463 resultados para Shipping conferences


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper evaluates the efficiency of a number of popular corpus-based distributional models in performing discovery on very large document sets, including online collections. Literature-based discovery is the process of identifying previously unknown connections from text, often published literature, that could lead to the development of new techniques or technologies. Literature-based discovery has attracted growing research interest ever since Swanson's serendipitous discovery of the therapeutic effects of fish oil on Raynaud's disease in 1986. The successful application of distributional models in automating the identification of indirect associations underpinning literature-based discovery has been heavily demonstrated in the medical domain. However, we wish to investigate the computational complexity of distributional models for literature-based discovery on much larger document collections, as they may provide computationally tractable solutions to tasks including, predicting future disruptive innovations. In this paper we perform a computational complexity analysis on four successful corpus-based distributional models to evaluate their fit for such tasks. Our results indicate that corpus-based distributional models that store their representations in fixed dimensions provide superior efficiency on literature-based discovery tasks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this paper, we analyse the loading of the secret key and IV during the initialisation process of A5/1. We demonstrate the existence of weak key-IV pairs in the A5/1 cipher due to this loading process; these weak key-IV pairs may generate one, two or three registers containing all-zero values, which may lead in turn to weak keystream sequences. In the case where two or three registers contain only zeros, we describe a distinguisher which leads to a complete decryption of the affected messages.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This preliminary paper provides an overview of the legislative and policy context of restorative justice measures for juveniles in each Australian state and territory, highlighting the diverse characteristics of current restorative practices. Further, it provides an indication of the numbers and characteristics of juveniles who are referred by police to restorative justice measures and the offence types for which they are most commonly referred. A number of key points about the application of restorative justice measures to juveniles in Australia’s jurisdictions are highlighted, including that juveniles were referred to conferences primarily for property crimes and that Indigenous juveniles comprised higher proportions of those sent to court than to conferencing. This paper argues that more detailed data on the offending histories, offence types and offence seriousness of juveniles referred by police to restorative justice processes would enable a more finely-grained analysis of restorative justice for juveniles in Australia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The main focus of ‘Kaleidoscope: Reframing evaluation through a stakeholder approach to sustainable, cultural change in Higher Education’ is to develop a set of principles to guide user-led engagement in widespread organisational change and maximise its impact. The word kaleidoscope represents the unique lens through which each institution will need to view their cultural specificity and local context through an extensive process of collaboration and engagement, followed by communication and dissemination. Kaleidoscope has particular relevance when new approaches to learning and teaching evaluation are introduced by tertiary institutions. Building on the Reframe Project, which involved three years of user-led consultation and was designed to meet stakeholders’ needs, QUT successfully introduced a new evaluation framework in 2013 across the university. Reframe was evidence based, involved scholarly reflection and was founded on a strong theoretical framework. The evolution of the evaluation framework included analysis of scholarly literature and environmental scans across the higher education sector (Alderman, et al., 2012), researched development of conceptual theory (Alderman, et al., in press 2013), incorporated the stakeholder voice and framed within project management principles (Alderman & Melanie, 2012). Kaleidoscope’s objectives are for QUT to develop its research-based stakeholder approach to distil the successful experience exhibited in the Reframe Project into a transferable set of guidelines for use by other tertiary institutions across the sectors. These guidelines will assist others to design, develop, and deploy, their own culturally specific widespread organisational change informed by stakeholder engagement and organisational buy-in. It is intended that these guidelines will promote, support and enable other tertiary institutions to embark on their own projects and maximise the impact. In correlation with a our conference paper, this round table presents the Draft Guidelines and Framework ready for external peer review by evaluation practitioners, as part of Kaleidoscope’s dissemination (Hinton & Gannaway, 2011) applying illuminative evaluation theory (Parlett & Hamilton, 1976), through conference workshops and linked round table discussions (Shapiro, et al., 1983; Jacobs, 2000).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The implementation of systematic peer review as a professional development activity, and as a support for educational design activities is under-utilised in many Australian higher education institutions. This case study reports on the first stages of planning and implementation of an institution-wide project to enhance teaching and learning quality at a remote and regional university, where one of the major strategies for improvement is peer review. Through a systematic process of staff engagement in peer review, within and from outside the organisation, a substantial change in flexible learning is envisaged. A mix of new and different learning spaces are to be used in the project, including blended learning spaces for academic development. This paper describes the research framework that will guide the peer review process and examines the early findings of the design-based research. Leadership, awareness raising and development of a supportive community of inquiry are seen as key components for successful implementation of peer review. In addition, unique contextual elements add to the complexity of designing for transformative change within such a relatively new organization.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the algebraic attack approach of Berbain et al. to Trivium-like ciphers and perform new analyses on them. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analyses. We also answer an open question posed by Berbain et al. on the feasibility of applying their technique on Trivium-like ciphers. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail. Analysis of Bivium-B and Trivium-N are omitted from this manuscript. The full paper is available on the IACR ePrint Archive.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Reducing complexity in Information Systems is an important topic in both research and industry. One strategy to deal with complexity is separation of concerns, which results in less complex, easily maintainable and more reusable systems. Separation of concerns can be addressed through the Aspect Oriented paradigm. Although this paradigm has been well researched in programming, it is still at the preliminary stage in the area of Business Process Management. While some efforts have been made to extend business process modelling with aspect oriented capability, it has not yet been investigated how aspect oriented business process models should be executed at runtime. In this paper, we propose a generic solution to support execution of aspect oriented business process models based on the principle behind dynamic weaving of aspects. This solution is formally specified using Coloured Petri Nets. The resulting formal specification serves as the blueprint to the implementation of a service module in the framework of a state-of-the-art Business Process Management System. Using this developed artefact, a case study is performed in which two simplified processes from real business in the domain of banking are modelled and executed in an aspect oriented manner. Through this case study, we also demonstrate that adoption of aspect oriented modularization increases the reusability while reducing the complexity of business process models in practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent years, restorative justice has become an immensely popular criminal justice option in contemporary western societies. Restorative practices have emerged in diverse parts of the world often in total isolation from one another – that is, they have emerged without knowledge of other, similar practices. This quandary prompts us to question how it is that restorative processes have come about, and what it is that has allowed restorative justice to become such a widely acceptable way of thinking about crime and criminal justice. The research project from which this pa-per stems takes this as its central problem, and aims to explore the many dis-courses which inform the field of restorative justice, or more specifically, the “conditions of emergence” of this field. This paper focuses on one of these discourses – the discourse of the therapeutic/recovery/self-help movement, famously championed by talk-show host Oprah Winfrey. It aims to investigate the ways in which the taken-for-granted nature of this discourse has permitted restorative justice to be-come an approved way of “doing justice”.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Modern international shipping is largely a flag state-based system. Only the flag state has complete authority over the vessels that fly its flag, and as a result, other states’ jurisdiction over these vessels is very limited. Against this backdrop, this article examines the flag state’s responsibility for maritime terrorism, a major security issue and vulnerability in the global supply chain. It is not an exaggeration that the global community’s repeated statements regarding the illegality of terrorism have created a customary international law obligation for states to take all possible steps for the prevention of terrorism. This article argues that providing flags to suspicious entities in an obscure registration system is not compatible with this obligation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Maritime terrorism is one of the main maritime security issues in the contemporary world. The threat of maritime terrorism is more apparent than ever in the post-September 11 era. Although maritime terrorism is an old issue, the disastrous events of 11 September 2001 brought this issue again onto the global agenda. This incident brought to the forefront the longstanding concerns that terrorists could severely disrupt the global maritime supply chain by using shipping containers or vessels to attack major business centres, port facilities and offshore installations. A number of international criminal law studies have been conducted to identify international legal challenges in maritime security. Some of these works have critically examined the international legal framework for maritime security and identified the lacunas in the existing system. Some of these writings have also identified that emerging maritime terrorism issues are prompting States to introduce some stringent measures. Although the international legal regime related to maritime terrorism is a well-researched area, very little research work has explored the legal issues related to State responsibility for maritime terrorism. This article argues that, although the United Nations Convention on the Law of the Sea (UNCLOS) provisions related to maritime piracy may not be applicable for some dimensions of maritime violence, different provisions of UNCLOS may relevant in identifying State responsibility for maritime terrorism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

According to a study conducted by the International Maritime organisation (IMO) shipping sector is responsible for 3.3% of the global Greenhouse Gas (GHG) emissions. The 1997 Kyoto Protocol calls upon states to pursue limitation or reduction of emissions of GHG from marine bunker fuels working through the IMO. In 2011, 14 years after the adoption of the Kyoto Protocol, the Marine Environment Protection Committee (MEPC) of the IMO has adopted mandatory energy efficiency measures for international shipping which can be treated as the first ever mandatory global GHG reduction instrument for an international industry. The MEPC approved an amendment of Annex VI of the 1973 International Convention for the Prevention of Pollution from Ships (MARPOL 73/78) to introduce a mandatory Energy Efficiency Design Index (EEDI) for new ships and the Ship Energy Efficiency Management Plan (SEEMP) for all ships. Considering the growth projections of human population and world trade the technical and operational measures may not be able to reduce the amount of GHG emissions from international shipping in a satisfactory level. Therefore, the IMO is considering to introduce market-based mechanisms that may serve two purposes including providing a fiscal incentive for the maritime industry to invest in more energy efficient manner and off-setting of growing ship emissions. Some leading developing countries already voiced their serious reservations on the newly adopted IMO regulations stating that by imposing the same obligation on all countries, irrespective of their economic status, this amendment has rejected the Principle of Common but Differentiated Responsibility (the CBDR Principle), which has always been the cornerstone of international climate change law discourses. They also claimed that negotiation for a market based mechanism should not be continued without a clear commitment from the developed counters for promotion of technical co-operation and transfer of technology relating to the improvement of energy efficiency of ships. Against this backdrop, this article explores the challenges for the developing counters in the implementation of already adopted technical and operational measures.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

International shipping is responsible for about 2.7% of the global emissions of CO2. In the absence of proper action, emissions from the maritime sector may grow by 150% to 250% by 2050, in comparison with the level of emissions in 2007. Against this backdrop, the International Maritime Organisation has introduced a mandatory Energy Efficiency Design Index (EEDI) for new ships and the Ship Energy Efficiency Management Plan (SEEMP) for all ships. Some Asian countries have voiced serious reservations about the newly adopted IMO regulations. They have suggested that imposing the same obligations on all countries, irrespective of their economic status, is a serious departure from the Principle of Common but Differentiated Responsibility, which has always been the cornerstone of international climate change law discourse. Against this backdrop, this article presents a brief overview of the technical and operational measures from the perspective of Asian countries.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction Falls are the most frequent adverse event reported in hospitals. Approximately 30% of in-hospital falls lead to an injury and up to 2% result in a fracture. A large randomised trial found that a trained health professional providing individualised falls prevention education to older inpatients reduced falls in a cognitively intact subgroup. This study aims to investigate whether this efficacious intervention can reduce falls and be clinically useful and cost-effective when delivered in the real-life clinical environment. Methods A stepped-wedge cluster randomised trial will be used across eight subacute units (clusters) which will be randomised to one of four dates to start the intervention. Usual care on these units includes patient's screening, assessment and implementation of individualised falls prevention strategies, ongoing staff training and environmental strategies. Patients with better levels of cognition (Mini-Mental State Examination >23/30) will receive the individualised education from a trained health professional in addition to usual care while patient's feedback received during education sessions will be provided to unit staff. Unit staff will receive training to assist in intervention delivery and to enhance uptake of strategies by patients. Falls data will be collected by two methods: case note audit by research assistants and the hospital falls reporting system. Cluster-level data including patient's admissions, length of stay and diagnosis will be collected from hospital systems. Data will be analysed allowing for correlation of outcomes (clustering) within units. An economic analysis will be undertaken which includes an incremental cost-effectiveness analysis. Ethics and dissemination The study was approved by The University of Notre Dame Australia Human Research Ethics Committee and local hospital ethics committees. Results The results will be disseminated through local site networks, and future funding and delivery of falls prevention programmes within WA Health will be informed. Results will also be disseminated through peer-reviewed publications and medical conferences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a vulnerability within the generic object oriented substation event (GOOSE) communication protocol. It describes an exploit of the vulnerability and proposes a number of attack variants. The attacks sends GOOSE frames containing higher status numbers to the receiving intelligent electronic device (IED). This prevents legitimate GOOSE frames from being processed and effectively causes a hijacking of the communication channel, which can be used to implement a denial–of–service (DoS) or manipulate the subscriber (unless a status number roll-over occurs). The authors refer to this attack as a poisoning of the subscriber. A number of GOOSE poisoning attacks are evaluated experimentally on a test bed and demonstrated to be successful.