968 resultados para security evaluation
Resumo:
From the business viewpoint, the railway timetable is a list of the products presented by the railway transportation operators to the customers, specifying the schedules of all the train services on a railway line or network. In order to evaluate the quality of the train service schedules, a number of indices are proposed in this paper. These indices primarily take the passengers’ needs, such as waiting time, transfer time and transport capacity into consideration. Delay rate is usually used in post-evaluation. In this study, we propose to give an evaluation on the probability that the scheduled train services are likely to be delayed and the recovery ability of the timetable after delay has occurred. The evaluation identifies the possible problems in the services, such as excessive waiting time, non-seamless transfer, and high possibility of delay. This paper also discusses the improvement of these problems through certain adjustments on the timetable. The indices for evaluation and the adjustment method on timetable are then applied to a case study on the Hu-Ning-Hang railway in China, followed by the discussions of the merits of the proposed indices for timetable evaluation and possible improvement.
Resumo:
Several studies have developed metrics for software quality attributes of object-oriented designs such as reusability and functionality. However, metrics which measure the quality attribute of information security have received little attention. Moreover, existing security metrics measure either the system from a high level (i.e. the whole system’s level) or from a low level (i.e. the program code’s level). These approaches make it hard and expensive to discover and fix vulnerabilities caused by software design errors. In this work, we focus on the design of an object-oriented application and define a number of information security metrics derivable from a program’s design artifacts. These metrics allow software designers to discover and fix security vulnerabilities at an early stage, and help compare the potential security of various alternative designs. In particular, we present security metrics based on composition, coupling, extensibility, inheritance, and the design size of a given object-oriented, multi-class program from the point of view of potential information flow.
Resumo:
Refactoring focuses on improving the reusability, maintainability and performance of programs. However, the impact of refactoring on the security of a given program has received little attention. In this work, we focus on the design of object-oriented applications and use metrics to assess the impact of a number of standard refactoring rules on their security by evaluating the metrics before and after refactoring. This assessment tells us which refactoring steps can increase the security level of a given program from the point of view of potential information flow, allowing application designers to improve their system’s security at an early stage.
Resumo:
This paper presents early results from a pilot project which aims to investigate the relationship between proprietary structure of small and medium- sized Italian family firms and their owners’ orientation towards a “business evaluation process”. Evidence from many studies point out the importance of family business in a worldwide economic environment: in Italy 93% of the businesses are represented by family firms; 98% of them have less than 50 employees (Italian Association of Family Firms, 2004) so we judged family SMEs as a relevant field of investigation. In this study we assume a broad definition of family business as “a firm whose control (50% of shares or voting rights) is closely held by the members of the same family” (Corbetta,1995). “Business evaluation process” is intended here both as “continuous evaluation process” (which is the expression of a well developed managerial attitude) or as an “immediate valuation” (i.e. in the case of new shareholder’s entrance, share exchange among siblings, etc). We set two hypotheses to be tested in this paper: the first is “quantitative” and aims to verify whether the number of owners (independent variable) in a family firm is positively correlated to the business evaluation process. If a family firm is led by only one subject, it is more likely that personal values, culture and feelings may affect his choices more than “purely economic opportunities”; so there is less concern about monitoring economic performance or about the economic value of the firm. As the shareholders’ number increases, economic aspects in managing the firm grow in importance over the personal values and "value orientation" acquires a central role. The second hypothesis investigates if and to what extent the presence of “non- family members” among the owners affects their orientation to the business evaluation process. The “Cramer’s V” test has been used to test the hypotheses; both were not confirmed from these early results; next steps will lead to make an inferential analysis on a representative sample of the population.
Resumo:
Given there is currently a migration trend from traditional electrical supervisory control and data acquisition (SCADA) systems towards a smart grid based approach to critical infrastructure management. This project provides an evaluation of existing and proposed implementations for both traditional electrical SCADA and smart grid based architectures, and proposals a set of reference requirements which test bed implementations should implement. A high-level design for smart grid test beds is proposed and initial implementation performed, based on the proposed design, using open source and freely available software tools. The project examines the move towards smart grid based critical infrastructure management and illustrates the increased security requirements. The implemented test bed provides a basic framework for testing network requirements in a smart grid environment, as well as a platform for further research and development. Particularly to develop, implement and test network security related disturbances such as intrusion detection and network forensics. The project undertaken proposes and develops an architecture of the emulation of some smart grid functionality. The Common Open Research Emulator (CORE) platform was used to emulate the communication network of the smart grid. Specifically CORE was used to virtualise and emulate the TCP/IP networking stack. This is intended to be used for further evaluation and analysis, for example the analysis of application protocol messages, etc. As a proof of concept, software libraries were designed, developed and documented to enable and support the design and development of further smart grid emulated components, such as reclosers, switches, smart meters, etc. As part of the testing and evaluation a Modbus based smart meter emulator was developed to provide basic functionality of a smart meter. Further code was developed to send Modbus request messages to the emulated smart meter and receive Modbus responses from it. Although the functionality of the emulated components were limited, it does provide a starting point for further research and development. The design is extensible to enable the design and implementation of additional SCADA protocols. The project also defines an evaluation criteria for the evaluation of the implemented test bed, and experiments are designed to evaluate the test bed according to the defined criteria. The results of the experiments are collated and presented, and conclusions drawn from the results to facilitate discussion on the test bed implementation. The discussion undertaken also present possible future work.
Resumo:
Background: Palliative care should be provided according to the individual needs of the patient, caregiver and family, so that the type and level of care provided, as well as the setting in which it is delivered, are dependent on the complexity and severity of individual needs, rather than prognosis or diagnosis. This paper presents a study designed to assess the feasibility and efficacy of an intervention to assist in the allocation of palliative care resources according to need, within the context of a population of people with advanced cancer. ---------- Methods/design: People with advanced cancer and their caregivers completed bi-monthly telephone interviews over a period of up to 18 months to assess unmet needs, anxiety and depression, quality of life, satisfaction with care and service utilisation. The intervention, introduced after at least two baseline phone interviews, involved a) training medical, nursing and allied health professionals at each recruitment site on the use of the Palliative Care Needs Assessment Guidelines and the Needs Assessment Tool: Progressive Disease - Cancer (NAT: PD-C); b) health professionals completing the NAT: PD-C with participating patients approximately monthly for the rest of the study period. Changes in outcomes will be compared pre-and post-intervention.---------- Discussion: The study will determine whether the routine, systematic and regular use of the Guidelines and NAT: PD-C in a range of clinical settings is a feasible and effective strategy for facilitating the timely provision of needs based care.
Resumo:
This study reports on the impact of a "drink driving education program" taught to grade ten high school students. The program which involves twelve lessons uses strategies based on the Ajzen and Madden theory of planned behavior. Students were trained to use alternatives to drink driving and passenger behaviors. One thousand seven hundred and seventy-four students who had been taught the program in randomly assigned control and intervention schools were followed up three years later. There had been a major reduction in drink driving behaviors in both intervention and control students. In addition to this cohort change there was a trend toward reduced drink driving in the intervention group and a significant reduction in passenger behavior in this group. Readiness to use alternatives suggested that the major impact of the program was on students who were experimenting with the behavior at the time the program was taught. The program seems to have optimized concurrent social attitude and behavior change.
Resumo:
The use of appropriate features to characterize an output class or object is critical for all classification problems. This paper evaluates the capability of several spectral and texture features for object-based vegetation classification at the species level using airborne high resolution multispectral imagery. Image-objects as the basic classification unit were generated through image segmentation. Statistical moments extracted from original spectral bands and vegetation index image are used as feature descriptors for image objects (i.e. tree crowns). Several state-of-art texture descriptors such as Gray-Level Co-Occurrence Matrix (GLCM), Local Binary Patterns (LBP) and its extensions are also extracted for comparison purpose. Support Vector Machine (SVM) is employed for classification in the object-feature space. The experimental results showed that incorporating spectral vegetation indices can improve the classification accuracy and obtained better results than in original spectral bands, and using moments of Ratio Vegetation Index obtained the highest average classification accuracy in our experiment. The experiments also indicate that the spectral moment features also outperform or can at least compare with the state-of-art texture descriptors in terms of classification accuracy.
Resumo:
Purpose: The purpose of the paper is to develop a framework for evaluation of accessibility for knowledge based cities. ----- ----- Design/methodology/approach: This approach notifies common mistakes and problems in accessibility assessment for knowledge cities. ----- ----- Originality/value: Accessibility plays a key role in transport sustainability and recognizes the crucial links between transport and sustainable goals like air quality, environmental resource consumption & social equity. In knowledge cities, accessibility has significant effects on quality of life and social equity by improving the mobility of people and goods. Accessibility also influences patterns of growth and economic health by providing access to land. Accessibility is not only one of the components of knowledge cities but also affects other elements of knowledge cities directly or indirectly. ----- ----- Practical implications: The outcomes of the application will be helpful for developing particular methodologies for evaluating knowledge cities. On other words, this methodology attempts to develop an assessment procedure for examining accessibility of knowledge-based cities.
Resumo:
OBJECTIVE: To examine whether some drivers with hemianopia or quadrantanopia display safe driving skills on the road compared with drivers with normal visual fields. ---------- METHOD: An occupational therapist evaluated 22 people with hemianopia, 8 with quadrantanopia, and 30 with normal vision for driving skills during naturalistic driving using six rating scales. ---------- RESULTS: Of drivers with normal vision, >90% drove flawlessly or had minor errors. Although drivers with hemianopia were more likely to receive poorer ratings for all skills, 59.1%–81.8% performed with no or minor errors. A skill commonly problematic for them was lane keeping (40.9%). Of 8 drivers with quadrantanopia, 7 (87.5%) exhibited no or minor errors. ---------- CONCLUSION: This study of people with hemianopia or quadrantanopia with no lateral spatial neglect highlights the need to provide individual opportunities for on-road driving evaluation under natural traffic conditions if a person is motivated to return to driving after brain injury.
Resumo:
Even though security protocols are designed to make computer communication secure, it is widely known that there is potential for security breakdowns at the human machine interface. This paper reports on a diary study conducted in order to investigate what people identify as security decisions that they make while using the web. The study aimed to uncover how security is perceived in the individual's context of use. From this data, themes were drawn, with a focus on addressing security goals such as confidentiality and authentication. This study is the first study investigating users' web usage focusing on their self-documented perceptions of security and the security choices they made in their own environment.
Resumo:
Expenditure on R&D in the China construction industry has been relatively low in comparison with many developed countries for a number of years – a situation considered to be a major barrier to the industry’s competitiveness in general and unsatisfactory industry development of the 31 regions involved. A major problem with this is the lack of a sufficiently sophisticated method of objectively evaluating R&D activity in what are quite complex circumstances considering the size and regional differences that exist in this part of the world. A regional construction R&D evaluation system (RCRES) is presented aimed at rectifying the situation. This is based on 12 indicators drawn from the Chinese Government’s R&D Inventory of Resources in consultation with a small group of experts in the field, and further factor analysed into three groups. From this, the required evaluation is obtained by a simple formula. Examination of the results provides a ranking list of the R&D performance of each of the 31 regions, indicating a general disproportion between coastal and inland regions and highlighting regions receiving special emphasis or currently lacking in development. The understanding on this is vital for the future of China’s construction industry.
Resumo:
This paper assesses the capacity of high-frequency ultrasonic waves for detecting changes in the proteoglycan (PG) content of articular cartilage. 50 cartilage-on-bone samples were exposed to ultrasonic waves via an ultrasound transducer at a frequency of 20MHz. Histology and ImageJ processing were conducted to determine the PG content of the specimen. The ratios of the reflected signals from both the surface and the osteochondral junction (OCJ) were determined from the experimental data. The initial results show an inconsistency in the capacity of ultrasound to distinguish samples with severe proteoglycan loss (i.e. >90% PG loss) from the normal intact sample. This lack of clear distinction was also demonstrated at for samples with less than 60% depletion, while there is a clear differentiation between the normal intact sample and those with 55-70% PG loss.
Resumo:
The concept of non-destructive testing (NDT) of materials and structures is of immense importance in engineering and medicine. Several NDT methods including electromagnetic (EM)-based e.g. X-ray and Infrared; ultrasound; and S-waves have been proposed for medical applications. This paper evaluates the viability of near infrared (NIR) spectroscopy, an EM method for rapid non-destructive evaluation of articular cartilage. Specifically, we tested the hypothesis that there is a correlation between the NIR spectrum and the physical and mechanical characteristics of articular cartilage such as thickness, stress and stiffness. Intact, visually normal cartilage-on-bone plugs from 2-3yr old bovine patellae were exposed to NIR light from a diffuse reflectance fibre-optic probe and tested mechanically to obtain their thickness, stress, and stiffness. Multivariate statistical analysis-based predictive models relating articular cartilage NIR spectra to these characterising parameters were developed. Our results show that there is a varying degree of correlation between the different parameters and the NIR spectra of the samples with R2 varying between 65 and 93%. We therefore conclude that NIR can be used to determine, nondestructively, the physical and functional characteristics of articular cartilage.