993 resultados para 230.0230
Resumo:
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and network card addresses, and rely on loosely coupled state machines. Even the new WLAN security standard - IEEE 802.11i does not address these issues. In our previous work, we proposed two new techniques for improving detection of session hijacking attacks that are passive, computationally inexpensive, reliable, and have minimal impact on network performance. These techniques utilise unspoofable characteristics from the MAC protocol and the physical layer to enhance confidence in the intrusion detection process. This paper extends our earlier work and explores usability, robustness and accuracy of these intrusion detection techniques by applying them to eight distinct test scenarios. A correlation engine has also been introduced to maintain the false positives and false negatives at a manageable level. We also explore the process of selecting optimum thresholds for both detection techniques. For the purposes of our experiments, Snort-Wireless open source wireless intrusion detection system was extended to implement these new techniques and the correlation engine. Absence of any false negatives and low number of false positives in all eight test scenarios successfully demonstrated the effectiveness of the correlation engine and the accuracy of the detection techniques.
Resumo:
Single nucleotide polymorphisms (SNPs) are unique genetic differences between individuals that contribute in significant ways to the determination of human variation including physical characteristics like height and appearance as well as less obvious traits such as personality, behaviour and disease susceptibility. SNPs can also significantly influence responses to pharmacotherapy and whether drugs will produce adverse reactions. The development of new drugs can be made far cheaper and more rapid by selecting participants in drug trials based on their genetically determined response to drugs. Technology that can rapidly and inexpensively genotype thousands of samples for thousands of SNPs at a time is therefore in high demand. With the completion of the human genome project, about 12 million true SNPs have been identified to date. However, most have not yet been associated with disease susceptibility or drug response. Testing for the appropriate drug response SNPs in a patient requiring treatment would enable individualised therapy with the right drug and dose administered correctly the first time. Many pharmaceutical companies are also interested in identifying SNPs associated with polygenic traits so novel therapeutic targets can be discovered. This review focuses on technologies that can be used for genotyping known SNPs as well as for the discovery of novel SNPs associated with drug response.
Resumo:
Use of Unmanned Aerial Vehicles (UAVs) in support of government applications has already seen significant growth and the potential for use of UAVs in commercial applications is expected to rapidly expand in the near future. However, the issue remains on how such automated or operator-controlled aircraft can be safely integrated into current airspace. If the goal of integration is to be realized, issues regarding safe separation in densely populated airspace must be investigated. This paper investigates automated separation management concepts in uncontrolled airspace that may help prepare for an expected growth of UAVs in Class G airspace. Not only are such investigations helpful for the UAV integration issue, the automated separation management concepts investigated by the authors can also be useful for the development of new or improved Air Traffic Control services in remote regions without any existing infrastructure. The paper will also provide an overview of the Smart Skies program and discuss the corresponding Smart Skies research and development effort to evaluate aircraft separation management algorithms using simulations involving realworld data communication channels, and verified against actual flight trials. This paper presents results from a unique flight test concept that uses real-time flight test data from Australia over existing commercial communication channels to a control center in Seattle for real-time separation management of actual and simulated aircraft. The paper also assesses the performance of an automated aircraft separation manager.
Resumo:
We introduce a formal model for certificateless authenticated key exchange (CL-AKE) protocols. Contrary to what might be expected, we show that the natural combination of an ID-based AKE protocol with a public key based AKE protocol cannot provide strong security. We provide the first one-round CL-AKE scheme proven secure in the random oracle model. We introduce two variants of the Diffie-Hellman trapdoor the introduced by \cite{DBLP:conf/eurocrypt/CashKS08}. The proposed key agreement scheme is secure as long as each party has at least one uncompromised secret. Thus, our scheme is secure even if the key generation centre learns the ephemeral secrets of both parties.
Resumo:
This paper examines the observable patterns of content creation by Australian political bloggers dur‐ing the 2007 election and its aftermath, thereby providing insight into the level and nature of activity in the Australian political blogosphere during that time. The performance indicators which are identi‐fied through this process enable us to target for further in‐depth research, to be reported in subse‐quent papers, those individual blogs and blog clusters showing especially high or unusual activity as compared to the overall baseline. This research forms the first stage in a larger project to investigate the shape and internal dynamics of the Australian political blogosphere. In this first stage, we tracked the activities of some 230 political blogs and related Websites in Australia from 2 November 2007 (the final month of the federal election campaign, with the election itself taking place on 24 Novem‐ber) to 24 January 2008. We harvested more than 65,000 articles for this study.
Resumo:
Effective knowledge transfer can prevent the reinvention of systems and ideas as well as the repetition of errors. Doing so will save substantial time, as well as contribute to better performance of projects and project-based organisations (PBOs). Despite the importance of knowledge, PBOs face serious barriers to the effective transfer of knowledge, while their characteristics, such as unique and innovative approaches taken during every project, mean they have much to gain from knowledge transfer. As each new project starts, there is the strong potential to reinvent the process, rather than utilise learning from previous projects. In fact, rework is one of the primary factors contributing to construction industry's poor performance and productivity. Current literature has identified several barriers to knowledge transfer in organisational settings in general, and not specifically PBOs. However, PBOs significantly differ from other types of organisations. PBOs operate mainly on temporary projects, where time is a crucial factor and people are more mobile than in other organisational settings. The aim of this research is to identify the key barriers that prevent effective knowledge transfer for PBOs, exclusively. Interviews with project managers and senior managers of PBOs complement the analysis of the literature and provide professional expertise. This research is crucial to gaining a better understanding of obstacles that hinder knowledge transfer in projects. The main contribution of this research is exclusive for PBO, list of key barriers that organisation and project managers need to consider to ensure effective knowledge transfer and better project management.
Resumo:
In this paper, we use time series analysis to evaluate predictive scenarios using search engine transactional logs. Our goal is to develop models for the analysis of searchers’ behaviors over time and investigate if time series analysis is a valid method for predicting relationships between searcher actions. Time series analysis is a method often used to understand the underlying characteristics of temporal data in order to make forecasts. In this study, we used a Web search engine transactional log and time series analysis to investigate users’ actions. We conducted our analysis in two phases. In the initial phase, we employed a basic analysis and found that 10% of searchers clicked on sponsored links. However, from 22:00 to 24:00, searchers almost exclusively clicked on the organic links, with almost no clicks on sponsored links. In the second and more extensive phase, we used a one-step prediction time series analysis method along with a transfer function method. The period rarely affects navigational and transactional queries, while rates for transactional queries vary during different periods. Our results show that the average length of a searcher session is approximately 2.9 interactions and that this average is consistent across time periods. Most importantly, our findings shows that searchers who submit the shortest queries (i.e., in number of terms) click on highest ranked results. We discuss implications, including predictive value, and future research.
Resumo:
BACKGROUND: The Edinburgh Postnatal Depression Scale (EPDS) has been validated and used extensively in screening for depression in new mothers, both in English speaking and non-English speaking communities. While some studies have reported the use of the EPDS with fathers, none have validated it for this group, and thus the appropriate cut-off score for screening for depression or anxiety caseness for this population is not known. METHODS: Couples were recruited antenatally and interviewed at six weeks postpartum. EPDS scores and distress caseness (depression or anxiety disorders) for 208 fathers and 230 mothers were determined using the Diagnostic Interview Schedule. RESULTS: Analyses of the EPDS for fathers using distress caseness (depression or anxiety disorders) as the criterion shows that a cut-off of 5/6 has optimum receiver operating characteristics. Furthermore acceptable reliability (split-half and internal consistency) and validity (concurrent) coefficients were obtained. For mothers the optimum cut-off screening value to detect distress caseness was 7/8. Item analysis revealed that fathers endorsed seven of the ten items at lower rates to mothers, with the most significant being that referring to crying. CONCLUSIONS: The EPDS is a reliable and valid measure of mood in fathers. Screening for depression or anxiety disorders in fathers requires a two point lower cut-off than screening for depression or anxiety in mothers, and we recommend this cut-off to be 5/6
Resumo:
The transformation of China's urban landscape has witnessed a boom in cultural adaptation, namely the adaptation of a Western idea, the creative cluster. This chapter examines the formatting of hundreds of creative clusters-art centres, animation bases, cultural zones, and incubators. The cluster has important implications for how we understand China going forward into the second decade of the 21st century. The cluster phenomenon has resulted in to a substantive remaking of the social contract, between officials, entrepreneurs, local residents, academics-and most significantly cultural producers. However, these processes of adaption are mostly driven by real estate developers working in partnership with local government officials. Cut and paste design is the fast road to completion. In this sense, the description 'creative' may well be redundant.
Resumo:
Presents arguments supporting a social model of learning linked to situated learning and cultural capital. Critiques training methods used in cultural industries (arts, publishing, broadcasting, design, fashion, restaurants). Uses case study evidence to demonstrates inadequacies of formal training in this sector. (Contains 49 references.)
Resumo:
Raman spectra of antimonate mineral brizziite NaSbO3 were studied and related to the structure of the mineral. Two sharp bands at 617 and 660 cm-1 are attributed to the SbO3- symmetric stretching mode. The reason for two symmetric stretching vibrations depends upon the bonding of the SbO3- units. The band at 617 cm-1 is assigned to bonding through the Sb and the 660 cm-1 to bonding through the oxygen. The low intensity band at 508 cm-1 is ascribed to the SbO antisymmetric stretching vibration. Low intensity bands were found at 503, 526 and 578 cm-1. Sharp Raman bands observed at 204, 230, 307 and 315 cm-1are assigned to OSbO bending modes. Raman spectroscopy enables a better understanding of the molecular structure of the mineral brizziite.
Resumo:
The Mobile Learning Kit is a new digital learning application that allows students and teachers to compose, publish, discuss and evaluate their own mobile learning games and events. The research field was interaction design in the context of mobile learning. The research methodology was primarily design-based supported by collaboration between participating disciplines of game design, education and information technology. As such, the resulting MiLK application is a synthesis of current pedagogical models and experimental interaction design techniques and technologies. MiLK is a dynamic learning resource for incorporating both formal and informal teaching and learning practices while exploiting mobile phones and contemporary digital social tools in innovative ways. MiLK explicitly addresses other predominant themes in educational scholarship that relate to current education innovation and reform such as personalised learning, life-long learning and new learning spaces. The success of this project is indicated through rigorous trials and actual uptake of MiLK by international participants in Australia, UK, US and South Africa. MiLK was awarded for excellence in the use of emerging technologies for improved learning and teaching as a finalist (top 3) in the Handheld Learning and Innovation Awards in the UK in 2008. MiLK was awarded funding from the Australasian CRC for Interaction Design in 2008 to prepare the MiLK application for development. MiLK has been awarded over $230,000 from ACID since 2006. The resulting application and research materials are now being commercialised by a new company, ‘ACID Services’.