443 resultados para regional security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Efficient and effective urban management systems for Ubiquitous Eco Cities require having intelligent and integrated management mechanisms. This integration includes bringing together economic, socio-cultural and urban development with a well orchestrated, transparent and open decision making mechanism and necessary infrastructure and technologies. In the Ubiquitous Eco Cities, telecommunication technologies plan an important role in monitoring and managing activities over wired, wireless and fibre-optic networks. particularly technology convergence creates new ways in which the information and telecommunication technologies are used and formed the back bone or urban management systems. The research paper reports and introduces recent approaches on urban management systems, such as intelligent urban management systems, that are suitable for Ubiquitous Eco Cities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper a new approach is proposed for interpreting of regional frequencies in multi machine power systems. The method uses generator aggregation and system reduction based on coherent generators in each area. The reduced system structure is able to be identified and a kalman estimator is designed for the reduced system to estimate the inter-area modes using the synchronized phasor measurement data. The proposed method is tested on a six machine, three area test system and the obtained results show the estimation of inter-area oscillations in the system with a high accuracy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper discusses major obstacles for the adoption of low cost level crossing warning devices (LCLCWDs) in Australia and reviews those trialed in Australia and internationally. The argument for the use of LCLCWDs is that for a given investment, more passive level crossings can be treated, therefore increasing safety benefits across the rail network. This approach, in theory, reduces risk across the network by utilizing a combination of low-cost and conventional level crossing interventions, similar to what is done in the road environment. This paper concludes that in order to determine if this approach can produce better safety outcomes than the current approach, involving the incremental upgrade of level crossings with conventional interventions, it is necessary to perform rigorous risk assessments and cost-benefit analyses of LCLCWDs. Further research is also needed to determine how best to differentiate less reliable LCCLWDs from conventional warning devices through the use of different warning signs and signals. This paper presents a strategy for progressing research and development of LCLCWDs and details how the Cooperative Research Centre (CRC) for Rail Innovation is fulfilling this strategy through the current and future affordable level crossing projects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a hierarchical model for assessing an object-oriented program's security. Security is quantified using structural properties of the program code to identify the ways in which `classified' data values may be transferred between objects. The model begins with a set of low-level security metrics based on traditional design characteristics of object-oriented classes, such as data encapsulation, cohesion and coupling. These metrics are then used to characterise higher-level properties concerning the overall readability and writability of classified data throughout the program. In turn, these metrics are then mapped to well-known security design principles such as `assigning the least privilege' and `reducing the size of the attack surface'. Finally, the entire program's security is summarised as a single security index value. These metrics allow different versions of the same program, or different programs intended to perform the same task, to be compared for their relative security at a number of different abstraction levels. The model is validated via an experiment involving five open source Java programs, using a static analysis tool we have developed to automatically extract the security metrics from compiled Java bytecode.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis argues that in order to establish a sound information security culture it is necessary to look at organisation's information security systems in a socio- technical context. The motivation for this research stems from the continuing concern of ineffective information security in organisations, leading to potentially significant monetary losses. It is important to address both technical and non- technical aspects when dealing with information security management. Culture has been identified as an underlying determinant of individuals' behaviour and this extends to information security culture, particularly in developing countries. This research investigates information security culture in the Saudi Arabia context. The theoretical foundation for the study is based on organisational and national culture theories. A conceptual framework for this study was constructed based on Peterson and Smith's (1997) model of national culture. This framework guides the study of national, organisational and technological values and their relationships to the development of information security culture. Further, the study seeks to better understand how these values might affect the development and deployment of an organisation's information security culture. Drawing on evidence from three exploratory case studies, an emergent conceptual framework was developed from the traditional human behaviour and the social environment perspectives used in social work, This framework contributes to in- formation security management by identifying behaviours related to four modes of information security practice. These modes provide a sound basis that can be used to evaluate individual organisational members' behaviour and the adequacy of ex- isting security measures. The results confirm the plausibility of the four modes of practice. Furthermore, a final framework was developed by integrating the four modes framework into the research framework. The outcomes of the three case stud- ies demonstrate that some of the national, organisational and technological values have clear impacts on the development and deployment of organisations' informa- tion security culture. This research, by providing an understanding the in uence of national, organi- sational and technological values on individuals' information security behaviour, contributes to building a theory of information security culture development within an organisational context. The research reports on the development of an inte- grated information security culture model that highlights recommendations for developing an information security culture. The research framework, introduced by this research, is put forward as a robust starting point for further related work in this area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In an era of rapidly changing economic, social and environmental conditions, urban and regional planning education must be resilient, innovative and able to deal with the complex political and socio-economic fabric of post-modern cities. As a consequence, urban and regional planning education plays a fundamental role in educating and forming planning practitioners that will be able to tackle such complexity. However, not many tertiary education institutions provide a trans-cultural engagement opportunity for students, where the need to internationalise planning education has been widely recognised worldwide. The aim of this paper is to communicate the findings of three overseas study trips (Kuala Lumpur-Malaysia, Daejeon-Korea, Istanbul and Gallipoli-Turkey) that students of Queensland University of Technology are taken to where these study trips trailed the provision of an innovative tertiary education experience of teaching regional planning in an international context. The findings of the pedagogic analyses of the study reveal that the exposure of students to different planning processes and practices give them a new outlook on what they knew from their own country and provide them with useful insights on international planning issues and cultural differences and barriers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: To examine the impact of different endotracheal tube (ETT) suction techniques on regional end-expiratory lung volume (EELV) and tidal volume (VT) in an animal model of surfactant-deficient lung injury. Methods: Six 2-week old piglets were intubated (4.0 mm ETT), muscle-relaxed and ventilated, and lung injury was induced with repeated saline lavage. In each animal, open suction (OS) and two methods of closed suction (CS) were performed in random order using both 5 and 8 French gauge (FG) catheters. The pre-suction volume state of the lung was standardised on the inflation limb of the pressure-volume relationship. Regional EELV and VT expressed as a proportion of the impedance change at vital capacity (%ZVCroi) within the anterior and posterior halves of the chest were measured during and for 60 s after suction using electrical impedance tomography. Results: During suction, 5 FG CS resulted in preservation of EELV in the anterior (nondependent) and posterior(dependent) lung compared to the other permutations, but these only reached significance in the anterior regions (p\0.001 repeated-measures ANOVA). VT within the anterior, but not posterior lung was significantly greater during 5FG CS compared to 8 FG CS; the mean difference was 15.1 [95% CI 5.1, 25.1]%ZVCroi. Neither catheter size nor suction technique influenced post-suction regional EELV or VT compared to pre-suction values (repeated-measures ANOVA). Conclusions: ETT suction causes transient loss of EELV and VT throughout the lung. Catheter size exerts a greater influence than suction method, with CS only protecting against derecruitment when a small catheter is used, especially in the non-dependent lung.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Choi et al. recently proposed an efficient RFID authentication protocol for a ubiquitous computing environment, OHLCAP(One-Way Hash based Low-Cost Authentication Protocol). However, this paper reveals that the protocol has several security weaknesses : 1) traceability based on the leakage of counter information, 2) vulnerability to an impersonation attack by maliciously updating a random number, and 3) traceability based on a physically-attacked tag. Finally, a security enhanced group-based authentication protocol is presented.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Agricultural soils emit about 50% of the global flux of N2O attributable to human influence, mostly in response to nitrogen fertilizer use. Recent evidence that the relationship between N2O fluxes and N-fertilizer additions to cereal maize are non-linear provides an opportunity to estimate regional N2O fluxes based on estimates of N application rates rather than as a simple percentage of N inputs as used by the Intergovernmental Panel on Climate Change (IPCC). We combined a simple empirical model of N2O production with the SOCRATES soil carbon dynamics model to estimate N2O and other sources of Global Warming Potential (GWP) from cereal maize across 19,000 cropland polygons in the North Central Region (NCR) of the US over the period 1964–2005. Results indicate that the loading of greenhouse gases to the atmosphere from cereal maize production in the NCR was 1.7 Gt CO2e, with an average 268 t CO2e produced per tonne of grain. From 1970 until 2005, GHG emissions per unit product declined on average by 2.8 t CO2e ha−1 annum−1, coinciding with a stabilisation in N application rate and consistent increases in grain yield from the mid-1970’s. Nitrous oxide production from N fertilizer inputs represented 59% of these emissions, soil C decline (0–30 cm) represented 11% of total emissions, with the remaining 30% (517 Mt) from the combustion of fuel associated with farm operations. Of the 126 Mt of N fertilizer applied to cereal maize from 1964 to 2005, we estimate that 2.2 Mt N was emitted as N2O when using a non-linear response model, equivalent to 1.75% of the applied N.