362 resultados para Security Studies - Military


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Video surveillance technology, based on Closed Circuit Television (CCTV) cameras, is one of the fastest growing markets in the field of security technologies. However, the existing video surveillance systems are still not at a stage where they can be used for crime prevention. The systems rely heavily on human observers and are therefore limited by factors such as fatigue and monitoring capabilities over long periods of time. To overcome this limitation, it is necessary to have intelligent processes which are able to highlight the salient data and filter out normal conditions that do not pose a threat to security. In order to create such intelligent systems, an understanding of human behaviour, specifically, suspicious behaviour is required. One of the challenges in achieving this is that human behaviour can only be understood correctly in the context in which it appears. Although context has been exploited in the general computer vision domain, it has not been widely used in the automatic suspicious behaviour detection domain. So, it is essential that context has to be formulated, stored and used by the system in order to understand human behaviour. Finally, since surveillance systems could be modeled as largescale data stream systems, it is difficult to have a complete knowledge base. In this case, the systems need to not only continuously update their knowledge but also be able to retrieve the extracted information which is related to the given context. To address these issues, a context-based approach for detecting suspicious behaviour is proposed. In this approach, contextual information is exploited in order to make a better detection. The proposed approach utilises a data stream clustering algorithm in order to discover the behaviour classes and their frequency of occurrences from the incoming behaviour instances. Contextual information is then used in addition to the above information to detect suspicious behaviour. The proposed approach is able to detect observed, unobserved and contextual suspicious behaviour. Two case studies using video feeds taken from CAVIAR dataset and Z-block building, Queensland University of Technology are presented in order to test the proposed approach. From these experiments, it is shown that by using information about context, the proposed system is able to make a more accurate detection, especially those behaviours which are only suspicious in some contexts while being normal in the others. Moreover, this information give critical feedback to the system designers to refine the system. Finally, the proposed modified Clustream algorithm enables the system to both continuously update the systems knowledge and to effectively retrieve the information learned in a given context. The outcomes from this research are: (a) A context-based framework for automatic detecting suspicious behaviour which can be used by an intelligent video surveillance in making decisions; (b) A modified Clustream data stream clustering algorithm which continuously updates the system knowledge and is able to retrieve contextually related information effectively; and (c) An update-describe approach which extends the capability of the existing human local motion features called interest points based features to the data stream environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a hierarchical model for assessing an object-oriented program's security. Security is quantified using structural properties of the program code to identify the ways in which `classified' data values may be transferred between objects. The model begins with a set of low-level security metrics based on traditional design characteristics of object-oriented classes, such as data encapsulation, cohesion and coupling. These metrics are then used to characterise higher-level properties concerning the overall readability and writability of classified data throughout the program. In turn, these metrics are then mapped to well-known security design principles such as `assigning the least privilege' and `reducing the size of the attack surface'. Finally, the entire program's security is summarised as a single security index value. These metrics allow different versions of the same program, or different programs intended to perform the same task, to be compared for their relative security at a number of different abstraction levels. The model is validated via an experiment involving five open source Java programs, using a static analysis tool we have developed to automatically extract the security metrics from compiled Java bytecode.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a theoretical model for e-Government in Malaysia and addresses issues involved in its implementation. It presents three possible models including the Framework for Electronic Government (Grant & Chau, 2005), the Three Pillars Framework (Georgescu, 2007) and The Grid-Group Theory from cultural studies (Douglas, 1996) and integrates and adapts them to the specific needs of the Malaysian environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper describes the processes and the outcomes of the ranking of LIS journal titles by Australias LIS researchers during 2007-8, firstly through the Australian federal governments Research Quality Framework (RQF) process and then its replacement, the Excellence in Research for Australia (ERA) initiative. The requirement to rank the journals titles used came from discussions held at the RQF panel meeting held in February 2007 in Canberra, Australia. While it was recognised that the Web of Science (formerly ISI) journal impact approach of journal acceptance for measures of research quality and impact might not work for LIS, it was apparent that this model would be the default if no other ranking of journal titles became apparent. Although an increasing number of LIS and related discipline journals were appearing in the Web of Science listed rankings, the number was few and it was thus decided by the Australian LIS research community to undertake the ranking exercise.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Choi et al. recently proposed an efficient RFID authentication protocol for a ubiquitous computing environment, OHLCAP(One-Way Hash based Low-Cost Authentication Protocol). However, this paper reveals that the protocol has several security weaknesses : 1) traceability based on the leakage of counter information, 2) vulnerability to an impersonation attack by maliciously updating a random number, and 3) traceability based on a physically-attacked tag. Finally, a security enhanced group-based authentication protocol is presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Women and Representation in Local Government opens up an opportunity to critique and move beyond suppositions and labels in relation to women in local government. Presenting a wealth of new empirical material, this book brings together international experts to examine and compare the presence of women at this level and features case studies on the US, UK, France, Germany, Spain, Finland, Uganda, China, Australia and New Zealand. Divided into four main sections, each explores a key theme related to the subject of women and representation in local government and engages with contemporary gender theory and the broader literature on women and politics. The contributors explore local government as a gendered environment; critiquing strategies to address the limited number of elected female members in local government and examine the impact of significant recent changes on local government through a gender lens. Addressing key questions of how gender equality can be achieved in this sector, it will be of strong interest to students and academics working in the fields of gender studies, local government and international politics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Towards the last decade of the last millennium, Indigenous knowledge has been central to scholarly debates relating to decolonising knowledge on a global level. Much of these debates were advanced by Indigenous scholars in colonised countries particularly Australia, New Zealand, Canada and the United States. Indigenous scholars argue for the location of Indigenous knowledge as the epistemological standpoint (Battiste, Bell and Findlay, 2002; Kaia, 2005; Nakata 2002, 2007) for intellectual engagements and methodology for resisting colonial constructions of the colonised other (Rigney, 1997; Smith, 1999, 2005). However, the challenge to engage Indigenous knowledge to inform research and educational processes, in many respects, is still a contested debate in western-oriented universities and institutions of higher education. The place of Indigenous knowledge in Australian secondary and primary schools remains vague, while efforts to embed Indigenous perspectives in the curriculum continue to be made by both government and private educational providers. Educational funding for Indigenous education continues to operate from a deficiency model, whereby educational outcomes are often measured against set criteria, reflecting a pass/fail structure, than a more comprehensive investigation of educational outcomes and quality of learning experiences. Teacher knowledge, effective parental and community engagement into students learning and students experiences of schooling continue to be secondary to students final results. This paper presents preliminary findings of Parent School Partnership Initiative (PSPI) project conducted by the Oodgeroo Unit at the Queensland University of Technology in partnerships with the Aboriginal and Torres Strait Islander Education Focus Group for the Caboolture Shire, in South East Queensland. The state government sponsored initiative was to examine factors that promote and enhance parent/school engagement with their students schooling, and to contribute to Aboriginal and Torres Strait Islander students learning and completion of secondary schooling within the participating schools in a more holistic way. We present four school case studies and discuss some of the early findings. We conclude by arguing the importance of the recognition of Indigenous knowledge and its place in enhancing parent schools partnerships.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the problem of how to efficiently and safely design dose finding studies. Both current and novel utility functions are explored using Bayesian adaptive design methodology for the estimation of a maximum tolerated dose (MTD). In particular, we explore widely adopted approaches such as the continual reassessment method and minimizing the variance of the estimate of an MTD. New utility functions are constructed in the Bayesian framework and are evaluated against current approaches. To reduce computing time, importance sampling is implemented to re-weight posterior samples thus avoiding the need to draw samples using Markov chain Monte Carlo techniques. Further, as such studies are generally first-in-man, the safety of patients is paramount. We therefore explore methods for the incorporation of safety considerations into utility functions to ensure that only safe and well-predicted doses are administered. The amalgamation of Bayesian methodology, adaptive design and compound utility functions is termed adaptive Bayesian compound design (ABCD). The performance of this amalgamation of methodology is investigated via the simulation of dose finding studies. The paper concludes with a discussion of results and extensions that could be included into our approach.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The results of pressure-tuning Raman spectroscopic, X-ray powder diffraction and solid-state 13C-NMR studies of selected dicarboxylate anions intercalated in a Mg-Al layered double hydroxide (talcite) lattice are reported. The pressure dependences of the vibrational modes are linear for pressures up to 4.6 GPa indicating that no phase transitions occur. The interlayer spacings show that the oxalate, malonate and succinate dianions are oriented perpendicular to the layers, but the glutarate and adipate are tilted. The solid-state 13C-NMR spectra of these materials show full chemical shift anisotropy and, therefore, the anions are not mobile at room temperature.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Socio-legal studies are an essentially interdisciplinary enterprise. However, there is currently only one form of interdisciplinarity that most socio-legal scholars (and criminologists) recognise and work with. This form is derived from the idea that 'society itself' - and by this most scholars mean 'civil society' - drives the law. However, another, rival understanding of society, which we term the authoritarian-liberal statist understanding that slipped from view in the late seventeenth century and remained obscure from then until now, may be used to generate another form of interdisciplinarity for sOcio-legal studies (and for criminology). However, this rival understanding of society does not simply allow us to reconfigure our notion of 'society'; it radically changes the role society plays in relation to the law. Two crucial points emerge from this rival account: first, society can no longer be understood as separable from (even though interacting with) the law; and second, society can no longer be understood as driving the law.