627 resultados para energy security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Advances in Information and Communication Technologies have the potential to improve many facets of modern healthcare service delivery. The implementation of electronic health records systems is a critical part of an eHealth system. Despite the potential gains, there are several obstacles that limit the wider development of electronic health record systems. Among these are the perceived threats to the security and privacy of patients’ health data, and a widely held belief that these cannot be adequately addressed. We hypothesise that the major concerns regarding eHealth security and privacy cannot be overcome through the implementation of technology alone. Human dimensions must be considered when analysing the provision of the three fundamental information security goals: confidentiality, integrity and availability. A sociotechnical analysis to establish the information security and privacy requirements when designing and developing a given eHealth system is important and timely. A framework that accommodates consideration of the legislative requirements and human perspectives in addition to the technological measures is useful in developing a measurable and accountable eHealth system. Successful implementation of this approach would enable the possibilities, practicalities and sustainabilities of proposed eHealth systems to be realised.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a comprehensive formal security framework for key derivation functions (KDF). The major security goal for a KDF is to produce cryptographic keys from a private seed value where the derived cryptographic keys are indistinguishable from random binary strings. We form a framework of five security models for KDFs. This consists of four security models that we propose: Known Public Inputs Attack (KPM, KPS), Adaptive Chosen Context Information Attack (CCM) and Adaptive Chosen Public Inputs Attack(CPM); and another security model, previously defined by Krawczyk [6], which we refer to as Adaptive Chosen Context Information Attack(CCS). These security models are simulated using an indistinguisibility game. In addition we prove the relationships between these five security models and analyse KDFs using the framework (in the random oracle model).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Distributed Wireless Smart Camera (DWSC) network is a special type of Wireless Sensor Network (WSN) that processes captured images in a distributed manner. While image processing on DWSCs sees a great potential for growth, with its applications possessing a vast practical application domain such as security surveillance and health care, it suffers from tremendous constraints. In addition to the limitations of conventional WSNs, image processing on DWSCs requires more computational power, bandwidth and energy that presents significant challenges for large scale deployments. This dissertation has developed a number of algorithms that are highly scalable, portable, energy efficient and performance efficient, with considerations of practical constraints imposed by the hardware and the nature of WSN. More specifically, these algorithms tackle the problems of multi-object tracking and localisation in distributed wireless smart camera net- works and optimal camera configuration determination. Addressing the first problem of multi-object tracking and localisation requires solving a large array of sub-problems. The sub-problems that are discussed in this dissertation are calibration of internal parameters, multi-camera calibration for localisation and object handover for tracking. These topics have been covered extensively in computer vision literatures, however new algorithms must be invented to accommodate the various constraints introduced and required by the DWSC platform. A technique has been developed for the automatic calibration of low-cost cameras which are assumed to be restricted in their freedom of movement to either pan or tilt movements. Camera internal parameters, including focal length, principal point, lens distortion parameter and the angle and axis of rotation, can be recovered from a minimum set of two images of the camera, provided that the axis of rotation between the two images goes through the camera's optical centre and is parallel to either the vertical (panning) or horizontal (tilting) axis of the image. For object localisation, a novel approach has been developed for the calibration of a network of non-overlapping DWSCs in terms of their ground plane homographies, which can then be used for localising objects. In the proposed approach, a robot travels through the camera network while updating its position in a global coordinate frame, which it broadcasts to the cameras. The cameras use this, along with the image plane location of the robot, to compute a mapping from their image planes to the global coordinate frame. This is combined with an occupancy map generated by the robot during the mapping process to localised objects moving within the network. In addition, to deal with the problem of object handover between DWSCs of non-overlapping fields of view, a highly-scalable, distributed protocol has been designed. Cameras that follow the proposed protocol transmit object descriptions to a selected set of neighbours that are determined using a predictive forwarding strategy. The received descriptions are then matched at the subsequent camera on the object's path using a probability maximisation process with locally generated descriptions. The second problem of camera placement emerges naturally when these pervasive devices are put into real use. The locations, orientations, lens types etc. of the cameras must be chosen in a way that the utility of the network is maximised (e.g. maximum coverage) while user requirements are met. To deal with this, a statistical formulation of the problem of determining optimal camera configurations has been introduced and a Trans-Dimensional Simulated Annealing (TDSA) algorithm has been proposed to effectively solve the problem.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Electrostatic discharges have been identified as the most likely cause in a number of incidents of fire and explosion with unexplained ignitions. The lack of data and suitable models for this ignition mechanism creates a void in the analysis to quantify the importance of static electricity as a credible ignition mechanism. Quantifiable hazard analysis of the risk of ignition by static discharge cannot, therefore, be entirely carried out with our current understanding of this phenomenon. The study of electrostatics has been ongoing for a long time. However, it was not until the wide spread use of electronics that research was developed for the protection of electronics from electrostatic discharges. Current experimental models for electrostatic discharge developed for intrinsic safety with electronics are inadequate for ignition analysis and typically are not supported by theoretical analysis. A preliminary simulation and experiment with low voltage was designed to investigate the characteristics of energy dissipation and provided a basis for a high voltage investigation. It was seen that for a low voltage the discharge energy represents about 10% of the initial capacitive energy available and that the energy dissipation was within 10 ns of the initial discharge. The potential difference is greatest at the initial break down when the largest amount of the energy is dissipated. The discharge pathway is then established and minimal energy is dissipated as energy dissipation becomes greatly influenced by other components and stray resistance in the discharge circuit. From the initial low voltage simulation work, the importance of the energy dissipation and the characteristic of the discharge were determined. After the preliminary low voltage work was completed, a high voltage discharge experiment was designed and fabricated. Voltage and current measurement were recorded on the discharge circuit allowing the discharge characteristic to be recorded and energy dissipation in the discharge circuit calculated. Discharge energy calculations show consistency with the low voltage work relating to discharge energy with about 30-40% of the total initial capacitive energy being discharged in the resulting high voltage arc. After the system was characterised and operation validated, high voltage ignition energy measurements were conducted on a solution of n-Pentane evaporating in a 250 cm3 chamber. A series of ignition experiments were conducted to determine the minimum ignition energy of n-Pentane. The data from the ignition work was analysed with standard statistical regression methods for tests that return binary (yes/no) data and found to be in agreement with recent publications. The research demonstrates that energy dissipation is heavily dependent on the circuit configuration and most especially by the discharge circuit's capacitance and resistance. The analysis established a discharge profile for the discharges studied and validates the application of this methodology for further research into different materials and atmospheres; by systematically looking at discharge profiles of test materials with various parameters (e.g., capacitance, inductance, and resistance). Systematic experiments looking at the discharge characteristics of the spark will also help understand the way energy is dissipated in an electrostatic discharge enabling a better understanding of the ignition characteristics of materials in terms of energy and the dissipation of that energy in an electrostatic discharge.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There are many variables to consider in the design of an electric motor. However, meeting the performance requirements for an electric vehicle drive may cause a designer to loose focus on its typical operation and hence fail to optimise the motor in the region where it processes the most power. This paper investigates operating requirements of electric vehicle motor drives using the University concept vehicle as an example. The paper outlines a methodology for determining primary operating region of a vehicle drive. The methodology is applied to standard driving cycles that are commonly used in the design and testing of vehicles.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a design technique of a fully regenerative dynamic dynamometer. It incorporates an energy storage system to absorb the energy variation due to dynamometer transients. This allows the minimum power electronics requirement at the grid to supply the losses. The simulation results of the full system over a driving cycle show the amount of energy required to complete a driving cycle, therefore the size of the energy storage system can be determined.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines a number of issues in sustainable energy generation and distribution, and explores avenues that are available for integration of our society’s energy supplies. In particular, the paper presents a way in which transport vehicle energy supplies could be integrated with distributed generation schemes to achieve synergistic and beneficial outcomes. The worldwide energy system contains fundamental problems that result directly from the use of unsustainable fuels and a lack of energy system integration. There is a need to adopt an integrated, sustainable energy system for our society. The adoption of distributed generation could result in beneficial restructuring of the energy trade, and a change in the role of energy providers. Inherent benefits in distributed generation schemes would directly combat barriers to installation of renewable generation facilities, which might prove distributed renewable energy sources to be more feasible. The presence of fuel cells, batteries, power electronic inverters and intelligent controls in vehicles of the future provides many opportunities for the integration of vehicle energy supplies into a distributed generation scheme. In such a system, vehicles could play a major role in power generation and storage.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines a number of issues in sustainable energy generation and distribution, and explores avenues that are available for integration of our society’s energy supplies. In particular, the paper presents a way in which transport vehicle energy supplies could be integrated with distributed generation schemes to achieve synergistic and beneficial outcomes. The worldwide energy system contains fundamental problems that result directly from the use of unsustainable fuels and a lack of energy system integration. There is a need to adopt an integrated, sustainable energy system for our society. The adoption of distributed generation could result in beneficial restructuring of the energy trade, and a change in the role of energy providers. Inherent benefits in distributed generation schemes would directly combat barriers to installation of renewable generation facilities, which might prove distributed renewable energy sources to be more feasible. The presence of fuel cells, batteries, power electronic inverters and intelligent controls in vehicles of the future provides many opportunities for the integration of vehicle energy supplies into a distributed generation scheme. In such a system, vehicles could play a major role in power generation and storage.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mainstream discourse on the revolving around food security is often portrayed by macro level indicators on nutrition, consumption and food production. While these indicators may prove significant in addressing food security in the national and regional levels, it falls short in addressing it among the indigenous peoples’ (IP) communities in the Philippines. Reflecting through the experiences in agricultural production, indigenous knowledge and socio-political institutions are relevant factors that must be seriously considered when food security among IPs are concerned. It is argued that disregarding micro level interactions over macro development policies will not address the issue of food security among marginalized sectors. The paper presents policy recommendations in taking cultural systems seriously in addressing food security among indigenous peoples.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Whether by using electronic banking, by using credit cards, or by synchronising a mobile telephone via Bluetooth to an in-car system, humans are a critical part in many cryptographic protocols daily. We reduced the gap that exists between the theory and the reality of the security of these cryptographic protocols involving humans, by creating tools and techniques for proofs and implementations of human-followable security. After three human research studies, we present a model for capturing human recognition; we provide a tool for generating values called Computer-HUman Recognisable Nonces (CHURNs); and we provide a model for capturing human perceptible freshness.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of the current study was to develop a measurement of information security culture in developing countries such as Saudi Arabia. In order to achieve this goal, the study commenced with a comprehensive review of the literature, the outcome being the development of a conceptual model as a reference base. The literature review revealed a lack of academic and professional research into information security culture in developing countries and more specifically in Saudi Arabia. Given the increasing importance and significant investment developing countries are making in information technology, there is a clear need to investigate information security culture from developing countries perspective such as Saudi Arabia. Furthermore, our analysis indicated a lack of clear conceptualization and distinction between factors that constitute information security culture and factors that influence information security culture. Our research aims to fill this gap by developing and validating a measurement model of information security culture, as well as developing initial understanding of factors that influence security culture. A sequential mixed method consisting of a qualitative phase to explore the conceptualisation of information security culture, and a quantitative phase to validate the model is adopted for this research. In the qualitative phase, eight interviews with information security experts in eight different Saudi organisations were conducted, revealing that security culture can be constituted as reflection of security awareness, security compliance and security ownership. Additionally, the qualitative interviews have revealed that factors that influence security culture are top management involvement, policy enforcement, policy maintenance, training and ethical conduct policies. These factors were confirmed by the literature review as being critical and important for the creation of security culture and formed the basis for our initial information security culture model, which was operationalised and tested in different Saudi Arabian organisations. Using data from two hundred and fifty-four valid responses, we demonstrated the validity and reliability of the information security culture model through Exploratory Factor Analysis (EFA), followed by Confirmatory Factor Analysis (CFA.) In addition, using Structural Equation Modelling (SEM) we were further able to demonstrate the validity of the model in a nomological net, as well as provide some preliminary findings on the factors that influence information security culture. The current study contributes to the existing body of knowledge in two major ways: firstly, it develops an information security culture measurement model; secondly, it presents empirical evidence for the nomological validity for the security culture measurement model and discovery of factors that influence information security culture. The current study also indicates possible future related research needs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research investigated airborne particle characteristics and their dynamics inside and around the envelope of mechanically ventilated office buildings, together with building thermal conditions and energy consumption. Based on these, a comprehensive model was developed to facilitate the optimisation of building heating, ventilation and air conditioning systems, in order to protect the health of their occupants and minimise the energy requirements of these buildings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ability of metals to store or trap considerable amounts of energy, and thus exist in a non-equilibrium or metastable state, is very well known in metallurgy; however, such behaviour, which is intimately connected with the defect character of metals, has been largely ignored in noble metal surface electrochemistry. Techniques for generating unusually high energy surface states for gold, and the unusual voltammetric responses of such states, are outlined. The surprisingly high (and complex) electrocatalytic activity of gold in aqueous media is attributed to the presence of a range of such non-equilibrium states as the vital entities at active sites on conventional gold surfaces. The possible relevance of these ideas to account for the remarkable catalytic activity of oxide-supported gold microparticles is briefly outlined.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Australian Clean Energy Package has been introduced to respond to the global challenge of climate change and reduce Australia’s greenhouse gas emissions. It includes legislation to establish an emissions trading scheme. In support of the entities that are liable under this Package, there are a number of assistance measures offered to alleviate the financial burden that the Package imposes. This paper considers whether these assistance measures are subsidies within the context of the law of the World Trade Organization. In order to do this, the rules of the Agreement on Subsidies and Countervailing Measures are examined. This examination enables an understanding of when a subsidy exists and in what circumstances those subsidies occasion the use of remedies under the law.