930 resultados para Energy security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We introduce the Network Security Simulator (NeSSi2), an open source discrete event-based network simulator. It incorporates a variety of features relevant to network security distinguishing it from general-purpose network simulators. Compared to the predecessor NeSSi, it was extended with a three-tier plugin architecture and a generic network model to shift its focus towards simulation framework for critical infrastructures. We demonstrate the gained adaptability by different use cases

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Session Initiation Protocol (SIP) is developed to provide advanced voice services over IP networks. SIP unites telephony and data world, permitting telephone calls to be transmitted over Intranets and Internet. Increase in network performance and new mechanisms for guaranteed quality of service encourage this consolidation to provide toll cost savings. Security comes up as one of the most important issues when voice communication and critical voice applications are considered. Not only the security methods provided by traditional telephony systems, but also additional methods are required to overcome security risks introduced by the public IP networks. SIP considers security problems of such a consolidation and provides a security framework. There are several security methods defined within SIP specifications and extensions. But, suggested methods can not solve all the security problems of SIP systems with various system requirements. In this thesis, a Kerberos based solution is proposed for SIP security problems, including SIP authentication and privacy. The proposed solution tries to establish flexible and scalable SIP system that will provide desired level of security for voice communications and critical telephony applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An engaging narrative is maintained throughout this edited collection of articles that address the issue of militarism in international relations. The book seamlessly integrates historical and contemporary perspectives on militarism with theory and relevant international case studies, resulting in a very informative read. The work is comprised of three parts. Part 1 deals with the theorisation of militarism and includes chapters by Anna Stavrianakis and Jan Selby, Martin Shaw, Simon Dalby, and Nicola Short. It covers a range of topics relating to historical and contemporary theories of militarism, geopolitical threat construction, political economy, and the US military’s ‘cultural turn’.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present and analyze several gaze-based graphical password schemes based on recall and cued-recall of grid points; eye-trackers are used to record user's gazes, which can prevent shoulder-surfing and may be suitable for users with disabilities. Our 22-subject study observes that success rate and entry time for the grid-based schemes we consider are comparable to other gaze-based graphical password schemes. We propose the first password security metrics suitable for analysis of graphical grid passwords and provide an in-depth security analysis of user-generated passwords from our study, observing that, on several metrics, user-generated graphical grid passwords are substantially weaker than uniformly random passwords, despite our attempts at designing schemes to improve quality of user-generated passwords.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A composite paraffin-based phase change material (PCM) was prepared by blending composite paraffin and calcined diatomite through the fusion adsorption method. In this study, raw diatomite was purified by thermal treatment in order to improve the adsorption capacity of diatomite, which acted as a carrier material to prepare shape-stabilized PCMs. Two forms of paraffin (paraffin waxes and liquid paraffin) with different melting points were blended together by the fusion method, and the optimum mixed proportion with a suitable phase-transition temperature was obtained through differential scanning calorimetry (DSC) analysis. Then the prepared composite paraffin was adsorbed in calcined diatomite. The prepared paraffin/calcined diatomite composites were characterized by the scanning electron microscope (SEM) and Fourier transformation infrared (FT-IR) analysis techniques. Thermal energy storage properties of the composite PCMs were determined by DSC method. DSC results showed that there was an optimum adsorption ratio between composite paraffin and calcined diatomite and the phase-transition temperature and the latent heat of the composite PCMs were 33.04 ◦C and 89.54 J/g, respectively. Thermal cycling test of composite PCMs showed that the prepared material is thermally reliable and chemically stable. The obtained paraffin/calcined diatomite composites have proper latent heat and melting temperatures, and show practical significance and good potential application value.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Vibration Based Damage Identification Techniques which use modal data or their functions, have received significant research interest in recent years due to their ability to detect damage in structures and hence contribute towards the safety of the structures. In this context, Strain Energy Based Damage Indices (SEDIs), based on modal strain energy, have been successful in localising damage in structuers made of homogeneous materials such as steel. However, their application to reinforced concrete (RC) structures needs further investigation due to the significant difference in the prominent damage type, the flexural crack. The work reported in this paper is an integral part of a comprehensive research program to develop and apply effective strain energy based damage indices to assess damage in reinforced concrete flexural members. This research program established (i) a suitable flexural crack simulation technique, (ii) four improved SEDI's and (iii) programmable sequentional steps to minimise effects of noise. This paper evaluates and ranks the four newly developed SEDIs and existing seven SEDIs for their ability to detect and localise flexural cracks in RC beams. Based on the results of the evaluations, it recommends the SEDIs for use with single and multiple vibration modes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

GPS is a commonly used and convenient technology for determining absolute position in outdoor environments, but its high power consumption leads to rapid battery depletion in mobile devices. An obvious solution is to duty cycle the GPS module, which prolongs the device lifetime at the cost of increased position uncertainty while the GPS is off. This article addresses the trade-off between energy consumption and localization performance in a mobile sensor network application. The focus is on augmenting GPS location with more energy-efficient location sensors to bound position estimate uncertainty while GPS is off. Empirical GPS and radio contact data from a large-scale animal tracking deployment is used to model node mobility, radio performance, and GPS. Because GPS takes a considerable, and variable, time after powering up before it delivers a good position measurement, we model the GPS behaviour through empirical measurements of two GPS modules. These models are then used to explore duty cycling strategies for maintaining position uncertainty within specified bounds. We then explore the benefits of using short-range radio contact logging alongside GPS as an energy-inexpensive means of lowering uncertainty while the GPS is off, and we propose strategies that use RSSI ranging and GPS back-offs to further reduce energy consumption. Results show that our combined strategies can cut node energy consumption by one third while still meeting application-specific positioning criteria.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The security of industrial control systems in critical infrastructure is a concern for the Australian government and other nations. There is a need to provide local Australian training and education for both control system engineers and information technology professionals. This paper proposes a postgraduate curriculum of four courses to provide knowledge and skills to protect critical infrastructure industrial control systems. Our curriculum is unique in that it provides security awareness but also the advanced skills required for security specialists in this area. We are aware that in the Australian context there is a cultural gap between the thinking of control system engineers who are responsible for maintaining and designing critical infrastructure and information technology professionals who are responsible for protecting these systems from cyber attacks. Our curriculum aims to bridge this gap by providing theoretical and practical exercises that will raise the awareness and preparedness of both groups of professionals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Extracting and aggregating the relevant event records relating to an identified security incident from the multitude of heterogeneous logs in an enterprise network is a difficult challenge. Presenting the information in a meaningful way is an additional challenge. This paper looks at solutions to this problem by first identifying three main transforms; log collection, correlation, and visual transformation. Having identified that the CEE project will address the first transform, this paper focuses on the second, while the third is left for future work. To aggregate by correlating event records we demonstrate the use of two correlation methods, simple and composite. These make use of a defined mapping schema and confidence values to dynamically query the normalised dataset and to constrain result events to within a time window. Doing so improves the quality of results, required for the iterative re-querying process being undertaken. Final results of the process are output as nodes and edges suitable for presentation as a network graph.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Neutron Compton scattering (NCS) measurements of the anisotropy of the momentum distribution and the mean Laplacian of the interatomic potential ∇2V have been performed using electron volt neutrons, with wave vector transfers between 24 Å−1 and 98 Å−1. The measured momentum distribution of the atoms displays significantly more anisotropy than a calculation using a model density of states. We have observed anisotropies in ∇2V for the first time. The results suggest that the atomic potential is harmonic within the graphite planes, but anharmonic for vibrations perpendicular to the planes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Deep inelastic neutron scattering measurements on liquid 3He-4He mixtures in the normal phase have been performed on the VESUVIO spectrometer at the ISIS pulsed neutron source at exchanged wave vectors of about q≃120.0Å-1. The neutron Compton profiles J(y) of the mixtures were measured along the T=1.96K isotherm for 3He concentrations, x, ranging from 0.1 to 1.0 at saturated vapor pressures. Values of kinetic energies 〈T〉 of 3He and 4He atoms as a function of x, 〈T〉(x), were extracted from the second moment of J(y). The present determinations of 〈T〉(x) confirm previous experimental findings for both isotopes and, in the case of 3He, a substantial disagreement with theory is found. In particular 〈T〉(x) for the 3He atoms is found to be independent of concentration yielding a value 〈T〉3(x=0.1)≃12K, much lower than the value suggested by the most recent theoretical estimates of approximately 19 K.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Australian Business Assessment of Computer User Security (ABACUS) survey is a nationwide assessment of the prevalence and nature of computer security incidents experienced by Australian businesses. This report presents the findings of the survey which may be used by businesses in Australia to assess the effectiveness of their information technology security measures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Intellectual property is crucial to the promotion of innovation. It provides an incentive to innovate as well as security for investment in innovation. The industries of the 21st century-information technology, biotechnology, pharmaceuticals, communications, education and entertainment – are all knowledge-based. The WTO Agreement on Trade-Related Aspects of Intellectual Property Rights (the TRIPS Agreement), adopted in 1994 at the conclusion of the Uruguay Round of trade negotiations, requires all WTO member countries to provide for the protection and enforcement of intellectual property rights. Having forged a link for the first time between intellectual property rights and the international trading system, the adoption of TRIPS means that any country that aims to participate fully in the global economy needs to understand the role of intellectual property and align its intellectual property laws and practices with the international minimum standards prescribed by TRIPS. However, for developing and least-developed countries, the implementation of intellectual property systems and enforcement mechanisms raises questions and challenges. Does recognition and enforcement of intellectual property serve their development needs and objectives? Does TRIPS encourage or hinder the transfer of technologies to developing and least-developed countries, particularly those that meet urgent needs in areas such as public health, food security, water and energy? What is the effect of TRIPS on developing countries’ access to knowledge and information? Is there scope for flexibility in implementation of TRIPS in pursuit of development strategies?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the problem of maximizing the secure connectivity in wireless ad hoc networks, and analyze complexity of the post-deployment key establishment process constrained by physical layer properties such as connectivity, energy consumption and interference. Two approaches, based on graph augmentation problems with nonlinear edge costs, are formulated. The first one is based on establishing a secret key using only the links that are already secured by shared keys. This problem is in NP-hard and does not accept polynomial time approximation scheme PTAS since minimum cutsets to be augmented do not admit constant costs. The second one extends the first problem by increasing the power level between a pair of nodes that has a secret key to enable them physically connect. This problem can be formulated as the optimal key establishment problem with interference constraints with bi-objectives: (i) maximizing the concurrent key establishment flow, (ii) minimizing the cost. We prove that both problems are NP-hard and MAX-SNP with a reduction to MAX3SAT problem.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report discusses the geologic framework and petroleum geology used to assess undiscovered petroleum resources in the Bohaiwan basin province for the 2000 World Energy Assessment Project of the U.S. Geological Survey. The Bohaiwan basin in northeastern China is the largest petroleum-producing region in China. Two total petroleum systems have been identified in the basin. The first, the Shahejie–Shahejie/Guantao/Wumishan Total Petroleum System, involves oil and gas generated from mature pods of lacustrine source rock that are associated with six major rift-controlled subbasins. Two assessment units are defined in this total petroleum system: (1) a Tertiary lacustrine assessment unit consisting of sandstone reservoirs interbedded with lacustrine shale source rocks, and (2) a pre-Tertiary buried hills assessment unit consisting of carbonate reservoirs that are overlain unconformably by Tertiary lacustrine shale source rocks. The second total petroleum system identified in the Bohaiwan basin is the Carboniferous/Permian Coal–Paleozoic Total Petroleum System, a hypothetical total petroleum system involving natural gas generated from multiple pods of thermally mature coal beds. Low-permeability Permian sandstones and possibly Carboniferous coal beds are the reservoir rocks. Most of the natural gas is inferred to be trapped in continuous accumulations near the center of the subbasins. This total petroleum system is largely unexplored and has good potential for undiscovered gas accumulations. One assessment unit, coal-sourced gas, is defined in this total petroleum system.