15 resultados para Passive Restraint Systems.

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we propose a secure ownership transfer protocol for a multi-tag and multi-owner RFID environment. Most of the existing work in this area do not comply with the EPC Global Class-1 Gen-2 (C1G2) standard since they use expensive hash operations or sophisticated encryption schemes that cannot be implemented on low-cost passive tags that are highly resource constrained. Our work aims to fill this gap by proposing a protocol based on simple XOR and 128-bit Pseudo Random Number Generators (PRNG), operations that can be easily implemented on low-cost passive RFID tags. The protocol thus achieves EPC C1G2 compliance while meeting the security requirements. Also, our protocol provides additional protection using a blind-factor to prevent tracking attacks.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Energy consumption in heating and cooling around the world has been a major contributor to global warming. Hence, many studies have been aimed at finding new techniques to save and control energy through energy efficient measures. Most of this energy is used in residential, agricultural and commercial buildings. It is therefore important to adopt energy efficiency measures in these buildings through new technologies and novel building designs. These new building designs can be developed by employing various passive cooling systems. Earth pipe cooling is one of these which can assist to save energy without using any customary mechanical units. This paper investigates the earth pipe cooling performance in a hot humid subtropical climate of Rockhampton, Australia. A thermal model is developed using ANSYS Fluent for measuring its performance. Impacts of air velocity, air temperature, relative humidity and soil temperature on room cooling performance are also assessed. A temperature reduction of around 2 °C was found for the system. This temperature reduction contributed to an energy saving of a maximum of 866.54 kW (8.82%) per year for a 27.23 m3 room.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent trends in grid computing development is moving towards a service-oriented architecture. With the momentum gaining for the service-oriented grid computing systems, the issue of deploying support for integrated scheduling and fault-tolerant approaches becomes paramount importance. To this end, we propose a scalable framework that loosely couples the dynamic job scheduling approach with the hybrid replications approach to schedule jobs efficiently while at the same time providing fault-tolerance. The novelty of the proposed framework is that it uses passive replication approach under high system load and active replication approach under low system loads. The switch between these two replication methods is also done dynamically and transparently.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The literature over the past 25 years indicates that there has been a continued interest in using passive and active solar technologies to reduce the conventional energy required to maintain water temperatures in small recirculation aquaculture systems. Although all of the experimental systems reviewed report favourable results, there is little information available to guide system designers. This paper describes the use of a simulation model to predict the annual conventional energy consumption of a 10.6 m3 RAS enclosed in a double layer polyethylene greenhouse in two different climates. The water was maintained at 22.5 °C and the recirculation rate was 10% of tank volume per day. Simple unglazed solar collectors have also been combined with the greenhouse to further reduce energy consumption. The effect of increasing collector area on the solar fraction and utilization of useful energy was predicted. Finally, the model was used to investigate the relationship between the occurrence of condensation on the inner cover, ventilation rates and energy use. It was found that in a hot dry climate, the greenhouse alone was sufficient to reduce the conventional energy requirements by 87%; while in the cooler temperate climate reductions of 66% were possible. When solar collectors were added to the system, conventional energy requirements were reduced further and depended on the area of collector used. For example, in the temperate climate location, conventional energy requirements were reduced to 23% of a RAS enclosed in a non-solar building when 26 m2 of solar collector inclined at the optimum angle for winter energy collection were used. Although condensation could be successfully reduced by ventilation of the greenhouse, this increased conventional energy requirements because the potential for evaporation was increased. Covering the tanks at night was found to be a more effective strategy because it reduced condensation and conventional energy use simultaneously.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Aim: This case study describes a quality initiative to minimize restraint in an Australian residential aged care facility.

Approach: The process of improving practice is examined with reference to the literature on implementation of research into practice and change management. The differences between planned and emergent approaches to change management are discussed. The concepts of resistance and attractors are explored in relation to our experiences of managing the change process in this initiative. The importance of the interpersonal interactions that were involved in facilitating the change process is highlighted.

Implications:
Recommendations are offered for dealing with change management processes in clinical environments, particularly the need to move beyond an individual mind-set to a systems-based approach for quality initiatives in residential aged care.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We evaluated cardiac output (CO) using three new methods – the auto-calibrated FloTrac–Vigileo (COed), the non-calibrated Modelflow (COmf ) pulse contour method and the ultra-sound HemoSonic system (COhs) – with thermodilution (COtd) as the reference. In 13 postoperative cardiac surgical patients, 104 paired CO values were assessed before, during and after four interventions: (i) an increase of tidal volume by 50%; (ii) a 10 cm H2O increase in positive end-expiratory pressure; (iii) passive leg raising and (iv) head up position. With the pooled data the difference (bias (2SD)) between COed and COtd, COmf and COtd and COhs and COtd was 0.33 (0.90), 0.30 (0.69) and −0.41 (1.11) l.min−1, respectively. Thus, Modelflow had the lowest mean squared error, suggesting that it had the best performance. COed significantly overestimates changes in cardiac output while COmf and COhs values are not significantly different from those of COtd. Directional changes in cardiac output by thermodilution were detected with a high score by all three methods.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Automated camera systems have widespread application in wildlife studies and their use is increasing (Kucera & Barrett 1993; Cutler & Swann 1999; Swann et al. 2004; Parker et al. 2008). Among other applications, they have been used to produce species inventories, estimate population sizes, study behaviour and examine the impact and activity of predators (Cutler & Swann 1999; Swann et al. 2004). Modern camera systems can operate for extended durations, are relatively non-invasive, easy to operate, portable, durable and can take good-quality images by day and night (Kucera & Barrett 1993; Peterson & Thomas 1998; Allison & Destefano 2006; Parker et al. 2008). Beyond their scientific applications, the generation of high-quality images can be useful for educational and conservation purposes (Cutler & Swann 1999). The two most common types of systems currently used in ecological research are passive and active infrared (IR) systems (Cutler & Swann 1999; Parker et al. 2008). An older form of remote photography is video which captures a continuous record of activity at a focal site (Stewart et al.1997; King et al. 2001). Camera systems have certain limitations and biases (Swann et al. 2004), yet these have not been well studied. Refinement of the use of camera systems is required to fully realize their value (Towerton et al. 2008). Here, we describe a comparison of detection rates of mammals and birds by passive and active IR camera systems, using a video system to benchmark detection rates.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper we present a novel approach to authentication and privacy in RFID systems based on the minimum disclosure property and in conformance to EPC Class-1 Gen-2 specifications. We take into account the computational constraints of EPC Class-1 Gen-2 passive RFID tags and only the cyclic redundancy check (CRC) and pseudo random number generator (PRNG) functions that passive RFID tags are capable of are employed. Detailed security analysis of our scheme shows that it can offer robust security properties in terms of tag anonymity and tag untraceability while at the same time being robust to replay, tag impersonation and desynchronisation attacks. Simulations results are also presented to study the scalability of the proposed scheme and its impact on authentication delay.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Several grouping proof protocols have been proposed over the years but they are either found to be vulnerable to certain attacks or do not comply with EPC Class-1 Gen-2 (C1G2) standard because they use hash functions or other complex encryption schemes. Also, synchronization of keys, forward security, proving simultaneity, creating dependence, detecting illegitimate tags, eliminating unwanted tag processing and denial-of-proof (DoP) attacks have not been fully addressed by many. Our protocol addresses these important gaps and is based on Quadratic Residues property where the tags are only required to use XOR, 128-bit Pseudo Random Number Generators (PRNG) and Modulo (MOD) operations which can be easily implemented on low-cost passive tags and hence achieves EPC C1G2 compliance.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The objective of the research is to develop security protocols for EPC C1G2 RFID Passive Tags in the areas of ownership transfer and grouping proof.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The need to manage otariid populations has necessitated the development of a wide range of capture methods. Chemical restraint by remote drug delivery (i.e., darting) is a highly selective method that can be used to facilitate otariid capture in a range of scenarios, when other methods may be impracticable. However, the risks associated with darting otariids are not widely known and guidelines necessary to promote and refine best practice do not exist. We review the risks associated with darting and in light of our findings, develop darting guidelines to help practitioners assess and minimize risks during capture, anesthesia and recovery. Published studies reveal that mortalities associated with darting predominantly result from complications during anesthetic maintenance (e.g., prolonged respiratory depression, apnea, or hyperthermia), rather than from complications during capture or recovery. In addition to monitoring vital signs and proper intervention, the risk of irreversible complications during anesthesia can be reduced by administering drug doses that are sufficient to enable the capture and masking of animals, after which anesthetic depth can be regulated using gas anesthesia.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Radio Frequency Identification (RFID) system is anemerging technology for automating object identification. TheNetworked RFID System (NRS) is a component of a distributedobject identification network which facilitates automated supplychain management. It also makes the Internet of Things (IoT)concept a reality. To increase the business feasibility of NRSimplementation, the system should be able to ensure the visibilityand traceability of the object throughout the chain using achecker protocol. By doing so, the protocol will check thegenuineness of the object and the genuineness of the object’sprevious travel path on-site. While doing so, the protocol needs toensure the security requirement of the system. To this end, wepropose a secure checker protocol for NRS which will use a PUF(Physically Unclonable Function) and simple cryptographicprimitives. The protocol provides security (protect privacy of thepartners, injection of fake objects, non-repudiation, andunclonability), visibility and traceability for NRS. It is alsosuitable for passive tags.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Networked systems have adapted Radio Frequency identification technology (RFID) to automate their business process. The Networked RFID Systems (NRS) has some unique characteristics which raise new privacy and security concerns for organizations and their NRS systems. The businesses are always having new realization of business needs using NRS. One of the most recent business realization of NRS implementation on large scale distributed systems (such as Internet of Things (IoT), supply chain) is to ensure visibility and traceability of the object throughout the chain. However, this requires assurance of security and privacy to ensure lawful business operation. In this paper, we are proposing a secure tracker protocol that will ensure not only visibility and traceability of the object but also genuineness of the object and its travel path on-site. The proposed protocol is using Physically Unclonable Function (PUF), Diffie-Hellman algorithm and simple cryptographic primitives to protect privacy of the partners, injection of fake objects, non-repudiation, and unclonability. The tag only performs a simple mathematical computation (such as combination, PUF and division) that makes the proposed protocol suitable to passive tags. To verify our security claims, we performed experiment on Security Protocol Description Language (SPDL) model of the proposed protocol using automated claim verification tool Scyther. Our experiment not only verified our claims but also helped us to eliminate possible attacks identified by Scyther.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper we propose a secure ownership transfer protocol for a multi-tag multi-owner RFID environment that provides individual-owner-privacy. To our knowledge, the existing schemes do not provide individual-owner-privacy and most of the existing schemes do not comply with the EPC Global Class-1 Gen-2 (C1G2) standard since the protocols use expensive hash operations or sophisticated encryption schemes that cannot be implemented on low-cost passive tags that are highly resource constrained. Our work aims to fill these gaps by proposing a protocol that provides individual-owner-privacy, based on simple XOR and 128-bit pseudo-random number generators (PRNG), operations that are easily implemented on low-cost RFID tags while meeting the necessary security requirements thus making it a viable option for large scale implementations. Our protocol also provides additional protection by hiding the pseudo-random numbers during all transmissions using a blind-factor to prevent tracking attacks.