411 resultados para Italian industrial property code


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Reliable communications is one of the major concerns in wireless sensor networks (WSNs). Multipath routing is an effective way to improve communication reliability in WSNs. However, most of existing multipath routing protocols for sensor networks are reactive and require dynamic route discovery. If there are many sensor nodes from a source to a destination, the route discovery process will create a long end-to-end transmission delay, which causes difficulties in some time-critical applications. To overcome this difficulty, the efficient route update and maintenance processes are proposed in this paper. It aims to limit the amount of routing overhead with two-tier routing architecture and introduce the combination of piggyback and trigger update to replace the periodic update process, which is the main source of unnecessary routing overhead. Simulations are carried out to demonstrate the effectiveness of the proposed processes in improvement of total amount of routing overhead over existing popular routing protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes the use of property graphs for mapping data between AEC software tools, which are not linked by common data formats and/or other interoperability measures. The intention of introducing this in practice, education and research is to facilitate the use of diverse, non-integrated design and analysis applications by a variety of users who need to create customised digital workflows, including those who are not expert programmers. Data model types are examined by way of supporting the choice of directed, attributed, multi-relational graphs for such data transformation tasks. A brief exemplar design scenario is also presented to illustrate the concepts and methods proposed, and conclusions are drawn regarding the feasibility of this approach and directions for further research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Piezoelectric transducers convert electrical energy to mechanical energy and play a great role in ultrasound systems. Ultrasound power transducer performance is strongly related to the applied electrical excitation. To have a suitable excitation for maximum energy conversion, it is required to analyze the effects of input signal waveform, medium and input signal distortion on the characteristic of a high power ultrasound system (including ultrasound transducer). In this research, different input voltage signals are generated using a single-phase power inverter and a linear power amplifier to excite a high power ultrasound transducer in different medium (water and oil) in order to study the characteristic of the system. We have also considered and analyzed the effect of power converter output voltage distortions on the performance of the high power ultrasound transducer using a passive filter.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most high-power ultrasound applications are driven by two-level inverters. However, the broad spectral content of the two-level pulse results in undesired harmonics that can decrease the performance of the system significantly. On the other hand, it is crucial to excite the piezoelectric devices at their main resonant frequency in order to have maximum energy conversion. Therefore a high-quality, low-distorted power signal is needed to excite the high-power piezoelectric transducer at its resonant frequency. This study proposes an efficient approach to develop the performance of high-power ultrasonic applications using multilevel inverters along with a frequency estimation algorithm. In this method, the resonant frequencies are estimated based on relative minimums of the piezoelectric impedance frequency response. The algorithm follows the resonant frequency variation and adapts the multilevel inverter reference frequency to drive an ultrasound transducer at high power. Extensive simulation and experimental results indicate the effectiveness of the proposed approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The scarcity of large parcels of land in well-serviced areas is one motivator for redeveloping industrial or commercial property that is abandoned or underused and often environmentally contaminated – so-called brownfield land. Poor industrial waste disposal practices caused by industrial activities including gas works, factories, railway land and waste tips have contributed to many instances of contaminated land identified as brownfield sites. It is estimated there are between 10,000 and 160,000 brownfield sites in Australia, with Queensland accounting for around 4000 of these.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter outlines the most important ways in which intellectual property is protected in Australia, and also the factors which affect the rights of joint venture participants in the absence of specific agreement between such participants. It then examines particular issues which may be considered in preparing appropriate documentation for any joint venture which involves the utilisation or generation of intellectual property to ensure that the joint venture participants achieve their desired result in terms of the allocation of ownership and control of such rights. The analysis includes and explanation of the special considerations which affect co-operation in research between industry and a university or government research institution. Finally, the rights of the joint venturers to intellectual property upon termination of the joint ventures are considered.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Carbon taxation governance is becoming increasingly popular, further evolving the polluter pays concept already well established in the built environment as a mechanism to controlling and licensing waste generation. This paper presents an explanation of property asset ‘regeneration reuse’ principles following deconstruction, which reduce waste generation associated with the process of demolition, construction and operation. An analysis is made of strategies in Australia and the United Kingdom, comparing jurisdiction targets pertaining to construction and demolition waste that encourage ‘regeneration reuse’. From examination of applicable Australian and United Kingdom legislation, strategic, fiscal and policy that influence on the 'regeneration reuse' of property assets, an evaluation to the variety of issues relevant to waste and resource management practices is reached. The paper concludes that a systematic evaluation framework to selecting building components and structures suitable for reuse after deconstruction must be considered in legislation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The 1st July 1997 heralded the implementation of a number of amendments to the Queensland Criminal Code including some intriguing changes affecting the principal property offences of stealing (section 398) and dishonest application (section 408C). This article discusses the impact of the changes. It examines the extent of the amendments and then aims to delineate the ambit of each offence drawing on some of the more recent judgments in the area. It concludes that the offences are moving closer together while retaining many of the complexities of proof experienced in the past.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Bazley v Wesley Monash IVF Pty Ltd [2010] QSC 118 an order was made under r 250 of the Uniform Civil Procedure Rules 1999 (Qld) (“UCPR”) requiring the respondent to continue to hold and maintain straws of semen belonging to the applicant’s deceased husband. The decision includes a useful analysis of the development of the common law regarding property rights in human bodies and body parts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The security of industrial control systems in critical infrastructure is a concern for the Australian government and other nations. There is a need to provide local Australian training and education for both control system engineers and information technology professionals. This paper proposes a postgraduate curriculum of four courses to provide knowledge and skills to protect critical infrastructure industrial control systems. Our curriculum is unique in that it provides security awareness but also the advanced skills required for security specialists in this area. We are aware that in the Australian context there is a cultural gap between the thinking of control system engineers who are responsible for maintaining and designing critical infrastructure and information technology professionals who are responsible for protecting these systems from cyber attacks. Our curriculum aims to bridge this gap by providing theoretical and practical exercises that will raise the awareness and preparedness of both groups of professionals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The book examines the correlation between Intellectual Property Law – notably copyright – on the one hand and social and economic development on the other. The main focus of the initial overview is on historical, legal, economic and cultural aspects. Building on that, the work subsequently investigates how intellectual property systems have to be designed in order to foster social and economic growth in developing countries and puts forward theoretical and practical solutions that should be considered and implemented by policy makers, legal experts and the Word Intellectual Property Organization (WIPO).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Intellectual property is crucial to the promotion of innovation. It provides an incentive to innovate as well as security for investment in innovation. The industries of the 21st century-information technology, biotechnology, pharmaceuticals, communications, education and entertainment – are all knowledge-based. The WTO Agreement on Trade-Related Aspects of Intellectual Property Rights (the TRIPS Agreement), adopted in 1994 at the conclusion of the Uruguay Round of trade negotiations, requires all WTO member countries to provide for the protection and enforcement of intellectual property rights. Having forged a link for the first time between intellectual property rights and the international trading system, the adoption of TRIPS means that any country that aims to participate fully in the global economy needs to understand the role of intellectual property and align its intellectual property laws and practices with the international minimum standards prescribed by TRIPS. However, for developing and least-developed countries, the implementation of intellectual property systems and enforcement mechanisms raises questions and challenges. Does recognition and enforcement of intellectual property serve their development needs and objectives? Does TRIPS encourage or hinder the transfer of technologies to developing and least-developed countries, particularly those that meet urgent needs in areas such as public health, food security, water and energy? What is the effect of TRIPS on developing countries’ access to knowledge and information? Is there scope for flexibility in implementation of TRIPS in pursuit of development strategies?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Property in an elusive concept. In many respects it has been regarded as a source of authority to use, develop and make decisions about whatever is the subject matter of this right of ownership. This is true whether the holder of this right of ownership is a private entity or a public entity. Increasingly a right of ownership of this kind has been recognised not only as a source of authority but also as a mechanism for restricting or limiting and perhaps even prohibiting existing or proposed activities that impact upon the environment. It is increasingly therefore an instrument of regulation as much as an instrument of authorisation. The protection and conservation of the environment are ultimately a matter of the public interest. This is not to suggest that the individual holders of rights of ownership are not interested in protecting the environment. It is open to them to do so in the exercise of a right of ownership as a source of authorisation. However a right of ownership – whether private or public – has become increasingly the mechanism according to which the environment is protected and conserved through the use of rights of ownership as a means of regulation. This paper addressed these issues from a doctrinal as well as a practical perspective in how the environment is managed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Nano-tin oxide was deposited on the surface of wollastonite using the mixed solution including stannic chloride pentahydrate precursor and wollastonite by a hydrolysis precipitation process. The antistatic properties of the wollastonite materials under different calcined conditions and composite materials (nano-SnO2/wollastonite, SW) were measured by rubber sheeter and four-point probe (FPP) sheet resistance measurement. Effects of hydrolysis temperature and time, calcination temperature and time, pH value and nano-SnO2 coating amount on the resistivity of SW powders were studied, and the optimum experimental conditions were obtained. The microstructure and surface properties of wollastonite, precipitate and SW were characterized by transmission electron microscopy (TEM), scanning electron microscopy (SEM), energy-dispersive X-ray spectrometry (EDS), specific surface area analyzer (BET), thermogravimetry (TG), X-ray photoelectron spectroscopy (XPS), X-ray diffraction (XRD), and Fourier translation infrared spectroscopy (FTIR) respectively. The results showed that the nano-SnO2/wollastonite composite materials under optimum preparation conditions showed better antistatic properties, the resistivity of which was reduced from 1.068 × 104 Ω cm to 2.533 × 103 Ω cm. From TG and XRD analysis, the possible mechanism for coating of SnO2 nanoparticles on the surface of wollastonite was proposed. The infrared spectrum indicated that there were a large number of the hydroxyl groups on the surface of wollastonite. This is beneficial to the heterogeneous nucleation reaction. Through morphology, EDS and XPS analysis, the surface of wollastonite fiber was coated with a layer of 10–15 nm thickness of tin oxide grains the distribution of which was uniform.