997 resultados para 1995_01241828 MOC-11


Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the acceptance and popularity of wireless networking technologies has proliferated, the security of the IEEE 802.11 wireless local area network (WLAN) has advanced in leaps and bounds. From tenuous beginnings, where the only safe way to deploy a WLAN was to assume it was hostile and employ higherlayer information security controls, to the current state of the art, all manner of improvements have been conceived and many implemented. This work investigates some of the remaining issues surrounding IEEE 802.11 WLAN operation. While the inherent issues in WLAN deployments and the problems of the original Wired Equivalent Privacy (WEP) provisions are well known and widely documented, there still exist a number of unresolved security issues. These include the security of management and control frames and the data link layer protocols themselves. This research introduces a novel proposal to enhance security at the link layer of IEEE 802.11 WLANs and then conducts detailed theoretical and empirical investigation and analysis of the eects of such proposals. This thesis �rst de�nes the state of the art in WLAN technology and deployment, including an overview of the current and emerging standards, the various threats, numerous vulnerabilities and current exploits. The IEEE 802.11i MAC security enhancements are discussed in detail, along with the likely outcomes of the IEEE 802.11 Task Group W1, looking into protected management frames. The problems of the remaining unprotected management frames, the unprotected control frames and the unprotected link layer headers are reviewed and a solution is hypothesised, to encrypt the entire MAC Protocol Data Unit (MPDU), including the MAC headers, not just the MAC Service Data Unit (MSDU) commonly performed by existing protocols. The proposal is not just to encrypt a copy of the headers while still using cleartext addresses to deliver the frame, as used by some existing protocols to support the integrity and authenticity of the headers, but to pass the entire MPDU only as ciphertext to also support the con�dentiality of the frame header information. This necessitates the decryption of every received frame using every available key before a station can determine if it is the intended recipient. As such, this raises serious concerns as to the viability of any such proposal due to the likely impact on throughput and scalability. The bulk of the research investigates the impacts of such proposals on the current WLAN protocols. Some possible variations to the proposal are also provided to enhance both utility and speed. The viability this proposal with respect to the eect on network throughput is then tested using a well known and respected network simulation tool, along with a number of analysis tools developed speci�cally for the data generated here. The simulator's operation is �rst validated against recognised test outputs, before a comprehensive set of control data is established, and then the proposal is tested and and compared against the controls. This detailed analysis of the various simulations should be of bene�t to other researchers who need to validate simulation results. The analysis of these tests indicate areas of immediate improvement and so the protocols are adjusted and a further series of experiments conducted. These �nal results are again analysed in detail and �nal appraisals provided.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Popular wireless network standards, such as IEEE 802.11/15/16, are increasingly adopted in real-time control systems. However, they are not designed for real-time applications. Therefore, the performance of such wireless networks needs to be carefully evaluated before the systems are implemented and deployed. While efforts have been made to model general wireless networks with completely random traffic generation, there is a lack of theoretical investigations into the modelling of wireless networks with periodic real-time traffic. Considering the widely used IEEE 802.11 standard, with the focus on its distributed coordination function (DCF), for soft-real-time control applications, this paper develops an analytical Markov model to quantitatively evaluate the network quality-of-service (QoS) performance in periodic real-time traffic environments. Performance indices to be evaluated include throughput capacity, transmission delay and packet loss ratio, which are crucial for real-time QoS guarantee in real-time control applications. They are derived under the critical real-time traffic condition, which is formally defined in this paper to characterize the marginal satisfaction of real-time performance constraints.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless network technologies, such as IEEE 802.11 based wireless local area networks (WLANs), have been adopted in wireless networked control systems (WNCS) for real-time applications. Distributed real-time control requires satisfaction of (soft) real-time performance from the underlying networks for delivery of real-time traffic. However, IEEE 802.11 networks are not designed for WNCS applications. They neither inherently provide quality-of-service (QoS) support, nor explicitly consider the characteristics of the real-time traffic on networked control systems (NCS), i.e., periodic round-trip traffic. Therefore, the adoption of 802.11 networks in real-time WNCSs causes challenging problems for network design and performance analysis. Theoretical methodologies are yet to be developed for computing the best achievable WNCS network performance under the constraints of real-time control requirements. Focusing on IEEE 802.11 distributed coordination function (DCF) based WNCSs, this paper analyses several important NCS network performance indices, such as throughput capacity, round trip time and packet loss ratio under the periodic round trip traffic pattern, a unique feature of typical NCSs. Considering periodic round trip traffic, an analytical model based on Markov chain theory is developed for deriving these performance indices under a critical real-time traffic condition, at which the real-time performance constraints are marginally satisfied. Case studies are also carried out to validate the theoretical development.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 1986 the then United States Secretary of State George Shultz asserted that: It is absurd to argue that international law prohibits us from capturing terrorists in international waters or airspace; from attacking them on the soil of other nations, even for the purpose of rescuing hostages; or from using force against states that support, train and harbor terrorists or guerrillas. At that time the United States’ claim of a right to use military force in self-defence against terrorism2 received little support from other states.3 The predominant view then was that terrorist attacks committed by private or non-state actors were a form of criminal activity to be combated through domestic and international criminal justice mechanisms. The notion that such terrorist acts should be treated as ‘armed attacks’ triggering a victim state’s right of self-defence was not accepted by the majority of states. To suggest, as Shultz had done, that a state not directly responsible for terrorist acts could have its territorial integrity violated by military action targeting terrorists located within that state, was a controversial proposition in 1986. However, some fifteen years later, when the United States and a coalition of allies launched a military campaign in Afghanistan following the 11 September 2001 (hereafter ‘9/11’) terrorist attacks, there was virtually unanimous international support for the use of force.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Popular wireless networks, such as IEEE 802.11/15/16, are not designed for real-time applications. Thus, supporting real-time quality of service (QoS) in wireless real-time control is challenging. This paper adopts the widely used IEEE 802.11, with the focus on its distributed coordination function (DCF), for soft-real-time control systems. The concept of the critical real-time traffic condition is introduced to characterize the marginal satisfaction of real-time requirements. Then, mathematical models are developed to describe the dynamics of DCF based real-time control networks with periodic traffic, a unique feature of control systems. Performance indices such as throughput and packet delay are evaluated using the developed models, particularly under the critical real-time traffic condition. Finally, the proposed modelling is applied to traffic rate control for cross-layer networked control system design.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the development of ICD-11 progresses, the Australian Bureau of Statistics is beginning to consider what will be required to successfully implement the new version of the classification. This paper will present early thoughts on the following: building understanding amongst the user community of upcoming changes and the implications of those changes; the need for training of coders and data users; development of analytical methods and conduct of comparability studies; processes to test, accept and implement new or updated coding software; assessment of coding quality; changes to data analyses and reporting processes; updates to regular publications; and assessing the resources required for successful implementation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At first glance, the gallery seems to be empty. Upon entering however, 11:59 reveals itself to be masking tape placed lackadaisically in seemingly geometric forms. Enter the gallery at 11:59 and you would witness the light and shadows correlate with the gestural marks that have been made. Exploring ideas of time, space, gesture, value and mark-making, this work can be interpreted to be overflowing with confidence and/or impotence. It whispers about site and encounters, over-complication and simplicity, and boldness and hesitancy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction: Emerging evidence reveals that early feeding practices are associated with child food intake, eating behaviour and weight status. This cross-sectional analysis examined the association between maternal infant feeding practices/beliefs and child weight in Australian infants aged 11-17 months. Methods: Participants were 293 first-time mothers of healthy term infants (144 boys, mean age 14±1 months) enrolled in the NOURISH RCT. Mothers self-reported infant feeding practices and beliefs using the Infant Feeding Questionnaire (Baughcum, 2001). Anthropometric data were also measured at baseline (infants aged 4 months). Multiple regression analysis was used, adjusting for infant age, gender, birth weight, infant feeding mode (breast vs. formula), maternal perceptions of infant weight status, pre-pregnancy weight, weight concern, age and education. Results: The average child weight-for-age z-score (WAZ) was 0.62±0.83 (range:-1.56 to 2.94) and the mean change in WAZ (WAZ change) from 4 to 14 months was 0.62±0.69 (range:-1.50 to 2.76). Feeding practices/beliefs partly explained child WAZ (R2=0.28) and WAZ change (R2=0.13) in the adjusted models. While child weight status at 14 months was inversely associated with responsive feeding (e.g. baby feeds whenever she wants, feeding to stop baby being unsettled) (β=-0.104, p=0.06) and maternal concern about the child becoming underweight (β=-0.224, p<0.001), it was positively associated with mother’s concern about child overweight (β=0.197, p<0.05). Birth weight, infant’s age, maternal weight concern and perceiving her child as overweight were significant covariates. WAZ change was only significantly associated with responsive feeding (β=-0.147, p<0.05). Conclusion: Responsive feeding may be an important strategy to promote healthy child weight.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Syntaxin 11 (Stx11) is a SNARE protein enriched in cells of the immune system. Loss or mutation of Stx11 results in familial hemophagocytic lymphohistiocytosis type-4 (FHL-4), an autosomal recessive disorder of immune dysregulation characterized by high levels of inflammatory cytokines along with defects in T-cell and natural killer cell function. We show here Stx11 is located on endosomalmembranes including late endosomes and lysosomes in macrophages. While Stx11 did not form a typical trans-SNARE complex, it did bind to the Q-SNARE Vti1b and was able to regulate the availability of Vti1b to form the Q-SNARE complexes Stx6/Stx7/Vtib and Stx7/Stx8/Vti1b. The mutant form of Stx11 sequestered Vti1b from forming the Q-SNARE complex that mediates late endosome to lysosome fusion. Depletion of Stx11 in activated macrophages leads to an accumulation of enlarged late endocytic compartments, increased trafficking to the cell surface and inhibition of late endosome to lysosome fusion. These phenotypes arerescued by the expression of an siRNA-resistant Stx11 construct in Stx11-depleted cells. Our results suggest that by regulating the availability of Vti1b, Stx11 regulates trafficking steps between late endosomes, lysosomes and the cell surface in macrophages.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Concerns regarding students' learning and reasoning in chemistry classrooms are well documented. Students' reasoning in chemistry should be characterized by conscious consideration of chemical phenomenon from laboratory work at macroscopic, molecular/sub-micro and symbolic levels. Further, students should develop metacognition in relation to such ways of reasoning about chemistry phenomena. Classroom change eliciting metacognitive experiences and metacognitive reflection is necessary to shift entrenched views of teaching and learning in students. In this study, Activity Theory is used as the framework for intepreting changes to the rules/customs and tools of the activity systems of two different classes of students taught by the same teacher, Frances, who was teaching chemical equilibrium to those classes in consecutive years. An interpretive methodolgy involving multiple data sources was employed. Frances explicitly changed her pedagogy in the second year to direct students attention to increasingly consider chemical phenomena at the molecular/sub-micro level. Additonally, she asked students not to use the textbook until toward the end of the equilibrium unit and sought to engage them in using their prior knowledge of chemistry to understand their observations from experiments. Frances' changed pedagogy elicited metacognitive experiences and reflection in students and challenged them to reconsider their metacognitive beliefs about learning chemistry and how it might be achieved. While teacher change is essential for science education reform, students are not passive players in the change efforts and they need to be convinced of the viability of teacher pedagogical change in the context of their goals, intentions, and beliefs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Criminologists have mostly followed the criminal law in adopting an apolitical concept of crime. They paid limited attention to both political crime and the political power to criminalise. The article traces efforts to redress this since the 1960s. It nevertheless remained a minority concern, mostly of critical criminology. Yet crime has been politicised in various ways by other developments, also examined in the article. The events of 9/11 have crowned the emergence of crime as a strategic security issue posing a challenge to criminology to engage with politically inspired crime and its control.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since 11 September 2001, Muslim minorities have experienced intensive "othering" in “Western” countries, above all in those US-led anglophone nations which invaded Afghanistan and Iraq to prosecute their "war on terror". This paper examines the cases of Britain and Australia, where whole communities of Muslims have been criminalised as "evil" and a "fifth column" enemy within by media, politicians, the security services and the criminal justice system. Although constituted by disparate ethnic groups, the targeted communities in each of these nations have experienced similar treatment in the State's anti-terrorist measures, as well as ideological responses and everyday racism, making comparable the two cases.