881 resultados para High security identity tags


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Given the increased importance of adaptation debates in global climate negotiations, pressure to achieve biodiversity, food and water security through managed landscape-scale adaptation will likely increase across the globe over the coming decade. In parallel, emerging market-based, terrestrial greenhouse gas abatement programs present a real opportunity to secure such adaptation to climate change through enhanced landscape resilience. Australia has an opportunity to take advantage of such programs through regional planning aspects of its governance arrangements for NRM. This paper explores necessary reforms to Australia's regional NRM planning systems to ensure that they will be better able to direct the nation's emerging GGA programs to secure enhanced landscape adaptation. © 2013 Planning Institute Australia.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cities in the 21st century have become layered and complex systems not only in terms of physical form, but also social and cultural structure. Consolidated tools to analyze the urban environment have today to be improved including a strong interdisciplinary perspective in order to understand and manage the unprecedented complexity our cities are facing. Redevelopments, new estates, internal and external migrations are all dynamics which are deeply modifying the built environment directly or indirectly also affecting local identity, culture and social structure. This paper investigates the relationship between urban form and social behaviors, with particular attention to the perception of the built environment and its use by long term residents, recent migrants as well as tourists. A comparative study is suggested between South East Queensland and Florida; this two regions share common features such as subtropical climate, similar lifestyle, leisure cities and canal estates. Neighborhoods on the Gold and Sunshine Coasts have been designed using the communities of Florida, such as Celebration or Seaside, as models. These regions share also significant migration processes, similar social problems and high crime rates, which directly affect the local economies. Comparing Florida and SEQ could provide an understanding of different strategies adopted and how urban development and lifestyle can be managed maintaining social equity and security. This study, investigates people’s perception of built form and how this affects the use of public space. The relationship between built environment and social behaviour has been previously investigated, for example by environmental psychology; the innovation proposed by this research is to study the perception of place in leisure cities at multiple levels. Locals, migrants and tourists have different understanding of the built form in the same location; this understanding affects the use of space and the attitude to visit or avoid some precincts. The research methodology integrates traditional morpho-typological investigations with qualitative methods; data are collected in the first phase through online surveys about perception of urban forms. Findings guide then the selection of neighbourhoods to be investigated in detail through questionnaires and Nolli maps, specifying morphological regions as well as recurrent building typologies. A final phase includes interviews with selected stakeholders. Major urban projects are discussed addressing how they are used and perceived by locals, migrants or tourists; the comparison between SEQ and Florida allows the identification of strategies to address migration issues in both regions with particular attention to urban form and placemaking dynamics.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Three proof requirements as essential for a sustainable land registration system. These were proof of identity, proof of ownership, and authority to deal. Our attention in this paper is drawn to the latter two requirements and will ask whether the introduction of the Property Exchange of Australia (PEXA), and its underpinning regulatory regime will meet the concerns that we have in relation to proof of ownership and authority to deal. In drawing out some problems with PEXA, we then offer an innovative idea, sourced from the transfer of equities that could serve to generate discussion on how we can ensure the Torrens system of land registration is sustainable for another 160 years.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Pandemics are for the most part disease outbreaks that become widespread as a result of the spread of human-to-human infection. Beyond the debilitating, sometimes fatal, consequences for those directly affected, pandemics have a range of negative social, economic and political consequences. These tend to be greater where the pandemic is a novel pathogen, has a high mortality and/or hospitalization rate and is easily spread. According to Lee Jong-wook, former Director-General of the World Health Organization (WHO), pandemics do not respect international borders. Therefore, they have the potential to weaken many societies, political systems and economies simultaneously.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We have previously suggested that three proof requirements are essential for a sustainable land registration system. These were proof of identity, proof of ownership and authority to deal. Our attention in this article is drawn to the security framework that surrounds these requirements. We will ask whether the introduction of the Property Exchange of Australia (PEXA), and its underpinning regulatory regime will meet the concerns that we have in relation to them. In drawing out some problems with PEXA, we then offer an innovative idea, sourced from the transfer of equities that could serve to generate discussion on how we can ensure the Torrens system of land registration is sustainable for another 160 years. We also canvass some more incremental suggestions that evolve out of what we currently do, as well as outlining some comparative externally sourced ideas as to how the transfer and ownership of land can be made safer for all citizens. Such a goal is imperative when land transfer and secure property ownership is a critical component of the economic infrastructure of a modern society.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

π-Conjugated polymers are the most promising semiconductor materials to enable printed organic thin film transistors (OTFTs) due to their excellent solution processability and mechanical robustness. However, solution-processed polymer semiconductors have shown poor charge transport properties mainly originated from the disordered polymer chain packing in the solid state as compared to the thermally evaporated small molecular organic semiconductors. The low charge carrier mobility, typically < 0.1 cm2 /V.s, of polymer semiconductors poses a challenge for most intended applications such as displays and radio-frequency identification (RFID) tags. Here we present our recent results on the dike topyrrolopyrrole (DPP)-based polymers and demonstrate that when DPP is combined with appropriate electron donating moieties such as thiophene and thienothiophene, very high charge carrier mobility values of ~1 cm2/V.s could be achieved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper explores how four English teachers position their English language learners for critical literacy within senior high school curriculum in Queensland, Australia. Such learners are often positioned, even by their teachers, within a broader “deficit discourse” that claims they are inherently lacking the requisite knowledge and skills to engage with intransigent school curricula. As such, English language learners’ identity formation is often constrained by deficit views that can ultimately see limited kinds of literacy teaching offered to them. Using Fairclough’s (2003) critical discourse analysis method, analysis of 16 interviews with the teachers was conducted as part of a larger, critical instrumental case study in two state high schools during 2010. Five competing discourses were identified: deficit as lack; deficit as need; learner “difference” as a resource; conceptual capacity for critical literacy; and linguistic, cultural and conceptual difficulty with critical literacy. While a deficit view is present, counter-hegemonic discourses also exist in their talk. The combination of discourses challenges monolithic deficit views of English language learners, and opens up generative discursive territory to position English language learners in ways other than “problematic”. This has important implications for how teachers view and teach English language learners and their capacity for critical literacy work in senior high school classrooms.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We consider online trading in a single security with the objective of getting rich when its price ever exhibits a large upcrossing, without risking bankruptcy. We investigate payoff guarantees that are expressed in terms of the extremity of the upcrossings. We obtain an exact and elegant characterisation of the guarantees that can be achieved. Moreover, we derive a simple canonical strategy for each attainable guarantee.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We present an approach for detecting sensor spoofing attacks on a cyber-physical system. Our approach consists of two steps. In the first step, we construct a safety envelope of the system. Under nominal conditions (that is, when there are no attacks), the system always stays inside its safety envelope. In the second step, we build an attack detector: a monitor that executes synchronously with the system and raises an alarm whenever the system state falls outside the safety envelope. We synthesize safety envelopes using a modified machine learning procedure applied on data collected from the system when it is not under attack. We present experimental results that show effectiveness of our approach, and also validate the several novel features that we introduced in our learning procedure.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Classic identity negative priming (NP) refers to the finding that when an object is ignored, subsequent naming responses to it are slower than when it has not been previously ignored (Tipper, S.P., 1985. The negative priming effect: inhibitory priming by ignored objects. Q. J. Exp. Psychol. 37A, 571-590). It is unclear whether this phenomenon arises due to the involvement of abstract semantic representations that the ignored object accesses automatically. Contemporary connectionist models propose a key role for the anterior temporal cortex in the representation of abstract semantic knowledge (e.g., McClelland, J.L., Rogers, T.T., 2003. The parallel distributed processing approach to semantic cognition. Nat. Rev. Neurosci. 4, 310-322), suggesting that this region should be involved during performance of the classic identity NP task if it involves semantic access. Using high-field (4 T) event-related functional magnetic resonance imaging, we observed increased BOLD responses in the left anterolateral temporal cortex including the temporal pole that was directly related to the magnitude of each individual's NP effect, supporting a semantic locus. Additional signal increases were observed in the supplementary eye fields (SEF) and left inferior parietal lobule (IPL).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Identity crime is argued to be one of the most significant crime problems of today. This paper examines identity crime, through the attitudes and practices of a group of seniors in Queensland, Australia. It examines their own actions towards the protection of their personal data in response to a fraudulent email request. Applying the concept of a prudential citizen (as one who is responsible for self-regulating their behaviour to maintain the integrity of one’s identity) it will be argued that seniors often expose identity information through their actions. However, this is demonstrated to be the result of flawed assumptions and misguided beliefs over the perceived risk and likelihood of identity crime, rather than a deliberate act. This paper concludes that to protect seniors from identity crime, greater awareness of appropriate risk-management strategies towards disclosure of their personal details is required to reduce their inadvertent exposure to identity crime.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

High end network security applications demand high speed operation and large rule set support. Packet classification is the core functionality that demands high throughput in such applications. This paper proposes a packet classification architecture to meet such high throughput. We have implemented a Firewall with this architecture in reconflgurable hardware. We propose an extension to Distributed Crossproducting of Field Labels (DCFL) technique to achieve scalable and high performance architecture. The implemented Firewall takes advantage of inherent structure and redundancy of rule set by using our DCFL Extended (DCFLE) algorithm. The use of DCFLE algorithm results in both speed and area improvement when it is implemented in hardware. Although we restrict ourselves to standard 5-tuple matching, the architecture supports additional fields. High throughput classification invariably uses Ternary Content Addressable Memory (TCAM) for prefix matching, though TCAM fares poorly in terms of area and power efficiency. Use of TCAM for port range matching is expensive, as the range to prefix conversion results in large number of prefixes leading to storage inefficiency. Extended TCAM (ETCAM) is fast and the most storage efficient solution for range matching. We present for the first time a reconfigurable hardware implementation of ETCAM. We have implemented our Firewall as an embedded system on Virtex-II Pro FPGA based platform, running Linux with the packet classification in hardware. The Firewall was tested in real time with 1 Gbps Ethernet link and 128 sample rules. The packet classification hardware uses a quarter of logic resources and slightly over one third of memory resources of XC2VP30 FPGA. It achieves a maximum classification throughput of 50 million packet/s corresponding to 16 Gbps link rate for the worst case packet size. The Firewall rule update involves only memory re-initialization in software without any hardware change.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

High end network security applications demand high speed operation and large rule set support. Packet classification is the core functionality that demands high throughput in such applications. This paper proposes a packet classification architecture to meet such high throughput. We have Implemented a Firewall with this architecture in reconfigurable hardware. We propose an extension to Distributed Crossproducting of Field Labels (DCFL) technique to achieve scalable and high performance architecture. The implemented Firewall takes advantage of inherent structure and redundancy of rule set by using, our DCFL Extended (DCFLE) algorithm. The use of DCFLE algorithm results In both speed and area Improvement when It is Implemented in hardware. Although we restrict ourselves to standard 5-tuple matching, the architecture supports additional fields.High throughput classification Invariably uses Ternary Content Addressable Memory (TCAM) for prefix matching, though TCAM fares poorly In terms of area and power efficiency. Use of TCAM for port range matching is expensive, as the range to prefix conversion results in large number of prefixes leading to storage inefficiency. Extended TCAM (ETCAM) is fast and the most storage efficient solution for range matching. We present for the first time a reconfigurable hardware Implementation of ETCAM. We have implemented our Firewall as an embedded system on Virtex-II Pro FPGA based platform, running Linux with the packet classification in hardware. The Firewall was tested in real time with 1 Gbps Ethernet link and 128 sample rules. The packet classification hardware uses a quarter of logic resources and slightly over one third of memory resources of XC2VP30 FPGA. It achieves a maximum classification throughput of 50 million packet/s corresponding to 16 Gbps link rate for file worst case packet size. The Firewall rule update Involves only memory re-initialiization in software without any hardware change.