81 resultados para Guangdong Sheng


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Parametric modelling is gaining in popularity as both a fabrication and design tool, but its application in the architectural design industry has not been widely explored. Parametric modelling has the ability to generate complex forms with intuitively reactive components, allowing designers to express and fabricate structures previously too laborious and geometrically complex to realise. This alIows designers to address a project at both the macro and micro levels of resolution in the governing control surface and the individual repetitive component. This two level modelling control, of component and overall surface, can allow designers to explore new types of form generation subject to parametric constraints. Shading screens have been selected as the focus for this paper and are used as a medium to explore form generation within a given set of functional parameters. Screens can have many applications in a building but for the purpose of the following case studies, lighting quality and passive sun control are the main functional requirement. A set of screen components have been designed within certain shading parameters to create a generic component that can automatically adapt to any given climatic conditions. These will then be applied to surfaces of varying degrees of geometric complexity to be analysed in their ability to correctly tessellate and create a unified screening array true to the lighting requirements placed on the generic component.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper reports on three approaches to the translation of Gaussian surface models into scaled physical prototype models. Using the geometry of Eladio Dieste's Gaussian Vaults, the paper reports on the aspects encountered in the process of digital to physical prototype fabrication. The primary focus of the paper is on exploring the design geometry, investigating methods for preparing the geometry for fabrication and constructing physical prototypes. Three different approaches in the translation from digital to physical models are investigated: rapid prototyping, two dimensional surface models in paper and structural component models using Computer Numerical Controlled (CNC) fabrication. The three approaches identify a body of knowledge in the design and prototyping of Gaussian vaults. Finally the paper discusses the digital to. fabrication translation processes with regards to the characteristics, benefits and limitations of the three approaches of prototyping the ruled surface geometry of Gaussian Vaults.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the granting of the franchise to white men and women in 1902, Australia became one of the first mass electoral democracies. When the early federal governments passed innovative social and economic legislation, Australia also laid claim to being, or at least becoming, a social democracy. Nonetheless, these achievements built upon an earlier record of political, social, and economic reform in the Australian colonies. This paper offers a brief history of the evolution of Australian democracy that takes account of the interactions between institutional change and political struggles for citizenship rights. The process of democratisation has not been uniform, either in its evolution or scope, and the outcomes for citizens have been uneven. Where liberal and social democratic principles generally predominate, these remain in constant tension with more authoritarian tendencies, which then become a focus for resistance from individual citizens, organised labour, and social movements. Democratisation in Australia, as in many countries, is a process that inevitably involves conflict, not only over the character of its political and legal institutions, but also over who is to be included or excluded as citizens, and the rights and responsibilities of citizenship.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

From the constitutional point of view, all ideology in a pluralistic society structures have their own status and function. The rise of China needs a healthy, diverse and balanced thinking the situation. We need a capacity of macro-narrative and a framework to develop a macro perspective, the various ideologies put this macro, the constitutional system integration. This article is about ideology than an example, the analysis and comparison of three models. The first mode is now at in the formation and development process, and our political system to adapt to the "balanced" mode. The second model is adopted, representing the "left" "right" interest groups to reach beyond the ruling party turns around, balance of interests purpose. The third is in the process of policy formulation and selection of multi-party consultation and inclusive pattern of results of various think tanks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we present some practical experience on implementing an alert fusion mechanism from our project. After investigation on most of the existing alert fusion systems, we found the current body of work alternatively weighed down in the mire of insecure design or rarely deployed because of their complexity. As confirmed by our experimental analysis, unsuitable mechanisms could easily be submerged by an abundance of useless alerts. Even with the use of methods that achieve a high fusion rate and low false positives, attack is also possible. To find the solution, we carried out analysis on a series of alerts generated by well-known datasets as well as realistic alerts from the Australian Honey-Pot. One important finding is that one alert has more than an 85% chance of being fused in the following 5 alerts. Of particular importance is our design of a novel lightweight Cache-based Alert Fusion Scheme, called CAFS. CAFS has the capacity to not only reduce the quantity of useless alerts generated by IDS (Intrusion Detection System), but also enhance the accuracy of alerts, therefore greatly reducing the cost of fusion processing. We also present reasonable and practical specifications for the target-oriented fusion policy that provides a quality guarantee on alert fusion, and as a result seamlessly satisfies the process of successive correlation. Our experimental results showed that the CAFS easily attained the desired level of survivable, inescapable alert fusion design. Furthermore, as a lightweight scheme, CAFS can easily be deployed and excel in a large amount of alert fusions, which go towards improving the usability of system resources. To the best of our knowledge, our work is a novel exploration in addressing these problems from a survivable, inescapable and deployable point of view.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Distributed denial of service (DDoS) attack is a continuous critical threat to the Internet. Derived from the low layers, new application-layer-based DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. The case may be more serious when suchattacks mimic or occur during the flash crowd event of a popular Website. In this paper, we present the design and implementation of CALD, an architectural extension to protect Web servers against various DDoS attacks that masquerade as flash crowds. CALD provides real-time detection using mess tests but is different from other systems that use resembling methods. First, CALD uses a front-end sensor to monitor thetraffic that may contain various DDoS attacks or flash crowds. Intense pulse in the traffic means possible existence of anomalies because this is the basic property of DDoS attacks and flash crowds. Once abnormal traffic is identified, the sensor sends ATTENTION signal to activate the attack detection module. Second, CALD dynamically records the average frequency of each source IP and check the total mess extent. Theoretically, the mess extent of DDoS attacks is larger than the one of flash crowds. Thus, with some parameters from the attack detection module, the filter is capable of letting the legitimate requests through but the attack traffic stopped. Third, CALD may divide the security modules away from the Web servers. As a result, it keeps maximum performance on the kernel web services, regardless of the harassment from DDoS. In the experiments, the records from www.sina.com and www.taobao.com have proved the value of CALD.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Numerous Permian limestone blocks exposed along the Yarlung-Zangbo Suture Zone have been named Tibetan facies exotic limestone blocks or Chitichun-type Permian deposits.The Gyanyima limestone block,one of those limestone blocks,is located in Burang County,southwestern Tibet.Fusulines are abundant in the Gyanyima limestone block especially for Middle Permian Xilanta Formation.The fusuline fauna comprises 10 genera,respectively Neoschwagerina, Yangchienia, Armenina, Verbeekina, Paraverbeekina, Kahlerina, Lantschichites, Codonofusiella,Chusenella, Nankinella.This fauna indicates a Midian age(Late Guadalupian or Lengwuan age of South China) in terms of the coexistence of Kahlerina, Lantschichites, Codonofusiella and Neoschwagerina.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Eastern Taerma bridge-Zhakang was found in recent years to be the second spot of Ordovician outcrop based on reliable fossils. The nautiloids described here include one new genus, two new species and one indeterminate species,which represent only a small fraction of the nautiloids collected from this area. They are new materials of Ordovician nautiloids that have been determined up to now, which enrich Ordovician nautiloid faunal assemblages as well as provide new data to both classification and correlation of the Ordovician for this area and geographical distribution of nautiloid fauna.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we present some practical experiences on implementing an alert fusion mechanism from our project. After investigation on most of the existing alert fusion systems, we found the current body of work alternatively weighed down in the mire of insecure design or rarely deployed because of their complexity. As confirmed by our experimental analysis, unsuitable mechanisms could easily be submerged by an abundance of useless alerts. Even with the use of methods that achieve a high fusion rate and low false positives, attack is also possible. To find the solution, we carried out analysis on a series of alerts generated by well-known datasets as well as realistic alerts from the Australian Honey-Pot. One important finding is that one alert has more than an 85% chance of being fused in the following five alerts. Of particular importance is our design of a novel lightweight Cache-based Alert Fusion Scheme, called CAFS. CAFS has the capacity to not only reduce the quantity of useless alerts generated by intrusion detection system, but also enhance the accuracy of alerts, therefore greatly reducing the cost of fusion processing. We also present reasonable and practical specifications for the target-oriented fusion policy that provides a quality guarantee on alert fusion, and as a result seamlessly satisfies the process of successive correlation. Our experiments compared CAFS with traditional centralized fusion. The results showed that the CAFS easily attained the desired level of simple, counter-escapable alert fusion design. Furthermore, as a lightweight scheme, CAFS can easily be deployed and excel in a large amount of alert fusions, which go towards improving the usability of system resources. To the best of our knowledge, our work is a practical exploration in addressing problems from the academic point of view. Copyright © 2011 John Wiley & Sons, Ltd.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Each year, large amounts of money and labor are spent on patching the vulnerabilities in operating systems and various popular software to prevent exploitation by worms. Modeling the propagation process can help us to devise effective strategies against those worms' spreading. This paper presents a microcosmic analysis of worm propagation procedures. Our proposed model is different from traditional methods and examines deep inside the propagation procedure among nodes in the network by concentrating on the propagation probability and time delay described by a complex matrix. Moreover, since the analysis gives a microcosmic insight into a worm's propagation, the proposed model can avoid errors that are usually concealed in the traditional macroscopic analytical models. The objectives of this paper are to address three practical aspects of preventing worm propagation: (i) where do we patch? (ii) how many nodes do we need to patch? (iii) when do we patch? We implement a series of experiments to evaluate the effects of each major component in our microcosmic model. Based on the results drawn from the experiments, for high-risk vulnerabilities, it is critical that networks reduce the number of vulnerable nodes to below 80%. We believe our microcosmic model can benefit the security industry by allowing them to save significant money in the deployment of their security patching schemes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There are the two common means for propagating worms: scanning vulnerable computers in the network and sending out malicious email attachments. Modeling the propagation of worms can help us understand how worms spread and devise effective defence strategies. Most traditional models simulate the overall scale of infected network in each time tick, making them invalid for examining deep inside the propagation procedure among individual nodes. For this reason, this paper proposes a novel probability matrix to model the propagation mechanism of the two main classes of worms (scanning and email worms) by concentrating on the propagation probability. The objective of this paper is to access the spreading and work out an effective scheme against the worms. In order to evaluate the effects of each major component in our probability model, we implement a series of experiments for both worms. From the results, the network administrators can make decision on how to reduce the number of vulnerable nodes to a certain threshold for scanning worms, and how to immunize the highly-connected node for preventing worm's propagation for email worms.