163 resultados para IP spoofing
Resumo:
With the recent regulatory reforms in a number of countries, railways resources are no longer managed by a single party but are distributed among different stakeholders. To facilitate the operation of train services, a train service provider (SP) has to negotiate with the infrastructure provider (IP) for a train schedule and the associated track access charge. This paper models the SP and IP as software agents and the negotiation as a prioritized fuzzy constraint satisfaction (PFCS) problem. Computer simulations have been conducted to demonstrate the effects on the train schedule when the SP has different optimization criteria. The results show that by assigning different priorities on the fuzzy constraints, agents can represent SPs with different operational objectives.
Resumo:
In this paper, we present the design and construction of a prototype target tracking system. The experimental set up consists of three main modules for moving the object, detecting the motion of the object and its tracking. The mechanism for moving the object includes an object and two stepper motors and their driving and control circuitry. The detection of the object’s motion is realized by photo switch array. The tracking mechanism consists of a laser beam and two DC servomotors and their associated circuitry. The control algorithm is a standard fuzzy logic controller. The system is designed to operate in two modes in such a way that the role of target and tracker can be interchanged. Experimental results indicate that the fuzzy controller is capable of controlling the system in both modes.
Resumo:
China has made great progress in constructing comprehensive legislative and judicial infrastructures to protect intellectual property rights. But levels of enforcement remain low. Estimates suggest that 90% of film and music products consumed in China are ‘pirated’ and in 2009 81% of the infringing goods seized at the US border originated from China. Despite of heavy criticism over its failure to enforce IPRs, key areas of China’s creative industries, including film, mobile-music, fashion and animation, are developing rapidly. This paper explores how the rapid expansion of China’s creative economy might be reconciled with conceptual approaches that view the CIs in terms of creativity inputs and IP outputs. It argues that an evolutionary understanding of copyright’s role in creative innovation might better explain China’s experiences and provide more general insights into the nature of the creative industries and the policies most likely to promote growth in this sector of the economy.
Resumo:
The emergence of mobile and ubiquitous computing technology has created what is often referred to as the hybrid space – a virtual layer of digital information and interaction opportunities that sit on top of and augment the physical environment. Embodied media materialise digital information as observable and sometimes interactive parts of the physical environment. The aim of this work is to explore ways to enhance people’s situated real world experience, and to find out what the role and impact of embodied media in achieving this goal can be. The Edge, an initiative of the State Library of Queensland in Brisbane, Australia, and case study of this thesis, envisions to be a physical place for people to meet, explore, experience, learn and teach each other creative practices in various areas related to digital technology and arts. Guided by an Action Research approach, this work applies Lefebvre’s triad of space (1991) to investigate the Edge as a social space from a conceived, perceived and lived point of view. Based on its creators’ vision and goals on the conceived level, different embodied media are iteratively designed, implemented and evaluated towards shaping and amplifying the Edge’s visitor experience on the perceived and lived level.
Resumo:
Given there is currently a migration trend from traditional electrical supervisory control and data acquisition (SCADA) systems towards a smart grid based approach to critical infrastructure management. This project provides an evaluation of existing and proposed implementations for both traditional electrical SCADA and smart grid based architectures, and proposals a set of reference requirements which test bed implementations should implement. A high-level design for smart grid test beds is proposed and initial implementation performed, based on the proposed design, using open source and freely available software tools. The project examines the move towards smart grid based critical infrastructure management and illustrates the increased security requirements. The implemented test bed provides a basic framework for testing network requirements in a smart grid environment, as well as a platform for further research and development. Particularly to develop, implement and test network security related disturbances such as intrusion detection and network forensics. The project undertaken proposes and develops an architecture of the emulation of some smart grid functionality. The Common Open Research Emulator (CORE) platform was used to emulate the communication network of the smart grid. Specifically CORE was used to virtualise and emulate the TCP/IP networking stack. This is intended to be used for further evaluation and analysis, for example the analysis of application protocol messages, etc. As a proof of concept, software libraries were designed, developed and documented to enable and support the design and development of further smart grid emulated components, such as reclosers, switches, smart meters, etc. As part of the testing and evaluation a Modbus based smart meter emulator was developed to provide basic functionality of a smart meter. Further code was developed to send Modbus request messages to the emulated smart meter and receive Modbus responses from it. Although the functionality of the emulated components were limited, it does provide a starting point for further research and development. The design is extensible to enable the design and implementation of additional SCADA protocols. The project also defines an evaluation criteria for the evaluation of the implemented test bed, and experiments are designed to evaluate the test bed according to the defined criteria. The results of the experiments are collated and presented, and conclusions drawn from the results to facilitate discussion on the test bed implementation. The discussion undertaken also present possible future work.
Resumo:
Peer-to-Patent Australia will initially run as a 12 month pilot project designed to test whether an open community of reviewers can effectively locate prior art that might not otherwise be located by the patent office during a typical examination. Patent applications will be made available for peer review for a period of 6 months and there will follow a 6 month period of joint qualitative and quantitative assessment of the pilot project by IP Australia and QUT. The objective of Peer-to-Patent Australia is to improve the patent examination process and the quality of issued patents by utilising the knowledge and skills of experts in the broader community. It is a way of linking the scientific and technical expertise of anyone with an Internet connection with the expertise of a patent examiner. That community participation consists of members of the public reviewing patent applications and contributing relevant prior art references and comments within a web-based forum. The aim is to bring to light prior art, particularly non-patent prior art, that might otherwise not be identified by patent examiners. The better the prior art resources a patent examiner has at his or her disposal, the more likely a patent application will be assessed properly in terms of novelty and inventive step. The role of Peer-to-Patent Australia in this regard is to act as both a facilitator of discussion and a collector of prior art submissions. Peer-to-Patent Australia collects relevant prior art references on behalf of the reviewing community and forwards that prior art to IP Australia. Section 27 of the Patents Act 1990 (Cth) allows for the Commissioner of Patents to receive submissions of prior art by third parties relevant to the novelty and inventiveness of a particular patent application.
Resumo:
There are two binding sites on the β1-adrenoceptor (AR), β1H and β1L corresponding to high and low affinity binding sites respectively, which can be activated to cause cardiostimulation (reviewed Kaumann and Molenaar, 2008). Some β-blockers that block β1AR and β2ARs can activate β1LARs at higher concentrations than those required to cause blockade. The β2AR does not form a corresponding low affinity binding site (Baker et al 2002) and therefore we postulated that heterologous amino acids are responsible for the formation of β1LAR. Our aim was to investigate whether heterologous amino acids of transmembrane domain V (TMDV) of β1AR and β2ARs contribute to β1LAR. β1ARs, β2ARs and mutant β1ARs containing all (β1(β2TMDV)AR) or single amino acids of TMDV of the β2AR were prepared and stably expressed in Chinese Hamster Ovary cells. Concentration-effect curves for cyclicAMP accumulation were carried out for (-)-CGP12177 or (-)-isoprenaline in the absence or presence of (-)-bupranolol. _______________________________________________________________________ (-)-CGP 12177 (-)-Bupranolol affinity (pKB) pEC50 vs (-)-CGP 12177 vs (-)-isoprenaline _______________________________________________________________________ β1AR 8.00 ± 0.11 (11) 7.23 ± 0.23 (5) 9.52 ± 0.28 (5) β2AR (high density) 9.24 ± 0.14 (5) 9.82 ± 0.52 (8) xPaulxxxxxxx β2AR (low density) no effect β1(β2TMV)AR 8.86 ± 0.10 (15) 8.06 ± 0.17 (8) 9.08 ± 0.22 (6) β1(V230I)AR 9.07 ± 0.07 (10) 7.64 ± 0.12 (8) 9.36 ± 0.28 (9) β1(R222Q)AR 8.09 ± 0.29 (6) 7.33 ± 0.23 (5) 9.36 ± 0.08 (6) β1(V230A)AR 7.59 ± 0.09 (6) 7.32 ± 0.24 (4) 8.62 ± 0.18 (5) _______________________________________________________________________ The potency of (-)-CGP12177 was higher at β2AR than at β1AR consistent with activation through a low affinity site at the β1AR (β1LAR) but not β2AR. The presence of V230 in β1AR accounted for the lower potency of (-)-CGP 12177. The affinity of (-)-bupranolol at β1AR and mutants was higher when determined with (-)-isoprenaline than with (-)-CGP 12177. The affinity of (-)-bupranolol determined against (-)-CGP 12177 was lower at β1AR compared to β2AR. The presence of V230 in β1AR accounted in part for the lower affinity. In conclusion V230 of the β1AR contributes in part to the low affinity binding site of β1AR. Baker JG, Hall IP, Hill SJ (2002). Pharmacological characterization of CGP12177 at the human β2-adrenoceptor. Br J Pharmacol 137, 400−408 Kaumann AJ, Molenaar P (2008) The low-affinity site of the β1-adrenoceptor and its relevance to cardiovascular pharmacology. Pharmacol Ther 118, 303-336
Resumo:
Objective: To explore the role of psychological distress in the self-reported risky driving of young novice drivers. Design: Cross-sectional online survey of 761 tertiary students aged 17-25 years with an intermediate (Provisional) driving licence who completed Kessler’s Psychological Distress Scale and the Behaviour of Young Novice Drivers Scale. Setting: Queensland, Australia, August-October 2009. Main outcome measures: Psychological distress, risky driving. Results: Regression analyses revealed that psychological distress uniquely explained 8.5% of the variance in young novice’s risky driving, with adolescents experiencing psychological distress also reporting higher levels of risky driving. Psychological distress uniquely explained a significant 6.7% and 9.5% of variance in risky driving for males and females respectively. Conclusions: Medical practitioners treating adolescents who have been injured through risky behaviour need to aware of the potential contribution of psychological distress, whilst mental health professionals working with adolescents experiencing psychological distress need to be aware of this additional source of potential harm. The nature of the causal relationships linking psychological distress and risky driving behaviour are not yet fully understood, indicating a need for further research so that strategies such as screening can be investigated.
Resumo:
In open railway markets, coordinating train schedules at an interchange station requires negotiation between two independent train operating companies to resolve their operational conflicts. This paper models the stakeholders as software agents and proposes an agent negotiation model to study their interaction. Three negotiation strategies have been devised to represent the possible objectives of the stakeholders, and they determine the behavior in proposing offers to the proponent. Empirical simulation results confirm that the use of the proposed negotiation strategies lead to outcomes that are consistent with the objectives of the stakeholders.
Resumo:
A Networked Control System (NCS) is a feedback-driven control system wherein the control loops are closed through a real-time network. Control and feedback signals in an NCS are exchanged among the system’s components in the form of information packets via the network. Nowadays, wireless technologies such as IEEE802.11 are being introduced to modern NCSs as they offer better scalability, larger bandwidth and lower costs. However, this type of network is not designed for NCSs because it introduces a large amount of dropped data, and unpredictable and long transmission latencies due to the characteristics of wireless channels, which are not acceptable for real-time control systems. Real-time control is a class of time-critical application which requires lossless data transmission, small and deterministic delays and jitter. For a real-time control system, network-introduced problems may degrade the system’s performance significantly or even cause system instability. It is therefore important to develop solutions to satisfy real-time requirements in terms of delays, jitter and data losses, and guarantee high levels of performance for time-critical communications in Wireless Networked Control Systems (WNCSs). To improve or even guarantee real-time performance in wireless control systems, this thesis presents several network layout strategies and a new transport layer protocol. Firstly, real-time performances in regard to data transmission delays and reliability of IEEE 802.11b-based UDP/IP NCSs are evaluated through simulations. After analysis of the simulation results, some network layout strategies are presented to achieve relatively small and deterministic network-introduced latencies and reduce data loss rates. These are effective in providing better network performance without performance degradation of other services. After the investigation into the layout strategies, the thesis presents a new transport protocol which is more effcient than UDP and TCP for guaranteeing reliable and time-critical communications in WNCSs. From the networking perspective, introducing appropriate communication schemes, modifying existing network protocols and devising new protocols, have been the most effective and popular ways to improve or even guarantee real-time performance to a certain extent. Most previously proposed schemes and protocols were designed for real-time multimedia communication and they are not suitable for real-time control systems. Therefore, devising a new network protocol that is able to satisfy real-time requirements in WNCSs is the main objective of this research project. The Conditional Retransmission Enabled Transport Protocol (CRETP) is a new network protocol presented in this thesis. Retransmitting unacknowledged data packets is effective in compensating for data losses. However, every data packet in realtime control systems has a deadline and data is assumed invalid or even harmful when its deadline expires. CRETP performs data retransmission only in the case that data is still valid, which guarantees data timeliness and saves memory and network resources. A trade-off between delivery reliability, transmission latency and network resources can be achieved by the conditional retransmission mechanism. Evaluation of protocol performance was conducted through extensive simulations. Comparative studies between CRETP, UDP and TCP were also performed. These results showed that CRETP significantly: 1). improved reliability of communication, 2). guaranteed validity of received data, 3). reduced transmission latency to an acceptable value, and 4). made delays relatively deterministic and predictable. Furthermore, CRETP achieved the best overall performance in comparative studies which makes it the most suitable transport protocol among the three for real-time communications in a WNCS.
Resumo:
Objectives: To quantify the concordance of hospital child maltreatment data with child protection service (CPS) records and identify factors associated with linkage. Methods: Multivariable logistic regression analysis was conducted following retrospective medical record review and database linkage of 884 child records from 20 hospitals and the CPS in Queensland, Australia. Results: Nearly all children with hospital assigned maltreatment codes (93.1%) had a CPS record. Of these, 85.1% had a recent notification. 29% of the linked maltreatment group (n=113) were not known to CPS prior to the hospital presentation. Almost 1/3 of children with unintentional injury hospital codes were known to CPS. Just over 24% of the linked unintentional injury group (n=34) were not known to CPS prior to the hospital presentation but became known during or after discharge from hospital. These estimates are higher than the 2006/07 annual rate of 2.39% of children being notified to CPS. Rural children were more likely to link to CPS, and children were over 3 times more likely to link if the index injury documentation included additional diagnoses or factors affecting their health. Conclusions: The system for referring maltreatment cases to CPS is generally efficient, although up to 1 in 15 children had codes for maltreatment but could not be linked to CPS data. The high proportion of children with unintentional injury codes who linked to CPS suggests clinicians and hospital-based child protection staff should be supported by further education and training to ensure children at risk are being detected by the child protection system.
Resumo:
Data preprocessing is widely recognized as an important stage in anomaly detection. This paper reviews the data preprocessing techniques used by anomaly-based network intrusion detection systems (NIDS), concentrating on which aspects of the network traffic are analyzed, and what feature construction and selection methods have been used. Motivation for the paper comes from the large impact data preprocessing has on the accuracy and capability of anomaly-based NIDS. The review finds that many NIDS limit their view of network traffic to the TCP/IP packet headers. Time-based statistics can be derived from these headers to detect network scans, network worm behavior, and denial of service attacks. A number of other NIDS perform deeper inspection of request packets to detect attacks against network services and network applications. More recent approaches analyze full service responses to detect attacks targeting clients. The review covers a wide range of NIDS, highlighting which classes of attack are detectable by each of these approaches. Data preprocessing is found to predominantly rely on expert domain knowledge for identifying the most relevant parts of network traffic and for constructing the initial candidate set of traffic features. On the other hand, automated methods have been widely used for feature extraction to reduce data dimensionality, and feature selection to find the most relevant subset of features from this candidate set. The review shows a trend toward deeper packet inspection to construct more relevant features through targeted content parsing. These context sensitive features are required to detect current attacks.
Resumo:
Railway timetabling is an important process in train service provision as it matches the transportation demand with the infrastructure capacity while customer satisfaction is also considered. It is a multi-objective optimisation problem, in which a feasible solution, rather than the optimal one, is usually taken in practice because of the time constraint. The quality of services may suffer as a result. In a railway open market, timetabling usually involves rounds of negotiations among a number of self-interested and independent stakeholders and hence additional objectives and constraints are imposed on the timetabling problem. While the requirements of all stakeholders are taken into consideration simultaneously, the computation demand is inevitably immense. Intelligent solution-searching techniques provide a possible solution. This paper attempts to employ a particle swarm optimisation (PSO) approach to devise a railway timetable in an open market. The suitability and performance of PSO are studied on a multi-agent-based railway open-market negotiation simulation platform.
Resumo:
Business education leaders have expressed interest in learning more about design and design thinking and their contributions to better problem framing, problem solving and to generating new solutions. Many business schools have engaged in educational programs with students from multiple disciplines, applying design thinking to business problems around workplace issues. This paper investigates a range of educational programs that teach design thinking to students in business education, at undergraduate and postgraduate levels around the world. We identify four patterns of program delivery that are emerging: human-centered design, integrative thinking, design management and design as strategy and discuss contributions from each. We expect that these four patterns of program delivery will continue and predict an increasing focus on programs around design as strategy in the near future.
Resumo:
In this paper we examine the usability of tablets for students in middle school in the context of mobile environmental education. Our study focuses on the expressive qualities of three input methods – text, audio and drawing – and the extent to which these methods support on-task behaviour. In our study 28 small groups of children were given iPads and asked to record ecological observations from around their schoolyard. The effectiveness of the devices and their core utility for expressive, on-task data capture is assessed.