985 resultados para water security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Projected increases in atmospheric carbon dioxide concentration ([CO2]) and air temperature associated with future climate change are expected to affect crop development, crop yield, and, consequently, global food supplies. They are also likely to change agricultural production practices, especially those related to agricultural water management and sowing date. The magnitude of these changes and their implications to local production systems are mostly unknown. The objectives of this study were to: (i) simulate the effect of projected climate change on spring wheat (Triticum aestivum L. cv. Lang) yield and water use for the subtropical environment of the Darling Downs, Queensland, Australia; and (ii) investigate the impact of changing sowing date, as an adaptation strategy to future climate change scenarios, on wheat yield and water use. The multimodel climate projections from the IPCC Coupled Model Intercomparison Project (CMIP3) for the period 2030–2070 were used in this study. Climate scenarios included combinations of four changes in air temperature (08C, 18C, 28C, and 38C), three [CO2] levels (380 ppm, 500 ppm, and 600 ppm), and three changes in rainfall (–30%, 0%, and +20%), which were superimposed on observed station data. Crop management scenarios included a combination of six sowing dates (1 May, 10 May, 20 May, 1 June, 10 June, and 20 June) and three irrigation regimes (no irrigation (NI), deficit irrigation (DI), and full irrigation (FI)). Simulations were performed with the model DSSAT4.5, using 50 years of daily weather data.Wefound that: (1) grain yield and water-use efficiency (yield/evapotranspiration) increased linearly with [CO2]; (2) increases in [CO2] had minimal impact on evapotranspiration; (3) yield increased with increasing temperature for the irrigated scenarios (DI and FI), but decreased for the NI scenario; (4) yield increased with earlier sowing dates; and (5) changes in rainfall had a small impact on yield for DI and FI, but a high impact for the NI scenario.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes in detail our Security-Critical Program Analyser (SCPA). SCPA is used to assess the security of a given program based on its design or source code with regard to data flow-based metrics. Furthermore, it allows software developers to generate a UML-like class diagram of their program and annotate its confidential classes, methods and attributes. SCPA is also capable of producing Java source code for the generated design of a given program. This source code can then be compiled and the resulting Java bytecode program can be used by the tool to assess the program's overall security based on our security metrics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Refactoring is a common approach to producing better quality software. Its impact on many software quality properties, including reusability, maintainability and performance, has been studied and measured extensively. However, its impact on the information security of programs has received relatively little attention. In this work, we assess the impact of a number of the most common code-level refactoring rules on data security, using security metrics that are capable of measuring security from the viewpoint of potential information flow. The metrics are calculated for a given Java program using a static analysis tool we have developed to automatically analyse compiled Java bytecode. We ran our Java code analyser on various programs which were refactored according to each rule. New values of the metrics for the refactored programs then confirmed that the code changes had a measurable effect on information security.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

NeSSi (network security simulator) is a novel network simulation tool which incorporates a variety of features relevant to network security distinguishing it from general-purpose network simulators. Its capabilities such as profile-based automated attack generation, traffic analysis and support for detection algorithm plug-ins allow it to be used for security research and evaluation purposes. NeSSi has been successfully used for testing intrusion detection algorithms, conducting network security analysis and developing overlay security frameworks. NeSSi is built upon the agent framework JIAC, resulting in a distributed and extensible architecture. In this paper, we provide an overview of the NeSSi architecture as well as its distinguishing features and briefly demonstrate its application to current security research projects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Collaborative methods are promising tools for solving complex security tasks. In this context, the authors present the security overlay framework CIMD (Collaborative Intrusion and Malware Detection), enabling participants to state objectives and interests for joint intrusion detection and find groups for the exchange of security-related data such as monitoring or detection results accordingly; to these groups the authors refer as detection groups. First, the authors present and discuss a tree-oriented taxonomy for the representation of nodes within the collaboration model. Second, they introduce and evaluate an algorithm for the formation of detection groups. After conducting a vulnerability analysis of the system, the authors demonstrate the validity of CIMD by examining two different scenarios inspired sociology where the collaboration is advantageous compared to the non-collaborative approach. They evaluate the benefit of CIMD by simulation in a novel packet-level simulation environment called NeSSi (Network Security Simulator) and give a probabilistic analysis for the scenarios.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many commentators have treated the internet as a site of democratic freedom and as a new kind of public sphere. While there are good reasons for optimism, like any social space digital space also has its dark side. Citizens and governments alike have expressed anxiety about cybercrime and cyber-security. In August 2011, the Australian government introduced legislation to give effect to Australia becoming a signatory to the European Convention on Cybercrime (2001). At the time of writing, that legislation is still before the Parliament. In this article, attention is given to how the legal and policy-making process enabling Australia to be compliant with the European Convention on Cybercrime came about. Among the motivations that informed both the development of the Convention in Europe and then the Australian exercise of legislating for compliance with it was a range of legitimate concerns about the impact that cybercrime can have on individuals and communities. This article makes the case that equal attention also needs to be given to ensuring that legislators and policy makers differentiate between legitimate security imperatives and any over-reach evident in the implementation of this legislation that affects rule of law principles, our capacity to engage in democratic practices, and our civic and human rights.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent years, organoclays have become widely used in many industrial applications, and particularly they have been applied as adsorbents for water purification (de Paiva et al., 2008; Zhou et al., 2008; Park et al., 2011). When the organoclays are enhanced by intercalation of cationic surfactant molecules, the surface properties are altered from hydrophilic to highly hydrophobic. These changes facilitate their industrial applications which are strongly dependent on the structural properties of organoclays (Koh and Dixon, 2001; Zeng et al., 2004; Cui et al., 2007). Thus a better understanding of the configuration and structural change in the organoclays by thermogravimetric analysis (TG) is essential. It has been proven that the TG is very useful for the study of complex minerals, modified minerals, and nanomaterials (Laachachi et al., 2005; Palmer et al., 2011; Park et al., in press, 2011). Therefore, the current investigation involves the thermal stability of a montmorillonite intercalated with two types of cationic surfactants: dodecyltrimethylammonium bromide (DDTMA) and didodecyldimethylammonium bromide (DDDMA) using TG. The modification of montmorillonite results in an increase in the interlayer or basal spacing and enhances the environmental and industrial application of the obtained organoclay.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cold water immersion (CWI) is a popular recovery modality, but actual physiological responses to CWI after exercise in the heat have not been well documented. The purpose of this study was to examine effects of 20-min CWI (14 degrees C) on neuromuscular function, rectal (T(re)) and skin temperature (T(sk)), and femoral venous diameter after exercise in the heat. Ten well-trained male cyclists completed two bouts of exercise consisting of 90-min cycling at a constant power output (216+/-12W) followed by a 16.1km time trial (TT) in the heat (32 degrees C). Twenty-five minutes post-TT, participants were assigned to either CWI or control (CON) recovery conditions in a counterbalanced order. T(re) and T(sk) were recorded continuously, and maximal voluntary isometric contraction torque of the knee extensors (MVIC), MVIC with superimposed electrical stimulation (SMVIC), and femoral venous diameters were measured prior to exercise, 0, 45, and 90min post-TT. T(re) was significantly lower in CWI beginning 50min post-TT compared with CON, and T(sk) was significantly lower in CWI beginning 25min post-TT compared with CON. Decreases in MVIC, and SMVIC torque after the TT were significantly greater for CWI compared with CON; differences persisted 90min post-TT. Femoral vein diameter was approximately 9% smaller for CWI compared with CON at 45min post-TT. These results suggest that CWI decreases T(re), but has a negative effect on neuromuscular function.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Threats against computer networks evolve very fast and require more and more complex measures. We argue that teams respectively groups with a common purpose for intrusion detection and prevention improve the measures against rapid propagating attacks similar to the concept of teams solving complex tasks known from field of work sociology. Collaboration in this sense is not easy task especially for heterarchical environments. We propose CIMD (collaborative intrusion and malware detection) as a security overlay framework to enable cooperative intrusion detection approaches. Objectives and associated interests are used to create detection groups for exchange of security-related data. In this work, we contribute a tree-oriented data model for device representation in the scope of security. We introduce an algorithm for the formation of detection groups, show realization strategies for the system and conduct vulnerability analysis. We evaluate the benefit of CIMD by simulation and probabilistic analysis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study examined the effects of post-exercise cooling on recovery of neuromuscular, physiological, and cerebral hemodynamic responses after intermittent-sprint exercise in the heat. Nine participants underwent three post-exercise recovery trials, including a control (CONT), mixed-method cooling (MIX), and cold-water immersion (10 °C; CWI). Voluntary force and activation were assessed simultaneously with cerebral oxygenation (near-infrared spectroscopy) pre- and post-exercise, post-intervention, and 1-h and 24-h post-exercise. Measures of heart rate, core temperature, skin temperature, muscle damage, and inflammation were also collected. Both cooling interventions reduced heart rate, core, and skin temperature post-intervention (P < 0.05). CWI hastened the recovery of voluntary force by 12.7 ± 11.7% (mean ± SD) and 16.3 ± 10.5% 1-h post-exercise compared to MIX and CONT, respectively (P < 0.01). Voluntary force remained elevated by 16.1 ± 20.5% 24-h post-exercise after CWI compared to CONT (P < 0.05). Central activation was increased post-intervention and 1-h post-exercise with CWI compared to CONT (P < 0.05), without differences between conditions 24-h post-exercise (P > 0.05). CWI reduced cerebral oxygenation compared to MIX and CONT post-intervention (P < 0.01). Furthermore, cooling interventions reduced cortisol 1-h post-exercise (P < 0.01), although only CWI blunted creatine kinase 24-h post-exercise compared to CONT (P < 0.05). Accordingly, improvements in neuromuscular recovery after post-exercise cooling appear to be disassociated with cerebral oxygenation, rather reflecting reductions in thermoregulatory demands to sustain force production.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Portable water filled barriers (PWFB) are semi-rigid roadside barriers which have the potential to display good crash attenuation characteristics at low and moderate impact speeds. The traditional mesh based numerical methods alone fail to simulate this type of impact with precision, stability and efficiency. This paper proposes to develop an advanced simulation model based on the combination of Smoothed Particles Hydrodynamics (SPH), a meshless method, and finite element method (FEM) for fluid-structure analysis using the commercially available software package LS-Dyna. The interaction between SPH particles and FEA elements is studied in this paper. Two methods of element setup at the element boundary were investigated. The response of the impacted barrier and fluid inside were analysed and compared. The system response and lagging were observed and reported in this paper. It was demonstrated that coupled SPH/FEM can be used in full scale PWFB modelling application. This will aid the research in determining the best initial setup to couple FEA and SPH in road safety barrier for impact response and safety analysis in the future.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a virtual test bed for network security evaluation in mid-scale telecommunication networks. Migration from simulation scenarios towards the test bed is supported and enables researchers to evaluate experiments in a more realistic environment. We provide a comprehensive interface to manage, run and evaluate experiments. On basis of a concrete example we show how the proposed test bed can be utilized.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mycobacterium abscessus is a rapidly growing mycobacteria responsible for progressive pulmonary disease, soft tissue and wound infections, and can contaminate clinical specimens. Nontuberculous mycobacteria (NTM) are generally considered environmental organisms though M. abscessus has not featured frequently in environmental studies, particularly those examining potable water. In a study of Brisbane potable water, M. abscessus was isolate from ten different locations. The incidence of disease due to M. abscessus has been increasing in Queensland. Aim: To compare genotypically the M. abscessus isolates obtained from water to those obtained from human clinical specimens. Methods: From a study of Brisbane potable water between 2007 and 2009, ten isolates confirmed as M. abscessus were recovered. In addition, one strain was isolated from a rainwater tank of a patient with disease due to M. avium, and another from the swimming pool of a patient with M. intracellulare disease. A random sample of 74 clinical isolates referred to the QLD Mycobacterial reference laboratory during the same time period was available for comparison using repPCR strain typing (Diversilab). Results: The drinking water isolates formed two distinct strain patterns (A and B) that shared >90% similarity. The tankwater isolate (pattern C) shared >85% similarity with the potable water isolates, but the pool isolate (D) was distinctly different. Fifty-three clinical isolates clustered tightly (>95% similarity) with the Group A potable water isolates, 4 patients with Group B. Thirteen patient isolates clustered with the Rainwater tank isolate. One patient matched the pool isolate. There were a further 3 patient isolates that were unrelated to the water isolates. No differences were found between strain types in terms of geographic origin, gender, age, or site/type of infection. Conclusion: The high degree of similarity between strains of M. abscessus from potable water and strains causing infection in humans from the same area, strengthens the possibility that drinking water may be a source of infection in these patients.