293 resultados para distributed denial-of-service attack


Relevância:

100.00% 100.00%

Publicador:

Resumo:

TOD: - A fully planned, mixed use development equipped with good quality transit service and infrastructure for walking and cycling Hypothesis: -TOD will help to reduce urban transport congestion Method: -Comparison of a TOD with non TOD urban environments -Residents’ trip characteristics

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Deterministic transit capacity analysis applies to planning, design and operational management of urban transit systems. The Transit Capacity and Quality of Service Manual (1) and Vuchic (2, 3) enable transit performance to be quantified and assessed using transit capacity and productive capacity. This paper further defines important productive performance measures of an individual transit service and transit line. Transit work (p-km) captures the transit task performed over distance. Passenger transmission (p-km/h) captures the passenger task delivered by service at speed. Transit productiveness (p-km/h) captures transit work performed over time. These measures are useful to operators in understanding their services’ or systems’ capabilities and passenger quality of service. This paper accounts for variability in utilized demand by passengers along a line and high passenger load conditions where passenger pass-up delay occurs. A hypothetical case study of an individual bus service’s operation demonstrates the usefulness of passenger transmission in comparing existing and growth scenarios. A hypothetical case study of a bus line’s operation during a peak hour window demonstrates the theory’s usefulness in examining the contribution of individual services to line productive performance. Scenarios may be assessed using this theory to benchmark or compare lines and segments, conditions, or consider improvements.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Higher ambient temperatures will increase heat stress on workers, leading to impacts upon their individual health and productivity. In particular, research has indicated that higher ambient temperatures can increase the prevalence of urolithiasis. This thesis examines the relationship between ambient heat exposure and urolithiasis among outdoor workers in a shipbuilding company in Guangzhou, China, and makes recommendations for minimising the possible impacts of high ambient temperatures on urolithiasis. A retrospective 1:4 matched case-control study was performed to investigate the association between ambient heat exposure and urolithiasis. Ambient heat exposure was characterised by total exposure time, type of work, department and length of service. The data were obtained from the affiliated hospital of the shipbuilding company under study for the period 2003 to 2010. A conditional logistic regression model was used to estimate the association between heat exposure and urolithiasis. This study found that the odds ratio (OR) of urolithiasis for total exposure time was 1.5 (95% confidence interval (CI): 1.2–1.8). Eight types of work in the shipbuilding company were investigated, including welder, assembler, production security and quality inspector, planing machine operator, spray painter, gas-cutting worker and indoor employee. Five out of eight types of work had significantly higher risks for urolithiasis, and four of the five mainly consisted of outdoors work with ORs of 4.4 (95% CI: 1.7–11.4) for spray painter, 3.8 (95% CI: 1.9–7.2) for welder, 2.7 (95% CI: 1.4–5.0) for production security and quality inspector, and 2.2 (95% CI: 1.1–4.3) for assembler, compared to the reference group (indoor employee). Workers with abnormal blood pressure (hypertension) were more likely to have urolithiasis with an OR of 1.6 (95% CI: 1.0–2.5) compared to those without hypertension. This study contributes to the understanding of the association between ambient heat exposure and urolithiasis among outdoor workers in China. In the context of global climate change, this is particularly important because rising temperatures are expected to increase the prevalence of urolithiasis among outdoor workers, putting greater pressure on productivity, occupational health management and health care systems. The results of this study have clear implications for public health policy and planning, as they indicate that more attention is required to protect outdoor workers from heat-related urolithiasis.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objective: The present study seeks to examine the impact of therapeutic interventions for people from refugee backgrounds within a naturalistic setting. Method: Sixty-two refugees from Burma were assessed soon after arriving in Australia. All participants received standard interventions provided by a resettlement organisation which included therapeutic interventions, assessment, social assistance, and referrals where appropriate. At the completion of service provision a follow-up assessment was conducted. Results: Over the course of the intervention, participants experienced a significant decrease in symptoms of post-traumatic stress disorder, anxiety, depression and somatisation. Pre-intervention symptoms predicted symptoms post-intervention for post-traumatic stress, anxiety, and somatisation. Post-migration living difficulties, the number of traumas experienced, and the number of contacts with the service agency were unrelated to all mental health outcomes. Conclusions: In the first Australian study of its kind, reductions in mental health symptoms post-intervention were significantly linked to pre-intervention symptomatology and the number of therapy sessions predicted post-intervention symptoms of post-traumatic stress. Future studies need to include larger samples and control groups to verify findings.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background: Currently in the Australian higher education sector higher productivity from allied health clinical education placements are a contested issue. This paper will report results of a study that investigated output changes associated with occupational therapy and nutrition/dietetics clinical education placements in Queensland, Australia. Supervisors’ and students’ time use during placements and how this changes for supervisors compared to when students are not present in the workplace is also presented. Methodology/Principal Findings: A cohort design was used with students from four Queensland universities, and their supervisors employed by Queensland Health. There was an increasing trend in the number of occasions of service delivered when the students were present, and a statistically significant increase in the daily mean length of occasions of service delivered during the placement compared to pre-placement levels. For project-based placements that were not directly involved in patient care, supervisors’ project activity time decreased during placements, with students undertaking considerably more time in project activities. Conclusions/Significance: A novel method for estimating productivity and time use changes during clinical education programs for allied health disciplines has been applied. During clinical education placements there was a net increase in outputs, suggesting supervisors engage in longer consultations with patients for the purpose of training students, while maintaining patient numbers. Other activities are reduced. This paper is the first time these data have been shown and form a good basis for future assessments of the economic impact of student placements for allied health disciplines.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Late discovery is a term used to describe the experience of discovering the truth of one’s genetic origins as an adult. Following discovery, late discoverers face a lack of recognition and acknowledgment of their concerns from family, friends, community and institutions. They experience pain, anger, loss, grief and frustration. This presentation shares the findings of the first qualitative study of both late discovery of adoptive and donor insemination offspring (heterosexual couple use only) experiences. It is also the first study of late discovery experiences undertaken from an ethical perspective. While this study recruited new participants, it also included an ethical re-analysis of existing late discovery accounts across both practices. The findings of this study (a) draws links between past adoption and current donor insemination (heterosexual couple only) practices, (b) reveals that late discoverers are demanding acknowledgment and recognition of the particularity of their experiences, and (c) offers insights into conceptual understandings of the ‘best interests of the child’ principle. These insights derive from the lived experiences of those whose biological and social worlds have been sundered and secrecy and denial of difference used to conceal this. It suggests that acknowledging the equal moral status of the child may be useful in strengthening conceptual understandings of the ‘best interests of the child’ principle. This equal moral status involves ensuring that personal autonomy and the ability to exercise free will is protected; that the integrity of the relationships of trust expected and demanded between parent/s and children is defended and supported; and that equal access to normative socio-cultural practices, that is; non-fictionalised birth certificates and open records, is guaranteed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background: General practitioners (GPs) and nurses are ideally placed to address the significant unmet demand for the treatment of cannabis-related problems given the numbers of people who regularly seek their care. The aim of this study was to evaluate differences between GPs and nurses’ perceived knowledge, beliefs, and behaviors toward cannabis use and its screening and management. Methods: This study involved 161 nurses and 503 GPs who completed a survey distributed via conference satchels to delegates of Healthed seminars focused on topics relevant to women and children’s health. Differences between GPs and nurses were analyzed using χ2- tests and two-sample t-tests, while logistic regression examined predictors of service provision. Results: GPs were more likely than nurses to have engaged in cannabis-related service provision, but also more frequently reported barriers related to time, interest, and having more important issues to address. Nurses reported less knowledge, skills, and role legitimacy. Perceived screening skills predicted screening and referral to alcohol and other drug (AOD) services, while knowing a regular user increased the likelihood of referrals only. Conclusions: Approaches to increase cannabis-related screening and intervention may be improved by involving nurses, and by leveraging the relationship between nurses and doctors, in primary care.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Our paper approaches Twitter through the lens of “platform politics” (Gillespie, 2010), focusing in particular on controversies around user data access, ownership, and control. We characterise different actors in the Twitter data ecosystem: private and institutional end users of Twitter, commercial data resellers such as Gnip and DataSift, data scientists, and finally Twitter, Inc. itself; and describe their conflicting interests. We furthermore study Twitter’s Terms of Service and application programming interface (API) as material instantiations of regulatory instruments used by the platform provider and argue for a more promotion of data rights and literacy to strengthen the position of end users.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The effect of HCl on authigenic chlorite in three different sandstones has been examined uisng an Environmental Scanning Electron Microscope (ESEM), together with conventional analytical techniques. The ESEM enabled chlorites to be directly observed in situ at high magnifications during HCl treatment, and was particularly effective in allowing the same chlorite areas to be closely compared before and after acid treatment. Chlorites were reacted with 1M to 10M HCl at temperatures up to 80°C and for periods up to five months. After all treatments, chlorites show extensive leaching of iron, magnesium and aluminum, and their crystalline structure is destroyed. However, despite these major compositional and structural changes, chlorites show little or no visible evidence of acid attack, with precise morphological detail of individual plates preserved in all samples following acid treatments. Chlorite dissolution, sensu stricto, did not occur as a result of acidization of the host sandstones. Acid-treated chlorides are likely to exits in a structurally weakened state that may make them susceptible to physical disintegration during fluid flow. Accordingly, fines migration may be a significant engineering problem associated with the acidization of chlorite-bearing sandstones. © 1993.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A complex attack is a sequence of temporally and spatially separated legal and illegal actions each of which can be detected by various IDS but as a whole they constitute a powerful attack. IDS fall short of detecting and modeling complex attacks therefore new methods are required. This paper presents a formal methodology for modeling and detection of complex attacks in three phases: (1) we extend basic attack tree (AT) approach to capture temporal dependencies between components and expiration of an attack, (2) using enhanced AT we build a tree automaton which accepts a sequence of actions from input message streams from various sources if there is a traversal of an AT from leaves to root, and (3) we show how to construct an enhanced parallel automaton that has each tree automaton as a subroutine. We use simulation to test our methods, and provide a case study of representing attacks in WLANs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents a formal methodology for attack modeling and detection for networks. Our approach has three phases. First, we extend the basic attack tree approach 1 to capture (i) the temporal dependencies between components, and (ii) the expiration of an attack. Second, using the enhanced attack trees (EAT) we build a tree automaton that accepts a sequence of actions from input stream if there is a traverse of an attack tree from leaves to the root node. Finally, we show how to construct an enhanced parallel automaton (EPA) that has each tree automaton as a subroutine and can process the input stream by considering multiple trees simultaneously. As a case study, we show how to represent the attacks in IEEE 802.11 and construct an EPA for it.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mandatory child abuse and neglect reporting laws apply to teachers in many countries of the world. However, such laws have not yet been introduced for teachers in Malaysia, and there is debate about whether the laws should be extended to teachers at all. This paper aimed to investigate the level of support among teachers to assume mandatory reporting duties and to identify factors determining this support in Malaysia. A total of 668 teachers from 14 randomly selected public primary schools completed an anonymous self-administered questionnaire. Results showed that 44.4 per cent of the respondents supported legislation requiring teachers to report child abuse. Teachers of Indian ethnicity, those with a shorter duration of service in teaching (< 5 years), the availability of knowledgeable and supportive school staff and a higher level of commitment to reporting were significant factors affecting teachers' support for mandatory reporting. This study provides important insights into factors influencing teachers' support for the introduction of mandatory reporting legislation for teachers in Malaysia. Teachers do not unanimously support these laws and there is a lack of clarity about what such laws will mean for teachers. The data highlight the need for specific training programmes to raise teachers' awareness, build their confidence and enhance their willingness to report child abuse.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Service research in information systems (IS) has received attention over many years (e.g. Kettinger and Lee, 1994), but more recently has increased substantially in both diversity and volume (Rai and Sambamurthy, 2006). A service-oriented view of information technology (IT) is gradually taking hold in both academia and industry. This is concomitant with the growth of service-related phenomena and concepts (Lusch and Vargo, 2006), stimulating a global discourse about 'service science' as a new, cross-disciplinary field of research (Chesbrough and Spohrer, 2006).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In recent years, enterprise architecture (EA) has captured increasing interest as a means to systematically consolidate and manage various enterprise artefacts in order to provide holistic decision support for business/IT alignment and business/IT landscapes management. To provide a holistic perspective on the enterprise over time, EA frameworks need to co-evolve with the changes in the enterprise and its IT over time. In this paper we focus on the emergence of Service-Oriented Architecture (SOA). There is a need to integrate SOA with EA to keep EA relevant and to use EA products to help drive successful SOA. This paper investigates and compares the integration of SOA elements in five widely used EA frameworks: Archimate, The Open Group Architecture Framework (TOGAF), Federal Enterprise Architecture Framework (FEAF), Department of Defence Architecture Framework (DoDAF) and the Ministry of Defence Architecture Framework (MODAF). It identifies what SOA elements are considered and their relative position in the overall structure. The results show that services and related elements are far from being well-integrated constructs in current EA frameworks and that the different EA frameworks integrated SOA elements in substantially different ways. Our results can support the academic EA and SOA communities with a closer and more consistent integration of EA and SOA and support practitioners in identifying an EA framework that provides the SOA support that matches their requirements.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the approach of Berbain et al. to Trivium-like ciphers and perform new algebraic analyses on them, namely Trivium and its reduced versions: Trivium-N, Bivium-A and Bivium-B. In doing so, we answer an open question in the literature. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques which use the F4 algorithm to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analysis. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail.