447 resultados para Security, International


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a semi-supervised intelligent visual surveillance system to exploit the information from multi-camera networks for the monitoring of people and vehicles. Modules are proposed to perform critical surveillance tasks including: the management and calibration of cameras within a multi-camera network; tracking of objects across multiple views; recognition of people utilising biometrics and in particular soft-biometrics; the monitoring of crowds; and activity recognition. Recent advances in these computer vision modules and capability gaps in surveillance technology are also highlighted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We describe a novel two stage approach to object localization and tracking using a network of wireless cameras and a mobile robot. In the first stage, a robot travels through the camera network while updating its position in a global coordinate frame which it broadcasts to the cameras. The cameras use this information, along with image plane location of the robot, to compute a mapping from their image planes to the global coordinate frame. This is combined with an occupancy map generated by the robot during the mapping process to track the objects. We present results with a nine node indoor camera network to demonstrate that this approach is feasible and offers acceptable level of accuracy in terms of object locations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

About 1.6 million students currently study outside their home country. Despite this, and the fact that Australia, the United States, the United Kingdom and many of the other host countries of international students are themselves extremely culturally diverse communities, business education remains essentially mono-cultural in form and Anglo American in content. Whilst it is true that these international students may want to understand the "Western" way of doing things, they may not be familiar or comfortable with the processes used to facilitate learning. This paper explores a project undertaken to create a tool that provides essential pre-orientation information and advice to students before they leave home. Where cultural adjustment is required, catching students before departure is a very effective time to introduce key information about lifestyle, culture and approaches to teaching and learning that would assist students with the complex and difficult adjustment to studying abroad, so that they could make a smoother transition to their new place of learning. Welcome to Studying Business at QUT is a Data DVD with 19 short videos capturing a student perspective on life and study. Forty percent of the content is related to living and studying and includes sections on accommodation, lifestyle, food and transport etc., and 60% takes an in-depth look at studying business, featuring students and academics talking about issues such as assessment, academic writing and working in groups. This paper outlines the process of developing the DVD and the range of issues addressed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As computer applications become more available—both technically and economically—construction project managers are increasingly able to access advanced computer tools capable of transforming the role that project managers have typically performed. Competence at using these tools requires a dual commitment in training—from the individual and the firm. Improving the computer skills of project managers can provide construction firms with a competitive advantage to differentiate from others in an increasingly competitive international market. Yet, few published studies have quantified what existing level of competence construction project managers have. Identification of project managers’ existing computer application skills is a necessary first step to developing more directed training to better capture the benefits of computer applications. This paper discusses the yet to be released results of a series of surveys undertaken in Malaysia, Singapore, Indonesia, Australia and the United States through QUT’s School of Construction Management and Property and the M.E. Rinker, Sr. School of Building Construction at the University of Florida. This international survey reviews the use and reported competence in using a series of commercially-available computer applications by construction project managers. The five different country locations of the survey allow cross-national comparisons to be made between project managers undertaking continuing professional development programs. The results highlight a shortfall in the ability of construction project managers to capture potential benefits provided by advanced computer applications and provide directions for targeted industry training programs. This international survey also provides a unique insight to the cross-national usage of advanced computer applications and forms an important step in this ongoing joint review of technology and the construction project manager.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Digital forensic examiners often need to identify the type of a file or file fragment based only on the content of the file. Content-based file type identification schemes typically use a byte frequency distribution with statistical machine learning to classify file types. Most algorithms analyze the entire file content to obtain the byte frequency distribution, a technique that is inefficient and time consuming. This paper proposes two techniques for reducing the classification time. The first technique selects a subset of features based on the frequency of occurrence. The second speeds classification by sampling several blocks from the file. Experimental results demonstrate that up to a fifteen-fold reduction in file size analysis time can be achieved with limited impact on accuracy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Automated visual surveillance of crowds is a rapidly growing area of research. In this paper we focus on motion representation for the purpose of abnormality detection in crowded scenes. We propose a novel visual representation called textures of optical flow. The proposed representation measures the uniformity of a flow field in order to detect anomalous objects such as bicycles, vehicles and skateboarders; and can be combined with spatial information to detect other forms of abnormality. We demonstrate that the proposed approach outperforms state-of-the-art anomaly detection algorithms on a large, publicly-available dataset.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The overarching objective of the research was to identify the existence and nature of international legal principles governing sustainable forest use and management. This research intended to uncover a set of forest legal considerations that are relevant for consideration across the globe. The purpose behind this, is to create a theoretical base of international forest law literature which be drawn upon to inform future international forestry research. This research will be of relevance to those undertaking examination of a particular forest issue or those focusing on forests in a particular region. The thesis explains the underlying legal issues in forest regulation, the dominant international regulatory approaches and makes suggestions as to how international and national forest policy could be improved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Immigrant Entrepreneurs (IE) are often portrayed as being pushed into self-employment due to employment barriers in their adopted countries. But IE have human resources, like international experience, which can help them form international new ventures (INV). We question the role of IE in INV. We use randomly selected data from 561 young firms from the Comprehensive Australian Study of Entrepreneurial Emergence (CAUSEE) project. We find that IE are overrepresented in INV and have many of the characteristics known to facilitate INV success. These findings have relevance to policy makers, IE and NE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis argues that in order to establish a sound information security culture it is necessary to look at organisation's information security systems in a socio- technical context. The motivation for this research stems from the continuing concern of ineffective information security in organisations, leading to potentially significant monetary losses. It is important to address both technical and non- technical aspects when dealing with information security management. Culture has been identified as an underlying determinant of individuals' behaviour and this extends to information security culture, particularly in developing countries. This research investigates information security culture in the Saudi Arabia context. The theoretical foundation for the study is based on organisational and national culture theories. A conceptual framework for this study was constructed based on Peterson and Smith's (1997) model of national culture. This framework guides the study of national, organisational and technological values and their relationships to the development of information security culture. Further, the study seeks to better understand how these values might affect the development and deployment of an organisation's information security culture. Drawing on evidence from three exploratory case studies, an emergent conceptual framework was developed from the traditional human behaviour and the social environment perspectives used in social work, This framework contributes to in- formation security management by identifying behaviours related to four modes of information security practice. These modes provide a sound basis that can be used to evaluate individual organisational members' behaviour and the adequacy of ex- isting security measures. The results confirm the plausibility of the four modes of practice. Furthermore, a final framework was developed by integrating the four modes framework into the research framework. The outcomes of the three case stud- ies demonstrate that some of the national, organisational and technological values have clear impacts on the development and deployment of organisations' informa- tion security culture. This research, by providing an understanding the in uence of national, organi- sational and technological values on individuals' information security behaviour, contributes to building a theory of information security culture development within an organisational context. The research reports on the development of an inte- grated information security culture model that highlights recommendations for developing an information security culture. The research framework, introduced by this research, is put forward as a robust starting point for further related work in this area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In an era of rapidly changing economic, social and environmental conditions, urban and regional planning education must be resilient, innovative and able to deal with the complex political and socio-economic fabric of post-modern cities. As a consequence, urban and regional planning education plays a fundamental role in educating and forming planning practitioners that will be able to tackle such complexity. However, not many tertiary education institutions provide a trans-cultural engagement opportunity for students, where the need to internationalise planning education has been widely recognised worldwide. The aim of this paper is to communicate the findings of three overseas study trips (Kuala Lumpur-Malaysia, Daejeon-Korea, Istanbul and Gallipoli-Turkey) that students of Queensland University of Technology are taken to where these study trips trailed the provision of an innovative tertiary education experience of teaching regional planning in an international context. The findings of the pedagogic analyses of the study reveal that the exposure of students to different planning processes and practices give them a new outlook on what they knew from their own country and provide them with useful insights on international planning issues and cultural differences and barriers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The design of the Kyoto Protocol renders it incapable of effectively responding to the problem of anthropogenic climate change. Therefore, this article explores the opportunity to construct a new, principled legal approach to respond to climate change that is premised on nationally derived legal responses. To do so, this article considers the theoretical foundation of the international legal response to climate change – Hardin's "The Tragedy of the Commons‟ – and the systemic design faults of the Kyoto Protocol. This article also suggests four principles – a judicious mix of legal instruments, flexibility, intrinsic legal coherence, and quantifiable and achievable targets for the reduction of greenhouse gas intensity – that are necessary to guide the creation of a nationally derived legal response to climate change. This approach is intended to provide the catalyst for new bilateral and multilateral arrangements that can, with the passing of time, generate sufficient momentum to drive the creation of a new and effective cooperative international legal framework to mitigate anthropogenic climate change.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the analysis of medical images for computer-aided diagnosis and therapy, segmentation is often required as a preliminary step. Medical image segmentation is a complex and challenging task due to the complex nature of the images. The brain has a particularly complicated structure and its precise segmentation is very important for detecting tumors, edema, and necrotic tissues in order to prescribe appropriate therapy. Magnetic Resonance Imaging is an important diagnostic imaging technique utilized for early detection of abnormal changes in tissues and organs. It possesses good contrast resolution for different tissues and is, thus, preferred over Computerized Tomography for brain study. Therefore, the majority of research in medical image segmentation concerns MR images. As the core juncture of this research a set of MR images have been segmented using standard image segmentation techniques to isolate a brain tumor from the other regions of the brain. Subsequently the resultant images from the different segmentation techniques were compared with each other and analyzed by professional radiologists to find the segmentation technique which is the most accurate. Experimental results show that the Otsu’s thresholding method is the most suitable image segmentation method to segment a brain tumor from a Magnetic Resonance Image.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Choi et al. recently proposed an efficient RFID authentication protocol for a ubiquitous computing environment, OHLCAP(One-Way Hash based Low-Cost Authentication Protocol). However, this paper reveals that the protocol has several security weaknesses : 1) traceability based on the leakage of counter information, 2) vulnerability to an impersonation attack by maliciously updating a random number, and 3) traceability based on a physically-attacked tag. Finally, a security enhanced group-based authentication protocol is presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Online social networking has become one of the most popular Internet applications in the modern era. They have given the Internet users, access to information that other Internet based applications are unable to. Although many of the popular online social networking web sites are focused towards entertainment purposes, sharing information can benefit the healthcare industry in terms of both efficiency and effectiveness. But the capability to share personal information; the factor which has made online social networks so popular, is itself a major obstacle when considering information security and privacy aspects. Healthcare can benefit from online social networking if they are implemented such that sensitive patient information can be safeguarded from ill exposure. But in an industry such as healthcare where the availability of information is crucial for better decision making, information must be made available to the appropriate parties when they require it. Hence the traditional mechanisms for information security and privacy protection may not be suitable for healthcare. In this paper we propose a solution to privacy enhancement in online healthcare social networks through the use of an information accountability mechanism.