 32 21 26 23 15 9 32 27 36 28 28 24 42 38 33 29 37 20 43 55 57 9 13 0 10 20 30 40 50 60 70 80 90 100 Slo ve nia Ire lan d -1 Hu ng ary Be lg ium Fin lan d Au str ia Sw ed en Ge rm an y De nm ark Fra nc e UK EU 28 Lu xe m bo ur g Bu lg ari a Ne th erl an ds Cz ec h R ep ub lic M alt a Ita ly Sp ain Cr oa tia Es to nia Po rtu ga l Slo va kia Po lan d Gr ee ce Ro m an ia La tv ia Lit hu an ia Cy pr us 66 64 61 60 60 57 55 55 50 48 47 47 47 46 46 44 44 44 43 41 40 38 37 32 31 27 22 19 11 29 27 26 23 29 28 35 33 27 31 34 36 27 43 43 34 43 39 40 48 39 35 47 51 52 35 24 32 66 4 9 12 13 7 11 8 10 21 20 14 17 21 5 7 20 9 16 15 10 18 27 13 13 16 37 52 48 17 0 10 20 30 40 50 60 70 80 90 100 Ge rm an y -1 Slo ve nia Fin lan d Be lg ium -2 De nm ark Sw ed en -2 Fra nc e- 1 EU 28 -1 Ire lan d -1 Lu xe m bo ur g -2 Ne th er lan ds Hu ng ar y UK Po rtu ga l-1 Sp ain -1 M alt a Ita ly -1 Au str ia Cr oa tia Es to nia Slo va kia Cz ec h R ep ub lic Po lan d Gr ee ce Ro m an ia Lit hu an ia La tv ia Bu lg ari a Cy pr us -1 By performing sector
Language:English
Score: 942201.5 - https://en.unesco.org/sites/de...t/files/usr_9-3_gerd_eu_en.pdf
Data Source: un
Letter on the art direction - UNHCR Innovation Menu About Us Innovation Fellowship Innovation Fund Strategic Communications Innovation Research Digital Inclusion Stories Contact Us Letter on the art direction By Shanice Da Costa A kaleidoscope for your toolbox In the warm spring of 2021, amidst the heart of a pandemic, UNHCR’s Innovation Service explored the dimly lit edges of imagination and speculative storytelling. (...) I hope you take the work curated here as a primer into the possibilities we believe can be tapped into if you’ll take inspiration from the lit pathways our fireflies drew on the edge of the present world.
Language:English
Score: 942201.5 - https://www.unhcr.org/innovati...n/letter-on-the-art-direction/
Data Source: un
Innovations for future networks and services 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 -140 -130 -120 -110 -100 -90 -80 -70 Distance between a DTV receiver and TETRA BS [km] In te rfe re nc e P ow er [d B m ] Interference Power from TETRA BS (TMO) Frequency Offset = 25 kHz BS Power Class = 1, 2, … , 10 Maximum Allowable Interference Power 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 -150 -140 -130 -120 -110 -100 -90 -80 Distance between a DTV receiver and TETRA BS [km] In te rfe re nc e P ow er [d B m ] Interference Power from TETRA BS (TMO) Frequency Offset = 50 kHz BS Power Class = 1, 2, … , 10 Maximum Allowable Interference Power -150 -140 -130 -120 -110 -100 -90 -80 -70 -60 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Interference Power [dBm] P ro ba bi lit y [ I nt er fe re nc e P ow er < A bs ci ss a ] CDF of TETRA DMO Interference Power Frequency Offset = 25 kHz MS Power Class = 1, 1L, … , 4L Maximum Allowable Interference Power -160 -150 -140 -130 -120 -110 -100 -90 -80 -70 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Interference Power [dBm] P ro ba bi lit y [ I nt er fe re nc e P ow er < A bs ci ss a ] CDF of TETRA DMO Interference Power MS Power Class = 1, 1L, … , 4L Maximum Allowable Interference Power Frequency Offset = 50 kHz  Interference Power(BSs)  CDF of Interference Power(MSs)
Language:English
Score: 942201.5 - https://www.itu.int/dms_pub/it.../29/05/T29050000110007PDFE.pdf
Data Source: un
During this un-interrupted 24 hour marathon (ToBe Continued... ) each musician has at disposal a 30-minute window, thus creating a relay of sounds and rhythms that will range across different streams of the "new music" for the cause of ending TB. Corcovado lit up on World TB Day The famous Corcovado will be lit up on the occasion of World TB Day thanks to the collaboration of the following institutions: WHO, Stop TB Partnership, Fiocruz, Brazilian Society of Respiratory Diseases and Rede TB. It will be lit up between 6pm and 7pm on 24 March. Subscribe to our newsletters → News Use of alternative interferon-gamma release assays for the diagnosis of TB infection - WHO Policy Statement 28 January 2022 Planning and budgeting tool for TB and drug-resistant TB testing 20 January 2022 WHO and Global Fund warn inequalities block progress towards ending AIDS, TB and malaria 9 December 2021 Fact sheets Tuberculosis 14 October 2021 Facts in pictures 10 facts on tuberculosis 12 October 2021 Feature stories Bordering Africa’s epicenter: How early action and careful border control policies have so far contained COVID-19 to clusters in Botswana 19 July 2020 Treating tuberculosis in Ukraine 3 June 2020 Successful fight against tuberculosis in south-western Russia 3 June 2020 Events World TB Day World TB Day 2022: Invest to End TB.
Language:English
Score: 941414.1 - https://www.who.int/news/item/...3-2017-world-tb-day-highlights
Data Source: un
ITU-Twww.itu.int/itu-t/studygroups Ac ce ss M an ag em en t Infrastructure Security Applications Security Services Security D at a Co n de nt ia lit y Co m m un ic at io n Se cu rit y In te gr ity A va ila bi lit y Pr iv ac y Au th en tic at io n N on -r ep ud ia tio n Security Layers Infrastructure Security Applications Security Services Security End User Security Control/Signaling Security Management Security THREATS ATTACKS Security LAYERS Destruction Disclosure Corruption Removal Interruption VULNERABILITIES Ac ce ss M an ag em en t Infrastructure Security Applications Security Services Security D at a Co n de nt ia lit y Co m m un ic at io n Se cu rit y In te gr ity A va ila bi lit y Pr iv ac y Au th en tic at io n N on -r ep ud ia tio n Security Layers THREATS ATTACKS Destruction Disclosure Corruption Removal Interruption http://www.itu.int/ITU-T/studygroups/com17/ict/part01.html http://www.itu.int/ITU-T/studygroups/com17/ict/part02.html http://www.itu.int/ITU-T/studygroups/com17/ict/part03.html http://www.itu.int/ITU-T/studygroups/com17/ict/part04.html http://www.itu.int/ITU-T/studygroups/com17/ict/part05.html ITU-T X.1500系列建议书 – 全球网络安全信息交换 CYBEX系列介绍了通过以下可酌情单独使用或一同使用的基本功能交换网络安全信息的技术: • 用于交换的结构性网络安全信息; • 确定并发现网络安全信息和实体; • 在交换实体之间建立信任和政策协议; • 要求网络安全信息并做出回应; • 确保网络安全信息交换的完整性。
Language:English
Score: 941020.8 - https://www.itu.int/dms_pub/it.../0B/04/T0B040000452C01PDFC.pdf
Data Source: un
., email) 2 - Control/Signaling Security Plane: • Activities that enable efficient functioning of the network • Machine-to-machine communications • Implementation may be in-band or out-of-band 3 - Management Security Plane: • The management and provisioning of network elements, services and applications • Support of the FCAPS functions • Implementation may be in-band or out-of-band 4/28/2005 6 1-Access Control 2-Authentication 3-Non-repudiation 4-Data Confidentiality 5-Communication Security 6-Data Integrity 7-Availability 8-Privacy • Limit & control access to network elements, services & applications • Examples: password, ACL, firewall • Prevent ability to deny that an activity on the network occurred • Examples: system logs, digital signatures • Ensure information only flows from source to destination • Examples: VPN, MPLS, L2TP • Ensure network elements, services and application available to legitimate users • Examples: IDS/IPS, network redundancy, BC/DR • Provide Proof of Identity • Examples: shared secret, PKI, digital signature, digital certificate • Ensure confidentiality of data • Example: encryption • Ensure data is received as sent or retrieved as stored • Examples: MD5, digital signature, anti-virus software • Ensure identification and network use is kept private • Examples: NAT, encryption 8 Security Dimensions Address the Breadth of Network Vulnerabilities 8 Security Dimensions applied to each Security Perspective (layer and plane) 4/28/2005 7 A cc es s M an ag em en t Infrastructure Security Applications Security Services Security End User Security Control/Signaling Security Management Security 8 Security Dimensions D at a C on fid en tia lit y C om m un ic at io n S ec ur ity In te gr ity A va ila bi lit y P ri va cy A ut he nt ic at io n N o n- re pu di at io n Security Layers Security Planes A cc es s C o n tr o l Infrastructure Security Applications Security Services Security End User Security Control/Signaling Security Management Security THREATS VULNERABILITIES 8 Security Dimensions ATTACKS D at a C on fid en tia lit y C om m un ic at io n S ec ur ity D at a In te gr ity A va ila bi lit y P ri va cy A ut he nt ic at io n N o n- re pu di at io n Security Layers Security Planes ITU-T X.805: Security Architecture for Systems Providing End-to-End Communications Vulnerabilities Can Exist In Each Layer, Plane Destruction Disclosure Corruption Removal Interruption 4/28/2005 8 Access Control Authentication Non-repudiation Data Confidentiality Module NineModule SixModule Three User Plane Module EightModule FiveModule Two Control/Signaling Plane Module SevenModule FourModule One Management Plane Applications LayerServices Layer Infrastructure Layer Communication Security Data Integrity Availability Privacy The 8 Security Dimensions Are Applied to Each Security Module Modular Form of X.805 Execute – Management Network: Top Row – Network Services: Middle Column – Security Module: Layer & Plane Intersection Provides a systematic, organized way of performing network security assessments and planning 4/28/2005 9 Conclusion: X.805 Provides A Holistic Approach to Network Security § Comprehensive, end-to-end network view of security § Applies to any network technology – Wireless, wireline, optical networks – Voice, data, video, converged networks § Applies to any scope of network function – Service provider networks – Enterprise (service provider’s customer) networks – Government networks – Management/operations, administrative networks – Data center networks § Can map to existing standards addressing – Enterprise & service provider, government needs 4/28/2005 10 Security work in FGNGN Security Capability WG and ITU-T Recommendation X.805 § Guidelines for NGN security and X.805 § Security in NGN • NGN threat model (based on ITU-T X.800 and X.805 Recommendations) § Security Dimensions and Mechanisms (based on ITU-T X.805) §Access Control §Authentication §Non-repudiation §Data confidentiality §Communication security §Data integrity §Availability §Privacy § NGN security requirements for Release 1 and X.805 § Security requirements § General considerations based on the concepts of X.805 4/28/2005 11 Thank you!
Language:English
Score: 941020.8 - https://www.itu.int/ITU-T/work...5/presentations/s5-zelstan.pdf
Data Source: un
Children born stateless in Norway will according to the proposed Section 16 lit. a) be required to have resided in the territory for the past five years with residency permits of a minimum of one year. (...) The current legislation and the proposed insertion of Section 16 lit. a) base the residence requirement for the acquisition nationality on “lawful” residence. (...) In this regard, we limit ourselves to stress that the proposed differentiation/distinction between the categories of stateless persons born in Norway falling within the scope of Section 16 lit. a) and the category of stateless persons covered by Section 16 lit. b) may amount to a difference in treatment of persons in analogous, or relevantly similar, situations.
Language:English
Score: 940205.2 - https://www.unhcr.org/neu/wp-c...slag-til-endringer-i-stats.pdf
Data Source: un
Aircraft must not cross lit Stop Bars, even if ATC have given a clearance to a point beyond the Stop Bar. (...) Observing that a previously lit Stop Bar has been turned off, or that a Stop Bar is not lit, should be interpreted only as a visual confirmation of an ATC clearance to proceed. (...) The lights are required to have equal intervals lit and unlit and to flash at between 30 and 60 cycles per minute.
Language:English
Score: 934692.3 - https://www.icao.int/MID/Docum...ist%20Edition%202014-11-02.pdf
Data Source: un
5.8A.doc ATM/SAR/AIS SG/5-REPORT APPENDIX 5.8A ATM/SAR/AIS SG/5 Appendix 5.8A to the Report on Agenda Item 5.8 CONCLUSIONS/RECOMMENDATIONS IN THE SEARCH AND RESCUE FIELDS APPLICABLE TO THE MID REGION STATES L IM /M ID R E C .3 /9 C h ar t S A R 1 L IM /M ID R E C .3 /4 C o -o rd in at io n S A R A u th o ri ti es a n d IM O A S IA /P A C R E C . 7 /6 P ro vi si o n o f S A R fa ci lit ie s A S IA /P A C R E C .7 /5 C ap ac it y o f re sc u e u n it s L IM /A F I R E C . 3 /6 S at el lit e ai d ed S A R A S IA /P A C R E C .7 /2 4 S A R e sc o rt s er vi ce A S IA /P A C R E C .7 /1 1 A ss is ta n ce -S A R se rv ic es L IM /M ID R E C . 3 /1 4 em er g en cy fr eq u en cy 2 18 2 K h z L IM /M ID R E C . 3 /1 5 d ev el o p m en t o f p re - se ar ch p ro ce d u re s A S IA /P A C R E C . 7/ 12 a) co m . b et w ee n A cf t A S IA /P A C A R E C .7 /1 3 co m . m ea n s fo r L IM /M ID R E C .3 /1 6 C ar ri ag e o f su rv iv al ra d io e q u ip m en t A S IA /P A C R E C .7 /1 6 A )& B ).
Language:English
Score: 932600 - https://www.icao.int/MID/Docum...is_subgroup_5/Appendix5.8A.PDF
Data Source: un
Literacy pilot project of the Iranian government. A lit 1965, Roger, Dominique Literacy pilot project of the Iranian government 1965, Roger, Dominique Workers during a class. Literacy pilot project of the Iranian government. A lit 1965, Roger, Dominique Mosque and portico, Islamic art, Safawid era 1965, Roger, Dominique Minarets, Safawid era, Islam, Persian culture 1965, Roger, Dominique Minarets, Safawid era, Islam, Persian culture 1965, Roger, Dominique Minarets, Safawid era, Islam, Persian culture 1965, Roger, Dominique Minarets, Safawid era, Islam, Persian culture 1965, Roger, Dominique Porch and minaret, Persian architecture 1965, Roger, Dominique Young boy reading in a copy book 1965, Roger, Dominique Young boy and girl reading in a copy book, street scene, children revising less 1965, Roger, Dominique Young girl reading in a copy book, street scene, child revising lesson, reading 1965, Roger, Dominique Street scene,children revising lesson with adults, reading 1965, Roger, Dominique Street scene, adult teaching a child to read, reading 1965, Roger, Dominique Street scene, adult teaching a child to read, reading 1965, Roger, Dominique Street scene, adult teaching a child to read, reading 1965, Roger, Dominique Street scene, adult teaching a child to read, reading 1965, Roger, Dominique Street scene, adult teaching a child to read, reading 1965, Roger, Dominique Street scene, adult teaching a child to read, reading 1965, Roger, Dominique Street scene, adult teaching a child to read, reading 1965, Roger, Dominique Street scene, adult teaching a child to read, reading 1965, Roger, Dominique Street scene, adult teaching a child to read, reading 1965, Roger, Dominique Old man sitting on the ground reading 1965, Roger, Dominique Street scene, adult sitting on the ground reading 1965, Roger, Dominique Street scene, two adults sitting on the ground reading 1965, Roger, Dominique Royal Mosque, cupola, minaret, Islamic art 1965, Roger, Dominique Royal Mosque, cupola, minaret, Islamic art 1965, Roger, Dominique “Bayasanghori Shâhnâmeh” (Prince Bayasanghor’s Book of the Kings) “Bayasanghori Shâhnâmeh” (Prince Bayasanghor’s Book of the Kings) “Bayasanghori Shâhnâmeh” (Prince Bayasanghor’s Book of the Kings) “Bayasanghori Shâhnâmeh” (Prince Bayasanghor’s Book of the Kings) “Bayasanghori Shâhnâmeh” (Prince Bayasanghor’s Book of the Kings) “Bayasanghori Shâhnâmeh” (Prince Bayasanghor’s Book of the Kings) Reading, small boy and girl with books, street scene, children revising lesson Roger, Dominique Reading, book, small boy Roger, Dominique This list was generated on Mon Feb 7 12:43:09 2022 CET .
Language:English
Score: 932600 - https://en.unesco.org/mediabank/view/countries/IR.html
Data Source: un