34 resultados para Secure Authentication for Broadcast (DNP3-SAB)
em University of Queensland eSpace - Australia
Resumo:
In this paper, we describe the Vannotea system - an application designed to enable collaborating groups to discuss and annotate collections of high quality images, video, audio or 3D objects. The system has been designed specifically to capture and share scholarly discourse and annotations about multimedia research data by teams of trusted colleagues within a research or academic environment. As such, it provides: authenticated access to a web browser search interface for discovering and retrieving media objects; a media replay window that can incorporate a variety of embedded plug-ins to render different scientific media formats; an annotation authoring, editing, searching and browsing tool; and session logging and replay capabilities. Annotations are personal remarks, interpretations, questions or references that can be attached to whole files, segments or regions. Vannotea enables annotations to be attached either synchronously (using jabber message passing and audio/video conferencing) or asynchronously and stand-alone. The annotations are stored on an Annotea server, extended for multimedia content. Their access, retrieval and re-use is controlled via Shibboleth identity management and XACML access policies.
Resumo:
The provisioning of offspring can have far-reaching consequences for later life in a wide range of organisms and generally this provisioning is thought to be under maternal influence or control. In experiments with a broadcast-spawning ascidian, we found that the size of offspring was determined by egg size and the abundance of sperm present during fertilization. Larger eggs were fertilized at low sperm concentrations, whilst smaller eggs were successfully fertilized at high sperm concentrations. These differences in fertilized egg size resulted in differences in the development rate, hatching success and mean size of the subsequent larvae. Our results suggest that, in contrast to females that reproduce by other mating systems, free-spawning mothers lack some control over the provisioning of offspring. Furthermore, because males can alter the sperm environment, they can exert paternal (non-genetic) control over key offspring characteristics.
Resumo:
When the availability of sperm limits female reproductive success, competition for sperm, may be an important broker of sexual selection. This is because sperm limitation can increase the variance in female reproductive success, resulting in strong selection on females to compete for limited fertilization opportunities. Sperm limitation is probably common in broadcast-spawning marine invertebrates, making these excellent candidates for investigating scramble competition between broods of eggs and its consequences for female reproductive success. Here, we report our findings from a series of experiments that investigate egg competition in the sessile, broadcast-spawning polychaete Galeolaria caespitosa. We initially tested whether the order in which eggs encounter sperm affects their fertilization success at two ecologically relevant current regimes. We used a split-clutch-split-ejaculate technique to compare the fertilization success of eggs from individual females that had either first access (competition-free treatment) or second access (egg competition treatment) to a batch of sperm. We found that fertilization success depended on the order in which eggs accessed sperm; eggs that were assigned to the competition-free treatment exhibited significantly higher fertilization rates than those assigned to the egg competition treatment at both current speeds. In subsequent experiments we found that prior exposure of sperm to eggs significantly reduced both the quantity and quality of sperm available to fertilize a second clutch of eggs, resulting in reductions in fertilization success at high and low sperm concentrations. These findings suggest that female traits that increase the likelihood of sperm-egg interactions (e.g. egg size) will respond to selection imposed by egg competition.
Resumo:
Knowledge of differences in voice and speech characteristics between novice and professional broadcasters is essential for effective education of broadcast journalism students. Because newsreaders rely on optimal voice production, information pertaining to vocal hygiene is also important. The first aim of this study was to compare the voice and speech characteristics of professional newsreaders, student newsreaders and control participants. The second aim was to compare the awareness and use of vocal hygiene across these groups. Professional radio newsreaders, broadcast journalism students and two matched control groups were included in the study. Each participant recorded a news bulletin and completed a questionnaire on vocal hygiene. Data analysis of the recording included objective analysis and perceptual ratings by a panel of three judges. Significant student-professional differences were found. Compared to both the students and the control groups, the professional newsreaders had greater variation in speaking fundamental frequency, a faster rate of speech, fewer pronunciation errors and higher perceptual ratings on vocal quality, emphasis, continuity, phrasing and style of newsreading. Female professional newsreaders had a higher speaking fundamental frequency than both their control participants and the student newsreaders. Comparison of vocal hygiene awareness revealed few significant differences between any of the groups.
Resumo:
Seven phenolic acids related to the botanical origins of nine monofloral Eucalyptus honeys from Australia, along with two abscisic isomers, have been analyzed. The mean content of total phenolic acids ranges from 2.14 mg/100 g honey of black box (Eucalyptus largiflorens) honey to 10.3 mg/100 g honey of bloodwood (Eucalyptus intermedia) honey, confirming an early finding that species-specific differences of phytochemical compositions occur quantitatively among these Eucalyptus honeys. A common profile of phenolic acids, comprising gallic, chlorogenic, coumaric and caffeic acids, can be found in all the Eucalyptus honeys, which could be floral markers for Australian Eucalyptus honeys. Thus, the analysis of phenolic acids could also be used as an objective method for the authentication of botanical origin of Eucalyptus honeys. Moreover, all the honey samples analyzed in this study contain gallic acid as the main phenolic acid, except for stringybox (Eucalyptus globoidia) honey which has ellagic acid as the main phenolic acid. This result indicates that the species-specific differences can also be found in the honey profiles of phenolic acids. Further-more, the analysis of abscisic acid in honey shows that the content of abscisic acid varies from 0.55 mg/100 g honey of black box honey to 4.68 mg/ 100 g honey of bloodwood honey, corresponding to the contents of phenolic acids measured in these honeys. These results have further revealed that the HPLC analysis of honey phytochemical constituents could be used individually and/or jointly for the authentication of the botanical origins of Australian Eucalyptus honeys. (C) 2003 Elsevier Ltd. All rights reserved.
Resumo:
Flavonoids in Australian honeys from five botanical species (Melaleuca, Guioa, Lophostemon, Banksia and Helianthus) have been analyzed in relation to their floral origins. Tea tree (Melaleuca quinquenervia) and heath (Banksia ericifolia) honeys show a common flavonoid profile comprising myricetin (3,5,7,3',4',5'-hexahydroxyflavone), tricetin (5,7,3',4,5'-pentahydroxyflavone), querectin (3,5,7,3',4'-pentahydroxyflavone) and luteolin (5,7,3',4'-tetrahydroxyflavone), which was previously suggested as a floral marker for an Australian Eucalyptus honey (bloodwood or Eucalyptus intermedia honey). These honeys of various floral species can be differentiated by their levels of total flavonoids, being 2.12 mg/100 g for heath honey and 6.35 m/100 g for tea tree honey. In brush box (Lophostemon conferta) honey, the flavonoid profile comprising mainly tricetin, luteolin and quercetin is similar to that of another Eucalyptus honey (yellow box or Eucalyptus melliodora honey). These results indicate that the flavonoid profiles in some of the Australian non-Eucalyptus honeys may contain more or less certain flavonoids from Eucalyptus floral sources because of the diversity and extensive availability of Eucalyptus nectars for honeybee foraging yearly around or a possible cross contamination of the monofloral honeys during collection, transportation and/or storage. Further analyses are required to differentiate and/or verify the botanical sources of the flavonoids that contribute to the flavonoid profiles of these honeys, by restricting honey sampling areas and procedures, employing other complementary analytical methods (e.g. pollen analysis, sugar profile) and using materials (e.g. nectar) directly sourced from the flowering plant for comparative studies. In Australian crow ash (Guioa semiglauca) honey, myricetin, tricetin, quercetin, luteolin and an unknown flavonoid have been found to be the main flavonoids, which is characteristic only to this type of honey, and could thus be used as the floral marker, while in Australian sunflower (Helianthus annuus) honey, the content of total flavonoids is the smallest amount comparing to those in the other honeys analysed in this study. However, the flavonoid quercetin and the flavonoid profile mainly consisting of quercetin, quercetin 3,3'-dimethyl ether (5,7,4'-trihydroxy3,3'-dimethoxyflavone), myricetin and luteolin are characteristic only to this sunflower honey and could thus be used for the authentication.
Resumo:
Eight phenolic acids and two abscisic acid isomers in Australian honeys from five botanical species (Melaleuca, Guioa, Lophostemon, Banksia and Helianthus) have been analyzed in relation to their botanical origins. Total phenolic acids present in these honeys range from 2.13 mg/100 g sunflower (Helianthus annuus) honey to 12.11 mg/100 g tea tree (Melaleuca quinquenervia) honey, with amounts of individual acids being various. Tea tree honey shows a phenolic profile of gallic, ellagic, chlorogenic and coumaric acids, which is similar to the phenolic profile of an Australian Eucalyptus honey (bloodwood or Eucalyptus intermedia honey). The main difference between tea tree and bloodwood honeys is the contribution of chlorogenic acid to their total phenolic profiles. In Australian crow ash (Guioa semiglauca) honey, a characteristic phenolic profile mainly consisting of gallic acid and abscisic acid could be used as the floral marker. In brush box (Lophostemon conferta) honey, the phenolic profile, comprising mainly gallic acid and ellagic acid, could be used to differentiate this honey not only from the other Australian non-Eucalyptus honeys but also from a Eucalyptus honey (yellow box or Eucalyptus melliodora honey). However, this Eucalyptus honey could not be differentiated from brush box honey based only on their flavonoid profiles. Similarly, the phenolic profile of heath (Banksia ericifolia) honey, comprising mainly gallic acid, an unknown phenolic acid (Phl) and coumaric acid, could also be used to differentiate this honey from tea tree and bloodwood honeys, which have similar flavonoid profiles. Coumaric acid is a principal phenolic acid in Australian sunflower honey and it could thus be used together with gallic acid for the authentication. These results show that the HPLC analysis of phenolic acids and abscisic acids in Australian floral honeys Could assist the differentiation and authentication of the honeys. © 2005 Elsevier Ltd. All rights reserved.
Resumo:
One of the obstacles to improved security of the Internet is ad hoc development of technologies with different design goals and different security goals. This paper proposes reconceptualizing the Internet as a secure distributed system, focusing specifically on the application layer. The notion is to redesign specific functionality, based on principles discovered in research on distributed systems in the decades since the initial development of the Internet. Because of the problems in retrofitting new technology across millions of clients and servers, any options with prospects of success must support backward compatibility. This paper outlines a possible new architecture for internet-based mail which would replace existing protocols by a more secure framework. To maintain backward compatibility, initial implementation could offer a web browser-based front end but the longer-term approach would be to implement the system using appropriate models of replication. (C) 2005 Elsevier Ltd. All rights reserved.
Resumo:
Information security devices must preserve security properties even in the presence of faults. This in turn requires a rigorous evaluation of the system behaviours resulting from component failures, especially how such failures affect information flow. We introduce a compositional method of static analysis for fail-secure behaviour. Our method uses reachability matrices to identify potentially undesirable information flows based on the fault modes of the system's components.
Resumo:
Twenty-seven patients undergoing treatment in a high-secure forensic facility participated in focus group interviews to elicit their perceptions of (1) the factors leading to aggressive behaviour; and (2) strategies to reduce the risk of such behaviour. The focus group interviews were audiotaped, transcribed and analysed using content analysis. The participants identified that a combination of patient, staff and environmental factors contributed to violence in the study wards. The cause of aggressive behaviour centred around five major themes: the environment; empty days; staff interactions; medication issues; and patient-centred factors. Potential strategies identified by patients to reduce aggressive behaviour included: early intervention; the provision of meaningful activities to reduce boredom; separation of acutely disturbed patients; improved staff attitudes; implementation of effective justice procedures; and a patient advocate to mediate during times of conflict. Findings suggested that social and organizational factors need to be addressed to change the punitive subculture inherent in forensic psychiatric facilities, and to ensure a balance between security and effective therapy.
Resumo:
Recently, there has been a dramatic increase in the number of ecotoxicological studies examining the effects of toxicants on fertilization success in marine broadcast spawners and it appears that this life-history stage is one of the most vulnerable to toxicants. Most of the studies examining this issue use single sperm concentrations in their assays. Here, I discuss recent advances in fertilization ecology that suggest this technique has some severe limitations resulting in unreliable estimations of the size and direction of toxicant effects. I present an alternative assay technique and two metrics (F-max and [Sperm](max)) that will reliably estimate the size of a toxicant's effect on fertilization success. This technique has the added advantage of making comparisons among species and studies easier without an impractical increase in effort. (c) 2006 Elsevier Ltd. All rights reserved.
Resumo:
User requirements of multimedia authentication are various. In some cases, the user requires an authentication system to monitor a set of specific areas with respective sensitivity while neglecting other modification. Most current existing fragile watermarking schemes are mixed systems, which can not satisfy accurate user requirements. Therefore, in this paper we designed a sensor-based multimedia authentication architecture. This system consists of sensor combinations and a fuzzy response logic system. A sensor is designed to strictly respond to given area tampering of a certain type. With this scheme, any complicated authentication requirement can be satisfied, and many problems such as error tolerant tamper method detection will be easily resolved. We also provided experiments to demonstrate the implementation of the sensor-based system
Resumo:
Infrastructureless networks are becoming more popular with the increased prevalence of wireless networking technology. A significant challenge faced by these infrastructureless networks is that of providing security. In this paper we examine the issue of authentication, a fundamental component of most security approaches, and show how it can be performed despite an absence of trusted infrastructure and limited or no existing trust relationship between network nodes. Our approach enables nodes to authenticate using a combination of contextual information, harvested from the environment, and traditional authentication factors (such as public key cryptography). Underlying our solution is a generic threshold signature scheme that enables distributed generation of digital certificates.