678 resultados para PSC-CUNY Grants


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Given global demand for new infrastructure, governments face substantial challenges in funding new infrastructure and simultaneously delivering Value for Money (VfM). As background to this challenge, a brief review is given of current practice in the selection of major public sector infrastructure in Australia, along with a review of the related literature concerning the Multi-Attribute Utility Approach (MAUA) and the effect of MAUA on the role of risk management in procurement selection. To contribute towards addressing the key weaknesses of MAUA, a new first-order procurement decision making model is mentioned. A brief summary is also given of the research method and hypothesis used to test and develop the new procurement model and which uses competition as the dependent variable and as a proxy for VfM. The hypothesis is given as follows: When the actual procurement mode matches the theoretical/predicted procurement mode (informed by the new procurement model), then actual competition is expected to match optimum competition (based on actual prevailing capacity vis-à-vis the theoretical/predicted procurement mode) and subject to efficient tendering. The aim of this paper is to report on progress towards testing this hypothesis in terms of an analysis of two of the four data components in the hypothesis. That is, actual procurement and actual competition across 87 road and health major public sector projects in Australia. In conclusion, it is noted that the Global Financial Crisis (GFC) has seen a significant increase in competition in public sector major road and health infrastructure and if any imperfections in procurement and/or tendering are discernible, then this would create the opportunity, through the deployment of economic principles embedded in the new procurement model and/or adjustments in tendering, to maintain some of this higher level post-GFC competition throughout the next business cycle/upturn in demand including private sector demand. Finally, the paper previews the next steps in the research with regard to collection and analysis of data concerning theoretical/predicted procurement and optimum competition.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Defence organisations perform information security evaluations to confirm that electronic communications devices are safe to use in security-critical situations. Such evaluations include tracing all possible dataflow paths through the device, but this process is tedious and error-prone, so automated reachability analysis tools are needed to make security evaluations faster and more accurate. Previous research has produced a tool, SIFA, for dataflow analysis of basic digital circuitry, but it cannot analyse dataflow through microprocessors embedded within the circuit since this depends on the software they run. We have developed a static analysis tool that produces SIFA compatible dataflow graphs from embedded microcontroller programs written in C. In this paper we present a case study which shows how this new capability supports combined hardware and software dataflow analyses of a security critical communications device.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Data flow analysis techniques can be used to help assess threats to data confidentiality and integrity in security critical program code. However, a fundamental weakness of static analysis techniques is that they overestimate the ways in which data may propagate at run time. Discounting large numbers of these false-positive data flow paths wastes an information security evaluator's time and effort. Here we show how to automatically eliminate some false-positive data flow paths by precisely modelling how classified data is blocked by certain expressions in embedded C code. We present a library of detailed data flow models of individual expression elements and an algorithm for introducing these components into conventional data flow graphs. The resulting models can be used to accurately trace byte-level or even bit-level data flow through expressions that are normally treated as atomic. This allows us to identify expressions that safely downgrade their classified inputs and thereby eliminate false-positive data flow paths from the security evaluation process. To validate the approach we have implemented and tested it in an existing data flow analysis toolkit.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article presents a novel approach to confidentiality violation detection based on taint marking. Information flows are dynamically tracked between applications and objects of the operating system such as files, processes and sockets. A confidentiality policy is defined by labelling sensitive information and defining which information may leave the local system through network exchanges. Furthermore, per application profiles can be defined to restrict the sets of information each application may access and/or send through the network. In previous works, we focused on the use of mandatory access control mechanisms for information flow tracking. In this current work, we have extended the previous information flow model to track network exchanges, and we are able to define a policy attached to network sockets. We show an example application of this extension in the context of a compromised web browser: our implementation detects a confidentiality violation when the browser attempts to leak private information to a remote host over the network.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The world’s increasing complexity, competitiveness, interconnectivity, and dependence on technology generate new challenges for nations and individuals that cannot be met by continuing education as usual (Katehi, Pearson, & Feder, 2009). With the proliferation of complex systems have come new technologies for communication, collaboration, and conceptualisation. These technologies have led to significant changes in the forms of mathematical and scientific thinking that are required beyond the classroom. Modelling, in its various forms, can develop and broaden children’s mathematical and scientific thinking beyond the standard curriculum. This paper first considers future competencies in the mathematical sciences within an increasingly complex world. Next, consideration is given to interdisciplinary problem solving and models and modelling. Examples of complex, interdisciplinary modelling activities across grades are presented, with data modelling in 1st grade, model-eliciting in 4th grade, and engineering-based modelling in 7th-9th grades.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Volatile properties of particle emissions from four compressed natural gas (CNG) and four diesel buses were investigated under steady state and transient driving modes on a chassis dynamometer. The exhaust was diluted utilising a full-flow continuous volume sampling system and passed through a thermodenuder at controlled temperature. Particle number concentration and size distribution were measured with a condensation particle counter and a scanning mobility particle sizer, respectively. We show that, while almost all the particles emitted by the CNG buses were in the nanoparticle size range, at least 85% and 98% were removed at 100ºC and 250ºC, respectively. Closer analysis of the volatility of particles emitted during transient cycles showed that volatilisation began at around 40°C with the majority occurring by 80°C. Particles produced during hard acceleration from rest exhibited lower volatility than that produced during other times of the cycle. Based on our results and the observation of ash deposits on the walls of the tailpipes, we suggest that these non-volatile particles were composed mostly of ash from lubricating oil. Heating the diesel bus emissions to 100ºC removed ultrafine particle numbers by 69% to 82% when a nucleation mode was present and just 18% when it was not.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Organisations within the not-for-profit sector provide services to individuals and groups that government and for-profit organisations cannot or will not consider. The not-for-profit sector has come to be a vibrant and rich agglomeration of services and programs that operate under a myriad of philosophical stances, service orientation, client groupings and operational capacities. In Australia these organisations and services are providing social support and service assistance to many people in the community; often targeting their assistance to the most difficult of clients. Initially, in undertaking this role, the not-for-profit sector received limited sponsorship from government. Over time governments assumed greater responsibility in the form of service grants to particular groups: ‘the worthy poor’. More recently, they have entered into contractual service agreements with the not-for-profit sector, which specify the nature of the outcomes to be achieved and, to a degree, the way in which the services will be provided. A consequence of this growing shift to a more marketised model of service contracting, often offered-up under the label of enhanced collaborative practice, has been increased competitiveness between agencies that had previously worked well together (Keast and Brown, 2006). Another trend emerging from the market approach is the entrance of for-profit providers. These larger organisations have higher levels of organisational capacity with considerable organisational slack to allow them to adopt new service roles. Shaped almost as ‘shadow governments’ they appear to be a strong preference for governments looking for greater accountability of outcomes and an easier way to control the interaction with the conventional not-for-profit sector. The question is will governments’ apparent preference for larger organisational arrangements lead to the demise of the vibrancy of the not-for-profit sector and impact on service provision to those people who fall outside of the remit of the new service providers? To address this issue, this paper uses information gleaned from a state-wide survey of not-for-profit organisations in Queensland, Australia which included organisational size, operational scope, funding arrangements and governance/management approaches. Supplementing this information is qualitative data derived from 17 focus groups and 120 interviews conducted over ten years of study of this sector. The findings contribute to greater understanding of the practice and theory of the future provision of social services.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Airports worldwide represent key forms of critical infrastructure in addition to serving as nodes in the international aviation network. While the continued operation of airports is critical to the functioning of reliable air passenger and freight transportation, these infrastructure systems face a number of sources of disturbance that threaten their operational viability. Recent examples of high magnitude events include the eruption of Iceland’s Eyjafjallajokull volcano eruption (Folattau and Schofield 2010), the failure of multiple systems at the opening of Heathrow’s Terminal 5 (Brady and Davies 2010) and the Glasgow airport 2007 terrorist attack (Crichton 2008). While these newsworthy events do occur, a multitude of lower-level more common disturbances also have the potential to cause significant discontinuity to airport operations. Regional airports face a unique set of challenges, particularly in a nation like Australia where they serve to link otherwise remote and isolated communities to metropolitan hubs (Wheeler 2005), often without the resources and political attention received by larger capital city airports. This paper discusses conceptual relationships between Business Continuity Management (BCM) and High Reliability Theory, and proposes BCM as an appropriate risk-based management process to ensure continued airport operation in the face of uncertainty. In addition, it argues that that correctly implemented BCM can lead to highly reliable organisations. This is framed within the broader context of critical infrastructures and the need for adequate crisis management approaches suited to their unique requirements (Boin and McConnell 2007).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes a vision-based airborne collision avoidance system developed by the Australian Research Centre for Aerospace Automation (ARCAA) under its Dynamic Sense-and-Act (DSA) program. We outline the system architecture and the flight testing undertaken to validate the system performance under realistic collision course scenarios. The proposed system could be implemented in either manned or unmanned aircraft, and represents a step forward in the development of a “sense-and-avoid” capability equivalent to human “see-and-avoid”.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

To identify microRNAs potentially involved in melanomagenesis, we compared microRNA expression profiles between melanoma cell lines and cultured melanocytes. The most differentially expressed microRNA between the normal and tumor cell lines was miR-211. We focused on this pigment-cell-enriched miRNA as it is derived from the microphthalmia-associated transcription factor (MITF)-regulated gene, TRPM1 (melastatin). We find that miR-211 expression is greatly decreased in melanoma cells and melanoblasts compared to melanocytes. Bioinformatic analysis identified a large number of potential targets of miR-211, including POU3F2 (BRN2). Inhibition of miR-211 in normal melanocytes resulted in increased BRN2 protein, indicating that endogenous miR-211 represses BRN2 in differentiated cells. Over-expression of miR-211 in melanoma cell lines changed the invasive potential of the cells in vitro through directly targeting BRN2 translation. We propose a model for the apparent non-overlapping expression levels of BRN2 and MITF in melanoma, mediated by miR-211 expression.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Variants of the same process can be encountered within one organization or across different organizations. For example, different municipalities, courts, and rental agencies all need to support highly similar processes. In fact, procurement and sales processes can be found in almost any organization. However, despite these similarities, there is also the need to allow for local variations in a controlled manner. Therefore, many academics and practitioners have advocated the use of configurable process models (sometimes referred to as reference models). A configurable process model describes a family of similar process models in a given domain. Such a model can be configured to obtain a specific process model that is subsequently used to handle individual cases, for instance, to process customer orders. Process configuration is notoriously difficult as there may be all kinds of interdependencies between configuration decisions. In fact, an incorrect configuration may lead to behavioral issues such as deadlocks and livelocks. To address this problem, we present a novel verification approach inspired by the “operating guidelines” used for partner synthesis. We view the configuration process as an external service, and compute a characterization of all such services which meet particular requirements via the notion of configuration guideline. As a result, we can characterize all feasible configurations (i. e., configurations without behavioral problems) at design time, instead of repeatedly checking each individual configuration while configuring a process model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Exercise interventions during adjuvant cancer therapy have been shown to increase functional capacity, relieve fatigue and distress and may assist rates of chemotherapy completion. These studies have been limited to breast, gastric and mixed cancer groups and it is not yet known if a similar intervention is even feasible among women with ovarian cancer. We aimed to assess safety, feasibility and potential effect of a walking intervention in women undergoing chemotherapy for ovarian cancer. Methods: Women newly diagnosed with ovarian cancer were recruited to participate in an individualised walking intervention throughout chemotherapy and were assessed pre-and post-intervention. Feasibility measures included session adherence, compliance with exercise physiologist prescribed walking targets and self-reported program acceptability. Changes in objective physical functioning (6 minute walk test), self-reported distress (Hospital Anxiety and Depression Scale), symptoms (Memorial Symptom Assessment Scale - Physical) and quality of life (Functional Assessment of Cancer Therapy - Ovarian) were calculated, and chemotherapy completion and adverse intervention effects recorded. Results: Seventeen women were enrolled (63% recruitment rate). Mean age was 60 years (SD = 8 years), 88% were diagnosed with FIGO stage III or IV disease, 14 women underwent adjuvant and three neo-adjuvant chemotherapy. On average, women adhered to > 80% of their intervention sessions and complied with 76% of their walking targets, with the majority walking four days a week at moderate intensity for 30 minutes per session. Meaningful improvements were found in physical functioning, physical symptoms, physical well-being and ovarian cancerspecific quality of life. Most women (76%) completed ≥85% of their planned chemotherapy dose. There were no withdrawals or serious adverse events and all women reported the program as being helpful. Conclusions: These positive preliminary results suggest that this walking intervention for women receiving chemotherapy for ovarian cancer is safe, feasible and acceptable and could be used in development of future work. Trial registration: ACTRN12609000252213

Relevância:

10.00% 10.00%

Publicador:

Resumo:

How bloggers and other independent online commentators criticise, correct, and otherwise challenge conventional journalism has been known for years, but has yet to be fully accepted by journalists; hostilities between the media establishment and the new generation of citizen journalists continue to flare up from time to time. The old gatekeeping monopoly of the mass media has been challenged by the new practice of gatewatching: by individual bloggers and by communities of commentators which may not report the news first-hand, but curate and evaluate the news and other information provided by official sources, and thus provide an important service. And this now takes place ever more rapidly, almost in real time: using the latest social networks, which disseminate, share, comment, question, and debunk news reports within minutes, and using additional platforms that enable fast and effective ad hoc collaboration between users. When hundreds of volunteers can prove within a few days that a German minister has been guilty of serious plagiarism, when the world first learns of earthquakes and tsunamis via Twitter – how does journalism manage to keep up?