203 resultados para SSO,Shibboleth,2FA,ADFS,Strong Authentication
Resumo:
Görgeyite, K2Ca5(SO4)6··H2O, is a very rare monoclinic double salt found in evaporites related to the slightly more common mineral syngenite. At 1 atmosphere with increasing external temperature from 25 to 150 °C, the following succession of minerals was formed: first gypsum and K2O, followed at 100 °C by görgeyite. Changes in concentration at 150 °C due to evaporation resulted in the formation of syngenite and finally arcanite. Under hydrothermal conditions, the succession is syngenite at 50 °C, followed by görgyeite at 100 and 150 °C. Increasing the synthesis time at 100 °C and 1 atmosphere showed that initially gypsum was formed, later being replaced by görgeyite. Finally görgeyite was replaced by syngenite, indicating that görgeyite is a metastable phase under these conditions. Under hydrothermal conditions, syngenite plus a small amount of gypsum was formed, after two days being replaced by görgeyite. No further changes were observed with increasing time. Pure görgeyite showed elongated crystals approximately 500 to 1000 µ m in length. The infrared and Raman spectra are mainly showing the vibrational modes of the sulfate groups and the crystal water (structural water). Water is characterized by OH-stretching modes at 3526 and 3577 cm–1 , OH-bending modes at 1615 and 1647 cm–1 , and an OH-libration mode at 876 cm–1 . The sulfate 1 mode is weak in the infrared but showed strong bands at 1005 and 1013 cm–1 in the Raman spectrum. The 2 mode also showed strong bands in the Raman spectrum at 433, 440, 457, and 480 cm–1 . The 3 mode is characterized by a complex set of bands in both infrared and Raman spectra around 1150 cm–1 , whereas 4 is found at 650 cm–1.
Resumo:
An unstructured mesh �nite volume discretisation method for simulating di�usion in anisotropic media in two-dimensional space is discussed. This technique is considered as an extension of the fully implicit hybrid control-volume �nite-element method and it retains the local continuity of the ux at the control volume faces. A least squares function recon- struction technique together with a new ux decomposition strategy is used to obtain an accurate ux approximation at the control volume face, ensuring that the overall accuracy of the spatial discretisation maintains second order. This paper highlights that the new technique coincides with the traditional shape function technique when the correction term is neglected and that it signi�cantly increases the accuracy of the previous linear scheme on coarse meshes when applied to media that exhibit very strong to extreme anisotropy ratios. It is concluded that the method can be used on both regular and irregular meshes, and appears independent of the mesh quality.
Resumo:
Raman spectra were recorded in the range 400–1800 cm−1 for a series of 15 mixed \[tetrakis(4-tert-butylphenyl)porphyrinato](2,3-naphthalocyaninato) rare earth double-deckers M(TBPP)(Nc) (M = Y; La–Lu except Pm) using laser excitation at 632.8 and 785 nm. Comparisons with bis(naphthalocyaninato) rare earth counterparts reveal that the vibrations of the metallonaphthalocyanine M(Nc) fragment dominate the Raman features of M(TBPP)(Nc). When excited with radiation of 632.8 nm, the most intense vibration appears at about 1595 cm−1, due to the naphthalene stretching. These complexes exhibit the marker Raman band for Nc•− as a medium-intense band in the range 1496–1507 cm−1, attributed to the coupling of pyrrole and aza stretching, while the marker Raman band of Nc2− in intermediate-valence Ce(TBPP)(Nc) appears as a strong band at 1493 cm−1 and is due to the isoindole stretchings. By contrast, when excited with radiation of 785 nm that is in close resonance with the main Q absorption band of the naphthalocyanine ligand, the ring radial vibrations at ca 680 and 735 cm−1 for MIII(TBPP)(Nc) are selectively intensified and are the most intense bands. For the cerium double-decker, the most intense vibration also acting as the marker Raman band of Nc2− appears at 1497 cm−1 with contributions from both pyrrole CC and aza CN stretches. The same vibrational modes show weak to medium intensity scattering at 1506–1509 cm−1 for MIII(TBPP)(Nc) and this is the marker Raman band of Nc•− when thus excited. The scatterings due to the Nc breathings, ring radial vibration, aza group stretchings, naphthalene stretchings, benzoisoindole stretchings and the coupling of pyrrole CC and aza CN stretchings in MIII(TBPP)(Nc) are all slightly blue shifted along with the decrease in rare earth ionic radius, confirming the effects of increased ring–ring interactions on the Raman characteristics of naphthalocyanine in the mixed ring double-deckers.
Resumo:
This paper presents the Smarty Board; a new micro-controller board designed specifically for the robotics teaching needs of Australian schools. The primary motivation for this work was the lack of commercially available and cheap controller boards that would have all their components including interfaces on a single board. Having a single board simplifies the construction of programmable robots that can be used as platforms for teaching and learning robotics. Reducing the cost of the board as much as possible was one of the main design objectives. The target user groups for this device are the secondary and tertiary students, and hobbyists. Previous studies have shown that equipment cost is one of the major obstacles for teaching robotics in Australia. The new controller board was demonstrated at high-school seminars. In these demonstrations the new controller board was used for controlling two robots that we built. These robots are available as kits. Given the strong demand from high-school teachers, new kits will be developed for the next robotic Olympiad to be held in Australia in 2006.
Resumo:
The effectiveness of higher-order spectral (HOS) phase features in speaker recognition is investigated by comparison with Mel Cepstral features on the same speech data. HOS phase features retain phase information from the Fourier spectrum unlikeMel–frequency Cepstral coefficients (MFCC). Gaussian mixture models are constructed from Mel– Cepstral features and HOS features, respectively, for the same data from various speakers in the Switchboard telephone Speech Corpus. Feature clusters, model parameters and classification performance are analyzed. HOS phase features on their own provide a correct identification rate of about 97% on the chosen subset of the corpus. This is the same level of accuracy as provided by MFCCs. Cluster plots and model parameters are compared to show that HOS phase features can provide complementary information to better discriminate between speakers.
Resumo:
We propose a new password-based 3-party protocol with a formal security proof in the standard model. Under reasonable assumptions we show that our new protocol is more efficient than the recent protocol of Abdalla and Pointcheval (FC 2005), proven in the random oracle model. We also observe some limitations in the model due to Abdalla, Fouque and Pointcheval (PKC 2005) for proving security of such protocols.
Resumo:
Faces are complex patterns that often differ in only subtle ways. Face recognition algorithms have difficulty in coping with differences in lighting, cameras, pose, expression, etc. We propose a novel approach for facial recognition based on a new feature extraction method called fractal image-set encoding. This feature extraction method is a specialized fractal image coding technique that makes fractal codes more suitable for object and face recognition. A fractal code of a gray-scale image can be divided in two parts – geometrical parameters and luminance parameters. We show that fractal codes for an image are not unique and that we can change the set of fractal parameters without significant change in the quality of the reconstructed image. Fractal image-set coding keeps geometrical parameters the same for all images in the database. Differences between images are captured in the non-geometrical or luminance parameters – which are faster to compute. Results on a subset of the XM2VTS database are presented.
Resumo:
In practical terms, conceptual modeling is at the core of systems analysis and design. The plurality of modeling methods available has however been regarded as detrimental, and as a strong indication that a common view or theoretical grounding of modeling is wanting. This theoretical foundation must universally address all potential matters to be represented in a model, which consequently suggested ontology as the point of departure for theory development. The Bunge–Wand–Weber (BWW) ontology has become a widely accepted modeling theory. Its application has simultaneously led to the recognition that, although suitable as a meta-model, the BWW ontology needs to be enhanced regarding its expressiveness in empirical domains. In this paper, a first step in this direction has been made by revisiting BUNGE’s ontology, and by proposing the integration of a “hierarchy of systems” in the BWW ontology for accommodating domain specific conceptualizations.
Resumo:
Hybrid face recognition, using image (2D) and structural (3D) information, has explored the fusion of Nearest Neighbour classifiers. This paper examines the effectiveness of feature modelling for each individual modality, 2D and 3D. Furthermore, it is demonstrated that the fusion of feature modelling techniques for the 2D and 3D modalities yields performance improvements over the individual classifiers. By fusing the feature modelling classifiers for each modality with equal weights the average Equal Error Rate improves from 12.60% for the 2D classifier and 12.10% for the 3D classifier to 7.38% for the Hybrid 2D+3D clasiffier.
Resumo:
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and network card addresses, and rely on loosely coupled state machines. Even the new WLAN security standard - IEEE 802.11i does not address these issues. In our previous work, we proposed two new techniques for improving detection of session hijacking attacks that are passive, computationally inexpensive, reliable, and have minimal impact on network performance. These techniques utilise unspoofable characteristics from the MAC protocol and the physical layer to enhance confidence in the intrusion detection process. This paper extends our earlier work and explores usability, robustness and accuracy of these intrusion detection techniques by applying them to eight distinct test scenarios. A correlation engine has also been introduced to maintain the false positives and false negatives at a manageable level. We also explore the process of selecting optimum thresholds for both detection techniques. For the purposes of our experiments, Snort-Wireless open source wireless intrusion detection system was extended to implement these new techniques and the correlation engine. Absence of any false negatives and low number of false positives in all eight test scenarios successfully demonstrated the effectiveness of the correlation engine and the accuracy of the detection techniques.
Resumo:
A range of influences, both technical and organisational, has encouraged the wide spread adoption of Enterprise Systems (ES). Nevertheless, there is a growing consensus that Enterprise Systems have in many cases failed to provide expected benefits. The increasing role of, and dependency on ES (and IT in general), and the ‘uncertainty’ of these large investments, have created a strong need to monitor and measure ES performance. This paper reports on a research project aimed at deriving an ‘Enterprise Systems benefits measurement instrument’. The research seeks to identify how Enterprise Systems benefits can be usefully measured, with a ‘balance’ between qualitative and quantitative factors.
Resumo:
We propose two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange (IKE). Our protocols can be implemented using different concrete mechanisms and we discuss different options; in particular we suggest solutions based on elliptic curve pairings. The protocol designs use the modular construction method of Canetti and Krawczyk which provides the basis for a proof of security. Our schemes can, in some situations, be more efficient than existing IKE protocols as well as having stronger deniability properties.
Resumo:
In his report into corruption in Queensland, Fitzgerald listed whistleblower protection as a necessary part of a strong governance regime. "What is required is an accessible, independent body to which disclosures can be made, confidentially (at least in the first instance) and in any event free from fear of reprisals." It was one of the reforms studied by the Electoral and Administrative Review Committee, the report of which resulted in the Whistleblowers Protection Act 1994 (WPA). The need for whistleblower protection was supported by all sides of Parliament. The Premier, Wayne Goss, in his Second Reading Speech on the Public Sector Ethics Bill , said that that Act and the WPA would form a package with the former outlining required behaviour and the WPA encouraging staff to report wrongdoing. The WPA was subsequently passed and has remained virtually unamended for over a decade. Such consistency is either an indication of skilled drafting and effectiveness or the fact that the Act has been neglected. It is the hypothesis of this paper that the latter is the case. This hypothesis will be tested by examining the sincerity and diligence with which the Act has been treated during, and following, its passage.