818 resultados para high security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The growing importance of logistics in increasingly globalised production and consumption systems strengthens the case for explicit consideration of the climate risks that may impact on the operation of ports in the future, as well as the formulation of adaptation responses that act to enhance their resilience. Within a logistics chain, seaports are functional nodes of significant strategic importance, and are considered as critical gateways linking local and national supply chains to global markets. However, they are more likely to be exposed to vagaries of climate-related extreme events due to their coastal locations. As such, they need to be adaptive and respond to the projected impacts of climate change, in particular extreme weather events. These impacts are especially important in the logistics context as they could result in varying degrees of business interruption; including business closure in the worst case scenario. Since trans-shipment of freight for both the import and export of goods and raw materials has a significant impact on Australia’s sustained economic growth it was considered important to undertake a study of port functional assets, to assess their vulnerability to climate change, to model the potential impacts of climate-related extreme events, and to highlight possible adaptation responses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For over 150 years Australia has exported bulk, undifferentiated, commodities such as wool, wheat, meat and sugar to the UK and more recently to Japan, Korea, and the Middle East. It is estimated that, each year, Australia's farming system feeds a domestic population of some 22 million people, while exporting enough food to feed another 40 million. With the Australian population expected to double in the next 40 years, and with the anticipated growth in the world's population to reach a level of some 9 billion (from its present level of 7 billion) in the same period, there are strong incentives for an expansion of food production in Australia. Neoliberal settings are encouraging this expansion at the same time as they are facilitating importation of foods, higher levels of foreign direct investment and the commoditisation of resources (such as water). Yet, expansion in food production – and in an era of climate change – will continue to compromise the environment. After discussing Australia's neoliberal framework and its relation to farming, this paper outlines how Australia is attempting to address the issue of food security. It argues that productivist farming approaches that are favoured by both industry and government are proving incapable of bringing about long-term production outcomes that will guarantee national food security.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports findings from an Australian survey of Year 10 students (N=3759) indicating that those in small rural and remote areas tend to enjoy school science significantly less than their peers in larger towns and cities (Lyons & Quinn, 2010). The study also found that rural and remote students were less inclined than those in other locations to enjoy science relative to other subjects. Such a result has not previously been recorded in the science education literature and raises a number of questions about the relevance and quality of the science education experienced by rural and remote students. It also raises timely questions about the applicability to rural and remote students of an Australian Science Curriculum. The paper explores these issues and their implications for policy and research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ideal coating materials for implants should be able to induce excellent osseointegration, which requires several important parameters, such as good bonding strength, limited inflammatory reaction, balanced osteoclastogenesis and osteogenesis, to gain well-functioning coated implants with long-term life span after implantation. Bioactive elements, like Sr, Mg and Si, have been found to play important roles in regulating the biological responses. It is of great interest to combine bioactive elements for developing bioactive coatings on Ti-6Al-4V orthopedic implants to elicit multidirectional effects on the osseointegration. In this study, Sr, Mg and Si-containing bioactive Sr2MgSi2O7 (SMS) ceramic coatings on Ti-6Al-4V were successfully prepared by plasma-spray coating method. The prepared SMS coatings have significantly higher bonding strength (~37MPa) than conventional pure hydroxyapatite (HA) coatings (mostly in the range of 15-25 MPa). It was also found that the prepared SMS coatings switch the macrophage phenotype into M2 extreme, inhibiting the inflammatory reaction via the inhibition of Wnt5A/Ca2+ and Toll-like receptor (TLR) pathways of macrophages. In addition, the osteoclastic activities were also inhibited by SMS coatings. The expression of osteoclastogenesis related genes (RANKL and MCSF) in bone marrow derived mesenchymal cells (BMSCs) with the involvement of macrophages was decreased, while OPG expression was enhanced on SMS coatings compared to HA coatings, indicating that SMS coatings also downregulated the osteoclastogenesis. However, the osteogenic differentiation of BMSCs with the involvement of macrophages was comparable between SMS and HA coatings. Therefore, the prepared SMS coatings showed multidirectional effects, such as improving bonding strength, reducing inflammatory reaction and downregulating osteoclastic activities, but maintaining a comparable osteogenesis, as compared with HA coatings. The combination of bioactive elements of Sr, Mg and Si into bioceramic coatings can be a promising method to develop bioactive implants with multifunctional properties for orthopaedic application.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Responsibility to Protect and Women, Peace and Security: Aligning the Protection Agendas, editors Davies, Nwokora, Stamnes and Teitt address the intersections of the Responsibility to Protect (R2P) principle and the Women, Peace, and Security (WPS) agenda. Widespread or systematic sexual or gender-based violence is a war crime, a crime against humanity and an act of genocide, all of which are clearly addressed in the R2P principle. The protection of those at risk of widespread sexual violence is therefore not only relative to the Women, Peace and Security (WPS) agenda, but a fundamental sovereign obligation for all states as part of their commitment to R2P. Contributions from policy-makers and academics consider both the merits and the utility of aligning the protection agendas of R2P and WPS. Ultimately, a number of actionable recommendations are made concerning a unification of the agendas to best support the global empowerment of women and prevention of mass atrocities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research introduces a general methodology in order to create a Coloured Petri Net (CPN) model of a security protocol. Then standard or user-defined security properties of the created CPN model are identified. After adding an attacker model to the protocol model, the security property is verified using state space method. This approach is applied to analyse a number of trusted computing protocols. The results show the applicability of proposed method to analyse both standard and user-defined properties.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Overconsumption of snack foods has been linked to rising rates of obesity, with our ‘obesogenic’ environment and its abundance of palatable, high-calorie foods and associated cues especially implicated. However, it is clear that some individuals are particularly susceptible to overconsumption and weight gain. It was hypothesised that individuals sensitive to the rewarding properties of palatable foods, and associated stimuli, would show elevated consumption. Snack food intake was measured in 50 adults (mean age 34.5 years, BMI 23.9 kg/m2, 56% female) in a repeated measures design, both with and without a ‘food cue’. Trait (BIS/BAS scales), behavioural (computerised CARROT) and food reward were assessed. Sensitivity to food reward, but not generalised reward, was positively associated with snack food intake. This relationship was not affected by the presence of a food cue. Findings are discussed in the context of implications for weight management.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

'Choosing Science' reports on the most thorough study yet undertaken in Australia to investigate Year 10 students' decisions about whether to take science subjects. The study was well supported by ASTA members, with around 590 teachers and 3800 students participating. It examined teachers' views on the persistent declines in science enrolments, and students' perceptions of school science and aspirations towards further study and careers. The report discusses students' attitudes to science, their enrolment deliberations, sources of advice and recommendations for change. The report identifies the most likely and unlikely contributors to enrolment declines, and makes 10 recommendations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Within the cardiac high dependency unit it is currently a member of the surgical team who makes the decision for a patient's chest drain to be removed after cardiac surgery. This has often resulted in delays in discharging one patient and therefore in admitting the next. A pilot study was carried out using a working standard that had been developed, incorporating an algorithmic model. The results have enabled nursing staff in a cardiac high dependency unit to undertake this responsibility independently.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Reliability of carrier phase ambiguity resolution (AR) of an integer least-squares (ILS) problem depends on ambiguity success rate (ASR), which in practice can be well approximated by the success probability of integer bootstrapping solutions. With the current GPS constellation, sufficiently high ASR of geometry-based model can only be achievable at certain percentage of time. As a result, high reliability of AR cannot be assured by the single constellation. In the event of dual constellations system (DCS), for example, GPS and Beidou, which provide more satellites in view, users can expect significant performance benefits such as AR reliability and high precision positioning solutions. Simply using all the satellites in view for AR and positioning is a straightforward solution, but does not necessarily lead to high reliability as it is hoped. The paper presents an alternative approach that selects a subset of the visible satellites to achieve a higher reliability performance of the AR solutions in a multi-GNSS environment, instead of using all the satellites. Traditionally, satellite selection algorithms are mostly based on the position dilution of precision (PDOP) in order to meet accuracy requirements. In this contribution, some reliability criteria are introduced for GNSS satellite selection, and a novel satellite selection algorithm for reliable ambiguity resolution (SARA) is developed. The SARA algorithm allows receivers to select a subset of satellites for achieving high ASR such as above 0.99. Numerical results from a simulated dual constellation cases show that with the SARA procedure, the percentages of ASR values in excess of 0.99 and the percentages of ratio-test values passing the threshold 3 are both higher than those directly using all satellites in view, particularly in the case of dual-constellation, the percentages of ASRs (>0.99) and ratio-test values (>3) could be as high as 98.0 and 98.5 % respectively, compared to 18.1 and 25.0 % without satellite selection process. It is also worth noting that the implementation of SARA is simple and the computation time is low, which can be applied in most real-time data processing applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We introduce the notion of distributed password-based public-key cryptography, where a virtual high-entropy private key is implicitly defined as a concatenation of low-entropy passwords held in separate locations. The users can jointly perform private-key operations by exchanging messages over an arbitrary channel, based on their respective passwords, without ever sharing their passwords or reconstituting the key. Focusing on the case of ElGamal encryption as an example, we start by formally defining ideal functionalities for distributed public-key generation and virtual private-key computation in the UC model. We then construct efficient protocols that securely realize them in either the RO model (for efficiency) or the CRS model (for elegance). We conclude by showing that our distributed protocols generalize to a broad class of “discrete-log”-based public-key cryptosystems, which notably includes identity-based encryption. This opens the door to a powerful extension of IBE with a virtual PKG made of a group of people, each one memorizing a small portion of the master key.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For the past several decades, cryptographers have consistently provided us with stronger and more capable primitives and protocols that have found many applications in security systems in everyday life. One of the central tenets of cryptographic design is that, whereas a system’s architecture ought to be public and open to scrutiny, the keys on which it depends — long, utterly random, unique strings of bits — will be perfectly preserved by their owner, and yet nominally inaccessible to foes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a pole inspection system for outdoor environments comprising a high-speed camera on a vertical take-off and landing (VTOL) aerial platform. The pole inspection task requires a vehicle to fly close to a structure while maintaining a fixed stand-off distance from it. Typical GPS errors make GPS-based navigation unsuitable for this task however. When flying outdoors a vehicle is also affected by aerodynamics disturbances such as wind gusts, so the onboard controller must be robust to these disturbances in order to maintain the stand-off distance. Two problems must therefor be addressed: fast and accurate state estimation without GPS, and the design of a robust controller. We resolve these problems by a) performing visual + inertial relative state estimation and b) using a robust line tracker and a nested controller design. Our state estimation exploits high-speed camera images (100Hz) and 70Hz IMU data fused in an Extended Kalman Filter (EKF). We demonstrate results from outdoor experiments for pole-relative hovering, and pole circumnavigation where the operator provides only yaw commands. Lastly, we show results for image-based 3D reconstruction and texture mapping of a pole to demonstrate the usefulness for inspection tasks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since their introduction, the notions of indistinguishability and non-malleability have been changed and extended by different authors to support different goals. In this paper, we propose new flavors of these notions, investigate their relative strengths with respect to previous notions, and provide the full picture of relationships (i.e., implications and separations) among the security notions for public-key encryption schemes. We take into account the two general security goals of indistinguishability and non-malleability, each in the message space, key space, and hybrid message-key space to find six specific goals, a couple of them, namely complete indistinguishability and key non-malleability, are new. Then for each pair of goals, coming from the indistinguishability or non-malleability classes, we prove either an implication or a separation, completing the full picture of relationships among all these security notions. The implications and separations are respectively supported by formal proofs (i.e., reductions) in the concrete-security framework and by counterexamples.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There has been significant research in the field of database watermarking recently. However, there has not been sufficient attention given to the requirement of providing reversibility (the ability to revert back to original relation from watermarked relation) and blindness (not needing the original relation for detection purpose) at the same time. This model has several disadvantages over reversible and blind watermarking (requiring only the watermarked relation and secret key from which the watermark is detected and the original relation is restored) including the inability to identify the rightful owner in case of successful secondary watermarking, the inability to revert the relation to the original data set (required in high precision industries) and the requirement to store the unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to a high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store the original database at a secure secondary storage. We have implemented our scheme and results show the success rate is limited to 11% even when 48% tuples are modified.