964 resultados para Transport Layer Security (TLS)
Resumo:
This paper seeks to identify the approaches undertaken in implementing equal employment opportunity in the transport industry in Australia and the links between these approaches and indicators of increased participation of women. This male dominated industry employs limited numbers of women with fewer numbers of women in management. The study analyses data from a unique set of equal opportunity progress reports from all organisations in the transport industry that are required to provide public reports under Australian legislation. The findings indicate a correlation between some approaches to equal opportunity and increased numbers of women in some areas. The study is equally remarkable for what it does not find. Despite widespread equal opportunity implementation across a broad number of employment measures there are limited measures that predict increases in the numbers of women in management or in non-traditional roles. This study differs from others in that it identifies issues specific to one industry and links organisational approach to equal opportunity with the employment status of both women and men.
Resumo:
The Queensland Department of Public Works (QDPW) and the Queensland Department of Main Roads (QDMR) have identified a need for industry e-contracting guidelines in the short to medium term. Each of these organisations conducts tenders and contracts for over $600 million annually. This report considers the security and legal issues relating to the shift from a paper-based tendering system to an electronic tendering system. The research objectives derived from the industry partners include: • a review of current standards and e-tendering systems; • a summary of legal requirements impacting upon e-tendering; • an analysis of the threats and requirements for any e-tendering system; • the identification of outstanding issues; • an evaluation of possible e-tendering architectures; • recommendations for e-tendering systems.
Resumo:
Non-motorized public transport (NMPT), especially three-wheeler cycle rickshaws, has a long history in East Asia; and has long been a major transport planning issue. Policy measures to restrict or eliminate NMPT have already been implemented in many developing cities with mixed success. However given the economic, social and cultural significance of NMPT, its environmental benefits, and the magnitude of its role in sustaining the mobility needs of citizens, it is timely to reconsider the future role of NMPT. Rather than pursuing policies to eliminate NMPT, a better approach may be to integrate motorized and non-motorized vehicles as complementary rather than competitive forces. With this backdrop and given the international significance of the problem, this paper examines the current role and significance of NMPT using Dhaka as a case study, and sets a research agenda for the future of NMPT in a sustainable transport system.
Resumo:
Solar Cities Congress 2008 “Energising Sustainable Communities – Options for Our Future” THEME 3: Climate Change. Impact on Society and Culture. Sub Theme: planning and implementing holistic strategies for sustainable transport Abstract Promoting the use of cycling as an environmentally and socially sustainable form of transport. We need to reduce carbon emissions. We need to reduce fuel consumption. We need to reduce pollution. We need to reduce traffic congestion. As obesity levels and associated health problems in the developed nations continue to increase we need to adopt a healthier lifestyle. Few if any would argue with these statements. In fact many would consider these problems to be amongst the most urgent that our society faces. What if we had a vehicle that uses no fossil fuel to power it, creates no pollution, takes up far less space on the roads and promotes an active, healthy lifestyle. What if this machine would have energy efficiency levels 50 times greater than the car? This is a solution that is here, now and ready to go and many of us already own one. It is the humble bicycle. Although bicycle sales in Australia now outnumber car sales, bicycle use as a form of transport (as opposed to recreation) only constitutes around 3% to 4% of all trips. So, why are bicycles the forgotten form of transport if they promise to deliver the benefits that I have just outlined? This paper examines the underlying reasons for the relatively low use of bicycles as a means of transport. It identifies the areas of greatest potential for encouraging the use of the world’s most efficient form of transport. Tim Williams - May 2007
Resumo:
We love the automobile and the independence that it gives us. We are more mobile than we have ever been before in recorded history. In Australia 80% of journeys are by private motor vehicle. But it is becoming increasingly obvious that this era has a very limited lifespan. Fuel prices have skyrocketed recently with no end in sight. In spite of massive amounts of road construction, our cities are becoming increasingly congested. We desperately need to address climate change and the automobile is a major contributor. Carbon trading schemes will put even more upward pressure on fuel prices. At some point in the near future, most of us will need to reconsider our automobile usage whether we like it or not. The time to plan for the future is now. But what will happen to our mobility when access to cheap and available petroleum becomes a thing of the past? Will we start driving electric/hydrogen/ethanol vehicles? Or will we flock to public transport? Will our public transport systems cope with a massive increase in demand? Will thousands of people take to alternatives such as bicycles? If so, where do we put them? How do we change our roads to cope? How do we change our buildings to suit? Will we need recharging stations in our car park for example? Some countries are less reliant on the car than others e.g. Holland and Germany. How can the rest of the world learn from them? This paper discusses many of the likely outcomes of the inevitable shift away from society’s reliance on petroleum and examines the expected impact on the built environment. It also looks at ways in which the built environment can be planned to help ease the transition to a fossil free world. 1.
Resumo:
Some new types of mathematical model among four key techno - economic indexes of highway rapid passenger through transportation were established based on the principles of transportation economics. According to the research on the feasible solutions to the associated parameters which were then compared to the actual value, found some limitation in the existing transport organization method. In order to conquer that, two new types of transport organization method, namely CD (Collecting and Distributing) Method and Relay Method were brought forward. What’s more, a further research was down to estimate their characteristics, such as feasibilities, operation flows, applicability fields, etc. This analysis proves the two methods can offset the shortage of rapid passenger through transportation. To ensure highway rapid passenger transport develop harmoniously, a three-stage development targets was suggested to fuse different organization methods.
Resumo:
Measuring quality attributes of object-oriented designs (e.g. maintainability and performance) has been covered by a number of studies. However, these studies have not considered security as much as other quality attributes. Also, most security studies focus at the level of individual program statements. This approach makes it hard and expensive to discover and fix vulnerabilities caused by design errors. In this work, we focus on the security design of an object oriented application and define a number of security metrics. These metrics allow designers to discover and fix security vulnerabilities at an early stage, and help compare the security of various alternative designs. In particular, we propose seven security metrics to measure Data Encapsulation (accessibility) and Cohesion (interactions) of a given object-oriented class from the point of view of potential information flow.
Resumo:
In conventional fabrication of ceramic separation membranes, the particulate sols are applied onto porous supports. Major structural deficiencies under this approach are pin-holes and cracks, and the dramatic losses of flux when pore sizes are reduced to enhance selectivity. We have overcome these structural deficiencies by constructing hierarchically structured separation layer on a porous substrate using lager titanate nanofibers and smaller boehmite nanofibers. This yields a radical change in membrane texture. The resulting membranes effectively filter out species larger than 60 nm at flow rates orders of magnitude greater than conventional membranes. This reveals a new direction in membrane fabrication.
Resumo:
Imperatives to improve the sustainability of cities often hinge upon plans to increase urban residential density to facilitate greater reliance on sustainable forms of transport and minimise car use. However there is ongoing debate about whether high residential density land use in isolation results in sustainable transport outcomes. Findings from surveys with residents of inner-urban high density dwellings in Brisbane, Australia, suggest that solo car travel accounts for the greatest modal share of typical work journeys and attitudes toward dwelling and neighbourhood transport-related features, residential sorting factors and socio-demographics, alongside land use such as public transport availability, are significantly associated with work travel mode choice. We discuss the implications of our findings for transport policy and management including encouraging relatively sustainable intermodal forms of transport for work journeys.
Resumo:
The Open and Trusted Health Information Systems (OTHIS) Research Group has formed in response to the health sector’s privacy and security requirements for contemporary Health Information Systems (HIS). Due to recent research developments in trusted computing concepts, it is now both timely and desirable to move electronic HIS towards privacy-aware and security-aware applications. We introduce the OTHIS architecture in this paper. This scheme proposes a feasible and sustainable solution to meeting real-world application security demands using commercial off-the-shelf systems and commodity hardware and software products.
Resumo:
Over the last few decades, most large cities in the developing world have been experiencing rapid and imbalanced transport sector development resulting in severe congestion and poor levels of service. The most common response at a policy level under this circumstance has been to focus on private and public motorized transport modes, and especially on traffic control measures and mass transit systems. Despite their major role in the overall transport system in many developing cities in Asia & Latin America, relatively little attention is given to non-motorized transport (NMT) modes (walk, bicycle and cycle-rickshaw). In particular, this ideology is applicable to the paid category of non-motorized public transport (NMPT), notably three-wheeler cycle rickshaws that still have an important socio-economic, environmental and trip-making role in many developing cities. Despite, they are often seen as inefficient and backward; an impediment to progress; and inconsistent with modern urban image. Policy measures therefore, to restrict or eliminate non-motorized transport from urban arterials and other feeder networks have been implemented in cities as diverse as Dhaka, Delhi, Karachi, Bangkok, Jakarta, Manila, Surabaya and Beijing . This paper will primarily investigate the key contribution of NMPT in the sustainable transport system and urban fabric of developing cities, with Dhaka as case study. The paper will also highlight in detail the impediments towards NMPT development and provide introductory concept on possible role this mode is expected to play into the future of these cities
Resumo:
Real-Time Kinematic (RTK) positioning is a technique used to provide precise positioning services at centimetre accuracy level in the context of Global Navigation Satellite Systems (GNSS). While a Network-based RTK (N-RTK) system involves multiple continuously operating reference stations (CORS), the simplest form of a NRTK system is a single-base RTK. In Australia there are several NRTK services operating in different states and over 1000 single-base RTK systems to support precise positioning applications for surveying, mining, agriculture, and civil construction in regional areas. Additionally, future generation GNSS constellations, including modernised GPS, Galileo, GLONASS, and Compass, with multiple frequencies have been either developed or will become fully operational in the next decade. A trend of future development of RTK systems is to make use of various isolated operating network and single-base RTK systems and multiple GNSS constellations for extended service coverage and improved performance. Several computational challenges have been identified for future NRTK services including: • Multiple GNSS constellations and multiple frequencies • Large scale, wide area NRTK services with a network of networks • Complex computation algorithms and processes • Greater part of positioning processes shifting from user end to network centre with the ability to cope with hundreds of simultaneous users’ requests (reverse RTK) There are two major requirements for NRTK data processing based on the four challenges faced by future NRTK systems, expandable computing power and scalable data sharing/transferring capability. This research explores new approaches to address these future NRTK challenges and requirements using the Grid Computing facility, in particular for large data processing burdens and complex computation algorithms. A Grid Computing based NRTK framework is proposed in this research, which is a layered framework consisting of: 1) Client layer with the form of Grid portal; 2) Service layer; 3) Execution layer. The user’s request is passed through these layers, and scheduled to different Grid nodes in the network infrastructure. A proof-of-concept demonstration for the proposed framework is performed in a five-node Grid environment at QUT and also Grid Australia. The Networked Transport of RTCM via Internet Protocol (Ntrip) open source software is adopted to download real-time RTCM data from multiple reference stations through the Internet, followed by job scheduling and simplified RTK computing. The system performance has been analysed and the results have preliminarily demonstrated the concepts and functionality of the new NRTK framework based on Grid Computing, whilst some aspects of the performance of the system are yet to be improved in future work.
Resumo:
An examination of Information Security (IS) and Information Security Management (ISM) research in Saudi Arabia has shown the need for more rigorous studies focusing on the implementation and adoption processes involved with IS culture and practices. Overall, there is a lack of academic and professional literature about ISM and more specifically IS culture in Saudi Arabia. Therefore, the overall aim of this paper is to identify issues and factors that assist the implementation and the adoption of IS culture and practices within the Saudi environment. The goal of this paper is to identify the important conditions for creating an information security culture in Saudi Arabian organizations. We plan to use this framework to investigate whether security culture has emerged into practices in Saudi Arabian organizations.
Resumo:
Understanding the complex dynamic and uncertain characteristics of organisational employees who perform authorised or unauthorised information security activities is deemed to be a very important and challenging task. This paper presents a conceptual framework for classifying and organising the characteristics of organisational subjects involved in these information security practices. Our framework expands the traditional Human Behaviour and the Social Environment perspectives used in social work by identifying how knowledge, skills and individual preferences work to influence individual and group practices with respect to information security management. The classification of concepts and characteristics in the framework arises from a review of recent literature and is underpinned by theoretical models that explain these concepts and characteristics. Further, based upon an exploratory study of three case organisations in Saudi Arabia involving extensive interviews with senior managers, department managers, IT managers, information security officers, and IT staff; this article describes observed information security practices and identifies several factors which appear to be particularly important in influencing information security behaviour. These factors include values associated with national and organisational culture and how they manifest in practice, and activities related to information security management.
Resumo:
Surveillance networks are typically monitored by a few people, viewing several monitors displaying the camera feeds. It is then very difficult for a human operator to effectively detect events as they happen. Recently, computer vision research has begun to address ways to automatically process some of this data, to assist human operators. Object tracking, event recognition, crowd analysis and human identification at a distance are being pursued as a means to aid human operators and improve the security of areas such as transport hubs. The task of object tracking is key to the effective use of more advanced technologies. To recognize an event people and objects must be tracked. Tracking also enhances the performance of tasks such as crowd analysis or human identification. Before an object can be tracked, it must be detected. Motion segmentation techniques, widely employed in tracking systems, produce a binary image in which objects can be located. However, these techniques are prone to errors caused by shadows and lighting changes. Detection routines often fail, either due to erroneous motion caused by noise and lighting effects, or due to the detection routines being unable to split occluded regions into their component objects. Particle filters can be used as a self contained tracking system, and make it unnecessary for the task of detection to be carried out separately except for an initial (often manual) detection to initialise the filter. Particle filters use one or more extracted features to evaluate the likelihood of an object existing at a given point each frame. Such systems however do not easily allow for multiple objects to be tracked robustly, and do not explicitly maintain the identity of tracked objects. This dissertation investigates improvements to the performance of object tracking algorithms through improved motion segmentation and the use of a particle filter. A novel hybrid motion segmentation / optical flow algorithm, capable of simultaneously extracting multiple layers of foreground and optical flow in surveillance video frames is proposed. The algorithm is shown to perform well in the presence of adverse lighting conditions, and the optical flow is capable of extracting a moving object. The proposed algorithm is integrated within a tracking system and evaluated using the ETISEO (Evaluation du Traitement et de lInterpretation de Sequences vidEO - Evaluation for video understanding) database, and significant improvement in detection and tracking performance is demonstrated when compared to a baseline system. A Scalable Condensation Filter (SCF), a particle filter designed to work within an existing tracking system, is also developed. The creation and deletion of modes and maintenance of identity is handled by the underlying tracking system; and the tracking system is able to benefit from the improved performance in uncertain conditions arising from occlusion and noise provided by a particle filter. The system is evaluated using the ETISEO database. The dissertation then investigates fusion schemes for multi-spectral tracking systems. Four fusion schemes for combining a thermal and visual colour modality are evaluated using the OTCBVS (Object Tracking and Classification in and Beyond the Visible Spectrum) database. It is shown that a middle fusion scheme yields the best results and demonstrates a significant improvement in performance when compared to a system using either mode individually. Findings from the thesis contribute to improve the performance of semi-automated video processing and therefore improve security in areas under surveillance.