138 resultados para Eastern Point
em Queensland University of Technology - ePrints Archive
Resumo:
Phishing and related cybercrime is responsible for billions of dollars in losses annually. Gartner reported more than 5 million U.S. consumers lost money to phishing attacks in the 12 months ending in September 2008 (Gartner 2009). This paper asks whether the majority of organised phishing and related cybercrime originates in Eastern Europe rather than elsewhere such as China or the USA. The Russian “Mafiya” in particular has been popularised by the media and entertainment industries to the point where it can be hard to separate fact from fiction but we have endeavoured to look critically at the information available on this area to produce a survey. We take a particular focus on cybercrime from an Australian perspective, as Australia was one of the first places where Phishing attacks against Internet banks were seen. It is suspected these attacks came from Ukrainian spammers. The survey is built from case studies both where individuals from Eastern Europe have been charged with related crimes or unsolved cases where there is some nexus to Eastern Europe. It also uses some earlier work done looking at those early Phishing attacks, archival analysis of Phishing attacks in July 2006 and new work looking at correlation between the Corruption Perception Index, Internet penetration and tertiary education in Russia and the Ukraine. The value of this work is to inform and educate those charged with responding to cybercrime where a large part of the problem originates and try to understand why.
Resumo:
Traditional information retrieval (IR) systems respond to user queries with ranked lists of relevant documents. The separation of content and structure in XML documents allows individual XML elements to be selected in isolation. Thus, users expect XML-IR systems to return highly relevant results that are more precise than entire documents. In this paper we describe the implementation of a search engine for XML document collections. The system is keyword based and is built upon an XML inverted file system. We describe the approach that was adopted to meet the requirements of Content Only (CO) and Vague Content and Structure (VCAS) queries in INEX 2004.
Resumo:
Cultural policy settings attempting to foster the growth and development of the Australian feature film industry in era of globalisation are coming under increasing pressure. Global forces and emerging production and distribution models are challenging the “narrowness” of cultural policy – mandating a particular film culture, circumscribing certain notions of value and limiting the variety of films produced through cultural policy driven subvention models. Australian horror film production is an important case study. Horror films are a production strategy well suited to the financial limitations of the Australian film industry with competitive advantages for producers against international competitors. However, emerging within a “national” cinema driven by public subsidy and social/cultural objectives, horror films – internationally oriented with a low-culture status – have been severely marginalised within public funding environments. This paper introduces Australian horror film production, and examines the limitations of cultural policy, and the impacts of these questions for the Producer Offset.
Resumo:
Monitoring unused or dark IP addresses offers opportunities to extract useful information about both on-going and new attack patterns. In recent years, different techniques have been used to analyze such traffic including sequential analysis where a change in traffic behavior, for example change in mean, is used as an indication of malicious activity. Change points themselves say little about detected change; further data processing is necessary for the extraction of useful information and to identify the exact cause of the detected change which is limited due to the size and nature of observed traffic. In this paper, we address the problem of analyzing a large volume of such traffic by correlating change points identified in different traffic parameters. The significance of the proposed technique is two-fold. Firstly, automatic extraction of information related to change points by correlating change points detected across multiple traffic parameters. Secondly, validation of the detected change point by the simultaneous presence of another change point in a different parameter. Using a real network trace collected from unused IP addresses, we demonstrate that the proposed technique enables us to not only validate the change point but also extract useful information about the causes of change points.
Resumo:
In this study, the authors propose a novel video stabilisation algorithm for mobile platforms with moving objects in the scene. The quality of videos obtained from mobile platforms, such as unmanned airborne vehicles, suffers from jitter caused by several factors. In order to remove this undesired jitter, the accurate estimation of global motion is essential. However it is difficult to estimate global motions accurately from mobile platforms due to increased estimation errors and noises. Additionally, large moving objects in the video scenes contribute to the estimation errors. Currently, only very few motion estimation algorithms have been developed for video scenes collected from mobile platforms, and this paper shows that these algorithms fail when there are large moving objects in the scene. In this study, a theoretical proof is provided which demonstrates that the use of delta optical flow can improve the robustness of video stabilisation in the presence of large moving objects in the scene. The authors also propose to use sorted arrays of local motions and the selection of feature points to separate outliers from inliers. The proposed algorithm is tested over six video sequences, collected from one fixed platform, four mobile platforms and one synthetic video, of which three contain large moving objects. Experiments show our proposed algorithm performs well to all these video sequences.
Resumo:
Abstract A field survey for natural enemies of Paropsis atomaria was conducted at two south-eastern Queensland Eucalyptus cloeziana plantation sites during 2004–2005. Primary egg and larval parasitoids and associated hyperparasitoids were identified to genus or species, and parasitism rates were determined throughout the season. Predators were identified to family level but their impact was not quantified. P. atomaria adults were also examined as potential hosts for parasitic mites and nematodes. An undescribed species of Neopolycystus (Pteromalidae) was the major primary egg parasitoid species reared from egg batches, parasitising half of all egg batches collected. Three hyperparasitoid species (Baeoanusia albifunicle (Encyrtidae), Neblatticida sp. (Encyrtidae) and Aphaneromella sp. (Platygasteridae) were present, representing around one-quarter to one-third of all emergent wasps; this is the first host association record for Neopolycystus–B. albifunicle. In contrast to populations of P. atomaria from the Australian Capital Territory, primary larval parasitism was very low, around 1%, and attributable only to the tachinid flies Anagonia sp. and Paropsivora sp. However, the presence of the sit-and-wait larval hyperparasitoid, Perilampus sp. (Perilampidae) was high, emerging from around 17% of tachinid pupae, with planidia infesting a further 40% of unparasitised hosts. Three species of podapolipid mites parasitised sexually mature P. atomaria adults, while no nematodes were found in this study. Spiders were the most common predators and their abundance was positively correlated with P. atomaria adult and egg numbers. Although natural enemy species composition was identical between our two study sites, significant differences in abundance and frequency were found between sites
Resumo:
This paper aims to describe the development of a critical thinking conceptual model which was constructed to guide the teaching and evaluation of critical thinking skills to Middle-Eastern nurses.
Resumo:
The purpose of this paper is to present a framework to guide critical thinking through reflective journaling, and describe how a group of 20 Middle Eastern nurses used reflective journaling to enhance their practice. Journal documentation was used during clinical practicum to foster the development of critical thinking in order to assist nurses when analysing and evaluating their clinical experiences. The findings from this study demonstrated that nurses accepted the framework for journal documentation because it provided structure for reflection, speculation, synthesis and metacognition of events experienced during clinical practice. Journaling gave nurses the opportunity to transfer thoughts onto paper and write down subjective and objective data, and created dialogue between the nurse educators and nurses. They were engaged in productive and positive activity to enhance their nursing practice. Nurses also commented that writing helped to develop their confidence in writing English.
Resumo:
A point interpolation method with locally smoothed strain field (PIM-LS2) is developed for mechanics problems using a triangular background mesh. In the PIM-LS2, the strain within each sub-cell of a nodal domain is assumed to be the average strain over the adjacent sub-cells of the neighboring element sharing the same field node. We prove theoretically that the energy norm of the smoothed strain field in PIM-LS2 is equivalent to that of the compatible strain field, and then prove that the solution of the PIM- LS2 converges to the exact solution of the original strong form. Furthermore, the softening effects of PIM-LS2 to system and the effects of the number of sub-cells that participated in the smoothing operation on the convergence of PIM-LS2 are investigated. Intensive numerical studies verify the convergence, softening effects and bound properties of the PIM-LS2, and show that the very ‘‘tight’’ lower and upper bound solutions can be obtained using PIM-LS2.