627 resultados para energy security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Open and Trusted Health Information Systems (OTHIS) Research Group has formed in response to the health sector’s privacy and security requirements for contemporary Health Information Systems (HIS). Due to recent research developments in trusted computing concepts, it is now both timely and desirable to move electronic HIS towards privacy-aware and security-aware applications. We introduce the OTHIS architecture in this paper. This scheme proposes a feasible and sustainable solution to meeting real-world application security demands using commercial off-the-shelf systems and commodity hardware and software products.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Damage localization induced by strain softening can be predicted by the direct minimization of a global energy function. This article concerns the computational strategy for implementing this principle for softening materials such as concrete. Instead of using heuristic global optimization techniques, our strategies are a hybrid of local optimization methods with a path-finding approach to ensure a global optimum. With admissible nodal displacements being independent variables, it is easy to deal with the geometric (mesh) constraint conditions. The direct search optimization methods recover the localized solutions for a range of softening lattice models which are representative of quasi-brittle structures

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Body Mass Index (BMI) has been used worldwide as an indicator of fatness. However, the universal cut-off points by the World Health Organisation (WHO) classification may not be appropriate for every ethnic group when consider the relationship with their actual total body fatness(%BF). The application of population-specific classifications to assess BMI may be more relevant to public health. Ethnic differences in the BMI%BF relationship between 45 Japanese and 42 Australian-Caucasian males were assessed using whole body dual-energy X-ray absorptiometry (DXA) scan and anthropometry using a standard protocol. Japanese males had significantly (p<0.05) greater %BF at given BMI values than Australian males. When this is taken into account the newly proposed Asia-Pacific BMI classification of BMI 23 as overweight and 25 as obese may better assess the level of obesity that is associated increased health risks for this population. To clarify the current findings, further studies that compare the relationships across other Japanese populations are recommended.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Energy efficient lubricants are becoming increasingly popular. This is due to a global increase in environmental awareness combined with the potential of reducing operating costs. A new test method of evaluating the energy efficiency of gear oils has been described in this report. The method involves measuring the power required by an FZG test rig to run while using a particular test lubricant. For each oil that was being evaluated, the rig was run for 10 minutes at a load stage of 10. Six extreme pressure (EP) industrial gear oils of mineral base were tested. The difference in power requirements between the best and the worst performing oils was 2.77 and 3.24 kW, respectively. This equates to a 14.6% reduction in power, a significant amount if considered in relation to a high powered industrial machine. The oils of superior performance were noticed to run at reduced temperatures. They were also more expensive than the other products of lesser performance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An examination of Information Security (IS) and Information Security Management (ISM) research in Saudi Arabia has shown the need for more rigorous studies focusing on the implementation and adoption processes involved with IS culture and practices. Overall, there is a lack of academic and professional literature about ISM and more specifically IS culture in Saudi Arabia. Therefore, the overall aim of this paper is to identify issues and factors that assist the implementation and the adoption of IS culture and practices within the Saudi environment. The goal of this paper is to identify the important conditions for creating an information security culture in Saudi Arabian organizations. We plan to use this framework to investigate whether security culture has emerged into practices in Saudi Arabian organizations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Understanding the complex dynamic and uncertain characteristics of organisational employees who perform authorised or unauthorised information security activities is deemed to be a very important and challenging task. This paper presents a conceptual framework for classifying and organising the characteristics of organisational subjects involved in these information security practices. Our framework expands the traditional Human Behaviour and the Social Environment perspectives used in social work by identifying how knowledge, skills and individual preferences work to influence individual and group practices with respect to information security management. The classification of concepts and characteristics in the framework arises from a review of recent literature and is underpinned by theoretical models that explain these concepts and characteristics. Further, based upon an exploratory study of three case organisations in Saudi Arabia involving extensive interviews with senior managers, department managers, IT managers, information security officers, and IT staff; this article describes observed information security practices and identifies several factors which appear to be particularly important in influencing information security behaviour. These factors include values associated with national and organisational culture and how they manifest in practice, and activities related to information security management.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A method of improving the security of biometric templates which satisfies desirable properties such as (a) irreversibility of the template, (b) revocability and assignment of a new template to the same biometric input, (c) matching in the secure transformed domain is presented. It makes use of an iterative procedure based on the bispectrum that serves as an irreversible transformation for biometric features because signal phase is discarded each iteration. Unlike the usual hash function, this transformation preserves closeness in the transformed domain for similar biometric inputs. A number of such templates can be generated from the same input. These properties are illustrated using synthetic data and applied to images from the FRGC 3D database with Gabor features. Verification can be successfully performed using these secure templates with an EER of 5.85%

Relevância:

20.00% 20.00%

Publicador: