194 resultados para sicurezza, exploit, XSS, Beef, browser
Resumo:
Mechanical control systems have become a part of our everyday life. Systems such as automobiles, robot manipulators, mobile robots, satellites, buildings with active vibration controllers and air conditioning systems, make life easier and safer, as well as help us explore the world we live in and exploit it’s available resources. In this chapter, we examine a specific example of a mechanical control system; the Autonomous Underwater Vehicle (AUV). Our contribution to the advancement of AUV research is in the area of guidance and control. We present innovative techniques to design and implement control strategies that consider the optimization of time and/or energy consumption. Recent advances in robotics, control theory, portable energy sources and automation increase our ability to create more intelligent robots, and allows us to conduct more explorations by use of autonomous vehicles. This facilitates access to higher risk areas, longer time underwater, and more efficient exploration as compared to human occupied vehicles. The use of underwater vehicles is expanding in every area of ocean science. Such vehicles are used by oceanographers, archaeologists, geologists, ocean engineers, and many others. These vehicles are designed to be agile, versatile and robust, and thus, their usage has gone from novelty to necessity for any ocean expedition.
Resumo:
The explosion in use of online social networks is an important phenomenon that provides a new set of entrepreneurial opportunities. Emerging musicians have been among the first to exploit this new market opportunity – and indeed, many have used it successfully. A recent study Carter (2009) reveals that artists who earned the most returns had an online presence on multiple social online sites and services such as MySpace and Facebook. These web pages are leveraged to build fan bases and develop different types of revenue streams. Yet, little is currently known about discovery or exploitation of such opportunities.
Resumo:
Despite having a band of greenness around the edge, Australia is fundamentally a dry country. Australian vegetation has developed a high range of mechanisms to cope with the dryness, but after 200 years of white settlement, Australians still have not really come to terms with the real dryness of their country, and still exploit European paradigms that attempted to transplant European aesthetic conditions, greenness, to the brown land of Australia. Australia is going through serious water shortages that are still and will continue with the Greenhouse effect, to become a major factor in the location and extent of urbanisation, and also Australia's carrying capacity. While such aesthetic concerns might seem ornamental, until the population changes its attitude to the real condition of the country, it will keep using water and operating unsustainably. The design of the public landscape, however, offers the opportunity to contribute to changing people's aesthetic perception of the country, which might in turn help to redirect their water use practices. This essay develops a language for discussion dryness based around the experiences of water. After having developed this sensibility it then discusses a range of different approaches that landscape design in Australia has used to try to develop geographically appropriate design languages, including the Bush Garden and the Mediterranean Garden. It then discusses four design projects, one from the 1970's, the other three from the last five years that demonstrate what such an aesthetic might look like.
Resumo:
This paper proposes a semi-supervised intelligent visual surveillance system to exploit the information from multi-camera networks for the monitoring of people and vehicles. Modules are proposed to perform critical surveillance tasks including: the management and calibration of cameras within a multi-camera network; tracking of objects across multiple views; recognition of people utilising biometrics and in particular soft-biometrics; the monitoring of crowds; and activity recognition. Recent advances in these computer vision modules and capability gaps in surveillance technology are also highlighted.
Resumo:
A key concern in the field of contemporary fashion/textiles design is the emergence of ‘fast fashion’: best explained as "buy it Friday, wear it Saturday and throw it away on Sunday" (O'Loughlin, 2007). In this contemporary retail atmosphere of “pile it high: sell it cheap” and “quick to market”, even designer goods have achieved a throwaway status. This modern culture of consumerism is the antithesis of sustainability and is proving a dilemma surrounding sustainable practice for designers and producers in the disciplines (de Blas, 2010). Design researchers including those in textiles/fashion have begun to explore what is a key question in the 21st century in order to create a vision and reason for their disciplines: Can products be designed to have added value to the consumer and hence contribute to a more sustainable industry? Fashion Textiles Design has much to answer for in contributing to the problems of unsustainable practices on a global scale in design, production and waste. However, designers within this field also have great potential to contribute to practical ‘real world’ solutions. ----- ----- This paper provides an overview of some of the design and technological developments from the fashion/textiles industry, endorsing a model where designers and technicians use their transferrable skills for wellbeing rather than desire. Smart materials in the form of responsive and adaptive fibres and fabrics combined with electro active devices, and ICT are increasingly shaping many aspects of society particularly in the leisure industry and interactive consumer products are ever more visible in healthcare. Combinations of biocompatible delivery devices with bio sensing elements can create analyse, sense and actuate early warning and monitoring systems which can be linked to data logging and patient records via intelligent networks. Patient sympathetic, ‘smart’ fashion/textiles applications based on interdisciplinary expertise utilising textiles design and technology is emerging. An analysis of a series of case studies demonstrates the potential of fashion textiles design practitioners to exploit the concept of value adding through technological garment and textiles applications and enhancement for health and wellbeing and in doing so contribute to a more sustainable future fashion/textiles design industry.
Resumo:
There is an urgent need in terms of changing world conditions to move beyond the dualist paradigm that has traditionally informed design research, education and practice. Rather than attempt to reduce uncertainty, novelty and complexity as is the conventional approach, an argument is presented in this article that seeks to exploit these qualities through a reconceptualisation of design in creative as well as systematic, rigorous and ethical terms. Arts-based research, which 'brings together the systematic and rigorous qualities of inquiry with the creative and imaginative qualities of the arts', is presented as being central to this reconceptualisation. This is exemplified in the application of art-informed inquiry in a research unit for graduating tertiary-level interior design students. The application is described in this article and is shown to rely substantially on the image and its capacity to open up and reveal new possibilities and meaning.
Resumo:
Genetic variation is the resource animal breeders exploit in stock improvement programs. Both the process of selection and husbandry practices employed in aquaculture will erode genetic variation levels overtime, hence the critical resource can be lost and this may compromise future genetic gains in breeding programs. The amount of genetic variation in five lines of Sydney Rock Oyster (SRO) that had been selected for QX (Queensland unknown) disease resistance were examined and compared with that in a wild reference population using seven specific SRO microsatellite loci. The five selected lines had significantly lower levels of genetic diversity than did the wild reference population with allelic diversity declining approximately 80%, but impacts on heterozygosity per locus were less severe. Significant deficiencies in heterozygotes were detected at six of the seven loci in both mass selected lines and the wild reference population. Against this trend however, a significant excess of heterozygotes was recorded at three loci Sgo9, Sgo14 and Sgo21 in three QX disease resistant lines (#2, #5 and #13). All populations were significantly genetic differentiated from each other based on pairwise FST values. A neighbour joining tree based on DA genetic distances showed a clear separation between all culture and wild populations. Results of this study show clearly, that the impacts of the stock improvement program for SRO has significantly eroded natural levels of genetic variation in the culture lines. This could compromise long-term genetic gains and affect sustainability of the SRO breeding program over the long-term.
Resumo:
Recent research has begun to address and even compare nascent entrepreneurship and nascent corporate entrepreneurship. An opportunity based view holds great potential to integrate both streams of research, but also presents challenges in how we define corporate entrepreneurship. We extend (corporate) entrepreneurship literature to the opportunity identification phase by providing a framework to classify different types of corporate entrepreneurship. Through analysis of a large dataset on nascent (corporate) entrepreneurship (PSEDII) we show that these corporate entrepreneurs differ largely from each other in terms of human capital. Prior studies have indicated that independent and corporate entrepreneurs pursue different types of opportunities and utilize different strategies. Our findings from the opportunity identification phase challenge those differences and seem to indicate a difference between the opportunities corporate entrepreneurs identify versus the opportunities they exploit.
Resumo:
Information and communication technologies (ICTs) are essential components of the knowledge economy, and have an immense complementary role in innovation, education, knowledge creation, and relations with government, civil society, and business within city regions. The ability to create, distribute, and exploit knowledge has become a major source of competitive advantage, wealth creation, and improvements in the new regional policies. Growing impact of ICTs on the economy and society, rapid application of recent scientific advances in new products and processes, shifting to more knowledge-intensive industry and services, and rising skill requirements have become crucial concepts for urban and regional competitiveness. Therefore, harnessing ICTs for knowledge-based urban development (KBUD) has a significant impact on urban and regional growth (Yigitcanlar, 2005). In this sense, e-region is a novel concept utilizing ICTs for regional development. Since the Helsinki European Council announced Turkey as a candidate for European Union (EU) membership in 1999, the candidacy has accelerated the speed of regional policy enhancements and adoption of the European regional policy standards. These enhancements and adoption include the generation of a new regional spatial division, NUTS-II statistical regions; a new legislation on the establishment of regional development agencies (RDAs); and new orientations in the field of high education, science, and technology within the framework of the EU’s Lisbon Strategy and the Bologna Process. The European standards posed an ambitious new agenda in the development and application of contemporary regional policy in Turkey (Bilen, 2005). In this sense, novel regional policies in Turkey necessarily endeavor to include information society objectives through efficient use of new technologies such as ICTs. Such a development seeks to be based on tangible assets of the region (Friedmann, 2006) as well as the best practices deriving from grounding initiatives on urban and local levels. These assets provide the foundation of an e-region that harnesses regional development in an information society context. With successful implementations, the Marmara region’s local governments in Turkey are setting the benchmark for the country in the implementation of spatial information systems and e-governance, and moving toward an e-region. Therefore, this article aims to shed light on organizational and regional realities of recent practices of ICT applications and their supply instruments based on evidence from selected local government organizations in the Marmara region. This article also exemplifies challenges and opportunities of the region in moving toward an e-region and provides a concise review of different ICT applications and strategies in a broader urban and regional context. The article is organized in three parts. The following section scrutinizes the e-region framework and the role of ICTs in regional development. Then, Marmara’s opportunities and challenges in moving toward an e-region are discussed in the context of ICT applications and their supply instruments based on public-sector projects, policies, and initiatives. Subsequently, the last section discusses conclusions and prospective research.
Resumo:
Adolescents are both aware of and have the impetuous to exploit aspects of Science, Technology, Engineering and Mathematics (STEM) within their personal lives. Whether they are surfing, cycling, skateboarding or shopping, STEM concepts impact their lives. However science, mathematics, engineering and technology are still treated in the classroom as separate fragmented entities in the educational environment where most classroom talk is seemingly incomprehensible to the adolescent senses. The aim of this study was to examine the experiences of young adolescents with the aim of transforming school learning at least of science into meaningful experiences that connected with their lives using a self-study approach. Over a 12-month period, the researcher, an experienced secondary-science teacher, designed, implemented and documented a range of pedagogical practices with his Year-7 secondary science class. Data for this case study included video recordings, journals, interviews and surveys of students. By setting an environment empathetic to adolescent needs and understandings, students were able to actively explore phenomena collaboratively through developmentally appropriate experiences. Providing a more contextually relevant environment fostered meta-cognitive practices, encouraged new learning through open dialogue, multi-modal representations and assessments that contributed to building upon, re-affirming, or challenging both the students' prior learning and the teacher’s pedagogical content knowledge. A significant outcome of this study was the transformative experiences of an insider, the teacher as researcher, whose reflections provided an authentic model for reforming pedagogy in STEM classes.
Resumo:
This chapter sets out to identify related issues surrounding the use of Information and Computer Technology (ICT) in developing relationships between local food producers and consumers (both individuals and businesses). Three surveys were conducted in South- East Wales to consider the overlapping issues. The first concerned the role of ICT in relationships between farmers’ market (FMs) vendors and their traditional customers. The second survey examined potential new markets for farmers in the propensity of restaurants and hotels to buy locally, the types and sources of purchases made and the modes of advertising of these businesses. The final survey focused on the potential to expand local web- based selling of farmers’ produce in the future, by examining the potential market of high ICT- use small hotels. Despite the development of tailored ICT facilities, farmers’ market vendors and current individual customers are antipathetic to them. In addition, whilst there is a desire for more local produce particularly amongst independent local restaurants and hotels, this has not been capitalised upon and there is much work to be done even amongst high ICT-use small hotels, to expand the range and scope of farmers’ markets. This raises the need for creation and utilisation of enhanced logistics, payment and marketing management capacity available through a web- based presence, linked to promotion of FMs in business- to- business (B2B) links with local restaurants and hotels. This linked quantitative research highlights the potential value in substantial development of both web portals and supporting logistics to exploit this potential in the future.
Resumo:
In the present paper, we introduce BioPatML.NET, an application library for the Microsoft Windows .NET framework [2] that implements the BioPatML pattern definition language and sequence search engine. BioPatML.NET is integrated with the Microsoft Biology Foundation (MBF) application library [3], unifying the parsers and annotation services supported or emerging through MBF with the language, search framework and pattern repository of BioPatML. End users who wish to exploit the BioPatML.NET engine and repository without engaging the services of a programmer may do so via the freely accessible web-based BioPatML Editor, which we describe below.
Resumo:
Language Modeling (LM) has been successfully applied to Information Retrieval (IR). However, most of the existing LM approaches only rely on term occurrences in documents, queries and document collections. In traditional unigram based models, terms (or words) are usually considered to be independent. In some recent studies, dependence models have been proposed to incorporate term relationships into LM, so that links can be created between words in the same sentence, and term relationships (e.g. synonymy) can be used to expand the document model. In this study, we further extend this family of dependence models in the following two ways: (1) Term relationships are used to expand query model instead of document model, so that query expansion process can be naturally implemented; (2) We exploit more sophisticated inferential relationships extracted with Information Flow (IF). Information flow relationships are not simply pairwise term relationships as those used in previous studies, but are between a set of terms and another term. They allow for context-dependent query expansion. Our experiments conducted on TREC collections show that we can obtain large and significant improvements with our approach. This study shows that LM is an appropriate framework to implement effective query expansion.
Resumo:
This article presents a novel approach to confidentiality violation detection based on taint marking. Information flows are dynamically tracked between applications and objects of the operating system such as files, processes and sockets. A confidentiality policy is defined by labelling sensitive information and defining which information may leave the local system through network exchanges. Furthermore, per application profiles can be defined to restrict the sets of information each application may access and/or send through the network. In previous works, we focused on the use of mandatory access control mechanisms for information flow tracking. In this current work, we have extended the previous information flow model to track network exchanges, and we are able to define a policy attached to network sockets. We show an example application of this extension in the context of a compromised web browser: our implementation detects a confidentiality violation when the browser attempts to leak private information to a remote host over the network.
Resumo:
With the growth and development of communication technology there is an increasing need for the use of interception technologies in modern policing. Law enforcement agencies are faced with increasingly sophisticated and complex criminal networks that utilise modern communication technology as a basis for their criminal success. In particular, transnational organised crime (TOC) is a diverse and complicated arena, costing global society in excess of $3 trillion annually, a figure that continues to grow (Borger, 2007) as crime groups take advantage of disappearing borders and greater profit markets. However, whilst communication can be a critical success factor for criminal enterprise it is also a key vulnerability. It is this vulnerability that the use of CIT, such as phone taps or email interception, can exploit. As such, law enforcement agencies now need a method and framework that allows them to utilise CIT to combat these crimes efficiently and successfully. This paper provides a review of current literature with the specific purpose of considering the effectiveness of CIT in the fight against TOC and the groundwork that must be laid in order for it to be fully exploited. In doing so, it fills an important gap in current research, focusing on the practical implementation of CIT as opposed to the traditional area of privacy concerns that arise with intrusive methods of investigation. The findings support the notion that CIT is an essential intelligence gathering tool that has a strong place within the modern policing arena. It identifies that the most effective use of CIT is grounded within a proactive, intelligence‐led framework and concludes that in order for this to happen Australian authorities and law enforcement agencies must re‐evaluate and address the current legislative and operational constraints placed on the use of CIT and the culture that surrounds intelligence in policing.