981 resultados para cloud environment


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes a new approach to establish the probabilistic cable rating based on cable thermal environment studies. Knowledge of cable parameters has been well established. However the environment in which the cables are buried is not so well understood. Research in Queensland University of Technology has been aimed at obtaining and analysing actual daily field values of thermal resistivity and diffusivity of the soil around power cables. On-line monitoring systems have been developed and installed with a data logger system and buried spheres that use an improved technique to measure thermal resistivity and diffusivity over a short period. Based on the long-term continuous field data for more than 4 years, a probabilistic approach is developed to establish the correlation between the measured field thermal resistivity values and rainfall data from weather bureau records. Hence, a probabilistic cable rating can be established based on monthly probabilistic distribution of thermal resistivity

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This case-study exemplifies a ‘writing movement’, which is currently occurring in various parts of Australia through the support of social media. A concept emerging from the café scene in San Francisco, ‘Shut Up and Write!’ is a meetup group that brings writers together at a specific time and place to write side by side, thus making writing practice, social. This concept has been applied to the academic environment and our case-study explores the positive outcomes in two locations: RMIT University and QUT. We believe that this informal learning practice can be implemented to assist research students in developing academic skills. DESCRIPTION: Please describe your practice as a case study, including its context; challenge addressed; its aims; what it is; and how it supports creative practice PhD students or supervisors. Additional information may include: the outcomes; key factors or principles that contribute to its effectiveness; anticipated impact/evidence of impact. Research students spend the majority of their time outside of formal learning environments. Doctoral candidates enter their degree with a range of experience, knowledge and needs, making it difficult to provide writing assistance in a structured manner. Using a less structured approach to provide writing assistance has been trialled with promising results (Boud, Cohen, & Sampson, 2001; Stracke, 2010; Devenish et al, 2009). Although, semi structured approaches have been developed and examined, informal learning opportunities have received minimal attention. The primary difference of Shut Up and Write! to other writing practices, is that individuals do not engage in any structured activity and they do not share the outcomes of the writing. The purpose of Shut Up and Write! is to transform writing practice from a solitary experience, to a social one. Shut Up and Write! typically takes place outside of formal learning environments, in public spaces such as a café. The structure of Shut Up and Write! sessions is simple: participants meet at a specific time and place, chat for a few minutes, then they Shut Up and Write for a predetermined amount of time. Critical to the success of the sessions, is that there is no critiquing of the writing, and there is no competition or formal exercises. Our case-study examines the experience of two meetup groups at RMIT University and QUT through narrative accounts from participants. These accounts reveal that participants have learned: • Writing/productivity techniques; • Social/cloud software; • Aspects of the PhD; and • ‘Mundane’ dimensions of academic practice. In addition to this, activities such as Shut Up and Write! promote peer to peer bonding, knowledge exchange, and informal learning within the higher degree research experience. This case-study extends the initial work presented by the authors in collaboration with Dr. Inger Mewburn at QPR2012 – Quality in Postgraduate Research Conference, 2012.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To protect the health information security, cryptography plays an important role to establish confidentiality, authentication, integrity and non-repudiation. Keys used for encryption/decryption and digital signing must be managed in a safe, secure, effective and efficient fashion. The certificate-based Public Key Infrastructure (PKI) scheme may seem to be a common way to support information security; however, so far, there is still a lack of successful large-scale certificate-based PKI deployment in the world. In addressing the limitations of the certificate-based PKI scheme, this paper proposes a non-certificate-based key management scheme for a national e-health implementation. The proposed scheme eliminates certificate management and complex certificate validation procedures while still maintaining security. It is also believed that this study will create a new dimension to the provision of security for the protection of health information in a national e-health environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite the compelling case for moving towards cloud computing, the upstream oil & gas industry faces several technical challenges—most notably, a pronounced emphasis on data security, a reliance on extremely large data sets, and significant legacy investments in information technology infrastructure—that make a full migration to the public cloud difficult at present. Private and hybrid cloud solutions have consequently emerged within the industry to yield as much benefit from cloud-based technologies as possible while working within these constraints. This paper argues, however, that the move to private and hybrid clouds will very likely prove only to be a temporary stepping stone in the industry's technological evolution. By presenting evidence from other market sectors that have faced similar challenges in their journey to the cloud, we propose that enabling technologies and conditions will probably fall into place in a way that makes the public cloud a far more attractive option for the upstream oil & gas industry in the years ahead. The paper concludes with a discussion about the implications of this projected shift towards the public cloud, and calls for more of the industry's services to be offered through cloud-based “apps.”

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In deregulated versions of free-market electricity, producers will be free to send power along other utilities. The price of power strongly depends and fluctuates according to mutual benefit index of both supplier and consumer. In such a situation, strong interaction among utilities may cause instabilities in the system. As the frequency of market-based dispatch increases market forces tend to destabilize the stable system dynamics depending on the value of Ks/τλ(market dependent parameter) ratio. This tends to destabilize the coupled dynamics. The implementation of TCSC can effectively damp the inter area modes of oscillations of the coupled market system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A simple experimental apparatus is described in which a wide variety of vapor phase nucleation studies of refractory materials could be performed aboard NASA's KC-135 Research Aircraft. The chief advantage of a microgravity environment for these studies is the expected absence of thermally driven convective motions in the gas. The absence of convection leads to much more accurate knowledge of both the temperature distribution in the system and the time evolution of the refractory vapor concentration as a function of distance from the crucible.The evolution of the apparatus will be described as more experience is gained with the microgravity environment. Such experiments will be used to prepare for similar ones carried out aboard either the shuttle or Space Station where considerably longer duration experiments are possible.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Over the last two decades, the internet and e-commerce have reshaped the way we communicate, interact and transact. In the converged environment enabled by high speed broadband, web 2.0, social media, virtual worlds, user-generated content, cloud computing, VoIP, open source software and open content have rapidly become established features of our online experience. Business and government alike are increasingly using the internet as the preferred platform for delivery of their goods and services and for effective engagement with their clients. New ways of doing things online and challenges to existing business, government and social activities have tested current laws and often demand new policies and laws, adapted to the new realities. The focus of this book is the regulation of social, cultural and commercial activity on the World Wide Web. It considers developments in the law that have been, and continue to be, brought about by the emergence of the internet and e-commerce. It analyses how the law is applied to define rights and obligations in relation to online infrastructure, content and practices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Smartphones are steadily gaining popularity, creating new application areas as their capabilities increase in terms of computational power, sensors and communication. Emerging new features of mobile devices give opportunity to new threats. Android is one of the newer operating systems targeting smartphones. While being based on a Linux kernel, Android has unique properties and specific limitations due to its mobile nature. This makes it harder to detect and react upon malware attacks if using conventional techniques. In this paper, we propose an Android Application Sandbox (AASandbox) which is able to perform both static and dynamic analysis on Android programs to automatically detect suspicious applications. Static analysis scans the software for malicious patterns without installing it. Dynamic analysis executes the application in a fully isolated environment, i.e. sandbox, which intervenes and logs low-level interactions with the system for further analysis. Both the sandbox and the detection algorithms can be deployed in the cloud, providing a fast and distributed detection of suspicious software in a mobile software store akin to Google's Android Market. Additionally, AASandbox might be used to improve the efficiency of classical anti-virus applications available for the Android operating system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Increasing use of computerized systems in our daily lives creates new adversarial opportunities for which complex mechanisms are exploited to mend the rapid development of new attacks. Behavioral Biometrics appear as one of the promising response to these attacks. But it is a relatively new research area, specific frameworks for evaluation and development of behavioral biometrics solutions could not be found yet. In this paper we present a conception of a generic framework and runtime environment which will enable researchers to develop, evaluate and compare their behavioral biometrics solutions with repeatable experiments under the same conditions with the same data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the modern connected world, pervasive computing has become reality. Thanks to the ubiquity of mobile computing devices and emerging cloud-based services, the users permanently stay connected to their data. This introduces a slew of new security challenges, including the problem of multi-device key management and single-sign-on architectures. One solution to this problem is the utilization of secure side-channels for authentication, including the visual channel as vicinity proof. However, existing approaches often assume confidentiality of the visual channel, or provide only insufficient means of mitigating a man-in-the-middle attack. In this work, we introduce QR-Auth, a two-step, 2D barcode based authentication scheme for mobile devices which aims specifically at key management and key sharing across devices in a pervasive environment. It requires minimal user interaction and therefore provides better usability than most existing schemes, without compromising its security. We show how our approach fits in existing authorization delegation and one-time-password generation schemes, and that it is resilient to man-in-the-middle attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: Recent knowledge management (KM) literature suggests that KM activities are influenced by the elements of the internal business environment (BE) of organisations. This paper attempts to provide some unique insights into the contextual input of the KM process through empirically identifying the major factors (i.e. “forces”) within the internal BE of construction organisations operating in Hong Kong, and investigating their impact on the intensity of KM activities. Design/methodology/approach: A questionnaire survey was administered to a sample of construction contractors operating in Hong Kong to elicit opinions on the internal BE and intensity of KM activities as executed by targeted organisations. A total of 149 usable responses were received from 99 organisations representing about 38 percent of the research population. In parallel, to the survey, a total of 15 semi-structured interviews were undertaken to provide more insights into the phenomenon under investigation. Findings: Supported by the empirical and qualitative evidence, this study established that firstly, both organisational and technical environments have the capacity to either positively or negatively impact the intensity of KM activities, and both environments serve as stimuli in increasing each other's dynamism; secondly, certain types of KM activities are stronger “energy receivers” and easily to be “powered up” by manipulating factors representing these two environments. Then, through interactions between KM activities, the intensity of the whole strategic KM cycle will be increased thus helping to strengthen organisational competitive advantage.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Evidence currently supports the view that intentional interpersonal coordination (IIC) is a self-organizing phenomenon facilitated by visual perception of co-actors in a coordinative coupling (Schmidt, Richardson, Arsenault, & Galantucci, 2007). The present study examines how apparent IIC is achieved in situations where visual information is limited for co-actors in a rowing boat. In paired rowing boats only one of the actors, [bow seat] gets to see the actions of the other [stroke seat]. Thus IIC appears to be facilitated despite the lack of important visual information for the control of the dyad. Adopting a mimetic approach to expert coordination, the present study qualitatively examined the experiences of expert performers (N=9) and coaches (N=4) with respect to how IIC was achieved in paired rowing boats. Themes were explored using inductive content analysis, which led to layered model of control. Rowers and coaches reported the use of multiple perceptual sources in order to achieve IIC. As expected(Kelso, 1995; Schmidt & O’Brien, 1997; Turvey, 1990), rowers in the bow of a pair boat make use of visual information provided by the partner in front of them [stroke]. However, this perceptual information is subordinate to perception Motor Learning and Control S111 of the relationship between the boat hull and water passing beside it. Stroke seat, in the absence of visual information about his/her partner, achieves coordination by picking up information about the lifting or looming of the boat’s stern along with water passage past the hull. In this case it appears that apparent or desired IIC is supported by the perception of extra-personal variables, in this case boat behavior; as this perceptual information source is used by both actors. To conclude, co-actors in two person rowing boats use multiple sources of perceptual information for apparent IIC that changes according to task constraints. Where visual information is restricted IIC is facilitated via extra-personal perceptual information and apparent IIC switches to intentional extra-personal coordination.