45 resultados para Distributed Network Protocol version 3 (DNP3)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

With the emergence of multi-core processors into the mainstream, parallel programming is no longer the specialized domain it once was. There is a growing need for systems to allow programmers to more easily reason about data dependencies and inherent parallelism in general purpose programs. Many of these programs are written in popular imperative programming languages like Java and C]. In this thesis I present a system for reasoning about side-effects of evaluation in an abstract and composable manner that is suitable for use by both programmers and automated tools such as compilers. The goal of developing such a system is to both facilitate the automatic exploitation of the inherent parallelism present in imperative programs and to allow programmers to reason about dependencies which may be limiting the parallelism available for exploitation in their applications. Previous work on languages and type systems for parallel computing has tended to focus on providing the programmer with tools to facilitate the manual parallelization of programs; programmers must decide when and where it is safe to employ parallelism without the assistance of the compiler or other automated tools. None of the existing systems combine abstraction and composition with parallelization and correctness checking to produce a framework which helps both programmers and automated tools to reason about inherent parallelism. In this work I present a system for abstractly reasoning about side-effects and data dependencies in modern, imperative, object-oriented languages using a type and effect system based on ideas from Ownership Types. I have developed sufficient conditions for the safe, automated detection and exploitation of a number task, data and loop parallelism patterns in terms of ownership relationships. To validate my work, I have applied my ideas to the C] version 3.0 language to produce a language extension called Zal. I have implemented a compiler for the Zal language as an extension of the GPC] research compiler as a proof of concept of my system. I have used it to parallelize a number of real-world applications to demonstrate the feasibility of my proposed approach. In addition to this empirical validation, I present an argument for the correctness of the type system and language semantics I have proposed as well as sketches of proofs for the correctness of the sufficient conditions for parallelization proposed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Guy Webster is a sound artist who has been featured in numerous festivals, galleries, conferences and theatres in Australia, Japan, UK and Europe. As part of the Transmute Collective he developed the immersive soundscape of Intimate Transactions. On 2nd November, 2005 Jilliann Hamilton and Jeremy Yuille met with Guy Webster to discuss his approach to immersion in soundsapes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The making of the modern world has long been fuelled by utopian images that are blind to ecological reality. Botanical gardens are but one example – who typically portray themselves as miniature, isolated 'edens on earth'. Whilst respected, heritage-laden institutions such as the Royal Botanical Gardens in Sydney, Australia promote such an idealised image they are now self-evidently also the vital ‘lungs’ of a crowded city as well as a critical habitats for threatened biodiversity (in this case notably flying foxes). In 2010 the 'Remnant Emergency Artlab' set out to alleviate this utopian hangover through a creative provocation called the 'Botanical Gardens ‘X-Tension’ - an imagined city-wide, distributed, network of 'ecological gardens' - in order to ask, what now needs to be better understood, connected and therefore ultimately conserved?

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The recently introduced Australian Curriculum: English Version 3.0 (Australian Curriculum, Assessment and Reporting Authority [ACARA], 2012) requires students to ‘read’ multimodal text and describe the effects of structure and organisation. We begin this article by tracing the variable understandings of what reading multimodal text might entail through the Framing Paper (National Curriculum Board, 2008), the Framing Paper Consultation Report (National Curriculum Board, 2009a), the Shaping Paper (National Curriculum Board, 2009b) and Version 3.0 of the Australian Curriculum English (ACARA, 2012). Our findings show that the theoretical and descriptive framework for doing so is implicit. Drawing together multiple but internally coherent theories from the field of semiotics, we suggest one way to work towards three Year 5 learning outcomes from the reading/writing mode. The affordances of assembling a broad but explicit technical metalanguage for an informed reading of the integrated design elements of multimodal texts are noted.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objectives: Researchers have suggested that approximately 1% of individuals within the community have psychopathic tendencies (Neumann and Hare, 2008), although confirmatory evidence is scant. Design: The current study aimed to extend previous research beyond university student samples to explore the effect of impression management and self-deception on the identification of psychopathic traits. Methods: A non-incarcerated community sample comprising of 300 adults completed the Self-Reported Psychopathy scale – version 3 (SRP-III; Paulhus, Hemphill & Hare, in press) as well as the Paulhus Deception Scales (PDS; Paulhus, 1998). Results: Results indicated that at least 1% of the current community sample had clear psychopathic tendencies, and that such tendencies were found in younger males who mis-used alcohol. Conclusions: Importantly, individuals with psychopathic traits did not present with an inflated propensity to distort assessment responses, which provides support for future research endeavours that aim to conduct larger-scale psychopathy assessments within the community. This paper further outlines the study implications in regards to the practical assessment of psychopathy.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This work experimentally examines the performance benefits of a regional CORS network to the GPS orbit and clock solutions for supporting real-time Precise Point Positioning (PPP). The regionally enhanced GPS precise orbit solutions are derived from a global evenly distributed CORS network added with a densely distributed network in Australia and New Zealand. A series of computational schemes for different network configurations are adopted in the GAMIT-GLOBK and PANDA data processing. The precise GPS orbit results show that the regionally enhanced solutions achieve the overall orbit improvements with respect to the solutions derived from the global network only. Additionally, the orbital differences over GPS satellite arcs that are visible by any of the five Australia-wide CORS stations show a higher percentage of overall improvements compared to the satellite arcs that are not visible from these stations. The regional GPS clock and Uncalibrated Phase Delay (UPD) products are derived using the PANDA real time processing module from Australian CORS networks of 35 and 79 stations respectively. Analysis of PANDA kinematic PPP and kinematic PPP-AR solutions show certain overall improvements in the positioning performance from a denser network configuration after solution convergence. However, the clock and UPD enhancement on kinematic PPP solutions is marginal. It is suggested that other factors, such as effects of ionosphere, incorrectly fixed ambiguities, may be the more dominating, deserving further research attentions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Denial-of-service (DoS) attacks are a growing concern to networked services like the Internet. In recent years, major Internet e-commerce and government sites have been disabled due to various DoS attacks. A common form of DoS attack is a resource depletion attack, in which an attacker tries to overload the server's resources, such as memory or computational power, rendering the server unable to service honest clients. A promising way to deal with this problem is for a defending server to identify and segregate malicious traffic as earlier as possible. Client puzzles, also known as proofs of work, have been shown to be a promising tool to thwart DoS attacks in network protocols, particularly in authentication protocols. In this thesis, we design efficient client puzzles and propose a stronger security model to analyse client puzzles. We revisit a few key establishment protocols to analyse their DoS resilient properties and strengthen them using existing and novel techniques. Our contributions in the thesis are manifold. We propose an efficient client puzzle that enjoys its security in the standard model under new computational assumptions. Assuming the presence of powerful DoS attackers, we find a weakness in the most recent security model proposed to analyse client puzzles and this study leads us to introduce a better security model for analysing client puzzles. We demonstrate the utility of our new security definitions by including two hash based stronger client puzzles. We also show that using stronger client puzzles any protocol can be converted into a provably secure DoS resilient key exchange protocol. In other contributions, we analyse DoS resilient properties of network protocols such as Just Fast Keying (JFK) and Transport Layer Security (TLS). In the JFK protocol, we identify a new DoS attack by applying Meadows' cost based framework to analyse DoS resilient properties. We also prove that the original security claim of JFK does not hold. Then we combine an existing technique to reduce the server cost and prove that the new variant of JFK achieves perfect forward secrecy (the property not achieved by original JFK protocol) and secure under the original security assumptions of JFK. Finally, we introduce a novel cost shifting technique which reduces the computation cost of the server significantly and employ the technique in the most important network protocol, TLS, to analyse the security of the resultant protocol. We also observe that the cost shifting technique can be incorporated in any Diffine{Hellman based key exchange protocol to reduce the Diffie{Hellman exponential cost of a party by one multiplication and one addition.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The work presents a new method for the design of ideal secret sharing. The method uses regular mappings that are well suited for construction of perfect secret sharing. The restriction of regular mappings to permutations gives a convenient tool for investigation of the relation between permutations and ideal secret sharing generated by them.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Sub-oxide-to-metallic highly-crystalline nanowires with uniformly distributed nanopores in the 3 nm range have been synthesized by a unique combination of the plasma oxidation, re-deposition and electron-beam reduction. Electron beam exposure-controlled oxide → sub-oxide → metal transition is explained using a non-equilibrium model.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Semantic knowledge is supported by a widely distributed neuronal network, with differential patterns of activation depending upon experimental stimulus or task demands. Despite a wide body of knowledge on semantic object processing from the visual modality, the response of this semantic network to environmental sounds remains relatively unknown. Here, we used fMRI to investigate how access to different conceptual attributes from environmental sound input modulates this semantic network. Using a range of living and manmade sounds, we scanned participants whilst they carried out an object attribute verification task. Specifically, we tested visual perceptual, encyclopedic, and categorical attributes about living and manmade objects relative to a high-level auditory perceptual baseline to investigate the differential patterns of response to these contrasting types of object-related attributes, whilst keeping stimulus input constant across conditions. Within the bilateral distributed network engaged for processing environmental sounds across all conditions, we report here a highly significant dissociation within the left hemisphere between the processing of visual perceptual and encyclopedic attributes of objects.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background Multi attribute utility instruments (MAUIs) are preference-based measures that comprise a health state classification system (HSCS) and a scoring algorithm that assigns a utility value to each health state in the HSCS. When developing a MAUI from a health-related quality of life (HRQOL) questionnaire, first a HSCS must be derived. This typically involves selecting a subset of domains and items because HRQOL questionnaires typically have too many items to be amendable to the valuation task required to develop the scoring algorithm for a MAUI. Currently, exploratory factor analysis (EFA) followed by Rasch analysis is recommended for deriving a MAUI from a HRQOL measure. Aim To determine whether confirmatory factor analysis (CFA) is more appropriate and efficient than EFA to derive a HSCS from the European Organisation for the Research and Treatment of Cancer’s core HRQOL questionnaire, Quality of Life Questionnaire (QLQ-C30), given its well-established domain structure. Methods QLQ-C30 (Version 3) data were collected from 356 patients receiving palliative radiotherapy for recurrent/metastatic cancer (various primary sites). The dimensional structure of the QLQ-C30 was tested with EFA and CFA, the latter informed by the established QLQ-C30 structure and views of both patients and clinicians on which are the most relevant items. Dimensions determined by EFA or CFA were then subjected to Rasch analysis. Results CFA results generally supported the proposed QLQ-C30 structure (comparative fit index =0.99, Tucker–Lewis index =0.99, root mean square error of approximation =0.04). EFA revealed fewer factors and some items cross-loaded on multiple factors. Further assessment of dimensionality with Rasch analysis allowed better alignment of the EFA dimensions with those detected by CFA. Conclusion CFA was more appropriate and efficient than EFA in producing clinically interpretable results for the HSCS for a proposed new cancer-specific MAUI. Our findings suggest that CFA should be recommended generally when deriving a preference-based measure from a HRQOL measure that has an established domain structure.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Despite a significant increase in the number of women enrolling and graduating from design courses, the reality is that women remain ‘invisible’ in the design profession (Bruce, 1985). Over two decades ago, Bruce and Lewis (1990) argued that women were less likely than men to be designers due to three key gendered hurdles: the completion of a design degree, getting a design job and obtaining success in a design job. This paper focuses specifically on Australian women’s experience of hurdle one: the completion of a design degree, utilising industrial design as a case study. Semi-structured interview questions (exploring issues such as experience in class and the workshop, accessibility of the course and content, types of projects etc) were recorded and transcribed verbatim, with a thematic analysis conducted to better understand women’s experiences in completing their industrial design degree. This paper focuses on one key theme “navigating the design studio”, which comprises of three sub-themes: design skill development, the workshop experience and course evaluation. These findings highlight the need to understand the educational experience to ensure female designers remain motivated and eventually employable.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the present study we utilised functional magnetic resonance imaging (fMRI) to examine cerebral activation during performance of a classic motor task in which response suppression load was parametrically varied. Linear increases in activity were observed in a distributed network of regions across both cerebral hemispheres, although with more extensive involvement of the right prefrontal cortex. Activated regions included prefrontal, parietal and occipitotemporal cortices. Decreasing activation was similarly observed in a distributed network of regions. These response forms are discussed in terms of an increasing requirement for visual cue discrimination and suppression/selection of motor responses, and a decreasing probability of the occurrence of non-target stimuli and attenuation of a prepotent tendency to respond. The results support recent proposals for a dominant role for the right-hemisphere in performance of motor response suppression tasks that emphasise the importance of the right prefrontal cortex.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In November 2010, tension between Internet infrastructure companies boiled over in a dispute between content distribution network (CDN) Level 3 and Internet service provider (ISP) Comcast. Level 3, a distribution partner of Netflix, accused Comcast of violating the principles of net neutrality when the ISP increased distribution fees for carrying high bandwidth services. Comcast justified its actions by stating that the price increase was standard practice and argued Level 3 was trying to avoid paying its fair share. The dispute exemplifies the growing concern over the rising costs of streaming media services. The companies facing these inflated infrastructure costs are CDNs (Level 3, Equinix, Limelight, Akamai, and Voxel), companies that host streaming media content on server farms and distribute the content to a variety of carriers, and ISPs (Comcast, Time Warner, Cox, and AT&T), the cable and phone companies that provide “last mile” service to paying customers. Both CDNs and ISPs are lobbying government regulators to keep their costs at a minimum. The outcome of these disputes will influence the cost, quality, and legal status of streaming media.