998 resultados para MAC address


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report is the eight deliverable of the Real Time and Predictive Traveller Information project and the third deliverable of the Arterial Travel Time Information sub-project in the Integrated Traveller Information research Domain of the Smart Transport Research Centre. The primary objective of the Arterial Travel Time Information sub-project is to develop algorithms for real-time travel time estimation and prediction models for arterial traffic. Brisbane arterial network is highly equipped with Bluetooth MAC Scanners, which can provide travel time information. Literature is limited with the knowledge on the Bluetooth protocol based data acquisition process and accuracy and reliability of the analysis performed using the data. This report expands the body of knowledge surrounding the use of data from Bluetooth MAC Scanner (BMS) as a complementary traffic data source. A multi layer simulation model named Traffic and Communication Simulation (TCS) is developed. TCS is utilised to model the theoretical properties of the BMS data and analyse the accuracy and reliability of travel time estimation using the BMS data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In speaking at the Cardiac Society this morning, I am conscious of this year’s 60th Anniversary. It is 60 years since motivated and impassioned people travelled to form the organisation that became the Cardiac Society. They started an organisation and a movement of sorts which was joined by many others over the years and which brings us to this room on this morning. This started in 1952. What were you doing in 1952? Where you just born and for some of you were? Others here were not born and may be your parents hadn’t even met yet. I want you to gain a sense of this time, of 60 years ago.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recently there has been significant interest of researchers and practitioners on the use of Bluetooth as a complementary transport data. However, literature is limited with the understanding of the Bluetooth MAC Scanner (BMS) based data acquisition process and the properties of the data being collected. This paper first provides an insight on the BMS data acquisition process. Thereafter, it discovers the interesting facts from analysis of the real BMS data from both motorway and arterial networks of Brisbane, Australia. The knowledge gained is helpful for researchers and practitioners to understand the BMS data being collected which is vital to the development of management and control algorithms using the data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The need to address on-road motorcycle safety in Australia is important due to the disproportionately high percentage of riders and pillions killed and injured each year. One approach to preventing motorcycle-related injury is through training and education. However, motorcycle rider training lacks empirical support as an effective road safety countermeasure to reduce crash involvement. Previous reviews have highlighted that risk-taking is a contributing factor in many motorcycle crashes, rather than merely a lack of vehicle-control skills (Haworth & Mulvihill, 2005; Jonah, Dawson & Bragg, 1982; Watson et al, 1996). Hence, though the basic vehicle-handling skills and knowledge of road rules that are taught in most traditional motorcycle licence training programs may be seen as an essential condition of safe riding, they do not appear to be sufficient in terms of crash reduction. With this in mind there is considerable scope for the improvement of program focus and content for rider training and education. This program of research examined an existing traditional pre-licence motorcycle rider training program and formatively evaluated the addition of a new classroom-based module to address risky riding; the Three Steps to Safer Riding program. The pilot program was delivered in the real world context of the Q-Ride motorcycle licensing system in the state of Queensland, Australia. Three studies were conducted as part of the program of research: Study 1, a qualitative investigation of delivery practices and student learning needs in an existing rider training course; Study 2, an investigation of the extent to which an existing motorcycle rider training course addressed risky riding attitudes and motives; and Study 3, a formative evaluation of the new program. A literature review as well as the investigation of learning needs for motorcyclists in Study 1 aimed to inform the initial planning and development of the Three Steps to Safer Riding program. Findings from Study 1 suggested that the training delivery protocols used by the industry partner training organisation were consistent with a learner-centred approach and largely met the learning needs of trainee riders. However, it also found that information from the course needs to be reinforced by on-road experiences for some riders once licensed and that personal meaning for training information was not fully gained until some riding experience had been obtained. While this research informed the planning and development of the new program, a project team of academics and industry experts were responsible for the formulation of the final program. Study 2 and Study 3 were conducted for the purpose of formative evaluation and program refinement. Study 2 served primarily as a trial to test research protocols and data collection methods with the industry partner organisation and, importantly, also served to gather comparison data for the pilot program which was implemented with the same rider training organisation. Findings from Study 2 suggested that the existing training program of the partner organisation generally had a positive (albeit small) effect on safety in terms of influencing attitudes to risk taking, the propensity for thrill seeking, and intentions to engage in future risky riding. However, maintenance of these effects over time and the effects on riding behaviour remain unclear due to a low response rate upon follow-up 24 months after licensing. Study 3 was a formative evaluation of the new pilot program to establish program effects and possible areas for improvement. Study 3a examined the short term effects of the intervention pilot on psychosocial factors underpinning risky riding compared to the effects of the standard traditional training program (examined in Study 2). It showed that the course which included the Three Steps to Safer Riding program elicited significantly greater positive attitude change towards road safety than the existing standard licensing course. This effect was found immediately following training, and mean scores for attitudes towards safety were also maintained at the 12 month follow-up. The pilot program also had an immediate effect on other key variables such as risky riding intentions and the propensity for thrill seeking, although not significantly greater than the traditional standard training. A low response rate at the 12 month follow-up unfortunately prevented any firm conclusions being drawn regarding the impact of the pilot program on self-reported risky riding once licensed. Study 3a further showed that the use of intermediate outcomes such as self-reported attitudes and intentions for evaluation purposes provides insights into the mechanisms underpinning risky riding that can be changed by education and training. A multifaceted process evaluation conducted in Study 3b confirmed that the intervention pilot was largely delivered as designed, with course participants also rating most aspects of training delivery highly. The complete program of research contributed to the overall body of knowledge relating to motorcycle rider training, with some potential implications for policy in the area of motorcycle rider licensing. A key finding of the research was that psychosocial influences on risky riding can be shaped by structured education that focuses on awareness raising at a personal level and provides strategies to manage future riding situations. However, the formative evaluation was mainly designed to identify areas of improvement for the Three Steps to Safer Riding program and found several areas of potential refinement to improve future efficacy of the program. This included aspects of program content, program delivery, resource development, and measurement tools. The planned future follow-up of program participants' official crash and traffic offence records over time may lend further support for the application of the program within licensing systems. The findings reported in this thesis offer an initial indication that the Three Steps to Safer Riding is a useful resource to accompany skills-based training programs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a model for the generation of a MAC tag using a stream cipher. The input message is used indirectly to control segments of the keystream that form the MAC tag. Several recent proposals can be considered as instances of this general model, as they all perform message accumulation in this way. However, they use slightly different processes in the message preparation and finalisation phases. We examine the security of this model for different options and against different types of attack, and conclude that the indirect injection model can be used to generate MAC tags securely for certain combinations of options. Careful consideration is required at the design stage to avoid combinations of options that result in susceptibility to forgery attacks. Additionally, some implementations may be vulnerable to side-channel attacks if used in Authenticated Encryption (AE) algorithms. We give design recommendations to provide resistance to these attacks for proposals following this model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents the results of task 3 of the ShARe/CLEF eHealth Evaluation Lab 2013. This evaluation lab focuses on improving access to medical information on the web. The task objective was to investigate the effect of using additional information such as the discharge summaries and external resources such as medical ontologies on the IR effectiveness. The participants were allowed to submit up to seven runs, one mandatory run using no additional information or external resources, and three each using or not using discharge summaries.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

One of the concerns about the use of Bluetooth MAC Scanner (BMS) data, especially from urban arterial, is the bias in the travel time estimates from multiple Bluetooth devices being transported by a vehicle. For instance, if a bus is transporting 20 passengers with Bluetooth equipped mobile phones, then the discovery of these mobile phones by BMS will be considered as 20 different vehicles, and the average travel time along the corridor estimated from the BMS data will be biased with the travel time from the bus. This paper integrates Bus Vehicle Identification system with BMS network to empirically evaluate such bias, if any. The paper also reports an interesting finding on the uniqueness of MAC IDs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"Firstly, I thank you sincerely for your kind invitation and warm welcome to Sri Lanka and to this national HR conference, I particularly acknowledge the initiative of Chairman of the Technical Committee, Dr Asoka Jinadasa in making it possible for me to be here, and to offer this contribution to your conference. I congratulate you on assembling such an impressive array of talent to aid your discussions. I hope I can add usefully to your conversations. In particular I congratulate you on developing such a good definition of HRM: “A strategic and integrated approach in acquisition, development and engagement of talent using relevant tools, with proper policies, products and processes in creating a conducive climate towards achieving organizational excellence and societal well-being” To me, that means that HR has to add value to the organisation, through an integrated set of tools, competencies, and policies, which are all consistent with the business model..."

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Over the past 20 years the labour market, workforce and work organisation of most if not all industrialised countries have been significantly refashioned by the increased use of more flexible work arrangements, variously labelled as precarious employment or contingent work. There is now a substantial and growing body of international evidence that many of these arrangements are associated with a significant deterioration in occupational health and safety (OHS), using a range of measures such as injury rates, disease, hazard exposures and work-related stress. Moreover, there is an emerging body of evidence that these arrangements pose particular problems for conventional regulatory regimes. Recognition of these problems has aroused the concern of policy makers - especially in Europe, North America and Australia - and a number of responses have been adopted in terms of modifying legislation, producing new guidance material and codes of practice and revised enforcement practices. This article describes one such in itiative in Australia with regard to home-based clothing workers. The regulatory strategy developed in one Australian jurisdiction (and now being ‘exported’ into others) seeks to counter this process via contractual tracking mechanisms to follow the work, tie in liability and shift overarching legal responsibility to the top of the supply chain. The process also entails the integration of minimum standards relating to wages, hours and working conditions; OHS and access to workers’ compensation. While home-based clothing manufacture represents a very old type of ‘flexible’ work arrangement, it is one that regulators have found especially difficult to address. Further, the elaborate multi-tiered subcont racting and diffuse work locations found in this industry are also characteristic of newer forms of contingent work in other industries (such as some telework) and the regulatory challenges they pose (such as the tendency of elaborate supply chains to attenuate and fracture statutory responsibilities, at least in terms of the attitudes and behaviour of those involved).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study started with the aim to develop an approach that will help designers create interfaces that are more intuitive for older adults to use. Two objectives were set for this study: 1) to investigate one of the possible strategies for developing intuitive interfaces for older people, and; 2) to investigate factors that could interfere with intuitive use. This paper briefly presents the outcome of the two experiments and how it has lead to the development of an adaptable interface design model that will help designers develop interfaces that are intuitive to learn and, over time, intuitive to use for users with diverse technology prior experience and cognitive abilities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent times a widespread consensus on the reality and gravity of anthropogenic climate change has emerged. Perceived inadequacies in the Australian government’s legal and policy responses to climate change issues have resulted in environmental activists increasingly turning to the courts as a strategy to promote greater action to address adverse climate impacts. The efficacy of this strategy for achieving climate goals is limited by the time and expense of litigating, the restrictions inherent in environmental law administrative challenges, and the possibility that judicial decisions may be overruled by the legislature. To date, climate change litigation in Australia has met with varied success, yet its significance extends beyond the court room as an important mechanism for raising public, political and commercial awareness about climate change issues. Ultimately, however, the types of far-reaching changes needed to mitigate and manage adverse climate impacts require strong regulatory backing. The most effective approach to addressing the complex challenges posed by climate change is a coordinated suite of regulatory measures spearheaded by the Federal Government.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The NLM stream cipher designed by Hoon Jae Lee, Sang Min Sung, Hyeong Rag Kim is a strengthened version of the LM summation generator that combines linear and non-linear feedback shift registers. In recent works, the NLM cipher has been used for message authentication in lightweight communication over wireless sensor networks and for RFID authentication protocols. The work analyses the security of the NLM stream cipher and the NLM-MAC scheme that is built on the top of the NLM cipher. We first show that the NLM cipher suffers from two major weaknesses that lead to key recovery and forgery attacks. We prove the internal state of the NLM cipher can be recovered with time complexity about nlog7×2, where the total length of internal state is 2⋅n+22⋅n+2 bits. The attack needs about n2n2 key-stream bits. We also show adversary is able to forge any MAC tag very efficiently by having only one pair (MAC tag, ciphertext). The proposed attacks are practical and break the scheme with a negligible error probability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Licence sanctions including suspension, disqualification, or revocation have been effective in reducing recidivism and crash rates among those convicted of driving while under the influence of alcohol and/or drugs. Nonetheless, studies have indicated that many offenders continue to drive while they are unlicensed. Consequently, more recent attention has been given to vehicle sanctions that separate the offender from their vehicle. Vehicle based interventions focus on incapacitating the vehicle or separating it from the offending driver rather than relying on the threat of further sanctions to encourage compliance. Following on from a previous review conducted by Dr. Ron Christie (2006) for VicRoads, which examined the effectiveness of vehicle based sanctions in deterring unlicensed driving, this report considers the effectiveness of the aforementioned vehicle based sanctions for addressing drink driving.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although many immigrants enter the United States with a healthy body weight, this health advantage disappears the longer they reside in the United States. To better understand the complexities of obesity change within a cultural framework, a community-based participatory research (CBPR) approach, PhotoVoice, was used, focusing on physical activity among Muslim Somali women. The CBPR partnership was formed to identify barriers and resources to engaging in physical activity with goals of advocacy and program development. Muslim Somali women (n = 8) were recruited to participate, trained and provided cameras, and engaged in group discussions about the scenes they photographed. Participants identified several barriers, including safety concerns, minimal culturally appropriate resources, and financial constraints. Strengths included public resources and a community support system. The CBPR process identified opportunities and challenges to collaboration and dissemination processes. The findings laid the framework for subsequent program development and community engagement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While bullying is often researched in children and adolescents and in the workplace, there is limited research in the emerging adult population, especially in students at university. This is perhaps due to the fact that bullying generally declines as children and young people become older (e.g., Nansel et al., 2001; Wang, Iannotti, & Nansel, 2009). Although this may indeed be the case, it is apparent that bullying does not completely abate when students graduate from high school. The plethora of literature evidencing workplace bullying, clearly shows that bullying continues beyond the school years (e.g., Hoel, Cooper, & Faragher, 2001; Privitera & Campbell, 2009). With the advent of cyberbullying in the last decade it has been shown that this particular form of bullying may not decrease with age as does traditional bullying (Kowalski & Limber, 2007; Raskauskas & Stoltz, 2007). In addition, we know there is a spike in prevalence rates during the transition from primary to high school Pellegrini et al., 2010), so it is possible that new university students are at an increased risk of victimisation due to this being a transition period. This has led to some interest in examining the prevalence of bullying in the emerging adult population at universities (Chapell, Casey, & de la Cruz, 2004; Pontzer, 2010; Wensley & Campbell, 2009).