991 resultados para Encryption systems


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents an implementation of an aircraft pose and motion estimator using visual systems as the principal sensor for controlling an Unmanned Aerial Vehicle (UAV) or as a redundant system for an Inertial Measure Unit (IMU) and gyros sensors. First, we explore the applications of the unified theory for central catadioptric cameras for attitude and heading estimation, explaining how the skyline is projected on the catadioptric image and how it is segmented and used to calculate the UAV’s attitude. Then we use appearance images to obtain a visual compass, and we calculate the relative rotation and heading of the aerial vehicle. Additionally, we show the use of a stereo system to calculate the aircraft height and to measure the UAV’s motion. Finally, we present a visual tracking system based on Fuzzy controllers working in both a UAV and a camera pan and tilt platform. Every part is tested using the UAV COLIBRI platform to validate the different approaches, which include comparison of the estimated data with the inertial values measured onboard the helicopter platform and the validation of the tracking schemes on real flights.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

1,2-Bis[10,15-di(3,5-di-tert-butyl)phenylporphyrinatonickel(II)-5-yl]diazene was synthesised via copper catalysed coupling of aminated nickel(II) 5,10-diarylporphyrin (“corner porphyrin”) and its X-ray crystal structure was determined. Two different crystals yielded different structures, one with the free meso positions in a trans-like orientation, and the other with a cis-like disposition. The free meso positions of the obtained dimer have been further functionalised while the synthesis of a zinc analogue has so far been unsuccessful. The X-ray crystal structure of the dinitro derivative of the dinickel(II) azoporphyrin was determined, and the structure showed a cis-like disposition of the nitro groups.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Journal of Strategic Information Systems (JSIS) has been an international outlet for Information Systems research that focuses on strategic issues since 1991. This paper reports on an analysis of the research published in JSIS to date. The paper presents a preliminary classification system for research topics related to Strategic Information Systems into which all 316 JSIS research papers as at end 2009 are classified. Discussion on changing emphases in topics over time is provided, in the context of the editorial philosophy of the journal. The paper seeks to stimulate discussion on future directions for research in Strategic Information Systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There have been powerful incentives for Tasmanian Small and Medium-sized Enterprises (SMEs) to adopt information technology to enable them to remain competitive and to comply with legislative regulations. This research study was undertaken to establish whether SMEs implementing computerised accounting systems have a subsequent change in their external accountancy fees. The research study employed a quantitative methodology using survey questionnaires. The study found that in less than 3% of cases SMEs reported a decrease in accountancy fees, in almost 45% of cases the organisation actually experienced a slight to substantial fee increase while 52% reported no change in accountancy fees.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many passwords and use each password only once. If a single password is compromised, it can be only be used to impersonate the user once, limiting the damage caused. However, existing practical approaches to one-time passwords have been susceptible to sophisticated phishing attacks. ---------- We give a formal security treatment of this important practical problem. We consider the use of one-time passwords in the context of password-authenticated key exchange (PAKE), which allows for mutual authentication, session key agreement, and resistance to phishing attacks. We describe a security model for the use of one-time passwords, explicitly considering the compromise of past (and future) one-time passwords, and show a general technique for building a secure one-time-PAKE protocol from any secure PAKE protocol. Our techniques also allow for the secure use of pseudorandomly generated and time-dependent passwords.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Construction clients often use financial incentives to encourage stakeholder motivation and commitment to voluntary higher-order project goals. Despite the increased use of financial incentives, there is little literature addressing means of optimizing outcomes. Using a case study methodology, the examination of a successful Australian construction project demonstrates the features of a positively geared procurement approach that promotes the effectiveness of financial incentives. The research results show that if the incentive system is perceived to be fair and is applied to reward exceptional performance, and not to manipulate, then contractors are more likely to be positively motivated.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Reforms to the national research and research training system by the Commonwealth Government of Australia sought to effectively connect research conducted in universities to Australia's national innovation system. Research training has a key role in ensuring an adequate supply of highly skilled people for the national innovation system. During their studies, research students produce and disseminate a massive amount of new knowledge. Prior to this study, there was no research that examined the contribution of research training to Australia's national innovation system despite the existence of policy initiatives aiming to enhance this contribution. Given Australia's below average (but improving) innovation performance compared to other OECD countries, the inclusion of Finland and the United States provided further insights into the key research question. This study examined three obvious ways that research training contributes to the national innovation systems in the three countries: the international mobility and migration of research students and graduates, knowledge production and distribution by research students, and the impact of research training as advanced human capital formation on economic growth. Findings have informed the concept of a research training culture of innovation that aims to enhance the contribution of research training to Australia's national innovation system. Key features include internationally competitive research and research training environments; research training programs that equip students with economically-relevant knowledge and the capabilities required by employers operating in knowledge-based economies; attractive research careers in different sectors; a national commitment to R&D as indicated by high levels of gross and business R&D expenditure; high private and social rates of return from research training; and the horizontal coordination of key organisations that create policy for, and/or invest in research training.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The co-authors raise two matters they consider essential for the future development of ECEfS. The first is the need to create deep foundations based in research. At a time of increasing practitioner interest, research in ECEfS is meagre. A robust research community is crucial to support quality in curriculum and pedagogy, and to promote learning and innovation in thinking and practice. The second 'essential' for the expansion and uptake of ECEfS is broad systemic change. All level within the early childhood education system - individual teachers and classrooms, whole centres and schools, professional associations and networks, accreditation and employing authorities, and teacher educators - must work together to create and reinforce the cultural and educational changes required for sustainability. This chapter provides explanations of processes to engender systemic change. It illustrates a systems approach, with reference to a recent study focused on embedding EfS into teacher education. This study emphasises the apparent contradiction that the answer to large-scale reform lies with small-scale reforms that build capacity and make connections.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The global financial crisis, global pandemics, global warming and peak oil are indicative of a world facing major environmental, social and economic problems. At the same time, world population continues to rise and global inequalities deepen. Children are the most vulnerable to the impacts of unsustainable living with specific harms arising because of their physical and cognitive vulnerabilities. Nevertheless, children do not have to be victims in the face of these challenges. Education, including early childhood education, has an important role to in building resilience and capabilities in children that equip them as active and informed citizens now and in the future and who are capable of contributing to healthy and sustainable ways of living. Drawing on educational change literature, action research, education for sustainability, health promotion and systems theory, this paper outlines three strategies that can help reorient early childhood education towards sustainability. One strategy is the adoption of whole centre approaches to sustainability and education for sustainability. This means working across the whole of a centre’s operations – curriculum and pedagogy, physical and social environments, its partnerships and community connections. The second strategy – applied in conjunction with the first – is the use of action research to investigate the early childhood setting and to create the desired changes. The third strategy is the adoption of systems thinking as a way of leveraging support and momentum for change so that education for sustainability goes beyond the initiatives of individual teachers and centres, and becomes a systems-wide imperative.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour, and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

ERP systems generally implement controls to prevent certain common kinds of fraud. In addition however, there is an imperative need for detection of more sophisticated patterns of fraudulent activity as evidenced by the legal requirement for company audits and the common incidence of fraud. This paper describes the design and implementation of a framework for detecting patterns of fraudulent activity in ERP systems. We include the description of six fraud scenarios and the process of specifying and detecting the occurrence of those scenarios in ERP user log data using the prototype software which we have developed. The test results for detecting these scenarios in log data have been verified and confirm the success of our approach which can be generalized to ERP systems in general.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Light gauge steel frame (LSF) structures are increasingly used in commercial and residential buildings because of their non-combustibility, dimensional stability and ease of installation. A common application is in floor-ceiling systems. The LSF floor-ceiling systems must be designed to serve as fire compartment boundaries and provide adequate fire resistance. Fire-rated floor-ceiling assemblies have been increasingly used in buildings. However, limited research has been undertaken in the past and hence a thorough understanding of their fire resistance behaviour is not available. Recently a new composite floor-ceiling system has been developed to provide higher fire rating. But its increased fire rating could not be determined using the currently available design methods. Therefore a research project was conducted to investigate its structural and fire resistance behaviour under standard fire conditions. This paper presents the results of full scale experimental investigations into the structural and fire behaviour of the new LSF floor system protected by the composite ceiling unit. Both the conventional and the new floor systems were tested under structural and fire loads. It demonstrates the improvements provided by the new composite panel system in comparison to conventional floor systems. Numerical studies were also undertaken using the finite element program ABAQUS. Measured temperature profiles of floors were used in the numerical analyses and their results were compared with fire test results. Tests and numerical studies provided a good understanding of the fire behaviour of the LSF floor-ceiling systems and confirmed the superior performance of the new composite system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper considers the question of designing a fully image based visual servo control for a dynamic system. The work is motivated by the ongoing development of image based visual servo control of small aerial robotic vehicles. The observed targets considered are coloured blobs on a flat surface to which the normal direction is known. The theoretical framework is directly applicable to the case of markings on a horizontal floor or landing field. The image features used are a first order spherical moment for position and an image flow measurement for velocity. A fully non-linear adaptive control design is provided that ensures global stability of the closed-loop system. © 2005 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

US state-based data breach notification laws have unveiled serious corporate and government failures regarding the security of personal information. These laws require organisations to notify persons who may be affected by an unauthorized acquisition of their personal information. Safe harbours to notification exist if personal information is encrypted. Three types of safe harbour have been identified in the literature: exemptions, rebuttable presumptions and factors. The underlying assumption of exemptions is that encrypted personal information is secure and therefore unauthorized access does not pose a risk. However, the viability of this assumption is questionable when examined against data breaches involving encrypted information and the demanding practical requirements of effective encryption management. Recent recommendations by the Australian Law Reform Commission (ALRC) would amend the Privacy Act 1988 (Cth) to implement a data breach scheme that includes a different type of safe harbour, factor based analysis. The authors examine the potential capability of the ALRC’s proposed encryption safe harbour in relation to the US experience at the state legislature level.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper introduces a novel strategy for the specification of airworthiness certification categories for civil unmanned aircraft systems (UAS). The risk-based approach acknowledges the fundamental differences between the risk paradigms of manned and unmanned aviation. The proposed airworthiness certification matrix provides a systematic and objective structure for regulating the airworthiness of a diverse range of UAS types and operations. An approach for specifying UAS type categories is then discussed. An example of the approach, which includes the novel application of data-clustering algorithms, is presented to illustrate the discussion.