968 resultados para security evaluation


Relevância:

20.00% 20.00%

Publicador:

Resumo:

IEC 61850 Process Bus technology has the potential to improve cost, performance and reliability of substation design. Substantial costs associated with copper wiring (designing, documentation, construction, commissioning and troubleshooting) can be reduced with the application of digital Process Bus technology, especially those based upon international standards. An IEC 61850-9-2 based sampled value Process Bus is an enabling technology for the application of Non-Conventional Instrument Transformers (NCIT). Retaining the output of the NCIT in its native digital form, rather than conversion to an analogue output, allows for improved transient performance, dynamic range, safety, reliability and reduced cost. In this paper we report on a pilot installation using NCITs communicating across a switched Ethernet network using the UCAIug Implementation Guideline for IEC 61850-9-2 (9-2 Light Edition or 9-2LE). This system was commissioned in a 275 kV Line Reactor bay at Powerlink Queensland’s Braemar substation in 2009, with sampled value protection IEDs 'shadowing' the existing protection system. The results of commissioning tests and twelve months of service experience using a Fibre Optic Current Transformer (FOCT) from Smart Digital Optics (SDO) are presented, including the response of the system to fault conditions. A number of remaining issues to be resolved to enable wide-scale deployment of NCITs and IEC 61850-9-2 Process Bus technology are also discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Evaluation, selection and finally decision making are all among important issues, which engineers face in long run of projects. Engineers implement mathematical and nonmathematical methods to make accurate and correct decisions, whenever needed. As extensive as these methods are, effects of any selected method on outputs achieved and decisions made are still suspicious. This is more controversial and challengeable, where evaluation is made among non-quantitative alternatives. In civil engineering and construction management problems, criteria include both quantitative and qualitative ones, such as aesthetic, construction duration, building and operation costs, and environmental considerations. As the result, decision making frequently takes place among non-quantitative alternatives. It should be noted that traditional comparison methods, including clear-cut and inflexible mathematics, have always been criticized. This paper demonstrates a brief review of traditional methods of evaluating alternatives. It also offers a new decision making method using, fuzzy calculations. The main focus of this research is some engineering issues, which have flexible nature and vague borders. Suggested method provides analyzability of evaluation for decision makers. It is also capable to overcome multi criteria and multi-referees problems. In order to ease calculations, a program named DeMA is introduced.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Building construction is a highly competitive and risky business. This competitiveness is compounded where conflicting objectives amongst contracting and subcontracting firms set the stage for an adversarial and potentially destructive business relationship. Clients, especially those from the public sector, need broader tender evaluation criteria to complement the traditional focus on bid price. There is also a need for change in the construction industry—not only to a more cooperative approach between the constructing parties—but also from a confrontationist attitude to a more harmonious relationship between all stakeholders in providing constructed facilities. A strategic alliance is a cooperative relationship between two or more organisations that forms part of their overall strategies, and contributes to achieving their major goals and objectives. Strategic alliances in building construction may provide a useful tool to assist public sector construction managers evaluate tenders and concurrently encourage more cooperative relationships amongst construction stakeholders. This paper begins with an overview of the Australian building construction industry, then reviews the existing strategic alliance literature and describes an analysis framework comprising six attributes of strategic alliances for application to construction organisations—trust, commitment, interdependence, cooperation, communication, and joint problem solving. These attributes are currently being used to collect data from 70 building construction firms in Queensland to assess their respective levels of strategic alliance. Given the trend towards broader indicators of construction firm performance, these attributes are proposed as a tool for use in the tender evaluation process for public works.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Extended Adolescent Injury Checklist (E-AIC), a self-report measure of injury based on the model of the Adolescent Injury Checklist (AIC), was developed for use in the evaluation of school-based interventions. The three stages of this development involved focus groups with adolescents and consultations with medical staff, pilot testing of the revised AIC in a high school context, and use of the finalised checklist in pre- and post-questionnaires to examine its utility. Results revealed that responses to the final version of the E-AIC were meaningful and remained consistent over time. The E-AIC appears to be a promising measure of adolescent injury that is simple, time-efficient and appropriate for use in the evaluation of school-based injury prevention programs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Online learning has been recognised as an effective pedagogical method and tool, and is broadly integrated into various types of teaching and learning strategies in higher education. In practice, the use of Virtual Learning Environment (VLE) in higher education has become an integral strategy for quality education. The field of design education however has not been researched extensively in regard to online learning, delivery and evaluation. This paper discusses design education from an online learning perspective. It proposes an integrated framework with three key components for online learning via VLE including an interactive delivery structure, communication channels, and learning evaluation. Additionally, the paper describes and evaluates how VLE sites for two design units were built based on an integrated framework and student learning experiences. The results indicate that online design education should be integrated with various educational values and functional features in a systematic manner, and requires designing learning evaluation protocols as part of learning activities and communicative forms within online-based learning sites.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Proposed transmission smart grids will use a digital platform for the automation of substations operating at voltage levels of 110 kV and above. The IEC 61850 series of standards, released in parts over the last ten years, provide a specification for substation communications networks and systems. These standards, along with IEEE Std 1588-2008 Precision Time Protocol version 2 (PTPv2) for precision timing, are recommended by the both IEC Smart Grid Strategy Group and the NIST Framework and Roadmap for Smart Grid Interoperability Standards for substation automation. IEC 61850-8-1 and IEC 61850-9-2 provide an inter-operable solution to support multi-vendor digital process bus solutions, allowing for the removal of potentially lethal voltages and damaging currents from substation control rooms, a reduction in the amount of cabling required in substations, and facilitates the adoption of non-conventional instrument transformers (NCITs). IEC 61850, PTPv2 and Ethernet are three complementary protocol families that together define the future of sampled value digital process connections for smart substation automation. This paper describes a specific test and evaluation system that uses real time simulation, protection relays, PTPv2 time clocks and artificial network impairment that is being used to investigate technical impediments to the adoption of SV process bus systems by transmission utilities. Knowing the limits of a digital process bus, especially when sampled values and NCITs are included, will enable utilities to make informed decisions regarding the adoption of this technology.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND: Treatment of proximal humerus fractures in elderly patients is challenging because of reduced bone quality. We determined the in vitro characteristics of a new implant developed to target the remaining bone stock, and compared it with an implant in clinical use. METHODS: Following osteotomy, left and right humeral pairs from cadavers were treated with either the Button-Fix or the Humerusblock fixation system. Implant stiffness was determined for three clinically relevant cases of load: axial compression, torsion, and varus bending. In addition, a cyclic varus-bending test was performed. RESULTS: We found higher stiffness values for the humeri treated with the ButtonFix system--with almost a doubling of the compression, torsion, and bending stiffness values. Under dynamic loading, the ButtonFix system had superior stiffness and less K-wire migration compared to the Humerusblock system. INTERPRETATION: When compared to the Humerusblock design, the ButtonFix system showed superior biomechanical properties, both static and dynamic. It offers a minimally invasive alternative for the treatment of proximal humerus fractures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction and aims: For a scaffold material to be considered effective and efficient for tissue engineering it must be biocompatible as well as bioinductive. Silk fiber is a natural biocompatible material suitable for scaffold fabrication; however, silk is tissue-conductive and lacks tissue-inductive properties. One proposed method to make the scaffold tissue-inductive is to introduce plasmids or viruses encoding a specific growth factor into the scaffold. In this study, we constructed adenoviruses encoding bone morphogenetic protein-7 (BMP-7) and incorporated these into silk scaffolds. The osteo-inductive and new bone formation properties of these constructs were assessed in vivo in a critical-sized skull defect animal model. Materials and methods: Silk fibroin scaffolds containing adenovirus particles coding BMP-7 were prepared. The release of the adenovirus particles from the scaffolds was quantified by tissue-culture infective dose (TCID50) and the bioactivity of the released viruses was evaluated on human bone marrow mesenchymal stromal cells (BMSCs). To demonstrate the in vivo bone forming ability of the virus-carrying silk fibroin scaffold, the scaffold constructs were implanted into calvarial defects in SCID mice. Results: In vitro studies demonstrated that the virus-carrying silk fibroin scaffold released virus particles over a 3 week period while preserving their bioactivity. In vivo test of the scaffold constructs in critical-sized skull defect areas revealed that silk scaffolds were capable of delivering the adenovirus encoding BMP-7, resulting significantly enhanced new bone formation. Conclusions: Silk scaffolds carrying BMP-7 encoding adenoviruses can effectively transfect cells and enhance both in vitro and in vivo osteogenesis. The findings of this study indicate silk fibroin is a promising biomaterial for gene delivery to repair critical-sized bone defects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Smart matrices are required in bone tissueengineered grafts that provide an optimal environment for cells and retain osteo-inductive factors for sustained biological activity. We hypothesized that a slow-degrading heparin-incorporated hyaluronan (HA) hydrogel can preserve BMP-2; while an arterio–venous (A–V) loop can support axial vascularization to provide nutrition for a bioartificial bone graft. HA was evaluated for osteoblast growth and BMP-2 release. Porous PLDLLA–TCP–PCL scaffolds were produced by rapid prototyping technology and applied in vivo along with HA-hydrogel, loaded with either primary osteoblasts or BMP-2. A microsurgically created A–V loop was placed around the scaffold, encased in an isolation chamber in Lewis rats. HA-hydrogel supported growth of osteoblasts over 8 weeks and allowed sustained release of BMP-2 over 35 days. The A–V loop provided an angiogenic stimulus with the formation of vascularized tissue in the scaffolds. Bone-specific genes were detected by real time RT-PCR after 8 weeks. However, no significant amount of bone was observed histologically. The heterotopic isolation chamber in combination with absent biomechanical stimulation might explain the insufficient bone formation despite adequate expression of bone-related genes. Optimization of the interplay of osteogenic cells and osteo-inductive factors might eventually generate sufficient amounts of axially vascularized bone grafts for reconstructive surgery.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research report documents work conducted by the Center for Transportation (CTR) at The University of Texas at Austin in analyzing the Joint Analysis using the Combined Knowledge (J.A.C.K.) program. This program was developed by the Texas Department of Transportation (TxDOT) to make projections of revenues and expenditures. This research effort was to span from September 2008 to August 2009, but the bulk of the work was completed and presented by December 2008. J.A.C.K. was subsequently renamed TRENDS, but for consistency with the scope of work, the original name is used throughout this report.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a modified approach to evaluate access control policy similarity and dissimilarity based on the proposal by Lin et al. (2007). Lin et al.'s policy similarity approach is intended as a filter stage which identifies similar XACML policies that can be analysed further using more computationally demanding techniques based on model checking or logical reasoning. This paper improves the approach of computing similarity of Lin et al. and also proposes a mechanism to calculate a dissimilarity score by identifying related policies that are likely to produce different access decisions. Departing from the original algorithm, the modifications take into account the policy obligation, rule or policy combining algorithm and the operators between attribute name and value. The algorithms are useful in activities involving parties from multiple security domains such as secured collaboration or secured task distribution. The algorithms allow various comparison options for evaluating policies while retaining control over the restriction level via a number of thresholds and weight factors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a hierarchical model for assessing an object-oriented program's security. Security is quantified using structural properties of the program code to identify the ways in which `classified' data values may be transferred between objects. The model begins with a set of low-level security metrics based on traditional design characteristics of object-oriented classes, such as data encapsulation, cohesion and coupling. These metrics are then used to characterise higher-level properties concerning the overall readability and writability of classified data throughout the program. In turn, these metrics are then mapped to well-known security design principles such as `assigning the least privilege' and `reducing the size of the attack surface'. Finally, the entire program's security is summarised as a single security index value. These metrics allow different versions of the same program, or different programs intended to perform the same task, to be compared for their relative security at a number of different abstraction levels. The model is validated via an experiment involving five open source Java programs, using a static analysis tool we have developed to automatically extract the security metrics from compiled Java bytecode.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report provides an evaluation of the Capalaba Youth Space.The evaluation included elements of process and impact evaluation and used a participatory action research approach informed by engagement processes, focus groups, a community survey, interviews and secondary analysis of existing data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Network-based Intrusion Detection Systems (NIDSs) monitor network traffic for signs of malicious activities that have the potential to disrupt entire network infrastructures and services. NIDS can only operate when the network traffic is available and can be extracted for analysis. However, with the growing use of encrypted networks such as Virtual Private Networks (VPNs) that encrypt and conceal network traffic, a traditional NIDS can no longer access network traffic for analysis. The goal of this research is to address this problem by proposing a detection framework that allows a commercial off-the-shelf NIDS to function normally in a VPN without any modification. One of the features of the proposed framework is that it does not compromise on the confidentiality afforded by the VPN. Our work uses a combination of Shamir’s secret-sharing scheme and randomised network proxies to securely route network traffic to the NIDS for analysis. The detection framework is effective against two general classes of attacks – attacks targeted at the network hosts or attacks targeted at framework itself. We implement the detection framework as a prototype program and evaluate it. Our evaluation shows that the framework does indeed detect these classes of attacks and does not introduce any additional false positives. Despite the increase in network overhead in doing so, the proposed detection framework is able to consistently detect intrusions through encrypted networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis argues that in order to establish a sound information security culture it is necessary to look at organisation's information security systems in a socio- technical context. The motivation for this research stems from the continuing concern of ineffective information security in organisations, leading to potentially significant monetary losses. It is important to address both technical and non- technical aspects when dealing with information security management. Culture has been identified as an underlying determinant of individuals' behaviour and this extends to information security culture, particularly in developing countries. This research investigates information security culture in the Saudi Arabia context. The theoretical foundation for the study is based on organisational and national culture theories. A conceptual framework for this study was constructed based on Peterson and Smith's (1997) model of national culture. This framework guides the study of national, organisational and technological values and their relationships to the development of information security culture. Further, the study seeks to better understand how these values might affect the development and deployment of an organisation's information security culture. Drawing on evidence from three exploratory case studies, an emergent conceptual framework was developed from the traditional human behaviour and the social environment perspectives used in social work, This framework contributes to in- formation security management by identifying behaviours related to four modes of information security practice. These modes provide a sound basis that can be used to evaluate individual organisational members' behaviour and the adequacy of ex- isting security measures. The results confirm the plausibility of the four modes of practice. Furthermore, a final framework was developed by integrating the four modes framework into the research framework. The outcomes of the three case stud- ies demonstrate that some of the national, organisational and technological values have clear impacts on the development and deployment of organisations' informa- tion security culture. This research, by providing an understanding the in uence of national, organi- sational and technological values on individuals' information security behaviour, contributes to building a theory of information security culture development within an organisational context. The research reports on the development of an inte- grated information security culture model that highlights recommendations for developing an information security culture. The research framework, introduced by this research, is put forward as a robust starting point for further related work in this area.