794 resultados para Design protection

em Queensland University of Technology - ePrints Archive


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An important aspect of designing any product is validation. Virtual design process (VDP) is an alternative to hardware prototyping in which analysis of designs can be done without manufacturing physical samples. In recent years, VDP have been generated either for animation or filming applications. This paper proposes a virtual reality design process model on one of the applications when used as a validation tool. This technique is used to generate a complete design guideline and validation tool of product design. To support the design process of a product, a virtual environment and VDP method were developed that supports validation and an initial design cycle performed by a designer. The product model car carrier is used as illustration for which virtual design was generated. The loading and unloading sequence of the model for the prototype was generated using automated reasoning techniques and was completed by interactively animating the product in the virtual environment before complete design was built. By using the VDP process critical issues like loading, unloading, Australian Design rules (ADR) and clearance analysis were done. The process would save time, money in physical sampling and to large extent in complete math generation. Since only schematic models are required, it saves time in math modelling and handling of bigger size assemblies due to complexity of the models. This extension of VDP process for design evaluation is unique and was developed, implemented successfully. In this paper a Toll logistics and J Smith and Sons car carrier which is developed under author’s responsibility has been used to illustrate our approach of generating design validation via VDP.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The early stages of the building design process are when the most far reaching decisions are made regarding the configuration of the proposed project. This paper examines methods of providing decision support to building designers across multiple disciplines during the early stage of design. The level of detail supported is at the massing study stage where the basic envelope of the project is being defined. The block outlines on the building envelope are sliced into floors. Within a floor the only spatial divisions supported are the “user” space and the building core. The building core includes vertical transportation systems, emergency egress and vertical duct runs. The current focus of the project described in the paper is multi-storey mixed use office/residential buildings with car parking. This is a common type of building in redevelopment projects within and adjacent to the central business districts of major Australian cities. The key design parameters for system selection across the major systems in multi-storey building projects - architectural, structural, HVAC, vertical transportation, electrical distribution, fire protection, hydraulics and cost – are examined. These have been identified through literature research and discussions with building designers from various disciplines. This information is being encoded in decision support tools. The decision support tools communicate through a shared database to ensure that the relevant information is shared across all of the disciplines. An internal data model has been developed to support the very early design phase and the high level system descriptions required. A mapping to IFC 2x2 has also been defined to ensure that this early information is available at later stages of the design process.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Design talks LOUDLY!!! Is a series of interactive presentations exploring issues and opportunities involving professional design. --------------- These seminars are organised by the Industrial Design Network Queensland (IDnetQLD) in coordination with the Design Institute of Australia (DIA). This event was held at the State Library of Queensland (SLQ) with invited public presentations by a panel of industry experts from the Australian Government – IP Australia. --------------- The first seminar "Intellectual Property : designing 4 success" highlighted to design professionals how the various forms of Intellectual Property interact, what protections and pitfalls exist, and how these impact upon the work and responsibilities of designers. The overlaps, gaps and in congruencies in the various IP protection systems were highlighted by the expert line-up of speakers. --------------- The underlying message is that a clear understanding of all IP types is necessary in order to gain the best advantage from IP protection and therefore eliminate potential IP ownership issues before they become a problem.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Water quality issues are heavily dependent on land development and management decisions within river and lake catchments or watersheds. Economic benefits of urbanisation may be short‐ lived without cleaner environmental outcomes. However, whole‐of‐catchment thinking is not, as yet, as frequent a consideration in urban planning and development in China as it is in many other countries. Water is predominantly seen as a resource to be ‘owned’ by different jurisdictions and allocated to numerous users, both within a catchment and between catchments. An alternative to this approach is to think of water in the same way as other commodities that must be kept moving through a complex transport system. Water must ultimately arrive at particular destinations in the biosphere, although it travels across a broad landscape and may be held up temporarily at certain places along the way. While water extraction can be heavily controlled, water pollution is far more difficult to regulate. Both have significant impacts on water availability and flows both now and in the future. As Chinese cities strive to improve economic conditions for their citizens, new centres are being rebuilt and environmental valued

Relevância:

30.00% 30.00%

Publicador:

Resumo:

With the rapid urbanization progress, water resources protection and water pollution control have become key problems of human environment construction and social sustainable development. Many countries, especially Australia, have mature experiences. Water Sensitive Urban Design (WSUD) is one of the successful strategies that is put forward under this global situation and helps releasing heavy environmental pressure from urbanization. The paper discussed main principles of WSUD and then took Shijiazhuang, Heibei and Yueng, Hunan for examples trying to apply WSUD in river landscape projects in China's new urban area, thus doing contributions to more sustainable water management in new urban areas in China.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Since 1996, ther provision of a refuge floor has been a mandatory feature for all new tall buildings in Hong Kong. These floors are designed to provide for building occupants a fire safe environment that is also free from smoke. However, the desired cross ventilation on these floors to achieve the removal of smoke, assumed by the Building Codes of Hong Kong, is still being questioned so that a further scientific study of the wind-induced ventilation of a refuge fllor is needed. This paper presents an investigation into this issue. The developed computational technique used in this paper was adopted to study the wind-induced natural ventilation on a refuge floor. The aim of the investigation was to establish whether a refuge floor with a cetnral core and having cross ventilation produced by only two open opposite external side walls on the refuge floor would provide the required protection in all situations taking into account behaviour of wind due to different floor heights, wall boundary conditions and turbulence intensity profiles. The results revealed that natural ventilation can be increased by increasng the floor heigh provided the wind angle to the building is less than 90 degrees. The effectiveness of the solution was greatly reduced when the wind was blowing at 90 degrees to the refuge floor opening.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A new approach that is slowly replacing neoclassical models of economic growth and commodity based industrial activities, knowledge based urban development (KBUD) aims to provide opportunities for citiesw to foster knowledge creation, exchange and innovation, and is based on the concepts of both sustainable urban development and economic prosperity; sustainable uses and protection of natural resources are therefore integral parts of KBUD. As such, stormwater, which has been recognised as one of the main culprits of aquatic ecosystem pollution and as therefore a significant threat to the goal of sustainable urban development, needs to be managed in a manner that produces ecologically sound outcomes. Water sensitive urban design (WSUD) is one of the key responses to the need to better management urban stormwater runoff and supports KBUD by providing an alternative, innovative and effective strategy to traditional stormwater management.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the long term, with development of skill, knowledge, exposure and confidence within the engineering profession, rigorous analysis techniques have the potential to become a reliable and far more comprehensive method for design and verification of the structural adequacy of OPS, write Nimal J Perera, David P Thambiratnam and Brian Clark. This paper explores the potential to enhance operator safety of self-propelled mechanical plant subjected to roll over and impact of falling objects using the non-linear and dynamic response simulation capabilities of analytical processes to supplement quasi-static testing methods prescribed in International and Australian Codes of Practice for bolt on Operator Protection Systems (OPS) that are post fitted. The paper is based on research work carried out by the authors at the Queensland University of Technology (QUT) over a period of three years by instrumentation of prototype tests, scale model tests in the laboratory and rigorous analysis using validated Finite Element (FE) Models. The FE codes used were ABAQUS for implicit analysis and LSDYNA for explicit analysis. The rigorous analysis and dynamic simulation technique described in the paper can be used to investigate the structural response due to accident scenarios such as multiple roll over, impact of multiple objects and combinations of such events and thereby enhance the safety and performance of Roll Over and Falling Object Protection Systems (ROPS and FOPS). The analytical techniques are based on sound engineering principles and well established practice for investigation of dynamic impact on all self propelled vehicles. They are used for many other similar applications where experimental techniques are not feasible.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The great male Aussie cossie is growing spots. The ‘dick’ tog, as it is colloquially referred to, is linked to Australia’s national identify with overtly masculine bronzed Aussie bodies clothed in this iconic apparel. Yet the reality is our hunger for worshiping the sun and the addiction to a beach lifestyle is tempered by the pragmatic need for neck-to-knee, or more apt head-to-toe, swimwear. Spotty Dick is an irreverent play on male swimwear – it experiments with alternate modes to sheath the body with Lyrca in order to protect it from searing UV’s and at the same time light-heartedly fools around with texture and pattern; to be specific, black Scharovsky crystals, jewelled in spot patterns - jewelled clothing is not characteristically aligned to menswear and even less so to the great Aussie cossie. The crystals form a matrix of spots that attempt to provoke a sense of mischievousness aligned to the Aussie beach larrikin. Ironically, spot patterns are in itself a form of a parody, as prolonged sun exposure ages the skin and sun spots can occur if appropriate sun protection is not used. ‘Spotty Dick’ – a research experiment to test design suitability for the use of jewelled spot matrix patterns for UV aware men’s swimwear. The creative work was paraded at 56 shows, over a 2 week period, and an estimated 50,000 people viewed the work.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In January 2013, Apple Inc obtained United States trademarks for the design and layout of its retail stores. While innovative brand protection strategies of this kind are not without precedent in the United States, traders in Australia have seemingly not adopted them. This article considers the prospects of an applicant seeking to register a similar trade mark in Australia and the protection such a registration would likely provide.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Current military conflicts are characterized by the use of the improvised explosive device. Improvements in personal protection, medical care, and evacuation logistics have resulted in increasing numbers of casualties surviving with complex musculoskeletal injuries, often leading to lifelong disability. Thus, there exists an urgent requirement to investigate the mechanism of extremity injury caused by these devices in order to develop mitigation strategies. In addition, the wounds of war are no longer restricted to the battlefield; similar injuries can be witnessed in civilian centers following a terrorist attack. Key to understanding such mechanisms of injury is the ability to deconstruct the complexities of an explosive event into a controlled, laboratory-based environment. In this article, a traumatic injury simulator, designed to recreate in the laboratory the impulse that is transferred to the lower extremity from an anti-vehicle explosion, is presented and characterized experimentally and numerically. Tests with instrumented cadaveric limbs were then conducted to assess the simulator’s ability to interact with the human in two mounting conditions, simulating typical seated and standing vehicle passengers. This experimental device will now allow us to (a) gain comprehensive understanding of the load-transfer mechanisms through the lower limb, (b) characterize the dissipating capacity of mitigation technologies, and (c) assess the bio-fidelity of surrogates.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Internet and its widespread usage for multimedia document distribution put the copyright issue in a complete new setting. Multimedia documents, specifically those installed on a web page, are no longer passive as they typically include active applets. Copyright protection safeguards the intellectual property (IP) of multimedia documents, which are either sold or distributed free of charge. In this Chapter, the basic tools for copyright protection are discussed. First, general concepts and the vocabulary used in copyright protection of multimedia documents are discussed. Later, taxonomy of watermarking and fingerprinting techniques are studied. This part is concluded by a review of the literature dealing with IP security. The main part of the chapter discusses the generic watermarking scheme and illustrates it on three specific examples: collusion-free watermarking, spread spectrum watermarking, and software fingerprinting. Future trends and conclusions close the chapter.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cold-formed steel members are widely used in load bearing Light gauge steel frame (LSF) wall systems with plasterboard linings on both sides. However, these thin-walled steel sections heat up quickly and lose their strength under fire conditions despite the protection provided by plasterboards. Hence there is a need for simple fire design rules to predict their load capacities and fire resistance ratings. During fire events, the LSF wall studs are subjected to non-uniform temperature distributions that cause thermal bowing, neutral axis shift and magnification effects and thus resulting in a combined axial compression and bending action on the LSF wall studs. In this research a series of full scale fire tests was conducted first to evaluate the performance of LSF wall systems with eight different wall configurations under standard fire conditions. Finite element models of LSF walls were then developed, analysed under transient and steady state conditions, and validated using full scale fire tests. Using the results from fire tests and finite element analyses, a detailed investigation was undertaken into the prediction of axial compression strength and failure times of LSF wall studs in standard fires using the available fire design rules based on Australian, American and European standards. The results from both fire tests and finite element analyses were used to investigate the ability of these fire design rules to include the complex effects of non-uniform temperature distributions and their accuracy in predicting the axial compression strengths of wall studs and the failure times. Suitable modifications were then proposed to the fire design rules. This paper presents the details of this investigation into the accuracy of using currently available fire design rules of LSF walls and the results.