996 resultados para critical infrastructures


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Defence organisations perform information security evaluations to confirm that electronic communications devices are safe to use in security-critical situations. Such evaluations include tracing all possible dataflow paths through the device, but this process is tedious and error-prone, so automated reachability analysis tools are needed to make security evaluations faster and more accurate. Previous research has produced a tool, SIFA, for dataflow analysis of basic digital circuitry, but it cannot analyse dataflow through microprocessors embedded within the circuit since this depends on the software they run. We have developed a static analysis tool that produces SIFA compatible dataflow graphs from embedded microcontroller programs written in C. In this paper we present a case study which shows how this new capability supports combined hardware and software dataflow analyses of a security critical communications device.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fundamental studies on constructability issue done in United States, United Kingdom and Australia illustrate capability of this concept to affect overall objectives of construction projects. It can result in significant cost and time savings and improved final quality by consideration of construction contractors experiences during conceptual planning and design phases. As intensive as these studies are, they do not attempt to investigate importance of these activities in order to find each of their specific barriers separately. This research explores Constructability Activities (CAs) in all project phases separately based on amount of contractors involvement in each activity and also amount of gap that exists between target and actual effects of each activity on achieving the final objectives of building projects in Malaysia. It ends to development of Critical Constructability Activities (CCAs). This research is crucial to gaining a better understanding of CCAs which are caused based on contractors higher participation percentage and larger gaps between their target and actual effects on achieving the final aims of the project. This research highlights the need to overcome barriers of CAs implementation in building projects. This study recommends construction stakeholders to concentrate more on CCAs in order to achieve the overall objectives of the project much faster and easier.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is one of the few studies in the academic literature that directly addresses inward exporting of customer services, which is a topic that has gained less attention from an international services marketing point of view. The objective of this study is to explore the drivers of satisfaction and dissatisfaction for overseas service customers of higher education in Australia. Critical incident technique (CIT) method was used to collect and analyse the data and a total of 107 critical incidents were collected. Findings from this study show that service satisfaction and dissatisfaction for international students derive from: elements of the core service (educational service performance), personal sources (international student performance), and the external environment (socialization and host environment performance). Additionally, results show that the drivers of satisfaction and dissatisfaction for international students are not necessarily the same. Limitations relating to the specific sector of higher education and the cross sectional natures of the data are addressed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Currently, well established clinical therapeutic approaches for bone reconstruction are restricted to the transplantation of autografts and allografts, and the implantation of metal devices or ceramic-based implants to assist bone regeneration. Bone grafts possess osteoconductive and osteoinductive properties, their application, however, is associated with disadvantages. These include limited access and availability, donor site morbidity and haemorrhage, increased risk of infection, and insufficient transplant integration. As a result, recent research focuses on the development of complementary therapeutic concepts. The field of tissue engineering has emerged as an important alternative approach to bone regeneration. Tissue engineering unites aspects of cellular biology, biomechanical engineering, biomaterial sciences and trauma and orthopaedic surgery. To obtain approval by regulatory bodies for these novel therapeutic concepts the level of therapeutic benefit must be demonstrated rigorously in well characterized, clinically relevant animal models. Therefore, in this PhD project, a reproducible and clinically relevant, ovine, critically sized, high load bearing, tibial defect model was established and characterized as a prerequisite to assess the regenerative potential of a novel treatment concept in vivo involving a medical grade polycaprolactone and tricalciumphosphate based composite scaffold and recombinant human bone morphogenetic proteins.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article continues the critical analysis of ‘meaningful relationships’ in the context of the operation of the ‘twin pillars’ which underpin the parenting provisions. It will be argued that the attitude of judicial officers to three key questions influence how they interpret this concept and consequently apply the best interest considerations. Relevant to this discussion is an examination of the Full Court’s approach to the key parenting sections, particularly the interaction of the primary and additional considerations. Against this backdrop, a current proposal to amend the ‘twin pillars’ will be examined.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The compressed gas industry and government agencies worldwide utilize "adiabatic compression" testing for qualifying high-pressure valves, regulators, and other related flow control equipment for gaseous oxygen service. This test methodology is known by various terms including adiabatic compression testing, gaseous fluid impact testing, pneumatic impact testing, and BAM testing as the most common terms. The test methodology will be described in greater detail throughout this document but in summary it consists of pressurizing a test article (valve, regulator, etc.) with gaseous oxygen within 15 to 20 milliseconds (ms). Because the driven gas1 and the driving gas2 are rapidly compressed to the final test pressure at the inlet of the test article, they are rapidly heated by the sudden increase in pressure to sufficient temperatures (thermal energies) to sometimes result in ignition of the nonmetallic materials (seals and seats) used within the test article. In general, the more rapid the compression process the more "adiabatic" the pressure surge is presumed to be and the more like an isentropic process the pressure surge has been argued to simulate. Generally speaking, adiabatic compression is widely considered the most efficient ignition mechanism for directly kindling a nonmetallic material in gaseous oxygen and has been implicated in many fire investigations. Because of the ease of ignition of many nonmetallic materials by this heating mechanism, many industry standards prescribe this testing. However, the results between various laboratories conducting the testing have not always been consistent. Research into the test method indicated that the thermal profile achieved (i.e., temperature/time history of the gas) during adiabatic compression testing as required by the prevailing industry standards has not been fully modeled or empirically verified, although attempts have been made. This research evaluated the following questions: 1) Can the rapid compression process required by the industry standards be thermodynamically and fluid dynamically modeled so that predictions of the thermal profiles be made, 2) Can the thermal profiles produced by the rapid compression process be measured in order to validate the thermodynamic and fluid dynamic models; and, estimate the severity of the test, and, 3) Can controlling parameters be recommended so that new guidelines may be established for the industry standards to resolve inconsistencies between various test laboratories conducting tests according to the present standards?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With increasing media exposure and evidence of environmental impacts, it is increasingly recognized that incorporating sustainability principles in construction works is both crucial and beneficial. However a recent survey reveals that among stakeholders of infrastructure projects such as roads, there is no common understanding on what constitutes sustainability in real-life projects. Sustainability has been interpreted widely and differently and as a result, sustainability outcomes are not tangible at the project level or often neglected. Under such conditions, policies and strategies on sustainability remain largely ideological and cannot be sufficiently reflected in the actual project delivery. The major difficulty of this sustainability pursuit lies in the lack of consensus among the experts on sustainability criteria and indicators. To move ahead, these criteria and indicators are to be agreed upon. This paper reviews the sustainable infrastructure development, its criteria and indicators, focusing on road infrastructure context. It goes on to introduce a Delphi study, an integral part of a QUT research, aimed at identifying critical sustainability criteria and indicators for Australian road infrastructure projects. It paves the way for further identification of solutions for each critical indicator at a subsequent stage. The criteria, indicators and solutions will be encapsulated into a decision making framework for the enhancement of sustainability deliverables. By doing so, the research will promote more integrated thinking of and consistent approaches to the sustainability agenda in road and highway infrastructure projects in Australia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, an ‘ecological’ lens is applied to an independent living project aiming to provide ‘homes for life’ for adult children with disabilities. The qualities of the project as ecological praxis are highlighted along with the implications for an open-ended enquiry into ecologies for and of the interior. In terms of the ecological concern for intimate modes of being, interior design is shown to be well placed through its association with environments in which people spend most of their life and through powerful concepts such as ‘interiority’ and ‘home’ which link to fundamental existential notions of ‘self ’ and ‘identity’. However, despite the interior being a significant generative force, this has not happened to the exclusion of other disciplines. Ignoring territorial urges to claim areas and concepts as one’s own, the paper describes how the project has actively encouraged design disciplines to trespass in each other’s territories. Ecologies for and of the interior, while recognising the need for discipline emphasis, also demand an integrated and collective approach through what is in effect transdisciplinary practice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Critical futures studies is not about the careers of a few scholars, rather it is about projects that transcend the narrow boundaries of the self. This biographical monograph examines the life and work of Richard Slaughter and Sohail Inayatullah.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A self-escrowed public key infrastructure (SE-PKI) combines the usual functionality of a public-key infrastructure with the ability to recover private keys given some trap-door information. We present an additively homomorphic variant of an existing SE-PKI for ElGamal encryption. We also propose a new efficient SE-PKI based on the ElGamal and Okamoto-Uchiyama cryptosystems that is more efficient than the previous SE-PKI. This is the first SE-PKI that does not suffer from a key doubling problem of previous SE-PKI proposals. Additionally, we present the first self-escrowed encryption schemes secure against chosen-ciphertext attack in the standard model. These schemes are also quite efficient and are based on the Cramer-Shoup cryptosystem, and the Kurosawa-Desmedt hybrid variant in different groups.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

One of the promises of New Labour was that government policy would be grounded in 'evidence based research'. In recent years some academics have come to question whether the government has delivered on this promise. Professors Reece Walters and Tim Hope offer two contributions to this debate, arguing that rather than the 'evidence base', it is political considerations that govern the commissioning, production and dissemination of Home Office research. As the first monograph in our 'Evidence based policy series' Critical thinking about the uses of research carries a thought provoking set of arguments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work offers a critical introduction to sociology for New Zealand students. Written in an accessible narrative style, it seeks to challenge and debunk students' assumptions about key elements of their social worlds, encouraging them to develop a "critical imagination" as a tool to identify broader social themes in personal issues.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a program’s object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or program’s security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The tool’s capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The concept of local accumulation time (LAT) was introduced by Berezhkovskii and coworkers in 2010–2011 to give a finite measure of the time required for the transient solution of a reaction–diffusion equation to approach the steady–state solution (Biophys J. 99, L59 (2010); Phys Rev E. 83, 051906 (2011)). Such a measure is referred to as a critical time. Here, we show that LAT is, in fact, identical to the concept of mean action time (MAT) that was first introduced by McNabb in 1991 (IMA J Appl Math. 47, 193 (1991)). Although McNabb’s initial argument was motivated by considering the mean particle lifetime (MPLT) for a linear death process, he applied the ideas to study diffusion. We extend the work of these authors by deriving expressions for the MAT for a general one–dimensional linear advection–diffusion–reaction problem. Using a combination of continuum and discrete approaches, we show that MAT and MPLT are equivalent for certain uniform–to-uniform transitions; these results provide a practical interpretation for MAT, by directly linking the stochastic microscopic processes to a meaningful macroscopic timescale. We find that for more general transitions, the equivalence between MAT and MPLT does not hold. Unlike other critical time definitions, we show that it is possible to evaluate the MAT without solving the underlying partial differential equation (pde). This makes MAT a simple and attractive quantity for practical situations. Finally, our work explores the accuracy of certain approximations derived using the MAT, showing that useful approximations for nonlinear kinetic processes can be obtained, again without treating the governing pde directly.