537 resultados para computer forensics tools
Resumo:
Intramedullary nailing is the standard fixation method for displaced diaphyseal fractures of the tibia. An optimal nail design should both facilitate insertion and anatomically fit the bone geometry at its final position in order to reduce the risk of stress fractures and malalignments. Due to the nonexistence of suitable commercial software, we developed a software tool for the automated fit assessment of nail designs. Furthermore, we demonstrated that an optimised nail, which fits better at the final position, is also easier to insert. Three-dimensional models of two nail designs and 20 tibiae were used. The fitting was quantified in terms of surface area, maximum distance, sum of surface areas and sum of maximum distances by which the nail was protruding into the cortex. The software was programmed to insert the nail into the bone model and to quantify the fit at defined increment levels. On average, the misfit during the insertion in terms of the four fitting parameters was smaller for the Expert Tibial Nail Proximal bend (476.3 mm2, 1.5 mm, 2029.8 mm2, 6.5 mm) than the Expert Tibial Nail (736.7 mm2, 2.2 mm, 2491.4 mm2, 8.0 mm). The differences were statistically significant (p ≤ 0.05). The software could be used by nail implant manufacturers for the purpose of implant design validation.
Resumo:
The Distributed Network Protocol v3.0 (DNP3) is one of the most widely used protocols, to control national infrastructure. Widely used interactive packet manipulation tools, such as Scapy, have not yet been augmented to parse and create DNP3 frames (Biondi 2014). In this paper we extend Scapy to include DNP3, thus allowing us to perform attacks on DNP3 in real-time. Our contribution builds on East et al. (2009), who proposed a range of possible attacks on DNP3. We implement several of these attacks to validate our DNP3 extension to Scapy, then executed the attacks on real world equipment. We present our results, showing that many of these theoretical attacks would be unsuccessful in an Ethernet-based network.
Resumo:
Modern power systems have become more complex due to the growth in load demand, the installation of Flexible AC Transmission Systems (FACTS) devices and the integration of new HVDC links into existing AC grids. On the other hand, the introduction of the deregulated and unbundled power market operational mechanism, together with present changes in generation sources including connections of large renewable energy generation with intermittent feature in nature, have further increased the complexity and uncertainty for power system operation and control. System operators and engineers have to confront a series of technical challenges from the operation of currently interconnected power systems. Among the many challenges, how to evaluate the steady state and dynamic behaviors of existing interconnected power systems effectively and accurately using more powerful computational analysis models and approaches becomes one of the key issues in power engineering. The traditional computing techniques have been widely used in various fields for power system analysis with varying degrees of success. The rapid development of computational intelligence, such as neural networks, fuzzy systems and evolutionary computation, provides tools and opportunities to solve the complex technical problems in power system planning, operation and control.
Resumo:
Industrial control systems (ICS) have been moving from dedicated communications to switched and routed corporate networks, making it probable that these devices are being exposed to the Internet. Many ICS have been designed with poor or little security features, making them vulnerable to potential attack. Recently, several tools have been developed that can scan the internet, including ZMap, Masscan and Shodan. However, little in-depth analysis has been done to compare these Internet-wide scanning techniques, and few Internet-wide scans have been conducted targeting ICS and protocols. In this paper we present a Taxonomy of Internet-wide scanning with a comparison of three popular network scanning tools, and a framework for conducting Internet-wide scans.
Resumo:
The definition of tourism “is the travel for recreational, leisure, family or business purposes, usually of a limited duration. Tourism is commonly associated with trans-national travel, but may also refer to travel to another location within the same country”. Tourism as an industry, in today’s modern language is a means of global communication between nations and travelers of all countries, introducing them to the various cultures and societies abroad, as well there history, ancient, historical sites, and languages. Hence, advertising overall has become a tool of necessity in this ever-growing global industry. Given that, tourism is a part of the infrastructure of any country’s economy the growth and development of tourism is of great importance. Advertising plays a vital and is a crucial tool in developing the countries tourism by attractively presenting the nations points-of-interests, historical and cultural. Advertising has a central role in expanding this industry, generating economic growth in this area, as well as creating direct and indirect employment, but most importantly a creative innovating competition in the national and international travel industry. Importantly, to achieve a successful tourist industry, the Travel Agencies and governmental offices of the Ministry’s of Tourism and Business must work hand-in-hand to attain these goals. This article shows the impact of the various media and advertising methods used in tourism, which assisted in identifying the correct tool for expanding the country’s industry of tourism. The results of this study illustrated that the appropriate tools for promotional strategies to attract domestic and foreign traveler’s, found to be the most effective were, handbook, internet advertising, TV, brochures, newspapers
Resumo:
This chapter examines the tools and activities (referred to as approaches) used by a catalyst while facilitating a design-led transformation within an Australian manufacturing small to medium enterprise (SME). Design-led innovation (DLI) aids the use of design at a higher strategic level; however few existing studies investigate the relative influence of approaches used by a catalyst while helping a firm to make a transition in the utilisation of design, specifically from a styling tool to a strategic process. This paper identifies the triggers to encouraging a shift toward understanding, utilising and valuing the business level outcomes of design through a range of design tools and activities within the participating company. Through a 12 month action research program, staff interviews and a reflective journal were utilised as data collection techniques to assess the successfulness of the approaches used during this project. It was found that, through the use of both successful and unsuccessful approaches, the catalyst achieved two key outcomes within the firm: 1) Improvements in the firm’s ability to challenge internal assumptions and standard practices; and 2) the creation of an informed and accurate awareness of company and industry issues. Approaches that made a higher impact of the firm were deemed successful, and were generally relatable to the task at hand, as perceived by employees. Additionally, the sequence in which the approaches were utilised was found to have a direct influence on their successfulness. Learnings from this research will assist future catalysts to facilitate a design-led transformation within a manufacturing SME through the use of design tools and activities with greater effectiveness.
Resumo:
Computer graphic analyses on a broad spectrum of adenosine receptor ligands has shown that both the A1 and A2 adenosine receptors have three binding sites. The spatial relationship of these three binding sites has been defined. Adenosine orientation at A1 and A2 is different.
Resumo:
In this chapter we aim to explore how videogames can lead to improvements in wellbeing. Following Keyes (2007) and Huppert and So (2012) we view wellbeing as a multidimensional concept with both hedonic and eudaimonic aspects. In this chapter we take a broad approach in terms of exploring the impact of videogames on the psychological, social, and physical components of wellbeing. We explore how videogames have been shown to have an impact in each of these domains. Although there is a great deal of evidence for the actual and potential positive impacts of videogames, there are many unanswered questions regarding the situations in which there is likely to be an impact of videogame play on wellbeing, as well as the aspects of wellbeing that are likely to be impacted by videogame play. We conclude the chapter by outlining the key questions for future research. Our focus in this chapter is on the positive influences of videogames. We do not explore research on contexts in which negative impacts are possible or subgroups for which videogames could cause harm. However, these questions are obviously important and we see balanced engagement with age-appropriate videogames as a key prerequisite for any of the wellbeing benefits discussed below.
Resumo:
This paper is a review of the state of play of research linking videogaming and flourishing, and explores the role of videogames and technology to improve mental health and well-being. Its purpose is to develop understandings about the positive intersection of gaming and well-being, to document evidence regarding links between videogames and positive mental health, and to provide guidelines for use by other researchers as they design and use tools and games to improve mental health and well-being. Using Huppert's (Huppert and So, 2013) proposition that to flourish is more than the absence of mental disorder but rather a combination of feeling good and functioning effectively, resulting in high levels of mental well-being, and Seligman's (Seligman, 2011) PERMA theory of well-being, the paper identifies strengths in existing games that generate positive affect, positive functioning, and positive social functioning, contributing to, and supporting mental health and well-being.
Resumo:
Over the last few years, investigations of human epigenetic profiles have identified key elements of change to be Histone Modifications, stable and heritable DNA methylation and Chromatin remodeling. These factors determine gene expression levels and characterise conditions leading to disease. In order to extract information embedded in long DNA sequences, data mining and pattern recognition tools are widely used, but efforts have been limited to date with respect to analyzing epigenetic changes, and their role as catalysts in disease onset. Useful insight, however, can be gained by investigation of associated dinucleotide distributions. The focus of this paper is to explore specific dinucleotides frequencies across defined regions within the human genome, and to identify new patterns between epigenetic mechanisms and DNA content. Signal processing methods, including Fourier and Wavelet Transformations, are employed and principal results are reported.
Resumo:
Biomedical systems involve a large number of entities and intricate interactions between these. Their direct analysis is, therefore, difficult, and it is often necessary to rely on computational models. These models require significant resources and parallel computing solutions. These approaches are particularly suited, given parallel aspects in the nature of biomedical systems. Model hybridisation also permits the integration and simultaneous study of multiple aspects and scales of these systems, thus providing an efficient platform for multidisciplinary research.
Resumo:
Several algorithms and techniques widely used in Computer Science have been adapted from, or inspired by, known biological phenomena. This is a consequence of the multidisciplinary background of most early computer scientists. The field has now matured, and permits development of tools and collaborative frameworks which play a vital role in advancing current biomedical research. In this paper, we briefly present examples of the former, and elaborate upon two of the latter, applied to immunological modelling and as a new paradigm in gene expression.