398 resultados para Monarchical Schemes
Resumo:
Dispute resolution in strata schemes in Peninsular Malaysia should focus on more than just "settlement." The quality of the outcome, its sustainability and its relevance in supporting the basic principles of a good neighbourhood and self-governance in a strata scheme are also fundamental. Based on the comprehensive law movement, this thesis develops a theoretical framework for strata scheme disputes within the parameters of therapeutic jurisprudence, preventive law, alternative dispute resolution (ADR) and problem-solving courts. The therapeutic orientation of this model offers approaches that promote positive communication between disputing parties, preserve neighbour relations and optimise people's psychological and emotional well-being.
Resumo:
An increasing number of countries are faced with an aging population increasingly needing healthcare services. For any e-health information system, the need for increased trust by such clients with potentially little knowledge of any security scheme involved is paramount. In addition notable scalability of any system has become a critical aspect of system design, development and ongoing management. Meanwhile cryptographic systems provide the security provisions needed for confidentiality, authentication, integrity and non-repudiation. Cryptographic key management, however, must be secure, yet efficient and effective in developing an attitude of trust in system users. Digital certificate-based Public Key Infrastructure has long been the technology of choice or availability for information security/assurance; however, there appears to be a notable lack of successful implementations and deployments globally. Moreover, recent issues with associated Certificate Authority security have damaged trust in these schemes. This paper proposes the adoption of a centralised public key registry structure, a non-certificate based scheme, for large scale e-health information systems. The proposed structure removes complex certificate management, revocation and a complex certificate validation structure while maintaining overall system security. Moreover, the registry concept may be easier for both healthcare professionals and patients to understand and trust.
Resumo:
As the biggest expo site in history, construction of the Shanghai Expo site faced a lot of challenges, including involvement of lots of investors, megaconstruction scale, concurrent construction mode, involvement of more than 40,000 migrant workers, and extremely tight completion deadlines, among others. Consequently, these challenges imposed great obstacles on accomplishing the safety, quality, and environmental goals. Through a case study of the Shanghai Expo construction, this paper paper presents the design and implementation of multicriteria incentives in megaprojects to accomplish the safety, quality, and environmental goals. Both quantitative and qualitative findings were triangulated to demonstrate the outcome of the incentives. Six critical success factors (CSFs) for the incentives, rule design, process orientation, top management support, training and promotion, communication in process, and process learning and improvement are identified and validated through case study data and content analysis. It is believed that the findings of this paper can enhance understanding of multicriteria incentive schemes in general and provide insights in implementing these incentive schemes in future megaprojects, particularly in the People’s Republic of China (PRC).
Resumo:
The primary motivation for signcryption was the gain in efficiency when both encryption and signing need to be performed. These two cryptographic operations may be done sequentially either by first encrypt and then sign (EtS) or alternatively, by first sign and then encrypt (StE). Further gains in efficiency can be achieved if encryption and signature are carried out in parallel (E&S). More importantly, however, is that these efficiency gains are complemented by gains in security, i.e., we may use relative weak encryption and signature schemes in order to obtain a “stronger” signcryption scheme. The reader is referred to Chaps. 2 and 3 for a discussion of the different “strengths” of security model (e.g., outsider vs. insider adversaries, two-user vs. multi-user setting).
Resumo:
In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.
Resumo:
This paper presents ongoing work toward constructing efficient completely non-malleable public-key encryption scheme based on lattices in the standard (common reference string) model. An encryption scheme is completely non-malleable if it requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti proposed two inefficient constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Recently, two efficient public-key encryption schemes have been proposed, both of them are based on pairing identity-based encryption.
Resumo:
Living City 2013 Workshop, as part of a school term’s design-based curriculum connected to the KGSC/QUT Design Excellence Program and run from 11 February – 1 May, 2013, was essentially a three-day place-based urban design immersion workshop program for 25 Year 11 Visual Art and Design Students and 2 Teachers from Kelvin Grove State College (KGSC) held at both Queensland University of Technology (QUT) Gardens Point Campus and The Edge, State Library of Queensland. Mentored by 4 design professionals, 2 tertiary design academics, 2 public artists, and 12 QUT tertiary design students, the workshop explored youth-inspired public space design solutions for the active Brisbane City Council redevelopment site of Queens Wharf Road precinct. As well as the face-to-face workshops, for Living City 2013, an interactive web environment was introduced to enable students to connect with each other and program mentors throughout the course of the program. The workshop, framed within notions of ecological, economic, social and cultural sustainability, aimed to raise awareness of the layered complexity and perspectives involved in the design of shared city spaces and to encourage young people to voice their own concerns as future citizens about the shape and direction of their city. The program commenced with an introductory student briefing by stakeholders and mentors at KGSC on 11 February, an introduction to site appraisal and site visit held at QUT and Queens Wharf Road on 20 February, and a follow up site analysis session on 6 March. Day 1 Workshop on April 17 at the Edge, State Library of Queensland, as part of the Design Minds partnership (http://designminds.org.au/kelvin-grove-state-college-excellence-in-art-design/), focused on mentoring team development of a concept design for a range of selected sites. Two workshops on April 22 and 23 at QUT, to develop these designs and presentation schemes, followed this. The workshop program culminated in a visual presentation of concept design ideas and discussion with a public audience in the Ideas Gallery on The Deck, King George Square during the Brisbane City Council City Centre Master Plan Ideas Fiesta on 1 May, 2013, as referenced in the Ideas Fiesta Wrap-up Report (http://www.brisbane.qld.gov.au/planning-building/planning-guidelines-tools/city-centre-master-plan/city-centre-master-plan-ideas-fiesta). Students were introduced to design methodology, team thinking strategies, the scope of design practices and professions, presentation skills and post-secondary pathways, while participating teachers acquired content and design learning strategies transferable in many other contexts. The program was fully documented on the Living City website (http://www.livingcity.net.au/LC2013x/index.html) and has been recognised by the Brisbane City Council Youth Strategy 2014-2019 as a best practice model for making Brisbane a well-designed, subtropical city.
Resumo:
There has been tremendous interest in watermarking multimedia content during the past two decades, mainly for proving ownership and detecting tamper. Digital fingerprinting, that deals with identifying malicious user(s), has also received significant attention. While extensive work has been carried out in watermarking of images, other multimedia objects still have enormous research potential. Watermarking database relations is one of the several areas which demand research focus owing to the commercial implications of database theft. Recently, there has been little progress in database watermarking, with most of the watermarking schemes modeled after the irreversible database watermarking scheme proposed by Agrawal and Kiernan. Reversibility is the ability to re-generate the original (unmarked) relation from the watermarked relation using a secret key. As explained in our paper, reversible watermarking schemes provide greater security against secondary watermarking attacks, where an attacker watermarks an already marked relation in an attempt to erase the original watermark. This paper proposes an improvement over the reversible and blind watermarking scheme presented in [5], identifying and eliminating a critical problem with the previous model. Experiments showing that the average watermark detection rate is around 91% even with attacker distorting half of the attributes. The current scheme provides security against secondary watermarking attacks.
Resumo:
Modern copyright law is based on the inescapable assumption that users, given the choice, will free-ride rather than pay for access. In fact, many consumers of cultural works – music, books, films, games, and other works – fundamentally want to support their production. It turns out that humans are motivated to support cultural production not only by extrinsic incentives, but also by social norms of fairness and reciprocity. This article explains how producers across the creative industries have used this insight to develop increasingly sophisticated business models that rely on voluntary payments (including pay-what-you-want schemes) to fund their costs of production. The recognition that users are not always free-riders suggests that current policy approaches to copyright are fundamentally flawed. Because social norms are so important in consumer motivations, the perceived unfairness of the current copyright system undermines the willingness of people to pay for access to cultural goods. While recent copyright reform debate has focused on creating stronger deterrence through enforcement, increasing the perceived fairness and legitimacy of copyright law is likely to be much more effective. The fact that users will sometimes willingly support cultural production also challenges the economic raison d'être of copyright law. This article demonstrates how 'peaceful revolutions' are flipping conventional copyright models and encouraging free-riding through combining incentives and prosocial norms. Because they provide a means to support production without limiting the dissemination of knowledge and culture, there is good reason to believe that these commons-based systems of cultural production can be more efficient, more fair, and more conducive to human flourishing than conventional copyright systems. This article explains what we know about free-riding so far and what work remains to be done to understand the viability and importance of cooperative systems in funding cultural production.
Resumo:
Global climate change is one of the most significant environmental issues that can harm human development. One central issue for the building and construction industry to address global climate change is the development of a credible and meaningful way to measure greenhouse gas (GHG) emissions. While Publicly Available Specification (PAS) 2050, the first international GHG standard, has been proven to be successful in standardizing the quantification process, its contribution to the management of carbon labels for construction materials is limited. With the recent publication of ISO 14067: Greenhouse gases – carbon footprint of products – requirements and guidelines for quantification and communication in May 2013, it is necessary for the building and construction industry to understand the past, present and future of the carbon labelling practices for construction materials. A systematic review shows that international GHG standards have been evolving in terms of providing additional guidance on communication and comparison, as well as less flexibility on the use of carbon labels. At the same time, carbon labelling schemes have been evolving on standardization and benchmarking. In addition, future actions are needed in the aspect of raising consumer awareness, providing benchmarking, ensuring standardization and developing simulation technologies in order for carbon labelling schemes for construction materials to provide credible, accurate and transparent information on GHG emissions.
Resumo:
We investigate the utility to computational Bayesian analyses of a particular family of recursive marginal likelihood estimators characterized by the (equivalent) algorithms known as "biased sampling" or "reverse logistic regression" in the statistics literature and "the density of states" in physics. Through a pair of numerical examples (including mixture modeling of the well-known galaxy dataset) we highlight the remarkable diversity of sampling schemes amenable to such recursive normalization, as well as the notable efficiency of the resulting pseudo-mixture distributions for gauging prior-sensitivity in the Bayesian model selection context. Our key theoretical contributions are to introduce a novel heuristic ("thermodynamic integration via importance sampling") for qualifying the role of the bridging sequence in this procedure, and to reveal various connections between these recursive estimators and the nested sampling technique.
Resumo:
Road construction, maintenance and operation are activities that impact the environment by way of energy use, resource consumption and emission. Components such as construction material, transportation, street lighting, rolling resistance, traffic congestion during works, albedo and end-of-life processing impact the environment at different phases of the life of a road. With a view to promote sustainable development, a few sustainability rating schemes, e.g. Infrastructure Sustainability and Invest (Australia), Envision and Greenroads (USA), and CEEQUAL (UK) have been developed, that can assess road projects. These schemes address environmental areas such as: energy and emission, land, water, materials, discharges into surroundings, waste and ecology as factors for sustainable development. This paper assesses different rating schemes based on a defined comprehensive life cycle assessment (LCA) system boundary for road projects to identify different environmental indicators that address sustainable road development and operation. The findings indicate that new indicators are required to address different environmental components during the operation phase of roads.
Resumo:
A defining characteristic of contemporary welfare governance in many western countries has been a reduced role for governments in direct provision of welfare, including housing, education, health and income support. One of the unintended consequences of devolutionary trends in social welfare is the development of a ‘shadow welfare state’ (Fairbanks, 2009; Gottschalk, 2000), which is a term used to describe the complex partnerships between statebased social protection, voluntarism and marketised forms of welfare. Coupled with this development, conditional workfare schemes in countries such as the United States, Canada, the UK and Australia are pushing more people into informal and semi-formal means of poverty survival (Karger, 2005). These transformations are actively reshaping welfare subjectivities and the role of the state in urban governance. Like other countries such as the US, Canada and the UK, the fringe lending sector in Australia has experienced considerable growth over the last decade. Large numbers of people on low incomes in Australia are turning to non-mainstream financial services, such as payday lenders, for the provision of credit to make ends meet. In this paper, we argue that the use of fringe lenders by people on low incomes reveals important theoretical and practical insights into the relationship between the mixed economy of welfare and the mixed economy of credit in poverty survival.
Resumo:
Global climate change is one of the most significant environmental impacts at the moment. One central issue for the building and construction industry to address global climate change is the development of credible carbon labelling schemes for building materials. Various carbon labelling schemes have been developed for concrete due to its high contribution to global greenhouse gas (GHG) emissions. However, as most carbon labelling schemes adopt cradle-to-gate as system boundary, the credibility of the eco-label information may not be satisfactory because recent studies show that the use and end-of-life phases can have a significant impact on the life cycle GHG emissions of concrete in terms of carbonation, maintenance and rehabilitation, other indirect emissions, and recycling activities. A comprehensive review on the life cycle assessment of concrete is presented to holistically examine the importance of use and end-of-life phases to the life cycle GHG quantification of concrete. The recent published ISO 14067: Carbon footprint of products – requirements and guidelines for quantification and communication also mandates the use of cradle-to-grave to provide publicly available eco-label information when the use and end-of-life phases of concrete can be appropriately simulated. With the support of Building Information Modelling (BIM) and other simulation technologies, the contribution of use and end-of-life phases to the life cycle GHG emissions of concrete should not be overlooked in future studies.
Resumo:
Suspended loads on UAVs can provide significant benefits to several applications in agriculture, law enforcement and construction. The load impact on the underlying system dynamics should not be neglected as significant feedback forces may be induced on the vehicle during certain flight manoeuvres. Much research has focused on standard multi-rotor position and attitude control with and without a slung load. However, predictive control schemes, such as Nonlinear Model Predictive Control (NMPC), have not yet been fully explored. To this end, we present software and flight system architecture to test controller for safe and precise operation of multi-rotors with heavy slung load in three dimensions.