126 resultados para Resilient
Resumo:
The perceived desirability of water views continues to lead to increasing numbers relocating to coastal regions. Proximity to coastal water brings with it unique risks from rising sea levels; however, water can present a risk in any area, whether or not you have water views. Recent Australian and international disasters show that even inland populations not located in traditional flood areas are not immune from water risks. The author examines the nature of these risks and shows how the internet can be used as a tool in identifying risk areas. The author also highlights the need to ensure accuracy of the data for valuation and planning purposes and identifies flaws in the current data provision.
Resumo:
Long-term autonomy in robotics requires perception systems that are resilient to unusual but realistic conditions that will eventually occur during extended missions. For example, unmanned ground vehicles (UGVs) need to be capable of operating safely in adverse and low-visibility conditions, such as at night or in the presence of smoke. The key to a resilient UGV perception system lies in the use of multiple sensor modalities, e.g., operating at different frequencies of the electromagnetic spectrum, to compensate for the limitations of a single sensor type. In this paper, visual and infrared imaging are combined in a Visual-SLAM algorithm to achieve localization. We propose to evaluate the quality of data provided by each sensor modality prior to data combination. This evaluation is used to discard low-quality data, i.e., data most likely to induce large localization errors. In this way, perceptual failures are anticipated and mitigated. An extensive experimental evaluation is conducted on data sets collected with a UGV in a range of environments and adverse conditions, including the presence of smoke (obstructing the visual camera), fire, extreme heat (saturating the infrared camera), low-light conditions (dusk), and at night with sudden variations of artificial light. A total of 240 trajectory estimates are obtained using five different variations of data sources and data combination strategies in the localization method. In particular, the proposed approach for selective data combination is compared to methods using a single sensor type or combining both modalities without preselection. We show that the proposed framework allows for camera-based localization resilient to a large range of low-visibility conditions.
Resumo:
This paper presents an approach to promote the integrity of perception systems for outdoor unmanned ground vehicles (UGV) operating in challenging environmental conditions (presence of dust or smoke). The proposed technique automatically evaluates the consistency of the data provided by two sensing modalities: a 2D laser range finder and a millimetre-wave radar, allowing for perceptual failure mitigation. Experimental results, obtained with a UGV operating in rural environments, and an error analysis validate the approach.
Resumo:
This paper proposes an approach to achieve resilient navigation for indoor mobile robots. Resilient navigation seeks to mitigate the impact of control, localisation, or map errors on the safety of the platform while enforcing the robot’s ability to achieve its goal. We show that resilience to unpredictable errors can be achieved by combining the benefits of independent and complementary algorithmic approaches to navigation, or modalities, each tuned to a particular type of environment or situation. In this paper, the modalities comprise a path planning method and a reactive motion strategy. While the robot navigates, a Hidden Markov Model continually estimates the most appropriate modality based on two types of information: context (information known a priori) and monitoring (evaluating unpredictable aspects of the current situation). The robot then uses the recommended modality, switching between one and another dynamically. Experimental validation with a SegwayRMP- based platform in an office environment shows that our approach enables failure mitigation while maintaining the safety of the platform. The robot is shown to reach its goal in the presence of: 1) unpredicted control errors, 2) unexpected map errors and 3) a large injected localisation fault.
Resumo:
There has been tremendous interest in watermarking multimedia content during the past two decades, mainly for proving ownership and detecting tamper. Digital fingerprinting, that deals with identifying malicious user(s), has also received significant attention. While extensive work has been carried out in watermarking of images, other multimedia objects still have enormous research potential. Watermarking database relations is one of the several areas which demand research focus owing to the commercial implications of database theft. Recently, there has been little progress in database watermarking, with most of the watermarking schemes modeled after the irreversible database watermarking scheme proposed by Agrawal and Kiernan. Reversibility is the ability to re-generate the original (unmarked) relation from the watermarked relation using a secret key. As explained in our paper, reversible watermarking schemes provide greater security against secondary watermarking attacks, where an attacker watermarks an already marked relation in an attempt to erase the original watermark. This paper proposes an improvement over the reversible and blind watermarking scheme presented in [5], identifying and eliminating a critical problem with the previous model. Experiments showing that the average watermark detection rate is around 91% even with attacker distorting half of the attributes. The current scheme provides security against secondary watermarking attacks.
Resumo:
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys. In this work, we advance the modelling of AKE protocols by considering more granular, continuous leakage of long-term secrets of protocol participants: the adversary can adaptively request arbitrary leakage of long-term secrets even after the test session is activated, with limits on the amount of leakage per query but no bounds on the total leakage. We present a security model supporting continuous leakage even when the adversary learns certain ephemeral secrets or session keys, and give a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the model; our protocol achieves continuous, after-the-fact leakage resilience with not much more cost than a previous protocol with only bounded, non-after-the-fact leakage.
Resumo:
In a conventional ac motor drive using field-oriented control, a dc-link voltage, speed, and at least two current sensors are required. Hence, in the event of sensor failure, the performance of the drive system can be severely compromised. This paper presents a sensor fault-tolerant control strategy for interior permanent-magnet synchronous motor (IPMSM) drives. Three independent observers are proposed to estimate the speed, dc-link voltage, and currents of the machine. If a sensor fault is detected, the drive system isolates the faulty sensor while retaining the remaining functional ones. The signal is then acquired from the corresponding observer in order to maintain the operation of the drive system. The experimental results provided verify the effectiveness of the proposed approach.
Resumo:
In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The software watermarking model is based on replacing jump instructions or unconditional branch statements (UBS) by calls to a fingerprint branch function (FBF) that computes the correct target address of the UBS as a function of the generated fingerprint and integrity check. If the program is tampered with, the fingerprint and/or integrity checks change and the target address is not computed correctly. Gupta and Pieprzyk's attack uses debugger capabilities such as register and address lookup and breakpoints to minimize the requirement to manually inspect the software. Using these resources, the FBF and calls to the same is identified, correct displacement values are generated and calls to FBF are replaced by the original UBS transferring control of the attack to the correct target instruction. In this paper, we propose a watermarking model that provides security against such debugging attacks. Two primary measures taken are shifting the stack pointer modification operation from the FBF to the individual UBSs, and coding the stack pointer modification in the same language as that of the rest of the code rather than assembly language to avoid conspicuous contents. The manual component complexity increases from O(1) in the previous scheme to O(n) in our proposed scheme.
Resumo:
Urban public space in Australia and internationally, can be critically examined from a number of multidisciplinary standpoints, including human geography, urban design, planning, sociology, and public health. Viewing urban public space from a range of perspectives encourages different vantage points to emerge and questions around health, wellbeing and public space are increasingly topical and important in the broadest of terms, with public space being a key arena for physical activity, mental health, commercial, cultural and community life and the possibility of social inclusion. However, in the name of urban regeneration, programs of securitisation, ‘gentrification’ ‘creative’ and ‘smart’ city initiatives refashion public space as sites of selective inclusion and exclusion (Watson 2005; Gabrys 2014). In this context of monitoring and control procedures, in particular, children and young people’s use of space in parks, neighbourhoods, shopping malls and streets, is often viewed as a threat to social order, requiring various forms of remedial action, such as being ‘designed out’ of public space (Johnson 2014). Rarely are children and young people actively and respectfully brought into planning and governance processes and consequently many urban public spaces are essentially adult places, where control and ongoing surveillance are the key concerns (Freeman 2011, Dee 2013). There is also a political economy of public space discernable in cities like Brisbane, where ‘flagship’ infrastructure such as road tunnels take pride of place, while more humbly appointed pedestrian footpaths are often narrow, in a poor state of repair and a potential barrier to good health (Atkinson and Easthope 2009). The recent development of bikeways in Brisbane is a case in point, presenting both challenges and opportunities in being a valuable new form of public space heavily used by ‘commuter cyclists’ by day, but poorly lit and conceived, for a range of users at other times (Wyeth 2014). This paper concentrates on questions of social citizenship rights and discourses of health and wellbeing and suggests that cities, places and spaces and those who seek to use them, can be resilient in maintaining and extending democratic freedoms, calling surveillance, planning and governance systems to account (Smith 2014). The active inclusion of children and young people better informs the implementation of public policy around the design, build and governance of public space and also understandings of urban citizenship, leading to healthier, more inclusive, public space for all (Jacobs 1965).
Resumo:
Aim: To examine evidence-based strategies that motivate appropriate action and increase informed decision-making during the response and recovery phases of disasters.
Resumo:
The Echology: Making Sense of Data initiative seeks to break new ground in arts practice by asking artists to innovate with respect to a) the possible forms of data representation in public art and b) the artist's role in engaging publics on environmental sustainability in new urban developments. Initiated by ANAT and Carbon Arts in 2011, Echology has seen three artists selected by National competition in 2012 for Lend Lease sites across Australia. In 2013 commissioning of one of these works, the Mussel Choir by Natalie Jeremijenko, began in Melbourne's Victoria Harbour development. This emerging practice of data - driven and environmentally engaged public artwork presents multiple challenges to established systems of public arts production and management, at the same time as offering up new avenues for artists to forge new modes of collaboration. The experience of Echology and in particular, the Mussel Choir is examined here to reveal opportunities for expansion of this practice through identification of the factors that lead to a resilient 'ecology of part nership' between stakeholders that include science and technology researchers, education providers, city administrators, and urban developers.
Resumo:
In pavement design, resilient modulus of a pavement material is one of the key design parameters. Resilient modulus of a granular pavement material can be measured using repeated load Triaxial (RLT) test or estimated using empirical models. For conventional granular pavement materials, a significant amount of resilient modulus data and empirical models to estimate this key design parameter are available. However, RCA is a relatively new granular pavement material and therefore no such data or empirical models are available. In this study, a number of RLT tests were conducted on RCA sample to investigate the effects of moisture content on its resilient modulus (Mr). It was observed that the resilient modulus of RCA increased with a number of loading cycles but decreased as the moisture content was increased. Further, using RLT test results, empirical models to estimate the resilient modulus of RCA were enhanced and validated.
Resumo:
The past decade has seen an increase in the occurrence of natural hazards and the experience in Australia has led to a reconsideration of the planning for natural hazards by government and to the adoption of a whole-of-nation resilience-based approach to disaster management. A key component of creating community resilience is the integration of disaster management with government and community strategic planning in relation to the social, built, economic and natural environments. Joint responsibility of government and the community for ‘land use planning systems and building control arrangements [which] reduce, as far as is practicable, community exposure to unreasonable risks from known hazards’, is a critical element of a resilient community. As the responsibility for the implementation of land use planning policies in Australia is generally with local governments, this paper will examine whether, in light of improved predictive technology, the failure of a local government to adequately foresee and make provision for a known hazard will give rise to liability for damage or loss of property caused by that hazard.
Resumo:
Our aim is to examine evidence-based strategies to motivate appropriate action and increase informed decision-making during the response and recovery phases of disasters. We combine expertise in communication, consumer psychology and marketing, disaster and emergency management, and law. This poster presents findings from a social media work package, and preliminary findings from the focus group work package on emergency warning message comprehension.
Resumo:
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to capture the security of AKE protocols even when the adversary learns certain secret values. Increased granularity of security can be modelled by considering partial leakage of secrets in the manner of models for leakage-resilient cryptography, designed to capture side-channel attacks. In this work, we use the strongest known partial-leakage-based security model for key exchange protocols, namely continuous after-the-fact leakage eCK (CAFL-eCK) model. We resolve an open problem by constructing the first concrete two-pass leakage-resilient key exchange protocol that is secure in the CAFL-eCK model.