730 resultados para pacs: it trainings requirements
Resumo:
The primary goal of the Vehicular Ad Hoc Network (VANET) is to provide real-time safety-related messages to motorists to enhance road safety. Accessing and disseminating safety-related information through the use of wireless communications technology in VANETs should be secured, as motorists may make critical decisions in dealing with an emergency situation based on the received information. If security concerns are not addressed in developing VANET systems, an adversary can tamper with, or suppress, the unprotected message to mislead motorists to cause traffic accidents and hazards. Current research on secure messaging in VANETs focuses on employing the certificate-based Public Key Infrastructure (PKI) scheme to support message encryption and digital signing. The security overhead of such a scheme, however, creates a transmission delay and introduces a time-consuming verification process to VANET communications. This thesis has proposed a novel public key verification and management approach for VANETs; namely, the Public Key Registry (PKR) regime. Compared to the VANET PKI scheme, this new approach can satisfy necessary security requirements with improved performance and scalability, and at a lower cost by reducing the security overheads of message transmission and eliminating digital certificate deployment and maintenance issues. The proposed PKR regime consists of the required infrastructure components, rules for public key management and verification, and a set of interactions and associated behaviours to meet these rule requirements. This is achieved through a system design as a logic process model with functional specifications. The PKR regime can be used as development guidelines for conforming implementations. An analysis and evaluation of the proposed PKR regime includes security features assessment, analysis of the security overhead of message transmission, transmission latency, processing latency, and scalability of the proposed PKR regime. Compared to certificate-based PKI approaches, the proposed PKR regime can maintain the necessary security requirements, significantly reduce the security overhead by approximately 70%, and improve the performance by 98%. Meanwhile, the result of the scalability evaluation shows that the latency of employing the proposed PKR regime stays much lower at approximately 15 milliseconds, whether operating in a huge or small environment. It is therefore believed that this research will create a new dimension to the provision of secure messaging services in VANETs.
Resumo:
In recent years, development of Unmanned Aerial Vehicles (UAV) has become a significant growing segment of the global aviation industry. These vehicles are developed with the intention of operating in regions where the presence of onboard human pilots is either too risky or unnecessary. Their popularity with both the military and civilian sectors have seen the use of UAVs in a diverse range of applications, from reconnaissance and surveillance tasks for the military, to civilian uses such as aid relief and monitoring tasks. Efficient energy utilisation on an UAV is essential to its functioning, often to achieve the operational goals of range, endurance and other specific mission requirements. Due to the limitations of the space available and the mass budget on the UAV, it is often a delicate balance between the onboard energy available (i.e. fuel) and achieving the operational goals. This thesis presents an investigation of methods for increasing the energy efficiency on UAVs. One method is via the development of a Mission Waypoint Optimisation (MWO) procedure for a small fixed-wing UAV, focusing on improving the onboard fuel economy. MWO deals with a pre-specified set of waypoints by modifying the given waypoints within certain limits to achieve its optimisation objectives of minimising/maximising specific parameters. A simulation model of a UAV was developed in the MATLAB Simulink environment, utilising the AeroSim Blockset and the in-built Aerosonde UAV block and its parameters. This simulation model was separately integrated with a multi-objective Evolutionary Algorithm (MOEA) optimiser and a Sequential Quadratic Programming (SQP) solver to perform single-objective and multi-objective optimisation procedures of a set of real-world waypoints in order to minimise the onboard fuel consumption. The results of both procedures show potential in reducing fuel consumption on a UAV in a ight mission. Additionally, a parallel Hybrid-Electric Propulsion System (HEPS) on a small fixedwing UAV incorporating an Ideal Operating Line (IOL) control strategy was developed. An IOL analysis of an Aerosonde engine was performed, and the most efficient (i.e. provides greatest torque output at the least fuel consumption) points of operation for this engine was determined. Simulation models of the components in a HEPS were designed and constructed in the MATLAB Simulink environment. It was demonstrated through simulation that an UAV with the current HEPS configuration was capable of achieving a fuel saving of 6.5%, compared to the ICE-only configuration. These components form the basis for the development of a complete simulation model of a Hybrid-Electric UAV (HEUAV).
Resumo:
While purporting to enhance Australia’s sustainability, the federal government’s Population Strategy rejects the assessment of the limiting factors to future population growth, thus avoiding urgent threshold issues such as resource depletion and environmental destruction. A more forward-thinking and whole-system perspective would assess and incorporate critical biophysical limits into governance processes with suitable prioritisation. It would encourage communities to examine their individual and collective responsibilities in the context of these limits in order to most equitably optimise outcomes; and it would employ both a resource-based examination of minimum population requirements, and an impact-based assessment of maximum thresholds. This carrying capacity approach to planning could help guide society towards a more sustainable future.
Resumo:
Purpose: The purpose of this paper is to identify changes in bank lending criteria due to the GFC and to explore the associated impacts on new housing supply in Queensland, Australia. Design/methodology/approach: This research involves a survey of each of Australia’s big four banks, as well as two prominent arrangers of development finance. Data on key lending criteria was collected: Pre GFC, during the GFC, and GFC recovery stage. Findings: The GFC has resulted in a retraction of funds available for residential development. The few institutions lending are filtering out only the best credit risks by way of constrictive loan covenants including: low loan to value ratios, high cash equity requirements, regional “no go” zones, and demonstrated borrower track record. The ability of developers to proceed with new housing developments is being constrained by their inability to obtain sufficient finance. Research limitations/implications: This research uses survey data, together with an understanding of the project finance process to extrapolate impacts on the residential development industry across Queensland. No regional or sub-market analysis is included. Future research will include subsequent surveys to track any loosening of credit policies over time and sub-market sector analysis. Practical implications: The inability to obtain project finance is identified as a key constraint to new housing supply. This research will inform policy makers and provide important quantitative evidence of the importance of availability of development finance in the housing supply chain. Social implications: Queensland is facing a supply shortfall, which if not corrected, may lead to upward pressure on house prices and falling housing affordability. Originality/value: There is very little academic research on development funding. This research is unique in linking bank lending criteria to new housing supply and demonstrating the impact on the development industry.
Resumo:
The increase of powerful mobile devices has accelerated the demand for mobile videos. Previous studies in mobile video have focused on understanding of mobile video usage, improvement of video quality, and user interface design in video browsing. However, research focusing on a deep understanding of users’ needs for a pleasing quality delivery of mobile video is lacking. In particular, what quality-delivery mode users prefer and what information relevant to video quality they need requires attention. This paper presents a qualitative interview study with 38 participants to gain an insight into three aspects: influencing factors of user-desired video quality, user-preferred quality-delivery modes, and user-required interaction information of mobile video. The results show that user requirements for video quality are related to personal preference, technology background and video viewing experience, and the preferred quality-delivery mode and interactive mode are diverse. These complex user requirements call for flexible and personalised quality delivery and interaction of mobile video.
Resumo:
International law’s capacity to influence state behaviour by regulating recourse to violence has been a longstanding source of debate among international lawyers and political scientists. On the one hand, sceptics assert that frequent violations of the prohibition on the use of force have rendered article 2(4) of the UN Charter redundant. They contend that national self-interest, rather than international law, is the key determinant of state behaviour regarding the use of force. On the other hand, defenders of article 2(4) argue first, that most states comply with the Charter framework, and second, that state rhetoric continues to acknowledge the existence of the jus ad bellum. In particular, the fact that violators go to considerable lengths to offer legal or factual justifications for their conduct – typically by relying on the right of self-defence – is advanced as evidence that the prohibition on the use of force retains legitimacy in the eyes of states. This paper identifies two potentially significant features of state practice since 2006 which may signal a shift in states’ perceptions of the normative authority of article 2(4). The first aspect is the recent failure by several states to offer explicit legal justifications for their use or force, or to report action taken in self-defence to the Security Council in accordance with Article 51. Four incidents linked to the global “war on terror” are examined here: Israeli airstrikes in Syria in 2007 and in Sudan in 2009, Turkey’s 2006-2008 incursions into northern Iraq, and Ethiopia’s 2006 intervention in Somalia. The second, more troubling feature is the international community’s apparent lack of concern over the legality of these incidents. Each use of force is difficult to reconcile with the strict requirements of the jus ad bellum; yet none attracted genuine legal scrutiny or debate among other states. While it is too early to conclude that these relatively minor incidents presage long term shifts in state practice, viewed together the two developments identified here suggest a possible downgrading of the role of international law in discussions over the use of force, at least in conflicts linked to the “war on terror”. This, in turn, may represent a declining perception of the normative authority of the jus ad bellum, and a concomitant admission of the limits of international law in regulating violence.
Resumo:
Popular wireless networks, such as IEEE 802.11/15/16, are not designed for real-time applications. Thus, supporting real-time quality of service (QoS) in wireless real-time control is challenging. This paper adopts the widely used IEEE 802.11, with the focus on its distributed coordination function (DCF), for soft-real-time control systems. The concept of the critical real-time traffic condition is introduced to characterize the marginal satisfaction of real-time requirements. Then, mathematical models are developed to describe the dynamics of DCF based real-time control networks with periodic traffic, a unique feature of control systems. Performance indices such as throughput and packet delay are evaluated using the developed models, particularly under the critical real-time traffic condition. Finally, the proposed modelling is applied to traffic rate control for cross-layer networked control system design.
Resumo:
Scientific visualisations such as computer-based animations and simulations are increasingly a feature of high school science instruction. Visualisations are adopted enthusiastically by teachers and embraced by students, and there is good evidence that they are popular and well received. There is limited evidence, however, of how effective they are in enabling students to learn key scientific concepts. This paper reports the results of a quantitative study conducted in Australian physics and chemistry classrooms. In general there was no statistically significant difference between teaching with and without visualisations, however there were intriguing differences around student sex and academic ability.
Resumo:
This paper presents a key based generic model for digital image watermarking. The model aims at addressing an identified gap in the literature by providing a basis for assessing different watermarking requirements in various digital image applications. We start with a formulation of a basic watermarking system, and define system inputs and outputs. We then proceed to incorporate the use of keys in the design of various system components. Using the model, we also define a few fundamental design and evaluation parameters. To demonstrate the significance of the proposed model, we provide an example of how it can be applied to formally define common attacks.
Resumo:
The objective of this thesis is to investigate whether the corporate governance practices adopted by Chinese listed firms are associated with the quality of earnings information. Based on a review of agency and institutional theory, this study develops hypotheses that predict the monitoring effectiveness of the board and the audit committee. Using a combination of univariate and multivariate analyses, the association between corporate governance mechanisms and earnings management are tested from 2004 to 2008. Through analysing the empirical results, a number of findings are summarised as below. First, board independence is weakened by the introduction of government officials as independent directors on the boards. Government officials acting as independent directors, claim that they meet the definition of independent director set by the regulation. However, they have some connection with the State, which is the controlling shareholder in listed SOEs affiliated companies. Consequently, the effect of the independent director’s expertise in constraining earnings management is mitigated as demonstrated by an insignificant association between board expertise and earnings management. An alternative explanation for the inefficiency of board independence may point to the pre-selection of independent directors by the powerful CEO. It is argued that a CEO can manipulate the board composition and choose the "desirable" independent directors to monitor themselves. Second, a number of internal mechanisms, such as board size, board activities, and the separation of the roles of the CEO and chair are found to be significantly associated with discretionary accruals. This result suggests that there are advantages in having a large and active board in the Chinese setting. This can offset the disadvantages associated with large boards, such as increased bureaucracy, and hence, increase the constraining effects of a large and resourceful board. Third, factor analysis identifies two factors: CEO power and board power. CEO power is the factor which consists of CEO duality and turnover, and board power is composed of board size and board activity. The results of CEO power show that if a Chinese listed company has CEO duality and turnover at the same time, it is more likely to have a high level of earnings management. The significant and negative relationship between board power and accruals indicate that large boards with frequent meetings can be associated with low level of earnings management. Overall, the factor analysis suggests that certain governance mechanisms complement each other to become more efficient monitors of opportunistic earnings management. A combination of board characteristics can increase the negative association with earnings management. Fourth, the insignificant results between audit committees and earnings management in Chinese listed firms suggests that the Chinese regulator should strengthen the audit committee functions. This thesis calls for listed firms to disclose more information on audit committee composition and activities, which can facilitate future research on the Chinese audit committee’s monitoring role. Fifth, the interactive results between State ownership and board characteristics show that dominant State ownership has a moderating effect on board monitoring power as the State totally controls 42% of the issued shares. The high percentage of State ownership makes it difficult for the non-controlling institutional shareholders to challenge the State’s dominant status. As a result, the association between non-controlling institutional ownership and earnings management is insignificant in most situations. Lastly, firms audited by the international Big4 have lower abnormal accruals than firms audited by domestic Chinese audit firms. In addition, the inverse U-shape relationship between audit tenure and earnings quality demonstrates the changing effects of audit quality after a certain period of appointment. Furthermore, this thesis finds that listing in Hong Kong Stock Exchanges can be an alternative governance mechanism to discipline Chinese firms to follow strict Hong Kong listing requirements. Management of Hong Kong listed companies are exposed to the scrutiny of international investors and Hong Kong regulators. This in turn reduces their chances of conducting self-interested earnings manipulation. This study is designed to fill the gap in governance literature in China that is related to earnings management. Previous research on corporate governance mechanisms and earnings management in China is not conclusive. The current research builds on previous literature and provides some meaningful implications for practitioners, regulators, academic, and international investors who have investment interests in a transitional country. The findings of this study contribute to corporate governance and earnings management literature in the context of the transitional economy of China. The use of alternative measures for earnings management yields similar results compared with the accruals models and produces additional findings.
Resumo:
Caveats as protection for unregistered interests - lapsing and non-lapsing caveats - caveator - use only in appropriate circumstances
Resumo:
Notwithstanding the obvious potential advantages of information and communications technology (ICT) in the enhanced provision of healthcare services, there are some concerns associated with integration of and access to electronic health records. A security violation in health records, such as an unauthorised disclosure or unauthorised alteration of an individual's health information, can significantly undermine both healthcare providers' and consumers' confidence and trust in e-health systems. A crisis in confidence in any national level e-health system could seriously degrade the realisation of the system's potential benefits. In response to the privacy and security requirements for the protection of health information, this research project investigated national and international e-health development activities to identify the necessary requirements for the creation of a trusted health information system architecture consistent with legislative and regulatory requirements and relevant health informatics standards. The research examined the appropriateness and sustainability of the current approaches for the protection of health information. It then proposed an architecture to facilitate the viable and sustainable enforcement of privacy and security in health information systems under the project title "Open and Trusted Health Information Systems (OTHIS)". OTHIS addresses necessary security controls to protect sensitive health information when such data is at rest, during processing and in transit with three separate and achievable security function-based concepts and modules: a) Health Informatics Application Security (HIAS); b) Health Informatics Access Control (HIAC); and c) Health Informatics Network Security (HINS). The outcome of this research is a roadmap for a viable and sustainable architecture for providing robust protection and security of health information including elucidations of three achievable security control subsystem requirements within the proposed architecture. The successful completion of two proof-of-concept prototypes demonstrated the comprehensibility, feasibility and practicality of the HIAC and HIAS models for the development and assessment of trusted health systems. Meanwhile, the OTHIS architecture has provided guidance for technical and security design appropriate to the development and implementation of trusted health information systems whilst simultaneously offering guidance for ongoing research projects. The socio-economic implications of this research can be summarised in the fact that this research embraces the need for low cost security strategies against economic realities by using open-source technologies for overall test implementation. This allows the proposed architecture to be publicly accessible, providing a platform for interoperability to meet real-world application security demands. On the whole, the OTHIS architecture sets a high level of security standard for the establishment and maintenance of both current and future health information systems. This thereby increases healthcare providers‘ and consumers‘ trust in the adoption of electronic health records to realise the associated benefits.
Resumo:
As universities worldwide begin to appreciate the value of authentic learning experiences, so they struggle with methods of assessing the outcomes from such experiences. This chapter describes the application of an assessment matrix developed by Queensland University of Technology(QUT) in Australia, to the assessment requirements and practices relating to work integrated learning at the University of Surrey in the UK. Despite the very different institutional contexts and independent way in which the assessment regimes have developed, it was found that the values and outcomes being assessed and the methods used to assess them were similar. The most important feature of assessing work integrated learning experiences is fitness for purpose, hence the learning objectives and assessment of outcomes for a WIL experience must be explicitly aligned to this objective.As universities worldwide begin to appreciate the value of authentic learning experiences, so they struggle with methods of assessing the outcomes from such experiences. This chapter describes the application of an assessment matrix developed by Queensland University of Technology (QUT) in Australia, to the assessment requirements and practices relating to work integrated learning at the University of Surrey in the UK. Despite the very different institutional contexts and independent way in which the assessment regimes have developed, it was found that the values and outcomes being assessed and the methods used to assess them were similar. The most important feature of assessing work integrated learning experiences is fitness for purpose, hence the learning objectives and assessment of outcomes for a WIL experience must be explicitly aligned to this objective.
Resumo:
Surrogacy has become an effective and accepted form of reproductive technology. It enables couples, regardless of gender or sexuality, to achieve the dream of becoming a parent in circumstances where other forms of reproductive technology and adoption are either not possible or have failed. To its credit, the Queensland parliament has recently brought this state up to date by enacting surrogacy laws that are in line with the majority of statutes implemented throughout the country. The Surrogacy Act 2010 (Qld) allows for the court to make a parentage order in certain circumstances where parties have entered into a surrogacy arrangement. A parentage order effectively transfers parental rights from the birth mother (and her spouse or de facto if there is one) to the intended parents. The requirements which must be satisfied to obtain a parenting order are comprehensive and onerous, making the path to parenthood through a surrogacy arrangement by no means easy. At the heart of the surrogacy issue lies a question, the answer to which has shifted and continues to shift as reproductive technologies continue to increase in success, method and popularity - what is a parent? A recent decision of the Administrative Appeals Tribunal, Hudson v Minister for Immigration and Citizenship, brought to attention the meaning of the word ‘parent’ as it appears in s 16(2) Australian Citizenship Act 2007 (Cth) (‘the Act’). Section 16(2) deals with citizenship by descent and provides that a person born outside Australia may make an application to the Minister to become an Australian citizen if a parent of the person was an Australian citizen at the time of the birth.
Resumo:
The concept of Six Sigma was initiated in the 1980s by Motorola. Since then it has been implemented in several manufacturing and service organizations. In case of services, health care and finance were major beneficiaries till now. The application of Six Sigma is gradually picking up in other services like; call centers, utilities and public services. This paper provides empirical evidence on Six Sigma implementation in service industries in Singapore. By using a sample size of 50 service organizations (10 responses are from organizations which have implemented Six Sigma), the paper helps in understanding the status of Six Sigma in service organizations in Singapore. The findings confirm the inclusion of critical success factors, critical to quality characteristics, tools and key performance indicators as observed from the literature. The revelation of “not relevant” as a reason for not implementing Six Sigma shows the need for understanding specific requirements of service organizations before its application.