46 resultados para Information Analysis
em University of Queensland eSpace - Australia
Resumo:
Streaming video application requires high security as well as high computational performance. In video encryption, traditional selective algorithms have been used to partially encrypt the relatively important data in order to satisfy the streaming performance requirement. Most video selective encryption algorithms are inherited from still image encryption algorithms, the encryption on motion vector data is not considered. The assumption is that motion vector data are not as important as pixel image data. Unfortunately, in some cases, motion vector itself may be sufficient enough to leak out useful video information. Normally motion vector data consume over half of the whole video stream bandwidth, neglecting their security may be unwise. In this paper, we target this security problem and illustrate attacks at two different levels that can restore useful video information using motion vectors only. Further, an information analysis is made and a motion vector information model is built. Based on this model, we describe a new motion vector encryption algorithm called MVEA. We show the experimental results of MVEA. The security strength and performance of the algorithm are also evaluated.
Resumo:
This book chapter represents a synthesis of the work which started in my PhD and which has been the conceptual basis for all of my research since 1993. The chapter presents a method for scientists and managers to use for selecting the type of remotely sensed data to use to meet their information needs associated with a mapping, monitoring or modelling application. The work draws on results from several of my ARC projects, CRC Rainforest and Coastal projects and theses of P.Scarth , K.Joyce and C.Roelfsema.
Resumo:
After outlining some relevant background information about the NT crocodile farming industry and explaining the purpose of our survey of NT crocodile farmers conducted in the first half of 2005, this paper reports the results of the survey. The information received from the survey is supplemented by secondary data and by information from secondary sources. This report covers the location of respondents; the size of crocodile farms; farmers’ stated knowledge of and attitudes towards the NT Crocodile Management Plan; the involvement of farms in the harvesting of crocodile eggs and the costs involved; views of crocodile farmers about whether the NT Crocodile Management Plan encourages landholders to conserve crocodiles and their perceptions of the benefits to landholders; predicted production trends and trends in the number of farms operating in NT; economic characteristics of crocodile farms producing in NT including the economic advantages and disadvantages of crocodile farming in NT. Concluding comments provide, amongst other things, an overview of the structure of the crocodile farming industry in the NT gleaned from a consideration of data available from the NT Government’s Department of Business, Industry and Resource Development.
Resumo:
Information security devices must preserve security properties even in the presence of faults. This in turn requires a rigorous evaluation of the system behaviours resulting from component failures, especially how such failures affect information flow. We introduce a compositional method of static analysis for fail-secure behaviour. Our method uses reachability matrices to identify potentially undesirable information flows based on the fault modes of the system's components.
Resumo:
Objective: This study (a) evaluated the reading ability of patients following stroke and their carers and the reading level and content and design characteristics of the written information provided to them, (b) explored the influence of sociodemographic and clinical characteristics on patients' reading ability, and (c) described an education package that provides well-designed information tailored to patients' and carers' informational needs. Methods: Fifty-seven patients and 12 carers were interviewed about their informational needs in an acute stroke unit. Their reading ability was assessed using the Rapid Estimate of Adult Literacy in Medicine (REALM). The written information provided to them in the acute stroke unit was analysed using the SMOG readability formula and the Suitability Assessment of Materials (SAM). Results: Thirteen (22.8%) patients and 5 (41.7%) carers had received written stroke information. The mean reading level of materials analysed was 11th grade while patients read at a mean of 7-8th grade. Most materials (89%) scored as only adequate in content and design. Patients with combined aphasia read significantly lower (4-6th grade) than other patients (p = 0.001). Conclusion: Only a small proportion of patients and carers received written materials about stroke and the readability level and content and design characteristics of most materials required improvement. Practice implications: When developing and distributing written materials about stroke, health professionals should consider the reading ability and informational needs of the recipients, and the reading level and content and design characteristics of the written materials. A computer system can be used to generate written materials tailored to the informational needs and literacy skills of patients and carers. (c) 2005 Elsevier Ireland Ltd. All rights reserved.
Resumo:
Social movement theories offer useful conceptual and analytical tools to the study and research of global media reform movements. This article is a critical analysis of the Communication Rights in the Information Society (CRIS) campaign. It explores its successes and blind-spots in the light of social movement theory, in particular resource mobilization theory (RMT), and offers practical directions for the movement to move on from where it is to where it ought to be.
Resumo:
The results of empirical studies are limited to particular contexts, difficult to generalise and the studies themselves are expensive to perform. Despite these problems, empirical studies in software engineering can be made effective and they are important to both researchers and practitioners. The key to their effectiveness lies in the maximisation of the information that can be gained by examining existing studies, conducting power analyses for an accurate minimum sample size and benefiting from previous studies through replication. This approach was applied in a controlled experiment examining the combination of automated static analysis tools and code inspection in the context of verification and validation (V&V) of concurrent Java components. The combination of these V&V technologies was shown to be cost-effective despite the size of the study, which thus contributes to research in V&V technology evaluation.
An Alternative ADS for the Analysis, Design and Evaluation of Information Representations in the ICU
Resumo:
Despite many successes of conventional DNA sequencing methods, some DNAs remain difficult or impossible to sequence. Unsequenceable regions occur in the genomes of many biologically important organisms, including the human genome. Such regions range in length from tens to millions of bases, and may contain valuable information such as the sequences of important genes. The authors have recently developed a technique that renders a wide range of problematic DNAs amenable to sequencing. The technique is known as sequence analysis via mutagenesis (SAM). This paper presents a number of algorithms for analysing and interpreting data generated by this technique.
Resumo:
Self-incompatibility RNases (S-RNases) are an allelic series of style glycoproteins associated with rejection of self-pollen in solanaceous plants. The nucleotide sequences of S-RNase alleles from several genera have been determined, but the structure of the gene products has only been described for those from Nicotiana alata. We report on the N-glycan structures and the disulfide bonding of the S-3-RNase from wild tomato (Lycopersicon peruvianum) and use this and other information to construct a model of this molecule. The S-3-RNase has a single N-glycosylation site (Asn-28) to which one of three N-glycans is attached. S-3-RNase has seven Cys residues; six are involved in disulfide linkages (Cys-16-Cys-21, Cys-46-Cys-91, and Cys-166-Cys-177), and one has a free thiol group (Cys-150). The disulfide-bonding pattern is consistent with that observed in RNase Rh, a related RNase for which radiographic-crystallographic information is available. A molecular model of the S-3-RNase shows that four of the most variable regions of the S-RNases are clustered on one surface of the molecule. This is discussed in the context of recent experiments that set out to determine the regions of the S-RNase important for recognition during the self-incompatibility response.