1000 resultados para Fiat Engineering, SPAF
Resumo:
The expression patterns of GUS fusion constructs driven by the Agrobacterium rhizogenes RolC and the maize Sh (Shrunken: sucrose synthase-1) promoters were examined in transgenic potatoes (cv. Atlantic). RolC drove high-level gene expression in phloem tissue, bundle sheath cells and vascular parenchyma, but not in xylem or non-vascular tissues. Sh expression was exclusively confined to phloem tissue. Potato leafroll luteovirus (PLRV) replicates only in phloem tissues, and we show that when RolC is used to drive expression of the PLRV coat protein gene, virus-resistant lines can be obtained. In contrast, no significant resistance was observed when the Sh promoter was used.
Resumo:
Financial literacy may not be as effective as previously thought in protecting against fraud victimisation. It does not inoculate investors from persuasion or social engineering tactics used by offenders to secure investment in fraudulent schemes. In fact, recent research indicates that overconfidence in investment knowledge may make individuals more susceptible to fraud. Using boiler room fraud as a case study, this article introduces the PREY (Profiled, Relational, Exploitable and Yielding) model to capture the psychological tactics used by fraud perpetrators to influence the thoughts and decision-making processes of individuals. The PREY model operationalizes the tenets of social engineering and demonstrates how such tactics could be re-engineered to increase the effectiveness of fraud prevention within the financial literacy context.
Resumo:
Basing signature schemes on strong lattice problems has been a long standing open issue. Today, two families of lattice-based signature schemes are known: the ones based on the hash-and-sign construction of Gentry et al.; and Lyubashevsky’s schemes, which are based on the Fiat-Shamir framework. In this paper we show for the first time how to adapt the schemes of Lyubashevsky to the ring signature setting. In particular we transform the scheme of ASIACRYPT 2009 into a ring signature scheme that provides strong properties of security under the random oracle model. Anonymity is ensured in the sense that signatures of different users are within negligible statistical distance even under full key exposure. In fact, the scheme satisfies a notion which is stronger than the classical full key exposure setting as even if the keypair of the signing user is adversarially chosen, the statistical distance between signatures of different users remains negligible. Considering unforgeability, the best lattice-based ring signature schemes provide either unforgeability against arbitrary chosen subring attacks or insider corruption in log-sized rings. In this paper we present two variants of our scheme. In the basic one, unforgeability is ensured in those two settings. Increasing signature and key sizes by a factor k (typically 80 − 100), we provide a variant in which unforgeability is ensured against insider corruption attacks for arbitrary rings. The technique used is pretty general and can be adapted to other existing schemes.
Resumo:
BACKGROUND Research on engineering design is a core area of concern within engineering education and a fundamental understanding of how engineering students approach and undertake design is necessary in order to develop effective design models and pedagogies. Understanding the factors related to design experiences in education and how they affect student practice can help educators as well as designers to leverage these factors as part of the design process. PURPOSE This study investigated the design practices of first-year engineering students’ and their experiences with a first-year engineering course design project. The research questions that guided the investigation were: 1. From a student perspective, what design parameters or criteria are most important? 2. How does this perspective impact subsequent student design practice throughout the design process? DESIGN/METHOD The authors employed qualitative multi-case study methods (Miles & Huberman, 1994) in order to the answer the research questions. Participant teams were observed and video recorded during team design meetings in which they researched the background for the design problem, brainstormed and sketched possible solutions, as well as built prototypes and final models of their design solutions as part of a course design project. Analysis focused on explanation building (Yin, 2009) and utilized within-case and cross-case analysis (Miles & Huberman, 1994). RESULTS We found that students focused disproportionally on the functional parameter, i.e. the physical implementation of their solution, and the possible/applicable parameter, i.e. a possible and applicable solution that benefited the user, in comparison to other given parameters such as safety and innovativeness. In addition, we found that individual teams focused on the functional and possible/ applicable parameters in early design phases such as brainstorming/ ideation and sketching. When prompted to discuss these non-salient parameters (from the student perspective) in the final design report, student design teams often used a post-hoc justification to support how the final designs fit the parameters that they did not initially consider. CONCLUSIONS This study suggests is that student design teams become fixated on (and consequently prioritize) certain parameters they interpret as important because they feel these parameters were described more explicitly in terms how they were met and assessed. Students fail to consider other parameters, perceived to be less directly assessable, unless prompted to do so. Failure to consider other parameters in the early design phases subsequently affects their approach in design phases as well. Case studies examining students’ study strategies within three Australian Universities illustrate similarities with some student approaches to design.
Resumo:
Social networking sites (SNSs), with their large numbers of users and large information base, seem to be perfect breeding grounds for exploiting the vulnerabilities of people, the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” While technology-based security has been addressed by research and may be well understood, social engineering is more challenging to understand and manage, especially in new environments such as SNSs, owing to some factors of SNSs that reduce the ability of users to detect the attack and increase the ability of attackers to launch it. This work will contribute to the knowledge of social engineering by presenting the first two conceptual models of social engineering attacks in SNSs. Phase-based and source-based models are presented, along with an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.
Resumo:
While social engineering represents a real and ominous threat to many organizations, companies, governments, and individuals, social networking sites (SNSs), have been identified as among the most common means of social engineering attacks. Owing to factors that reduce the ability of users to detect social engineering tricks and increase the ability of attackers to launch them, SNSs seem to be perfect breeding ground for exploiting the vulnerabilities of people, and the weakest link in security. This work will contribute to the knowledge of social engineering by identifying different entities and subentities that affect social engineering based attacks in SNSs. Moreover, this paper includes an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.
Resumo:
There is no doubt that social engineering plays a vital role in compromising most security defenses, and in attacks on people, organizations, companies, or even governments. It is the art of deceiving and tricking people to reveal critical information or to perform an action that benefits the attacker in some way. Fraudulent and deceptive people have been using social engineering traps and tactics using information technology such as e-mails, social networks, web sites, and applications to trick victims into obeying them, accepting threats, and falling victim to various crimes and attacks such as phishing, sexual abuse, financial abuse, identity theft, impersonation, physical crime, and many other forms of attack. Although organizations, researchers, practitioners, and lawyers recognize the severe risk of social engineering-based threats, there is a severe lack of understanding and controlling of such threats. One side of the problem is perhaps the unclear concept of social engineering as well as the complexity of understand human behaviors in behaving toward, approaching, accepting, and failing to recognize threats or the deception behind them. The aim of this paper is to explain the definition of social engineering based on the related theories of the many related disciplines such as psychology, sociology, information technology, marketing, and behaviourism. We hope, by this work, to help researchers, practitioners, lawyers, and other decision makers to get a fuller picture of social engineering and, therefore, to open new directions of collaboration toward detecting and controlling it.
Resumo:
Joint venture design teams are formed to combine resources and expertise in order to secure multi-discipline engineering design services on major projects. Bringing together resources from two ordinarily competing companies to form one joint team is however challenging as each parent company brings to the project its own organisational culture, processes and team attitudes. This study examined the factors that impact on forming a successful joint venture project team. Three critical areas were identified from an extensive literature review; Joint Venture Arrangements, Parent Companies and Forming the Team; and a survey was conducted with professionals who have worked in joint venture project teams in the Australian building industry in order to identify factors that affected successful joint venture team formation, and the common lessons learnt. This study reinforced the importance of three key criteria - trust, commitment and compatibility - for partner alignment. The results also identified four key lessons learnt which included; selecting the right resources, enabling a collaborative working environment by way of project office, implementing an independent Joint Venture Manager, and allocating work which is best for project with fees reflecting risk where risk is disproportionate.
Resumo:
Nanomaterials are prone to influence by chemical adsorption because of their large surface to volume ratios. This enables sensitive detection of adsorbed chemical species which, in turn, can tune the property of the host material. Recent studies discovered that single and multi-layer molybdenum disulfide (MoS2) films are ultra-sensitive to several important environmental molecules. Here we report new findings from ab inito calculations that reveal substantially enhanced adsorption of NO and NH3 on strained monolayer MoS2 with significant impact on the properties of the adsorbates and the MoS2 layer. The magnetic moment of adsorbed NO can be tuned between 0 and 1 μB; strain also induces an electronic phase transition between half-metal and metal. Adsorption of NH3 weakens the MoS2 layer considerably, which explains the large discrepancy between the experimentally measured strength and breaking strain of MoS2 films and previous theoretical predictions. On the other hand, adsorption of NO2, CO, and CO2 is insensitive to the strain condition in the MoS2 layer. This contrasting behavior allows sensitive strain engineering of selective chemical adsorption on MoS2 with effective tuning of mechanical, electronic, and magnetic properties. These results suggest new design strategies for constructing MoS2-based ultrahigh-sensitivity nanoscale sensors and electromechanical devices.
Resumo:
This research identifies factors that are crucial to the success of a knowledge management system (KMS) implementation in a prominent Australian engineering consultancy firm. The study employs the Delphi method to solicit the opinions of experienced market leaders in the Australian construction industry, and then benchmarks the organisational profile of the consultancy firm against the Delphi findings. From this comparative case study, recommendations are made pertaining to the organisational and cultural changes required within the consultancy firm in order to improve its readiness to successfully implement a KMS.
Resumo:
In late 2011, first year university students in science, technology, engineering and mathematics (STEM) courses across Australia were invited to participate in the international Interests and Recruitment in Science (IRIS) study. IRIS investigates the influences on young people's decisions to choose university STEM courses and their subsequent experiences of these courses. The study also has a particular focus on the motivations and experiences of young women in courses such as physics, IT and engineering given the low rates of female participation in these fields. Around 3500 students from 30 Australian universities contributed their views on the relative importance of various school and non-school influences on their decisions, as well as insights into their experiences of university STEM courses so far. It is hoped that their contributions will help improve recruitment, retention and gender equity in STEM higher education and careers.
Resumo:
Digital tablets have been identified as a tool for enabling blended learning and supporting online teaching and learning. A small scale trial was undertaken to assess the effectiveness of this technology when applied to power engineering education. Critical findings and experiences gained from this trial, including potential benefits, presentation techniques and the resulting student feedback are presented in this paper.
Resumo:
Engineering asset management (EAM) is a rapidly growing and developing field. However, efforts to select and develop engineers in this area are complicated by our lack of understanding of the full range of competencies required to perform. This exploratory study sought to clarify and categorise the professional competencies required of individuals at different hierarchical levels within EAM. Data from 14 field interviews, 61 online surveys, and 10 expert panel interviews were used to develop an initial professional competency framework. Overall, nine competency clusters were identified. These clusters indicate that engineers working in this field need to be able to collaborate and influence others, complete objectives within organisational guidelines, and be able to manage themselves effectively. Limitations and potential uses of this framework in engineering education and research are discussed.
Resumo:
Visual information is central to several of the scientific disciplines. This paper studies how scientists working in a multidisciplinary field produce scientific evidence through building and manipulating scientific visualizations. Using ethnographic methods, we studied visualization practices of eight scientists working in the domain of tissue engineering research. Tissue engineering is an upcoming field of research that deals with replacing or regenerating human cells, tissues, or organs to restore or establish normal function. We spent 3 months in the field, where we recorded laboratory sessions of these scientists and used semi-structured interviews to get an insight into their visualization practices. From our results, we elicit two themes characterizing their visualization practices: multiplicity and physicality. In this article, we provide several examples of scientists’ visualization practices to describe these two themes and show that multimodality of such practices plays an important role in scientific visualization.
Resumo:
Numerous research studies have evaluated whether distance learning is a viable alternative to traditional learning methods. These studies have generally made use of cross-sectional surveys for collecting data, comparing distance to traditional learners with intent to validate the former as a viable educational tool. Inherent fundamental differences between traditional and distance learning pedagogies, however, reduce the reliability of these comparative studies and constrain the validity of analyses resulting from this analytical approach. This article presents the results of a research project undertaken to analyze expectations and experiences of distance learners with their degree programs. Students were given surveys designed to examine factors expected to affect their overall value assessment of their distance learning program. Multivariate statistical analyses were used to analyze the correlations among variables of interest to support hypothesized relationships among them. Focusing on distance learners overcomes some of the limitations with assessments that compare off- and on-campus student experiences. Evaluation and modeling of distance learner responses on perceived value for money of the distance education they received indicate that the two most important influences are course communication requirements, which had a negative effect, and course logistical simplicity, which revealed a positive effect. Combined, these two factors accounted for approximately 47% of the variability in perceived value for money of the educational program of sampled students. A detailed focus on comparing expectations with outcomes of distance learners complements the existing literature dominated by comparative studies of distance and nondistance learners.