310 resultados para Edward Morse
Resumo:
Supervisory Control And Data Acquisition (SCADA) systems are widely used in the management of critical infrastructure such as electricity and water distrubution systems. Currently there is little understanding of how to best protect SCADA systems from malicious attacks. We review the constraints and requirements for SCADA security and propose a suitable architecture (SKMA) for secure SCADA communications. The architecture includes a proposed key management protocol (SKMP). We compare the architecture with a previous proposal from Sandia Labs.
Resumo:
Objective: To assess extent of coder agreement for external causes of injury using ICD-10-AM for injury-related hospitalisations in Australian public hospitals. Methods: A random sample of 4850 discharges from 2002 to 2004 was obtained from a stratified random sample of 50 hospitals across four states in Australia. On-site medical record reviews were conducted and external cause codes were assigned blinded to the original coded data. Code agreement levels were grouped into the following agreement categories: block level, 3-character level, 4-character level, 5th-character level, and complete code level. Results: At a broad block level, code agreement was found in over 90% of cases for most mechanisms (eg, transport, fall). Percentage disagreement was 26.0% at the 3-character level; agreement for the complete external cause code was 67.6%. For activity codes, the percentage of disagreement at the 3-character level was 7.3% and agreement for the complete activity code was 68.0%. For place of occurrence codes, the percentage of disagreement at the 4-character level was 22.0%; agreement for the complete place code was 75.4%. Conclusions: With 68% agreement for complete codes and 74% agreement for 3-character codes, as well as variability in agreement levels across different code blocks, place and activity codes, researchers need to be aware of the reliability of their specific data of interest when they wish to undertake trend analyses or case selection for specific causes of interest.
Resumo:
In recent years, the transport simulation of large road networks has become far more rapid and detailed, and many exciting developments in this field have emerged. In this perspective, the authors describe the simulation of automobile, pedestrian and rail traffic, coupled to new applications, such as the embedding of traffic simulation into driving simulators, to give a more realistic environment of driver behavior surrounding the subject vehicle.
Resumo:
The potential of bequests to contribute to the sustainability of charities1 is immense, with social and economic trends opening up the bequest landscape. Yet so much is unknown about how Australians think about charitable bequests – particularly about the motivations, barriers and triggers surrounding this behaviour. Do bequestors differ from other donors? What prevents good intentions from becoming good actions? Where do charities figure in this process? This study aims at a better understanding of those Australians who make a charitable bequest and those who might. It offers individual charities, and the sector as a whole, empirical evidence to support and extend the anecdotal knowledge of those working with donors around this sensitive, but vital, area. This research has been supported by the Perpetual Foundation, the EF and SL Gluyas Trust and the Edward Corbould Charitable Trust under the management of Perpetual Trustee Company Ltd.