885 resultados para MAC GIN
Resumo:
The multiple-input multiple-output (MIMO) technique can be used to improve the performance of ad hoc networks. Various medium access control (MAC) protocols with multiple contention slots have been proposed to exploit spatial multiplexing for increasing the transport throughput of MIMO ad hoc networks. However, the existence of multiple request-to-send/clear-to-send (RTS/CTS) contention slots represents a severe overhead that limits the improvement on transport throughput achieved by spatial multiplexing. In addition, when the number of contention slots is fixed, the efficiency of RTS/CTS contention is affected by the transmitting power of network nodes. In this study, a joint optimisation scheme on both transmitting power and contention slots number for maximising the transport throughput is presented. This includes the establishment of an analytical model of a simplified MAC protocol with multiple contention slots, the derivation of transport throughput as a function of both transmitting power and the number of contention slots, and the optimisation process based on the transport throughput formula derived. The analytical results obtained, verified by simulation, show that much higher transport throughput can be achieved using the joint optimisation scheme proposed, compared with the non-optimised cases and the results previously reported.
Resumo:
The authors identify the firm-specific core competencies that Panera Bread has relied on to achieve a competitive advantage in its business domain. The study illustrates how the company scans the dynamically changing environments and tailors their products and services in accordance with these changes.
Resumo:
Geochemical records are presented for five sediment cores from basins on the continental shelf of Mac. Robertson Land, East Antarctica. The cores contain 2-4 m thick sequences of hemipelagic, siliceous mud and ooze (SMO) deposited under seasonally open marine conditions. The inner and middle shelf SMO sequences are massive dark olive green material, whereas the outer shelf SMO sequences are dark olive material interspersed with light olive green layers ~1-10 cm thick. The biogenic material is dominated by marine diatoms including Fragilariopsis curta, Fragilariopsis cylindrus, and Chaetoceros spp. in the dark-colored SMO and Corethron criophilum in the light-colored layers. Radiocarbon dates suggest that the cores provide continuous accumulation records extending from < 1 kyr before present (B.P.) back as far as 4-15 kyr B.P., with estimated accumulation rates of 0.07-5 mm/yr. The three core records from the middle and outer shelf suggest six episodes of increased accumulation of biogenic material at ~5.5 kyr B.P. (all three cores), 1, 2, and 6.2 kyr B.P. (two of the three cores), and 3.8 and 10.8 kyr B.P. (one core), most of which coincide with Corethron layers. We interpret these features as the result of enhanced diatom production over the outer shelf, possibly related to climatic warm periods. The absence of such features in the inner shelf core records is thought to reflect a relatively constant level of seasonal diatom production in adjacent waters maintained by a coastal polynya.
Resumo:
Due to huge popularity of portable terminals based on Wireless LANs and increasing demand for multimedia services from these terminals, the earlier structures and protocols are insufficient to cover the requirements of emerging networks and communications. Most research in this field is tailored to find more efficient ways to optimize the quality of wireless LAN regarding the requirements of multimedia services. Our work is to investigate the effects of modulation modes at the physical layer, retry limits at the MAC layer and packet sizes at the application layer over the quality of media packet transmission. Interrelation among these parameters to extract a cross-layer idea will be discussed as well. We will show how these parameters from different layers jointly contribute to the performance of service delivery by the network. The results obtained could form a basis to suggest independent optimization in each layer (an adaptive approach) or optimization of a set of parameters from different layers (a cross-layer approach). Our simulation model is implemented in the NS-2 simulator. Throughput and delay (latency) of packet transmission are the quantities of our assessments. © 2010 IEEE.
Resumo:
Féachann an tráchtas seo le solas a chaitheamh ar an amhránaíocht mar a chleachtaítí agus mar a chleactaítear fós i gcontae Phort Láirge í. Ardaítear ann ceisteanna a bhaineann le seachadadh agus le sealbhú na n-amhrán I measc an phobail i gceantar na nDéise sa tréimhse c.1750-1960, ó aimsir Sheáin Chláraigh go dtí an ré sin ina raibh Nioclás Tóibín, ‘rí-amhránaí Éireann’, ar bhuaic a réime. Cuirtear spéis anseo i bhfás agus i dteacht chun cinn an Rómánsachais agus (a leathchúpla) an náisiúnachais ar Mhór-roinn na hEorpa in earr an 18ú haois agus amach san 19ú haois; ar thionchar na ngluaiseachtaí sin i bhfad ó bhaile ar Éirinn i gcoitinne san aimsir úd; orthu sin a raibh díolamaí amhrán á gcur in eagar acu in Éirinn san 19ú agus amach san 20ú haois; agus, ar deireadh, ar an stór amhrán mar atá le clos inniu I measc na ndaoine i nGaeltacht na Déise.
Resumo:
This template covers the final sections of a thesis - appendices, glossary, list of references and bibliography. Support materials for using the template are referenced near the start of the file. You will want to use this in conjunction with the Front Matter http://www.edshare.soton.ac.uk/9405/ and Chapter http://www.edshare.soton.ac.uk/9403/ templates.
Resumo:
This is an informational brochure describing Camp Burnt Gin. It tells about the campers, the facilities, the program and the staff. It also gives a short history of the camp.
Resumo:
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and network card addresses, and rely on loosely coupled state machines. Even the new WLAN security standard - IEEE 802.11i does not address these issues. In our previous work, we proposed two new techniques for improving detection of session hijacking attacks that are passive, computationally inexpensive, reliable, and have minimal impact on network performance. These techniques utilise unspoofable characteristics from the MAC protocol and the physical layer to enhance confidence in the intrusion detection process. This paper extends our earlier work and explores usability, robustness and accuracy of these intrusion detection techniques by applying them to eight distinct test scenarios. A correlation engine has also been introduced to maintain the false positives and false negatives at a manageable level. We also explore the process of selecting optimum thresholds for both detection techniques. For the purposes of our experiments, Snort-Wireless open source wireless intrusion detection system was extended to implement these new techniques and the correlation engine. Absence of any false negatives and low number of false positives in all eight test scenarios successfully demonstrated the effectiveness of the correlation engine and the accuracy of the detection techniques.
Resumo:
Health Information Systems (HIS) make extensive use of Information and Communication Technologies (ICT). The use of ICT aids in improving the quality and efficiency of healthcare services by making healthcare information available at the point of care (Goldstein, Groen, Ponkshe, and Wine, 2007). The increasing availability of healthcare data presents security and privacy issues which have not yet been fully addressed (Liu, Caelli, May, and Croll, 2008a). Healthcare organisations have to comply with the security and privacy requirements stated in laws, regulations and ethical standards, while managing healthcare information. Protecting the security and privacy of healthcare information is a very complex task (Liu, May, Caelli and Croll, 2008b). In order to simplify the complexity of providing security and privacy in HIS, appropriate information security services and mechanisms have to be implemented. Solutions at the application layer have already been implemented in HIS such as those existing in healthcare web services (Weaver et al., 2003). In addition, Discretionary Access Control (DAC) is the most commonly implemented access control model to restrict access to resources at the OS layer (Liu, Caelli, May, Croll and Henricksen, 2007a). Nevertheless, the combination of application security mechanisms and DAC at the OS layer has been stated to be insufficient in satisfying security requirements in computer systems (Loscocco et al., 1998). This thesis investigates the feasibility of implementing Security Enhanced Linux (SELinux) to enforce a Role-Based Access Control (RBAC) policy to help protect resources at the Operating System (OS) layer. SELinux provides Mandatory Access Control (MAC) mechanisms at the OS layer. These mechanisms can contain the damage from compromised applications and restrict access to resources according to the security policy implemented. The main contribution of this research is to provide a modern framework to implement and manage SELinux in HIS. The proposed framework introduces SELinux Profiles to restrict access permissions over the system resources to authorised users. The feasibility of using SELinux profiles in HIS was demonstrated through the creation of a prototype, which was submitted to various attack scenarios. The prototype was also subjected to testing during emergency scenarios, where changes to the security policies had to be made on the spot. Attack scenarios were based on vulnerabilities common at the application layer. SELinux demonstrated that it could effectively contain attacks at the application layer and provide adequate flexibility during emergency situations. However, even with the use of current tools, the development of SELinux policies can be very complex. Further research has to be made in order to simplify the management of SELinux policies and access permissions. In addition, SELinux related technologies, such as the Policy Management Server by Tresys Technologies, need to be researched in order to provide solutions at different layers of protection.
Resumo:
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. AE is potentially more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message and in a separate pass, providing integrity protection by generating a Message Authentication Code (MAC) tag. This paper presents results on the analysis of three AE stream ciphers submitted to the recently completed eSTREAM competition. We classify the ciphers based on the methods the ciphers use to provide authenticated encryption and discuss possible methods for mounting attacks on these ciphers.
Resumo:
Cleaning of sugar mill evaporators is an expensive exercise. Identifying the scale components assists in determining which chemical cleaning agents would result in effective evaporator cleaning. The current methods (based on x-ray diffraction techniques, ion exchange/high performance liquid chromatography and thermogravimetry/differential thermal analysis) used for scale characterisation are difficult, time consuming and expensive, and cannot be performed in a conventional analytical laboratory or by mill staff. The present study has examined the use of simple descriptor tests for the characterisation of Australian sugar mill evaporator scales. Scale samples were obtained from seven Australian sugar mill evaporators by mechanical means. The appearance, texture and colour of the scale were noted before the samples were characterised using x-ray fluorescence and x-ray powder diffraction to determine the compounds present. A number of commercial analytical test kits were used to determine the phosphate and calcium contents of scale samples. Dissolution experiments were carried out on the scale samples with selected cleaning agents to provide relevant information about the effect the cleaning agents have on different evaporator scales. Results have shown that by simply identifying the colour and the appearance of the scale, the elemental composition and knowing from which effect the scale originates, a prediction of the scale composition can be made. These descriptors and dissolution experiments on scale samples can be used to provide factory staff with an on-site rapid process to predict the most effective chemicals for chemical cleaning of the evaporators.
Resumo:
A membrane filtration plant using suitable micro or ultra-filtration membranes has the potential to significantly increase pan stage capacity and improve sugar quality. Previous investigations by SRI and others have shown that membranes will remove polysaccharides, turbidity and colloidal impurities and result in lower viscosity syrups and molasses. However, the conclusion from those investigations was that membrane filtration was not economically viable. A comprehensive assessment of current generation membrane technology was undertaken by SRI. With the aid of two pilot plants provided by Applexion and Koch Membrane Systems, extensive trials were conducted at an Australian factory using clarified juice at 80–98°C as feed to each pilot plant. Conditions were varied during the trials to examine the effect of a range of operating parameters on the filtering characteristics of each of the membranes. These parameters included feed temperature and pressure, flow velocity, soluble solids and impurity concentrations. The data were then combined to develop models to predict the filtration rate (or flux) that could be expected for nominated operating conditions. The models demonstrated very good agreement with the data collected during the trials. The trials also identified those membranes that provided the highest flux levels per unit area of membrane surface for a nominated set of conditions. Cleaning procedures were developed that ensured the water flux level was recovered following a clean-in-place process. Bulk samples of clarified juice and membrane filtered juice from each pilot were evaporated to syrup to quantify the gain in pan stage productivity that results from the removal of high molecular weight impurities by membrane filtration. The results are in general agreement with those published by other research groups.
Resumo:
The high moisture content of mill mud (typically 75–80% for Australian factories) results in high transportation costs for the redistribution of mud onto cane farms. The high transportation cost relative to the nutrient value of the mill mud results in many milling companies subsidising the cost of this recycle to ensure a wide distribution across the cane supply area. An average mill would generate about 100 000 t of mud (at 75% moisture) in a crushing season. The development of mud processing facilities that will produce a low moisture mud that can be effectively incorporated into cane land with existing or modified spreading equipment will improve the cost efficiency of mud redistribution to farms; provide an economical fertiliser alternative to more farms in the supply area; and reduce the potential for adverse environmental impacts from farms. A research investigation assessing solid bowl decanter centrifuges to produce low moisture mud with low residual pol was undertaken and the results compared to the performance of existing rotary vacuum filters in factory trials. The decanters were operated on filter mud feed in parallel with the rotary vacuum filters to allow comparisons of performance. Samples of feed, mud product and filtrate were analysed to provide performance indicators. The decanter centrifuge could produce mud cakes with very low moistures and residual pol levels. Spreading trials in cane fields indicated that the dry cake could be spread easily by standard mud trucks and by trucks designed specifically to spread fertiliser.