968 resultados para security evaluation
Towards a generic skills learning model in public relations: student perspectives on self evaluation
Resumo:
Since 1993 we have been working on the automation of dragline excavators, the largest earthmoving machines that exist. Recently we completed a large-scale experimental program where the automation system was used for production purposes over a two week period and moved over 200,000 tonnes of overburden. This is a landmark achievement in the history of automated excavation. In this paper we briefly describe the robotic system and how it works cooperatively with the machine operator. We then describe our methodology for gauging machine performance, analyze results from the production trial and comment on the effectiveness of the system that we have created. © Springer-Verlag Berlin Heidelberg 2006.
Resumo:
Magnetic Resonance Imaging (MRI) offers a valuable research tool for the assessment of 3D spinal deformity in AIS, however the horizontal patient position imposed by conventional scanners removes the axial compressive loading on the spine which is an important determinant of deformity shape and magnitude in standing scoliosis patients. The objective of this study was to design, construct and test an MRI compatible compression device for research into the effect of axial loading on spinal deformity using supine MRI scans. The compression device was designed and constructed, consisting of a vest worn by the patient, which was attached via straps to a pneumatically actuated footplate. An applied load of 0.5 x bodyweight was remotely controlled by a unit in the scanner operator’s console. The entire device was constructed using non-metallic components for MRI compatibility. The device was evaluated by performing unloaded and loaded supine MRI scans on a series of 10 AIS patients. The study concluded that an MRI compatible compression device had been successfully designed and constructed, providing a research tool for studies into the effect of axial loading on 3D spinal deformity in scoliosis. The 3D axially loaded MR imaging capability developed in this study will allow future research investigations of the effect of axial loading on spinal rotation, and for imaging the response of scoliotic spinal tissues to axial loading.
Resumo:
The implementation of a robotic security solution generally requires one algorithm to route the robot around the environment and another algorithm to perform anomaly detection. Solutions to the routing problem require the robot to have a good estimate of its own pose. We present a novel security system that uses metrics generated by the localisation algorithm to perform adaptive anomaly detection. The localisation algorithm is a vision-based SLAM solution called RatSLAM, based on mechanisms within the hippocampus. The anomaly detection algorithm is based on the mechanisms used by the immune system to identify threats to the body. The system is explored using data gathered within an unmodified office environment. It is shown that the algorithm successfully reacts to the presence of people and objects in areas where they are not usually present and is tolerised against the presence of people in environments that are usually dynamic.
Resumo:
Objectives: The Nurse Researcher Project (NRP) was initiated to support development of a nursing research and evidence based practice culture in Cancer Care Services (CCS) in a large tertiary hospital in Australia. The position was established and evaluated to inform future directions in the organisation.---------- Background: The demand for quality cancer care has been expanding over the past decades. Nurses are well placed to make an impact on improving health outcomes of people affected by cancer. At the same time, there is a robust body of literature documenting the barriers to undertaking and utilising research by and for nurses and nursing. A number of strategies have been implemented to address these barriers including a range of staff researcher positions but there is scant attention to evaluating the outcomes of these strategies. The role of nurse researcher has been documented in the literature with the aim to provide support to nurses in the clinical setting. There is, to date, little information in relation to the design, implementation and evaluation of this role.---------- Design: The Donabedian’s model of program evaluation was used to implement and evaluate this initiative.---------- Methods: The ‘NRP’ outlined the steps needed to implement the nurse researcher role in a clinical setting. The steps involved the design of the role, planning for the support system for the role, and evaluation of outcomes of the role over two years.---------- Discussion: This paper proposes an innovative and feasible model to support clinical nursing research which would be relevant to a range of service areas.---------- Conclusion: Nurse researchers are able to play a crucial role in advancing nursing knowledge and facilitating evidence based practice, especially when placed to support a specialised team of nurses at a service level. This role can be implemented through appropriate planning of the position, building a support system and incorporating an evaluation plan.
Resumo:
The over representation of novice drivers in crashes is alarming. Research indicates that one in five drivers’ crashes within their first year of driving. Driver training is one of the interventions aimed at decreasing the number of crashes that involve young drivers. Currently, there is a need to develop comprehensive driver evaluation system that benefits from the advances in Driver Assistance Systems. Since driving is dependent on fuzzy inputs from the driver (i.e. approximate distance calculation from the other vehicles, approximate assumption of the other vehicle speed), it is necessary that the evaluation system is based on criteria and rules that handles uncertain and fuzzy characteristics of the drive. This paper presents a system that evaluates the data stream acquired from multiple in-vehicle sensors (acquired from Driver Vehicle Environment-DVE) using fuzzy rules and classifies the driving manoeuvres (i.e. overtake, lane change and turn) as low risk or high risk. The fuzzy rules use parameters such as following distance, frequency of mirror checks, gaze depth and scan area, distance with respect to lanes and excessive acceleration or braking during the manoeuvre to assess risk. The fuzzy rules to estimate risk are designed after analysing the selected driving manoeuvres performed by driver trainers. This paper focuses mainly on the difference in gaze pattern for experienced and novice drivers during the selected manoeuvres. Using this system, trainers of novice drivers would be able to empirically evaluate and give feedback to the novice drivers regarding their driving behaviour.
Resumo:
Films of piezoelectric PVDF and P(VDF-TrFE) were exposed to vacuum UV (115-300 nm VUV) and -radiation to investigate how these two forms of radiation affect the chemical, morphological, and piezoelectric properties of the polymers. The extent of crosslinking was almost identical in both polymers after -irradiation, but surprisingly, was significantly higher for the TrFE copolymer after VUV-irradiation. Changes in the melting behavior were also more significant in the TrFE copolymer after VUV-irradiation due to both surface and bulk crosslinking, compared with only surface crosslinking for the PVDF films. The piezoelectric properties (measured using d33 piezoelectric coefficients and D-E hysteresis loops) were unchanged in the PVDF homopolymer, while the TrFE copolymer exhibited more narrow D-E loops after exposure to either - or VUV-radiation. The more severe damage to the TrFE copolymer in comparison with the PVDF homopolymer after VUV-irradiation is explained by different energy deposition characteristics. The short wavelength, highly energetic photons are undoubtedly absorbed in the surface layers of both polymers, and we propose that while the longer wavelength components of the VUV-radiation are absorbed by the bulk of the TrFE copolymer causing crosslinking, they are transmitted harmlessly in the PVDF homopolymer.
Resumo:
Poly(vinylidene fluoride) and copolymers of vinylidene fluoride with hexafluoropropylene, trifluoroethylene and chlorotrifluoroethylene have been exposed to gamma irradiation in vacuum, up to doses of 1MGy under identical conditions, to obtain a ranking of radiation sensitivities. Changes in the tensile properties, crystalline melting points,heats of fusion, gel contents and solvent uptake factors were used as the defining parameters. The initial degree of crystallinity and film processing had the greatest influence on relative radiation damage, although the cross-linked network features were almost identical in their solvent swelling characteristics, regardless of the comonomer composition or content.
Resumo:
The effects of atomic oxygen (AO) and vacuum UV radiation simulating low Earth orbit conditions on two commercially available piezoelectric polymer films, poly(vinylidene fluoride) (PVDF) and poly(vinylidene fluoride-trifluoroethylene) P(VDF-TrFE), have been studied. Surface erosion and pattern development are significant for both polymers. Erosion yields were determined as 2.8 � 10�24 cm3/atom for PVDF and 2.5 � 10�24 cm3/atom for P(VDF-TrFE). The piezoelectric properties of the residual material of both polymers were largely unchanged after exposure, although a slight shift in the Curie transition of the P(VDF-TrFE) was observed. A lightly cross-linked network was formed in the copolymer presumably because of penetrating vacuum ultraviolet (VUV) radiation, while the homopolymer remained uncross-linked. These differences were attributed to varying degrees of crystallinity and potentially greater absorption, and hence damage, of VUV radiation in P(VDFTrFE) compared with PVDF.
Resumo:
Smart materials, such as thin-film piezoelectric polymers, are interesting for potential applications on Gossamer spacecraft. This investigation aims to predict the performance and long-term stability of the piezoelectric properties of poly(vinylidene fluoride) (PVDF) and its copolymers under conditions simulating the low-Earthorbit environment. To examine the effects of temperature on the piezoelectric properties of PVDF, poly(vinylidenefluoride-co-trifluoroethylene), and poly(vinylidenefluoride-cohexafluoropropylene), the d33 piezoelectric coefficients were measured up to 160 8C, and the electric displacement/electric field (D–E) hysteresis loops were measured from �80 to þ110 8C. The room-temperature d33 coefficient of PVDF homopolymer films, annealed at 50, 80, and 125 8C, dropped rapidly within a few days of thermal exposure and then remained unchanged. In contrast, the TrFE copolymer exhibited greater thermal stability than the homopolymer, with d33 remaining almost unchanged up to 125 8C. The HFP copolymer exhibited poor retention of d33 at temperatures above 80 8C. In situ D–E loop measurements from �80 to þ110 8C showed that the remanent polarization of the TrFE copolymer was more stable than that of the PVDF homopolymer. D–E hysteresis loop and d33 results were also compared with the deflection of the PVDF homopolymer and TrFE copolymer bimorphs tested over a wide temperature range.
Resumo:
Curriculum evaluation, as a field of study, is dynamic. For over the years it has been responsive to the developments in the conceptualization of curriculum and the associated processes of curriculum change. The concept of curriculum is integral to curriculum evaluation and can be defined in terms of what can and shall be taught to whom, when, where, how, and why. Much of the decision making relates to what knowledge is to be selected for inclusion in the curriculum.
Resumo:
This thesis is about the derivation of the addition law on an arbitrary elliptic curve and efficiently adding points on this elliptic curve using the derived addition law. The outcomes of this research guarantee practical speedups in higher level operations which depend on point additions. In particular, the contributions immediately find applications in cryptology. Mastered by the 19th century mathematicians, the study of the theory of elliptic curves has been active for decades. Elliptic curves over finite fields made their way into public key cryptography in late 1980’s with independent proposals by Miller [Mil86] and Koblitz [Kob87]. Elliptic Curve Cryptography (ECC), following Miller’s and Koblitz’s proposals, employs the group of rational points on an elliptic curve in building discrete logarithm based public key cryptosystems. Starting from late 1990’s, the emergence of the ECC market has boosted the research in computational aspects of elliptic curves. This thesis falls into this same area of research where the main aim is to speed up the additions of rational points on an arbitrary elliptic curve (over a field of large characteristic). The outcomes of this work can be used to speed up applications which are based on elliptic curves, including cryptographic applications in ECC. The aforementioned goals of this thesis are achieved in five main steps. As the first step, this thesis brings together several algebraic tools in order to derive the unique group law of an elliptic curve. This step also includes an investigation of recent computer algebra packages relating to their capabilities. Although the group law is unique, its evaluation can be performed using abundant (in fact infinitely many) formulae. As the second step, this thesis progresses the finding of the best formulae for efficient addition of points. In the third step, the group law is stated explicitly by handling all possible summands. The fourth step presents the algorithms to be used for efficient point additions. In the fifth and final step, optimized software implementations of the proposed algorithms are presented in order to show that theoretical speedups of step four can be practically obtained. In each of the five steps, this thesis focuses on five forms of elliptic curves over finite fields of large characteristic. A list of these forms and their defining equations are given as follows: (a) Short Weierstrass form, y2 = x3 + ax + b, (b) Extended Jacobi quartic form, y2 = dx4 + 2ax2 + 1, (c) Twisted Hessian form, ax3 + y3 + 1 = dxy, (d) Twisted Edwards form, ax2 + y2 = 1 + dx2y2, (e) Twisted Jacobi intersection form, bs2 + c2 = 1, as2 + d2 = 1, These forms are the most promising candidates for efficient computations and thus considered in this work. Nevertheless, the methods employed in this thesis are capable of handling arbitrary elliptic curves. From a high level point of view, the following outcomes are achieved in this thesis. - Related literature results are brought together and further revisited. For most of the cases several missed formulae, algorithms, and efficient point representations are discovered. - Analogies are made among all studied forms. For instance, it is shown that two sets of affine addition formulae are sufficient to cover all possible affine inputs as long as the output is also an affine point in any of these forms. In the literature, many special cases, especially interactions with points at infinity were omitted from discussion. This thesis handles all of the possibilities. - Several new point doubling/addition formulae and algorithms are introduced, which are more efficient than the existing alternatives in the literature. Most notably, the speed of extended Jacobi quartic, twisted Edwards, and Jacobi intersection forms are improved. New unified addition formulae are proposed for short Weierstrass form. New coordinate systems are studied for the first time. - An optimized implementation is developed using a combination of generic x86-64 assembly instructions and the plain C language. The practical advantages of the proposed algorithms are supported by computer experiments. - All formulae, presented in the body of this thesis, are checked for correctness using computer algebra scripts together with details on register allocations.
Resumo:
Unified Enterprise application security is a new emerging approach for providing protection against application level attacks. Conventional application security approach that consists of embedding security into each critical application leads towards scattered security mechanism that is not only difficult to manage but also creates security loopholes. According to the CSIIFBI computer crime survey report, almost 80% of the security breaches come from authorized users. In this paper, we have worked on the concept of unified security model, which manages all security aspect from a single security window. The basic idea is to keep business functionality separate from security components of the application. Our main focus was on the designing of frame work for unified layer which supports single point of policy control, centralize logging mechanism, granular, context aware access control, and independent from any underlying authentication technology and authorization policy.
Resumo:
Since 2002 QUT has sponsored a range of first year-focussed initiatives, most recently the Transitions In Project (TIP) which was designed to complement the First Year Experience Program and be a capacity building initiative. A primary focus of TIP was The First Year Curriculum Project: the review, development, implementation and evaluation of first year curriculum which has culminated in the development of a “Good Practice Guide” for the management of large first year units. First year curriculum initiates staff-student relationships and provides the scaffolding for the learning experience and engagement. Good practice in first year curriculum is within the control of the institution and can be redesigned and reviewed to improve outcomes. This session will provide a context for the First Year Curriculum Project and a concise overview of the suite of resources developed that have culminated in the Good Practice Guide.
Resumo:
This paper presents the outcomes of a study which focused on evaluating roof surfaces as stormwater harvesting catchments. Build-up and wash-off samples were collected from model roof surfaces. The collected build-up samples were separated into five different particle size ranges prior to the analysis of physico-chemical parameters. Study outcomes showed that roof surfaces are efficient catchment surfaces for the deposition of fine particles which travel over long distances. Roof surfaces contribute relatively high pollutant loads to the runoff and hence significantly influence the quality of the harvested rainwater. Pollutants associated with solids build-up on roof surfaces can vary with time, even with minimal changes to total solids load and particle size distribution. It is postulated that this variability is due to changes in distant atmospheric pollutant sources and wind patterns. The study highlighted the requirement for first flush devices to divert the highly polluted initial portion of roof runoff. Furthermore, it is highly recommended to not to harvest runoff from small intensity rainfall events since there is a high possibility that the runoff would contain a significant amount of pollutants even after the initial runoff fraction.