825 resultados para Urban streets networks


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides the obvious feature which is to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor encrypted traffic. Our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment. In this paper, we introduce a novel protocol that utilises a secret-sharing scheme to detect attacks in encrypted networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Public transportation is an environment with great potential for applying location-based services through mobile devices. This paper provides the underpinning rationale for research that will be looking at how the real-time passenger information system deployed by the Translink Transit Authority across all of South East Queensland in Australia can provide a core platform to improve commuters’ user experiences. This system relies on mobile computing and GPS technology to provide accurate information on transport vehicle locations. The proposal builds on this platform to inform the design and development of innovative social media, mobile computing and geospatial information applications. The core aim is to digitally augment the public transport environment to enhance the user experience of commuters for a more enjoyable journey.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this paper is to advance understandings of the processes of cluster-building and evolution, or transformative and adaptive change, through the conscious design and reflective activities of private and public actors. A model of transformation is developed which illustrates the importance of actors becoming exposed to new ideas and visions for industrial change by political entrepreneurs and external networks. Further, actors must be guided in their decision-making and action by the new vision, and this requires that they are persuaded of its viability through the provision of test cases and supportive resources and institutions. In order for new ideas to become guiding models, actors must be convinced of their desirability through the portrayal of models as a means of confronting competitive challenges and serving the economic interests of the city/region. Subsequent adaptive change is iterative and reflexive, involving a process of strategic learning amongst key industrial and political actors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Public transport is one of the key promoters of sustainable urban transport. To encourage and increase public transport patronage it is important to investigate the route choice behaviours of urban public transit users. This chapter reviews the main developments of modelling urban public transit users’ route choice behaviours in a historical perspective, from the 1960s to the present time. The approaches re- viewed for this study include the early heuristic studies on finding the least-cost transit route and all-or- nothing transit assignment, the bus common lines problem, the disaggregate discrete choice models, the deterministic and stochastic user equilibrium transit assignment models, and the recent dynamic transit assignment models. This chapter also provides an outlook for the future directions of modelling transit users’ route choice behaviours. Through the comparison with the development of models for motorists’ route choice and traffic assignment problems, this chapter advocates that transit route choice research should draw inspiration from the research outcomes from the road area, and that the modelling practice of transit users’ route choice should further explore the behavioural complexities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ad hoc networks are vulnerable to attacks due to distributed nature and lack of infrastructure. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. The clustering protocols can be taken as an additional advantage in these processing constrained networks to collaboratively detect intrusions with less power usage and minimal overhead. Existing clustering protocols are not suitable for intrusion detection purposes, because they are linked with the routes. The route establishment and route renewal affects the clusters and as a consequence, the processing and traffic overhead increases due to instability of clusters. The ad hoc networks are battery and power constraint, and therefore a trusted monitoring node should be available to detect and respond against intrusions in time. This can be achieved only if the clusters are stable for a long period of time. If the clusters are regularly changed due to routes, the intrusion detection will not prove to be effective. Therefore, a generalized clustering algorithm has been proposed that can run on top of any routing protocol and can monitor the intrusions constantly irrespective of the routes. The proposed simplified clustering scheme has been used to detect intrusions, resulting in high detection rates and low processing and memory overhead irrespective of the routes, connections, traffic types and mobility of nodes in the network. Clustering is also useful to detect intrusions collaboratively since an individual node can neither detect the malicious node alone nor it can take action against that node on its own.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile ad-hoc networks (MANETs) are temporary wireless networks useful in emergency rescue services, battlefields operations, mobile conferencing and a variety of other useful applications. Due to dynamic nature and lack of centralized monitoring points, these networks are highly vulnerable to attacks. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. We take benefit of the clustering concept in MANETs for the effective communication between nodes, where each cluster involves a number of member nodes and is managed by a cluster-head. It can be taken as an advantage in these battery and memory constrained networks for the purpose of intrusion detection, by separating tasks for the head and member nodes, at the same time providing opportunity for launching collaborative detection approach. The clustering schemes are generally used for the routing purposes to enhance the route efficiency. However, the effect of change of a cluster tends to change the route; thus degrades the performance. This paper presents a low overhead clustering algorithm for the benefit of detecting intrusion rather than efficient routing. It also discusses the intrusion detection techniques with the help of this simplified clustering scheme.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the rapid urbanization progress, water resources protection and water pollution control have become key problems of human environment construction and social sustainable development. Many countries, especially Australia, have mature experiences. Water Sensitive Urban Design (WSUD) is one of the successful strategies that is put forward under this global situation and helps releasing heavy environmental pressure from urbanization. The paper discussed main principles of WSUD and then took Shijiazhuang, Heibei and Yueng, Hunan for examples trying to apply WSUD in river landscape projects in China's new urban area, thus doing contributions to more sustainable water management in new urban areas in China.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

TCP is a dominant protocol for consistent communication over the internet. It provides flow, congestion and error control mechanisms while using wired reliable networks. Its congestion control mechanism is not suitable for wireless links where data corruption and its lost rate are higher. The physical links are transparent from TCP that takes packet losses due to congestion only and initiates congestion handling mechanisms by reducing transmission speed. This results in wasting already limited available bandwidth on the wireless links. Therefore, there is no use to carry out research on increasing bandwidth of the wireless links until the available bandwidth is not optimally utilized. This paper proposed a hybrid scheme called TCP Detection and Recovery (TCP-DR) to distinguish congestion, corruption and mobility related losses and then instructs the data sending host to take appropriate action. Therefore, the link utilization is optimal while losses are either due to high bit error rate or mobility.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This literature review examines the relationship between traffic lane widths on the safety of road users. It focuses on the impacts of lane widths on motor vehicle behaviour and cyclists’ safety. The review commenced with a search of available databases. Peer reviewed articles and road authority reports were reviewed, as well as current engineering guidelines. Research shows that traffic lane width influences drivers’ perceived difficulty of the task, risk perception and possibly speed choices. Total roadway width, and the presence of onroad cycling facilities, influence cyclists’ positioning on the road. Lateral displacement between bicycles and vehicles is smallest when a marked bicycle facility is present. Reduced motor vehicle speeds can significantly improve the safety of vulnerable road users, particularly pedestrians and cyclists. It has been shown that if road lane widths on urban roads were reduced, through various mechanisms, it could result in a safety environment for all road users.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objectives: The objectives of this study were to specifically investigate the differences in culture, attitudes and social networks between Australian and Taiwanese men and women and identify the factors that predict midlife men and women’s quality of life in both countries. Methods: A stratified random sample strategy based on probability proportional sampling (PPS) was conducted to investigate 278 Australian and 398 Taiwanese midlife men and women’s quality of life. Multiple regression modelling and classification and regression trees (CARTs) were performed to examine the potential differences on culture, attitude, social networks, social demographic factors and religion/spirituality in midlife men and women’s quality of life in both Australia and Taiwan. Results: The results of this study suggest that culture involves multiple functions and interacts with attitudes, social networks and individual factors to influence a person’s quality of life. Significant relationships were found between the interaction between cultural circumstances and a person’s internal and external factors. The research found that good social support networks and a healthy optimistic disposition may significantly enhance midlife men and women’s quality of life. Conclusion: The study indicated that there is a significant relationship between culture, attitude, social networks and quality of life in midlife Australian and Taiwanese men and women. People who had higher levels of horizontal individualism and collectivism, positive attitudes and better social support had better psychological, social, physical and environmental health, while it emerged that vertical individualists with competitive characteristics would experience a lower quality of life. This study has highlighted areas where opportunities exist to further reflect upon contemporary social health policies for Australian and Taiwanese societies and also within the global perspective, in order to provide enhanced quality care for growing midlife populations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports the distribution of Polycyclic Aromatic Hydrocarbons (PAHs) in wash-off in urban stormwater in Gold Coast, Australia. Runoff samples collected from residential, industrial and commercial sites were separated into a dissolved fraction (<0.45µm), and three particulate fractions (0.45-75µm, 75-150µm and >150µm). Patterns in the distribution of PAHs in the fractions were investigated using Principal Component Analysis. Regardless of the land use and particle size fraction characteristics, the presence of organic carbon plays a dominant role in the distribution of PAHs. The PAHs concentrations were also found to decrease with rainfall duration. Generally, the 1- and 2-year average recurrence interval rainfall events were associated with the majority of the PAHs and the wash-off was a source limiting process. In the context of stormwater quality mitigation, targeting the initial part of the rainfall event is the most effective treatment strategy. The implications of the study results for urban stormwater quality management are also discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper discusses the outcomes of a research project on nutrients build-up on urban road surfaces. Nutrient build-up was investigated on road sites belonging to residential, industrial and commercial land use. Collected build-up samples were separated into five particle size ranges and were tested for total nitrogen (TN), total phosphorus (TP) and sub species of nutrients, namely, NO2-, NO3-, TKN and PO43-. Multivariate analytical techniques were used to analyse the data and to develop detailed understanding on build-up. Data analysis revealed that the solids loads on urban road surfaces are highly influenced by factors such as land use, antecedent dry period and traffic volume. However, the nutrient build-up process was found to be independent of the type of land use. It was solely dependent on the particle size of solids build-up. Most of the nutrients were associated with the particle size range <150 μm. Therefore, the removal of particles below 150 µm from road surfaces is of importance for the removal of nitrogen and phosphorus from road surface solids build-up. It is also important to consider the differences in the composition of nitrogen and phosphorus build-up in the context of designing effective stormwater quality mitigation strategies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: This study examined the quality of life (QOL), measured by the Functional Assessment of Cancer Therapy (FACT) questionnaire, among urban (n=277) and non-urban (n=323) breast cancer survivors and women from the general population (n=1140) in Queensland, Australia. ---------- Methods: Population-based samples of breast cancer survivors aged <75 years who were 12 months post-diagnosis and similarly-aged women from the general population were recruited between 2002 and 2007. ---------- Results: Age-adjusted QOL among urban and non-urban breast cancer survivors was similar, although QOL related to breast cancer concerns was the weakest domain and was lower among non-urban survivors than their urban counterparts (36.8 versus 40.4, P<0.01). Irrespective of residence, breast cancer survivors, on average, reported comparable scores on most QOL scales as their general population peers, although physical well-being was significantly lower among non-urban survivors (versus the general population, P<0.01). Overall, around 20%-33% of survivors experienced lower QOL than peers without the disease. The odds of reporting QOL below normative levels were increased more than two-fold for those who experienced complications following surgery, reported upper-body problems, had higher perceived stress levels and/or a poor perception of handling stress (P<0.01 for all). ---------- Conclusions: Results can be used to identify subgroups of women at risk of low QOL and to inform components of tailored recovery interventions to optimize QOL for these women following cancer treatment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We describe the design and implementation of a public-key platform, secFleck, based on a commodity Trusted Platform Module (TPM) chip that extends the capability of a standard node. Unlike previous software public-key implementations this approach provides E- Commerce grade security; is computationally fast, energy efficient; and has low financial cost — all essential attributes for secure large-scale sen- sor networks. We describe the secFleck message security services such as confidentiality, authenticity and integrity, and present performance re- sults including computation time, energy consumption and cost. This is followed by examples, built on secFleck, of symmetric key management, secure RPC and secure software update.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article presents the design and implementation of a trusted sensor node that provides Internet-grade security at low system cost. We describe trustedFleck, which uses a commodity Trusted Platform Module (TPM) chip to extend the capabilities of a standard wireless sensor node to provide security services such as message integrity, confidentiality, authenticity, and system integrity based on RSA public-key and XTEA-based symmetric-key cryptography. In addition trustedFleck provides secure storage of private keys and provides platform configuration registers (PCRs) to store system configurations and detect code tampering. We analyze system performance using metrics that are important for WSN applications such as computation time, memory size, energy consumption and cost. Our results show that trustedFleck significantly outperforms previous approaches (e.g., TinyECC) in terms of these metrics while providing stronger security levels. Finally, we describe a number of examples, built on trustedFleck, of symmetric key management, secure RPC, secure software update, and remote attestation.