205 resultados para Forest protection


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A patient-centric DRM approach is proposed for protecting privacy of health records stored in a cloud storage based on the patient's preferences and without the need to trust the service provider. Contrary to the current server-side access control solutions, this approach protects the privacy of records from the service provider, and also controls the usage of data after it is released to an authorized user.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A microgrid provides economical and reliable power to customers by integrating distributed resources more effectively. Islanded operation enables a continuous power supply for loads during a major grid disturbance. Reliability of a microgrid can be further increased by forming a mesh configuration. However, the protection of mesh microgrids is a challenging task. In this paper, protection schemes are discussed using current differential protection of a microgrid. The protection challenges associated with bi-directional power flow, meshed configuration, changing fault current level due to intermittent nature of DGs and reduced fault current level in an islanded mode are considered in proposing the protection solutions. Relay setting criterion and current transformer (CT) selection guidelines are also discussed. The results are verified using MATLAB calculations and PSCAD simulations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Client puzzles are moderately-hard cryptographic problems neither easy nor impossible to solve that can be used as a counter-measure against denial of service attacks on network protocols. Puzzles based on modular exponentiation are attractive as they provide important properties such as non-parallelisability, deterministic solving time, and linear granularity. We propose an efficient client puzzle based on modular exponentiation. Our puzzle requires only a few modular multiplications for puzzle generation and verification. For a server under denial of service attack, this is a significant improvement as the best known non-parallelisable puzzle proposed by Karame and Capkun (ESORICS 2010) requires at least 2k-bit modular exponentiation, where k is a security parameter. We show that our puzzle satisfies the unforgeability and difficulty properties defined by Chen et al. (Asiacrypt 2009). We present experimental results which show that, for 1024-bit moduli, our proposed puzzle can be up to 30 times faster to verify than the Karame-Capkun puzzle and 99 times faster than the Rivest et al.'s time-lock puzzle.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the long term, with development of skill, knowledge, exposure and confidence within the engineering profession, rigorous analysis techniques have the potential to become a reliable and far more comprehensive method for design and verification of the structural adequacy of OPS, write Nimal J Perera, David P Thambiratnam and Brian Clark. This paper explores the potential to enhance operator safety of self-propelled mechanical plant subjected to roll over and impact of falling objects using the non-linear and dynamic response simulation capabilities of analytical processes to supplement quasi-static testing methods prescribed in International and Australian Codes of Practice for bolt on Operator Protection Systems (OPS) that are post fitted. The paper is based on research work carried out by the authors at the Queensland University of Technology (QUT) over a period of three years by instrumentation of prototype tests, scale model tests in the laboratory and rigorous analysis using validated Finite Element (FE) Models. The FE codes used were ABAQUS for implicit analysis and LSDYNA for explicit analysis. The rigorous analysis and dynamic simulation technique described in the paper can be used to investigate the structural response due to accident scenarios such as multiple roll over, impact of multiple objects and combinations of such events and thereby enhance the safety and performance of Roll Over and Falling Object Protection Systems (ROPS and FOPS). The analytical techniques are based on sound engineering principles and well established practice for investigation of dynamic impact on all self propelled vehicles. They are used for many other similar applications where experimental techniques are not feasible.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The 'dick' tog, a briefs-style male swimsuit as it is colloquially referred to, is linked to Australia's national identity with overtly masculine bronzed 'Aussie' bodies clothed in this iconic apparel. However, the reality is, our hunger for worshiping the sun and the addiction to a beach culture is tempered by the pragmatic need to cover up and wear neck-to-knee, or more apt, head-to-toe sun protective clothing. Australia, in particular the state of Queensland, has one of the highest rates of skin cancer in the world; nevertheless, even after wide-ranging public programs for sun safety awareness many people still continue to wear designs that provide minimal sun protection. This paper will examine issues surrounding fashion and sun safe clothing. It will be proposed that in order to have effective community adoption of sun safe practices it is critical to understand the important role that fashion plays in determining sun protective behaviour.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In June 2011, a research project team from the Institute for Ethics, Governance and Law (IEGL), Queensland University of Technology, the United Nations University, and the Australian Government’s Asia Pacific Civil-Military Centre of Excellence (APCMCOE) held three Capacity-Building Workshops (the Workshops) on the Responsibility to Protect (R2P) and the Protection of Civilians (POC) in Armed Conflict in Manila, Kuala Lumpur, and Jakarta. The research project is funded by the Australian Responsibility to Protect Fund, with support from APCMCOE. Developments in Libya and Cote d’Ivoire and the actions of the United Nations Security Council have given new significance to the relationship between R2P and POC, providing impetus to the relevance and application of the POC principle recognised in numerous Security Council resolutions, and the R2P principle, which was recognised by the United Nations General Assembly in 2005 and, now, by the Security Council. The Workshops considered the relationship between R2P and POC. The project team presented the preliminary findings of their study and sought contributions and feedback from Workshop participants. Prior to the Workshops, members of the project team undertook interviews with UN offices and agencies, international organisations (IOs) and non-government organisations (NGOs) in Geneva and New York as part of the process of mapping the relationship between R2P and POC. Initial findings were considered at an Academic-Practitioner Workshop held at the University of Sydney in November 2010. In addition to an extensive literature review and a series of academic publications, the project team is preparing a practical guidance text (the Guide) on the relationship between R2P and POC to assist the United Nations, governments, regional bodies, IOs and NGOs in considering and applying appropriate protection strategies. It is intended that the Guide be presented to the United Nations Secretariat in New York in early 2012. The primary aim of the Workshops was to test the project’s initial findings among an audience of diplomats, military, police, civilian policy-makers, practitioners, researchers and experts from within the region. Through dialogue and discussion, the project team gathered feedback – comments, questions, critique and suggestions – to help shape the development of practical guidance about when, how and by whom R2P and POC might be implemented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis is about the Australian domain name system and, in particular, the principles governing the registration of domain names in the '.au' country code domain space. It examines the different types of registration systems adopted in country code domain spaces and categorises them according to the extent to which they impose restrictions on registration, ranging from restrictive to unrestrictive. A comparative analysis is made of the restrictive registration system in Australia and the United Kingdom‘s unrestrictive system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

-International recognition of need for public health response to child maltreatment -Need for early intervention at health system level -Important role of health professionals in identifying, reporting, documenting suspician of maltreatment -Up to 10% of all children presenting at ED’s are victims and without identification, 35% reinjured and 5% die -In Qld, mandatory reporting requirement for doctors and nurses for suspected abuse or neglect

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information communication and technology (ICT) systems are almost ubiquitous in the modern world. It is hard to identify any industry, or for that matter any part of society, that is not in some way dependent on these systems and their continued secure operation. Therefore the security of information infrastructures, both on an organisational and societal level, is of critical importance. Information security risk assessment is an essential part of ensuring that these systems are appropriately protected and positioned to deal with a rapidly changing threat environment. The complexity of these systems and their inter-dependencies however, introduces a similar complexity to the information security risk assessment task. This complexity suggests that information security risk assessment cannot, optimally, be undertaken manually. Information security risk assessment for individual components of the information infrastructure can be aided by the use of a software tool, a type of simulation, which concentrates on modelling failure rather than normal operational simulation. Avoiding the modelling of the operational system will once again reduce the level of complexity of the assessment task. The use of such a tool provides the opportunity to reuse information in many different ways by developing a repository of relevant information to aid in both risk assessment and management and governance and compliance activities. Widespread use of such a tool allows the opportunity for the risk models developed for individual information infrastructure components to be connected in order to develop a model of information security exposures across the entire information infrastructure. In this thesis conceptual and practical aspects of risk and its underlying epistemology are analysed to produce a model suitable for application to information security risk assessment. Based on this work prototype software has been developed to explore these concepts for information security risk assessment. Initial work has been carried out to investigate the use of this software for information security compliance and governance activities. Finally, an initial concept for extending the use of this approach across an information infrastructure is presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Research over the last two decades has significantly increased our understanding of the evolutionary position of the insects among other arthropods, and the relationships among the insect Orders. Many of these insights have been established through increasingly sophisticated analyses of DNA sequence data from a limited number of genes. Recent results have established the relationships of the Holometabola, but relationships among the hemimetabolous orders have been more difficult to elucidate. A strong consensus on the relationships among the Palaeoptera (Ephemeroptera and Odonata) and their relationship to the Neoptera has not emerged with all three possible resolutions supported by different data sets. While polyneopteran relationships generally have resisted significant resolution, it is now clear that termites, Isoptera, are nested within the cockroaches, Blattodea. The newly discovered order Mantophasmatodea is difficult to place with the balance of studies favouring Grylloblattodea as sister-group. While some studies have found the paraneopteran orders (Hemiptera, Thysanoptera, Phthiraptera and Psocoptera) monophyletic, evidence suggests that parasitic lice (Phthiraptera) have evolved from groups within the book and bark lice (Psocoptera), and may represent parallel evolutions of parasitism within two major louse groups. Within Holometabola, it is now clear that Hymenoptera are the sister to the other orders, that, in turn are divided into two clades, the Neuropteroidea (Coleoptera, Neuroptera and relatives) and the Mecopterida (Trichoptera, Lepidoptera, Diptera and their relatives). The enigmatic order Strepsiptera, the twisted wing insects, have now been placed firmly near Coleoptera, rejecting their close relationship to Diptera that was proposed some 15years ago primarily based on ribosomal DNA data. Phylogenomic-scale analyses are just beginning to be focused on the relationships of the insect orders, and this is where we expect to see resolution of palaeopteran and polyneopteran relationships. Future research will benefit from greater coordination between intra and inter-ordinal analyses. This will maximise the opportunities for appropriate outgroup choice at the intraordinal level and provide the background knowledge for the interordinal analyses to span the maximum phylogenetic scope within groups.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In March 2000, the Department of Health and the Home Office issued guidance fundamentally altering policy and practice with regard to young people in prostitution. 1 Instead of being arrested and punished for prostitution-related offences, those under 18 years old were to be thought of as children ‘in need’ and offered welfare-based interventions. The practice that has developed in the last three years has offered interventions that are located within both child protection and youth justice work. This article examines these changes in order to generate insights about the changing nature of youth justice. In particular, it is argued that the drive to manage the risks posed by young people in prostitution to specific organisations, takes precedence over either the desire to care for, or the demand to punish them. Through an analysis of how practitioners and policy makers responsible for implementing this new approach to youth prostitution talk about ‘risk’ and ‘responsibility’, ‘liability’, ‘protection’ and ‘punishment’, the article argues that the contradiction between care and control has been re-interpreted, such that there is noticeable blurring of the boundaries between welfare and punishment at the margins of youth justice work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective To identify the spatial and temporal clusters of Barmah Forest virus (BFV) disease in Queensland in Australia, using geographical information systems (GIS) and spatial scan statistic (SaTScan). Methods We obtained BFV disease cases, population and statistical local areas boundary data from Queensland Health and Australian Bureau of Statistics respectively during 1992-2008 for Queensland. A retrospective Poisson-based analysis using SaTScan software and method was conducted in order to identify both purely spatial and space-time BFV disease high-rate clusters. A spatial cluster size of a proportion of the population and a 200km circle radius and varying time windows from 1 month to 12 months were chosen (for the space-time analysis). Results The spatial scan statistic detected a most likely significant purely spatial cluster (including 23 SLAs) and a most likely significant space-time cluster (including 24 SLAs) in approximately the same location. Significant secondary clusters were also identified from both the analyses in several locations. Conclusions This study provides evidence of the existence of statistically significant BFV disease clusters in Queensland, Australia. The study also demonstrated the relevance and applicability of SaTScan in analysing on-going surveillance data to identify clusters to facilitate the development of effective BFV disease prevention and control strategies in Queensland, Australia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The eastern Australian rainforests have experienced several cycles of range contraction and expansion since the late Miocene that are closely correlated with global glaciation events. Together with ongoing aridification of the continent, this has resulted in current distributions of native closed forest that are highly fragmented along the east coast. Several closed forest endemic taxa exhibit patterns of population genetic structure that are congruent with historical isolation of populations in discrete refugia and reflect evolutionary histories dramatically affected by vicariance. Currently, limited data are available regarding the impact of these past climatic fluctuations on freshwater invertebrate taxa. The non-biting midge species Echinocladius martini Cranston is distributed along the east coast and inhabits predominantly montane streams in closed forest habitat. Phylogeographic structure in E. martini was resolved here at a continental scale by incorporating data from a previous pilot study and expanding the sampling design to encompass populations in the Wet Tropics of north-eastern Queensland, south-east Queensland, New South Wales and Victoria. Patterns of phylogeographic structure revealed several deeply divergent mitochondrial lineages from central and south-eastern Australia that were previously unrecognised and were geographically endemic to closed forest refugia. Estimated divergence times were congruent with late Miocene onset of rainforest contractions across the east coast of Australia. This suggested that dispersal and gene flow among E. martini populations isolated in refugia has been highly restricted historically. Moreover, these data imply, in contrast to existing preconceptions about freshwater invertebrates, that this taxon may be acutely susceptible to habitat fragmentation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Barmah Forest Virus (BFV) disease is the most rapidly emerging mosquito-borne disease in Australia. BFV transmission depends on factors such as climate, virus, vector and the human population. However, the impact of climatic and social factors on BFV remains to be determined. This paper provided an overview of current research and discusses the future research directions on the BFV transmission. These research findings could be regarded as an impetus towards BFV prevention and control strategies.