37 resultados para Deployment of Federal Institutes


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Security is a principal concern in offering an infrastructure for the formation of general-purpose computational grids. A number of grid implementations have been devised to deal with the security concerns by authenticating the users, hosts and their interactions in an appropriate fashion. Resource management systems that are sophisticated and secured are inevitable for the efficient and beneficial deployment of grid computing services. The chief factors that can be problematic in the secured selection of grid resources are the wide range of selection and the high degree of strangeness. Moreover, the lack of a higher degree of confidence relationship is likely to prevent efficient resource allocation and utilisation. In this paper, we present an efficient approach for the secured selection of grid resources, so as to achieve secure execution of the jobs. This approach utilises trust and reputation for securely selecting the grid resources. To start with, the self-protection capability and reputation weightage of all the entities are computed, and based on those values, the trust factor (TF) of all the entities are determined. The reputation weightage of an entity is the measure of both the user’s feedback and other entities’ feedback. Those entities with higher TF values are selected for the secured execution of jobs. To make the proposed approach more comprehensive, a novel method is employed for evaluating the user’s feedback on the basis of the existing feedbacks available regarding the entities. This approach is proved to be scalable for an increased number of user jobs and grid entities. The experimentation portrays that this approach offers desirable efficiency in the secured selection of grid resources.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Commuting to work is one of the most important and regular routines of transportation in towns and cities. From a geographic perspective, the length of people’s commute is influenced, to some degree, by the spatial separation of their home and workplace and the transport infrastructure. The rise of car ownership in Australia from the 1950s to the present was accompanied by a considerable decrease of public transport use. Currently there is an average of 1.4 persons per car in Australia, and private cars are involved in approximately 90% of the trips, and public transportation in only 10%. Increased personal mobility has fuelled the trend of decentralised housing development, mostly without a clear planning for local employment, or alternative means of transportation. Transport sector accounts for 14% of Australia’s net greenhouse gas emissions. Without further policy action, Australia’s emissions are projected to continue to increase. The Australian Federal Government and the new Department of Climate Change have recently published a set of maps showing that rising seas would submerge large parts of Victoria coastal region. Such event would lead to major disruption in planned urban growth areas in the next 50 years with broad scale inundation of dwellings, facilities and road networks. The Greater Geelong Region has well established infrastructure as a major urban centre and tourist destination and hence attracted the attention of federal and state governments in their quest for further development and population growth. As a result of its natural beauty and ecological sensitivity, scenarios for growth in the region are currently under scrutiny from local government as well as development agencies, scientists, and planners. This paper is part of a broad research in the relationship between transportation system, urban form, trip demand, and emissions, as a paramount in addressing the challenges presented by urban growth. Progressing from previous work focused on private cars, this present paper investigates the use of public transport as a mode for commuting in the Greater Geelong Region. Using a GIS based interaction model, it characterises the current use of the existing public transportation system, and also builds a scenario of increased use of the existing public transportation system, estimating potencial reductions in CO2 emissions. This study provides an improved understanding of the extent to which choices of transport mode and travel activity patterns, affect emissions in the context of regional networks. The results indicate that emissions from commuting by public transportation are significantly lower than those from commuting by private car, and emphasise that there are opportunities for large abatment in the greenhouse emissions from the transportation sector related to efforts in increasing the use of existing public transportation system.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Each year, large amounts of money and labor are spent on patching the vulnerabilities in operating systems and various popular software to prevent exploitation by worms. Modeling the propagation process can help us to devise effective strategies against those worms' spreading. This paper presents a microcosmic analysis of worm propagation procedures. Our proposed model is different from traditional methods and examines deep inside the propagation procedure among nodes in the network by concentrating on the propagation probability and time delay described by a complex matrix. Moreover, since the analysis gives a microcosmic insight into a worm's propagation, the proposed model can avoid errors that are usually concealed in the traditional macroscopic analytical models. The objectives of this paper are to address three practical aspects of preventing worm propagation: (i) where do we patch? (ii) how many nodes do we need to patch? (iii) when do we patch? We implement a series of experiments to evaluate the effects of each major component in our microcosmic model. Based on the results drawn from the experiments, for high-risk vulnerabilities, it is critical that networks reduce the number of vulnerable nodes to below 80%. We believe our microcosmic model can benefit the security industry by allowing them to save significant money in the deployment of their security patching schemes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The use of RFID (Radio Frequency Identification) technology can be employed for tracking and detecting each container, pallet, case, and product uniquely in the supply chain. It connects the supply chain stakeholders (i.e.; suppliers, manufacturers, wholesalers/distributors, retailers and customers) and allows them to exchange data and product information. Despite these potential benefits, security issues are the key factor in the deployment of a RFID-enabled system in the global supply chain. This paper proposes a hybrid approach to secure RFID transmission in Supply Chain Management (SCM) systems using modified Wired Equivalent Encryption (WEP) and Rivest, Shamir and Adleman (RSA) cryptosystem. The proposed system also addresses the common loop hole of WEP key algorithm and makes it more secure compare to the existing modified WEP key process.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Privacy is an important aspect of pervasive and ubiquitous computing systems, and, in particular, pervasive healthcare. With reference to previous approaches on developing privacy sensitive pervasive healthcare applications, we detail a framework for the design of such systems that aims to minimise the impact of privacy on such systems. In reviewing previous approaches, we extract and combine common elements in order to unify the approaches and create a more formal methodology for designing privacy mechanisms in pervasive healthcare applications. In doing so we also consider the manner in which ubiquitous technologies impact on privacy and methods for reducing this impact. We demonstrate how the framework can be applied by using examples from the previous approaches. In addressing privacy issues, the framework aims to remove a large obstacle to deployment of pervasive healthcare systems, acceptance of the technology.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Worms are widely believed to be one of the most serious challenges in network security research. In order to prevent worms from propagating, we present a microcosmic model, which can benefit the security industry by allowing them to save significant money in the deployment of their security patching schemes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

1. Maintaining a high and stable body temperature is often critical for female ectotherms during reproduction. Yet this strategy may be energetically costly, and therefore challenging, during this period of already high-energy demand. 2. Here, the 6-week deployment of tri-axial accelerometers (n = 6) on a marine ectotherm, the loggerhead turtle (Caretta caretta), reproducing at the northern limit of the species’ breeding range (i.e. in a thermally dynamic environment) revealed the behavioural mechanisms underlying its energy management strategy during the breeding season. 3. The estimated activity levels of female loggerheads using overall dynamic body acceleration (ODBA) were high during the breeding season, suggesting that marine turtles may not be able to remain inactive for long periods in the same manner as terrestrial ectotherms, because of the thermally dynamic nature of their environment. 4. However, activity levels were not constant throughout the season, being impacted by both ambient water temperature and female reproductive status. In cold water at the beginning of the nesting season, high levels of activity suggested that females behaviourally thermoregulated by seeking out warm water patches along the shoreline. Interactions with male turtles (courtship and/or avoidance) may also explain this high level of activity. As sea temperatures warmed up and the amount of energy devoted to reproduction probably increased, the turtles spent more time resting during long sequential flat-bottomed dives, and reduced any unnecessary locomotory activity. 5. Turtles may therefore adjust their activity patterns in response to seasonal variations in abiotic (i.e. ambient temperature) and biotic (i.e. reproductive status) factors. This may help minimize activity-linked metabolic rate and maximize reproductive output over a season while breeding in thermally dynamic environments. 6. A mechanistic model gave support to these empirical results. The model revealed that actively maintaining high and stable body temperature is of clear benefit to female turtles at temperate breeding sites. While energetically costly, such active thermoregulatory behaviour may speed up egg maturation, allowing turtles to initiate nesting earlier in the season, and hence maximize reproductive output.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Greek community in Melbourne, Australia, is large and has a long history in the city. It is diverse and associated with a range of cultural, social and political structures. It has strong transnational links and in many ways exemplifies ‘diasporic’ in contradistinction to ‘migrant’. This paper focuses on young people from this community, particularly those who attend schools established to promote Greek language and cultural maintenance. In this paper, we examine such students’ explorations of their cultural identifications, most specifically how they adopt the term ‘wog’. This term is complex and its place in Australian discourse has shifted over time. Tracking these shifts and considering them as a context for these young people's use of the term allows us to consider the processes involved in their self-fashioning. We argue that their uptake of ‘wog’ involves the deployment of irony, given their awareness of its strong association with racism. We are also interested in the potential for women's experience to be silenced through the common association between ‘wog’ and protest masculinities. We argue that these students’ use of the term illustrates self-fashioning that provides insights into the complexities that surround cultural identification at the micro level, including schooling, but also in the broader context of globalisation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Radio-frequency identification (RFID) is seen as one of the requirements for the implementation of the Internet-of-Things (IoT). However, an RFID system has to be equipped with a holistic security framework for a secure and scalable operation. Although much work has been done to provide privacy and anonymity, little focus has been given to performance, scalability and customizability issues to support robust implementation of IoT. Also, existing protocols suffer from a number of deficiencies such as insecure or inefficient identification techniques, throughput delay and inadaptability. In this paper, we propose a novel identification technique based on a hybrid approach (group-based approach and collaborative approach) and security check handoff (SCH) for RFID systems with mobility. The proposed protocol provides customizability and adaptability as well as ensuring the secure and scalable deployment of an RFID system to support a robust distributed structure such as the IoT. The protocol has an extra fold of protection against malware using an incorporated malware detection technique. We evaluated the protocol using a randomness battery test and the results show that the protocol offers better security, scalability and customizability than the existing protocols. © 2014 Elsevier B.V. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This research focuses on a major health priority for Australia by addressing existing gaps in the implementation of nursing informatics solutions in healthcare. It serves to inform the successful deployment of IT solutions designed to support patient-centered, frontline acute healthcare delivery by multidisciplinary care teams. The outcomes can guide future evaluations of the contribution of IT solutions to the efficiency, safety and quality of care delivery in acute hospital settings.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This is the third in a series of papers examining different aspects of the CEO compensation debate. This Article will explore attempts by norms entrepreneurs to create or modify social norms. It argues that the relevant social norms are in a state of flux because of the work of norms entrepreneurs, whose efforts might reduce the need for legislative intervention. Several new norms like majority voting for board election, say on pay, smaller multiples for severance packages, and respect for shareholder activists may be emerging due to the work of norms entrepreneurs. Part II analyzes the rich literature on social norms to determine if there are models capable of application to better correlate executive compensation with performance. Despite several problems at the definitional level, it argues that the actions of constituencies relevant to the CEO pay debate might be explained by signaling, esteem, and expressive theories. Further, social norms theories neglecting internalization are deficient; corporate actors undertake self-improvement only when they internalize norms. Part III identifies the work of norms entrepreneurs in creating or changing norms pertaining to CEO compensation, and analyzes the reasons for their success. The examples considered demonstrate the effects of dynamic normative transformations on corporate actors and illustrate the contrast in behavioral changes accompanying resistance and acceptance of new norms. Part IV concludes that norm creation in corporate law is facilitated by the role of groups where membership benefits are dependent on reputation; that directors cannot tradeoff reputation like CEOs, making the deployment of reputational sanctions against them powerful; that behavioral change is more effective when there is norm internalization; and that norms entrepreneurs ought to focus on socializing relevant actors if they aspire to be successful in achieving normative change.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

© 2014 by IGI Global. All rights reserved. The purpose of this chapter is to empirically examine the mediating role of innovation in strategic international marketing. The theoretical model consists of four variables: firm commitment, innovation, promotion strategy, and firm performance. It is conceptualized that firm commitment influences innovation that mediates the promotion variable, which in turn affects firm performance. A mail-out survey to Australian firms involved in international marketing gathered 315 useable responses. The whole theoretical model was tested using the structural equation modelling, partial disaggregation method. The findings confirm significant relationships among the variables in the theoretical model. All major fit indices from structural equation modelling analysis show satisfactory results for both the measurement model and the structural model. The findings shed light on the deployment of resources and capabilities such as human and financial resources, innovation, and promotion strategy to enhance firm performance. The major contributions of this chapter are the establishment of the mediating role of innovation on promotion strategy and the variables from the resources and capabilities perspective affecting firm performance.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study examines whether individually held cultural values moderate the relationship between transformational leadership behavior of supervisors and the job involvement of subordinates in the Middle Eastern organizational context. Hierarchical regression analysis was used to analyze survey data from 229 employees of 10 organizations in the United Arab Emirates. In line with the findings of studies in Western countries, transformational leadership was found to influence job involvement positively. In addition, the cultural value orientations of individuals were found to moderate this relationship. Collectivism positively influenced the relationship between transformational leadership and job involvement, whereas uncertainty avoidance had a negative effect. These findings provide an insight into how transformational leadership may be used to motivate culturally diverse groups of employees within the Middle East. To enhance job involvement, organizations need to realize that the attitudinal response of subordinates to transformational leadership can depend on their cultural values. This has significant implications regarding the training and effective deployment of transformational leaders within Middle Eastern organizations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The adoption of Building Information Modelling (BIM) is one of the greatest technological innovations in the construction industry to date. However, the implementation of BIM lags far behind its potential due to the existence of various barriers. Strong government support is critical for the successful development and deployment of complex technology systems. BIM could seek government support to drive its implementation process and overcome the barriers. Through a survey, this paper aims to discover stakeholders’ expectations of the government role in BIM implementation and explores specific ways for governments to promote BIM implementation. The research findings are expected to assist related departments to accelerate BIM implementation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This research focuses on a major health priority for Australia by addressing existing gaps in the implementation of nursing informatics solutions in healthcare. It serves to inform the successful deployment of IT solutions designed to support patient-centered, frontline acute healthcare delivery by multidisciplinary care teams. The outcomes can guide future evaluations of the contribution of IT solutions to the efficiency, safety and quality of care delivery in acute hospital settings.