627 resultados para energy security
Resumo:
Even though web security protocols are designed to make computer communication secure, it is widely known that there is potential for security breakdowns at the human-machine interface. This paper examines findings from a qualitative study investigating the identification of security decisions used on the web. The study was designed to uncover how security is perceived in an individual user's context. Study participants were tertiary qualified individuals, with a focus on HCI designers, security professionals and the general population. The study identifies that security frameworks for the web are inadequate from an interaction perspective, with even tertiary qualified users having a poor or partial understanding of security, of which they themselves are acutely aware. The result is that individuals feel they must protect themselves on the web. The findings contribute a significant mapping of the ways in which individuals reason and act to protect themselves on the web. We use these findings to highlight the need to design for trust at three levels, and the need to ensure that HCI design does not impact on the users' main identified protection mechanism: separation.
Resumo:
A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.
Resumo:
Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of NLFSR ciphers is that their security is still not well investigated. The paper makes a progress in the study of the security of NLFSR ciphers. In particular, we show a distinguishing attack on linearly filtered NLFSR (or LF-NLFSR) ciphers. We extend the attack to a linear combination of LF-NLFSRs. We investigate the security of a modified version of the Grain stream cipher and show its vulnerability to both key recovery and distinguishing attacks.
Resumo:
The aim of this study was to examine whether maternal-report of child eating behaviour at two years predicted self-regulation of energy intake and weight status at four years. Using an ‘eating in the absence of hunger’ paradigm, children’s energy intake (kJ) from a semi-standardized lunch meal and a standardized selection of snacks were measured. Participants were 37 mother-child dyads (16 boys, Median child age = 4.4 years, Inter-quartile range = 3.7-4.5 years) recruited from an existing longitudinal study (NOURISH randomised controlled trial). All participants were tested in their own home. Details of maternal characteristics, child eating behaviours (at age two years) reported by mothers on a validated questionnaire, and measured child height and weight (at age 3.5-4 years) were sourced from existing NOURISH trial data. Correlation and partial correlation analyses were used to examine longitudinal relationships. Satiety responsiveness and Slowness in eating were inversely associated with energy intake of the lunch meal (partial r = -.40, p =.023, and partial r = -.40, p = .023) and the former was also negatively associated with BMI-for-age Z score (partial r = -.42, p = .015). Food responsiveness and Enjoyment of food were not related to energy intake or BMI Z score. None of the eating behaviours were significantly associated with energy intake of the snacks (i.e., eating in the absence of hunger). The small and predominantly ‘healthy weight’ sample of children may have limited the ability to detect some hypothesized effects. Nevertheless, the study provides evidence for the predictive validity of two eating behaviours and future research with a larger and more diverse sample should be able to better evaluate the predictive validity of other children’s early eating behaviour styles.
Resumo:
Although there is an increasing recognition of the impacts of climate change on communities, residents often resist changing their lifestyle to reduce the effects of the problem. By using a landscape architectural design medium, this paper argues that public space, when designed as an ecological system, has the capacity to create social and environmental change and to increase the quality of the human environment. At the same time, this ecological system can engage residents, enrich the local economy, and increase the social network. Through methods of design, research and case study analysis, an alternative master plan is proposed for a sustainable tourism development in Alacati, Turkey. Our master plan uses local geographical, economic and social information within a sustainable landscape architectural design scheme that addresses the key issues of ecology, employment, public space and community cohesion. A preliminary community empowerment model (CEM) is proposed to manage the designs. The designs address: the coexistence of local agricultural and sustainable energy generation; state of the art water management; and the functional and sustainable social and economic interrelationship of inhabitants, NGOs, and local government.
Resumo:
This paper discusses findings made during a study of energy use feedback in the home (eco-feedback), well after the novelty has worn off. Contributing towards four important knowledge gaps in the research, we explore eco-feedback over longer time scales, focusing on instances where the feedback was not of lasting benefit to users rather than when it was. Drawing from 23 semi-structured interviews with Australian householders, we found that an initially high level of engagement gave way over time to disinterest, neglect and in certain cases, technical malfunction. Additionally, preconceptions concerned with the “purpose” of the feedback were found to affect use. We propose expanding the scope of enquiry for eco-feedback in several ways, and describe how eco-feedback that better supports decision-making in the “maintenance phase”, i.e. once the initial novelty has worn off, may be key to longer term engagement.
Resumo:
The main aim was to expand existing knowledge on the influence of physical activity on gastric emptying and appetite control. Through a series of three complementary research studies interactions between exercise, gastric emptying, appetite and energy intake were investigated in males. Relationships with body composition and energy expenditure were also addressed.
Resumo:
Drawing on data from the Australian Business Assessment of Computer User Security (ABACUS) survey, this paper examines a range of factors that may influence businesses’ likelihood of being victimised by a computer security incident. It has been suggested that factors including business size, industry sector, level of outsourcing, expenditure on computer security functions and types of computer security tools and/or policies used may influence the probability of particular businesses experiencing such incidents. This paper uses probability modelling to test whether this is the case for the 4,000 businesses that responded to the ABACUS survey. It was found that the industry sector that a business belonged to, and business expenditure on computer security, were not related to businesses’ likelihood of detecting computer security incidents. Instead, the number of employees that a business has and whether computer security functions were outsourced were found to be key indicators of businesses’ likelihood of detecting incidents. Some of the implications of these findings are considered in this paper.
Resumo:
Background It is evident from previous research that the role of dietary composition in relation to the development of childhood obesity remains inconclusive. Several studies investigating the relationship between body mass index (BMI), waist circumference (WC) and/or skin fold measurements with energy intake have suggested that the macronutrient composition of the diet (protein, carbohydrate, fat) may play an important contributing role to obesity in childhood as it does in adults. This study investigated the possible relationship between BMI and WC with energy intake and percentage energy intake from macronutrients in Australian children and adolescents. Methods Height, weight and WC measurements, along with 24 h food and drink records (FDR) intake data were collected from 2460 boys and girls aged 5-17 years living in the state of Queensland, Australia. Results Statistically significant, yet weak correlations between BMI z-score and WC with total energy intake were observed in grades 1, 5 and 10, with only 55% of subjects having a physiologically plausible 24 hr FDR. Using Pearson correlations to examine the relationship between BMI and WC with energy intake and percentage macronutrient intake, no significant correlations were observed between BMI z-score or WC and percentage energy intake from protein, carbohydrate or fat. One way ANOVAs showed that although those with a higher BMI z-score or WC consumed significantly more energy than their lean counterparts. Conclusion No evidence of an association between percentage macronutrient intake and BMI or WC was found. Evidently, more robust longitudinal studies are needed to elucidate the relationship linking obesity and dietary intake.
Resumo:
In this paper we will examine passenger actions and activities at the security screening points of Australian domestic and international airports. Our findings and analysis provide a more complete understanding of the current airport passenger security screening experience. Data in this paper is comprised of field studies conducted at two Australian airports, one domestic and one international. Video data was collected by cameras situated either side of the security screening point. A total of one hundred and ninety-six passengers were observed. Two methods of analysis are used. First, the activities of passengers are coded and analysed to reveal the common activities at domestic and international security regimes and between quiet and busy periods. Second, observation of passenger activities is used to reveal uncommon aspects. The results show that passengers do more at security screening that being passively scanned. Passengers queue, unpack the required items from their bags and from their pockets, walk through the metal-detector, re-pack and occasionally return to be re-screened. For each of these activities, passengers must understand the procedures at the security screening point and must co-ordinate various actions and objects in time and space. Through this coordination passengers are active participants in making the security checkpoint function – they are co-producers of the security screening process.
Resumo:
Recent data from Australia, the United States and Europe show increased self-reported energy intake associated with obesity, in contrast to earlier suggestions that the obesity epidemic has occurred despite minimal or no increase in per capita energy intake from food. The effect of increased energy intake is compounded by sedentary lifestyles. Both physical activity and nutrition must be addressed to reduce the prevalence of obesity and improve the health of Australians.
Resumo:
This paper presents a series of operating schedules for Battery Energy Storage Companies (BESC) to provide peak shaving and spinning reserve services in the electricity markets under increasing wind penetration. As individual market participants, BESC can bid in ancillary services markets in an Independent System Operator (ISO) and contribute towards frequency and voltage support in the grid. Recent development in batteries technologies and availability of the day-ahead spot market prices would make BESC economically feasible. Profit maximization of BESC is achieved by determining the optimum capacity of Energy Storage Systems (ESS) required for meeting spinning reserve requirements as well as peak shaving. Historic spot market prices and frequency deviations from Australia Energy Market Operator (AEMO) are used for numerical simulations and the economic benefits of BESC is considered reflecting various aspects in Australia’s National Electricity Markets (NEM).
Resumo:
For decades Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) have used computers to monitor and control physical processes in many critical industries, including electricity generation, gas pipelines, water distribution, waste treatment, communications and transportation. Increasingly these systems are interconnected with corporate networks via the Internet, making them vulnerable and exposed to the same risks as those experiencing cyber-attacks on a conventional network. Very often SCADA networks services are viewed as a specialty subject, more relevant to engineers than standard IT personnel. Educators from two Australian universities have recognised these cultural issues and highlighted the gap between specialists with SCADA systems engineering skills and the specialists in network security with IT background. This paper describes a learning approach designed to help students to bridge this gap, gain theoretical knowledge of SCADA systems' vulnerabilities to cyber-attacks via experiential learning and acquire practical skills through actively participating in hands-on exercises.
Resumo:
Achieving energy efficient legged locomotion is an important goal for the future of robot mobility. This paper presents a novel joint for legged locomotion that is energy efficient for two reasons. The first reason is the configuration of the elastic elements and actuator which we show analytically has lower energy losses than the typical arrangement. The second is that the joint stiffness, and hence stance duration, is controllable without requiring any energy from the actuator. Further, the joint stiffness can be changed significantly during the flight phase, from zero to highly rigid. Results obtained from a prototype hopper, demonstrate that the joint allows continuous and peak hopping via torque control. The results also demonstrate that the hopping frequency can be varied between 2.2Hz and 4.6Hz with associated stance duration of between 0.35 and 0.15 seconds.