133 resultados para Airport infrastructure


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Early in 2001, after a damning public report by the Auditor-General, the Australian Federal Government was forced to abandon its highly promoted “whole of government” infrastructure outsourcing initiative. This about-face was greeted in the press with reports that the initiative was a “fiasco”. Yet a four-year case study of the initiative suggests a more complex picture. The initiative can be viewed in a quite different light on the basis of comparisons with a contemporary survey of 240 Australian organisations engaged in IT outsourcing. This reveals that many of the negative outcomes associated with this “fiasco” are typical of those experienced by large Australian organisations. This has important implications for decision makers confronted with choices about sourcing IT service delivery.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Knowledge management has by now exerted a large influence over industrial practice. We propose a multi-agent based system to provide infrastructure service to meet various requirements of knowledge management in view of the complex nature of the task, i.e., covering science and technologies across different disciplines. The paper discusses the use of a multi-agent system to support the knowledge management infrastructure. It will also discuss the design rational and implementation details as well as an application to the problem of feature extraction in weather prediction.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The following paper examines federally accredited and funded aged care provision in regional Victoria. Benchmarks that have been set by the Australian Department of Health and Ageing, are used to measure and compare the relative number of high and low level aged care positions and Community Aged Care Packages in six regional Victorian centres.
Using population forecasts, the additional aged care positions that each centre will require to meet the provision benchmarks in the year 2021 have been estimated. These figures are then translated into infrastructure requirements for the regional Victorian city of Greater Bendigo. This is done by surveying Greater Bendigo’s existing residential aged care facilities. Strategies for the provision of additional high and low level residential aged care infrastructure are explored using a matrix governed by size and configuration. Variations in these two aspects are shown to affect the location options for future facilities in Greater Bendigo. The implications of the benchmarks are also investigated in terms of facilities for the provision of Community Aged Care Packages.
The research is funded by a double ARC APAI grant between the Built Environment Research Group at Deakin University, The Centre for Sustainable Regional Centres at La Trobe University, the City of Greater Bendigo and the City of Warrnambool.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports on the application of systems modelling benchmarks to determine the viability of systems modelling software and its suitability for modelling critical infrastructure systems. This research applies the earlier research that related to developing benchmarks that when applied to systems modelling software will indicate its likely suitability to modelling critical infrastructure systems. In this context, the systems modelling benchmarks will assess the practicality of CPNTools to the task of modelling critical infrastructure systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secure management of Australia’s commercial critical infrastructure presents ongoing challenges to owners and the government. Although it is currently managed through high-level information sharing via collaboration, but does this suit the commercial sector. One of the issues facing Australia is that the majority of critical infrastructure resides under the control of the business sector and certain aspects such of the critical infrastructure such as Supply Chain Management (SCM) systems are distributed entities and not a single entity. The paper focuses upon the security issues associated with SCM systems and critical infrastructure protection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Understanding and managing information infrastructure (II) security risks is a priority to most organizations dealing with information technology and information warfare (IW) scenarios today (Libicki, 2000). Traditional security risk analysis (SRA) was well suited to these tasks within the paradigm of computer security, where the focus was on securing tangible items such as computing and communications equipment (NCS,1996; Cramer, 1998). With the growth of information interchange and reliance on information infrastructure, the ability to understand where vulnerabilities lie within an organization, regardless of size, has become extremely difficult (NIPC, 1996). To place a value on the information that is owned and used by an organization is virtually an impossible task. The suitability of risk analysis to assist in managing IW and information infrastructure-related security risks is unqualified, however studies have been undertaken to build frameworks and methodologies for modeling information warfare attacks (Molander, Riddile, & Wilson, 1996; Johnson, 1997; Hutchinson & Warren, 2001) which will assist greatly in applying risk analysis concepts and methodologies to the burgeoning information technology security paradigm, information warfare.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective.
Females are substantially less likely than males to cycle for transport in countries with low bicycle transport mode share. We investigated whether female commuter cyclists were more likely to use bicycle routes that provide separation from motor vehicle traffic.
Methods.
Census of cyclists observed at 15 locations (including off-road bicycle paths, on-road lanes and roads with no bicycle facilities) within a 7.4 km radius of the central business district (CBD) of Melbourne, Australia, during peak commuting times in February 2004.
Results.
6589 cyclists were observed, comprising 5229 males (79.4%) and 1360 females (20.6%). After adjustment for distance of the bicycle facility from the CBD, females showed a preference for using off-road paths rather than roads with no bicycle facilities (odds ratio [OR] = 1.43, 95% confidence interval [CI]: 1.12, 1.83), or roads with on-road bicycle lanes (OR = 1.34, 95% CI: 1.03, 1.75).
Conclusions.
Consistent with gender differences in risk aversion, female commuter cyclists preferred to use routes with maximum separation from motorized traffic. Improved cycling infrastructure in the form of bicycle paths and lanes that provide a high degree of separation from motor traffic is likely to be important for increasing transportation cycling amongst under-represented population groups such as women.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper commences by reviewing and examining the structure of critical infrastructure systems from a holistic viewpoint, before venturing towards determining what are the necessary considerations required for modelling a specific system within the layered structural context of the larger holistic system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Net metering is generally a consumer-based incentive for renewable sources such as wind or solar power systems also referred to as dasiacogenerationdasia. It is still a grey area for container terminals with large electric machines, such as quay cranes, automatic stacking cranes, that can operate in the regenerative mode and export electric energy to the grid. With actual measured electrical data presented for discussion, this paper provides information for the readers to provide a better understanding of their access to net metering, ultilizing their electrical equipment capabilities and be informed for their next negotiation with the power supply company.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Distributed Denial of Service attacks is one of the most challenging areas to deal with in Security. Not only do security managers have to deal with flood and vulnerability attacks. They also have to consider whether they are from legitimate or malicious attackers. In our previous work we developed a framework called bodyguard, which is to help security software developers from the current serialized paradigm, to a multi-core paradigm. In this paper, we update our research work by moving our bodyguard paradigm, into our new Ubiquitous Multi-Core Framework. From this shift, we show a marked improvement from our previous result of 20% to 110% speedup performance with an average cost of 1.5 ms. We also conducted a second series of experiments, which we trained up Neural Network, and tested it against actual DDoS attack traffic. From these experiments, we were able to achieve an average of 93.36%, of this attack traffic.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper explores the complexity of critical infrastructure and critical infrastructure failure (CIF), real life examples are used to discuss the complexity involved. The paper then discusses what Visualisation is and how Visualisation can be applied to a security situation, in particular critical infrastructure. The paper concludes by discussing the future direction of the research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The provision and delivery of many of the services that modern society enjoys are the result of ubiquitous critical infrastructure systems that permeate across many sectors of the Australian community. Moreover, the integration of technological enhancements and networking interconnections between critical infrastructure systems has heightened system interdependence, availability and resilience, including the efficient delivery of services to consumers within Australia's industrialised society. This research delivers a system security analysis and system modelling framework tool based on an associated conceptual methodology as the basis for assessing security and conceptually modelling a critical infrastructure system incident. The intent to identify potential system security issues and gain operational insights that will contribute to improving system resilience, contingency planning development applicable to disaster recovery and ameliorating incident management responses for Australian critical infrastructure system incidents.