833 resultados para CRITICAL SYSTEMS


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The advent of personal communication systems within the last decade has depended upon the utilization of advanced digital schemes for source and channel coding and for modulation. The inherent digital nature of the communications processing has allowed the convenient incorporation of cryptographic techniques to implement security in these communications systems. There are various security requirements, of both the service provider and the mobile subscriber, which may be provided for in a personal communications system. Such security provisions include the privacy of user data, the authentication of communicating parties, the provision for data integrity, and the provision for both location confidentiality and party anonymity. This thesis is concerned with an investigation of the private-key and public-key cryptographic techniques pertinent to the security requirements of personal communication systems and an analysis of the security provisions of Second-Generation personal communication systems is presented. Particular attention has been paid to the properties of the cryptographic protocols which have been employed in current Second-Generation systems. It has been found that certain security-related protocols implemented in the Second-Generation systems have specific weaknesses. A theoretical evaluation of these protocols has been performed using formal analysis techniques and certain assumptions made during the development of the systems are shown to contribute to the security weaknesses. Various attack scenarios which exploit these protocol weaknesses are presented. The Fiat-Sharmir zero-knowledge cryptosystem is presented as an example of how asymmetric algorithm cryptography may be employed as part of an improved security solution. Various modifications to this cryptosystem have been evaluated and their critical parameters are shown to be capable of being optimized to suit a particular applications. The implementation of such a system using current smart card technology has been evaluated.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Few today doubt that English Higher Education (HE), like the wider world in which it is located, is in crisis. This is, in part, an economic crisis, as the government response to the current recession seems to be that of introducing the kind of neoliberal ‘shock doctrine’ (Klein 2007) or ‘shock therapy’ (Harvey 2005) that previously resulted in swingeing cuts in public services in Southern nations. Our aim in producing this volume is that these contributions help develop a collective response to the seeming limits of these conditions. We view the strength of these contributions in part as providing palpable evidence of how we and our colleagues are acting with critical hope under current conditions so that we might encourage others to work with us to build, together, more progressive formal and informal education systems that address and seek to redress multiple injustices of the world today.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An efficient Bayesian inference method for problems that can be mapped onto dense graphs is presented. The approach is based on message passing where messages are averaged over a large number of replicated variable systems exposed to the same evidential nodes. An assumption about the symmetry of the solutions is required for carrying out the averages; here we extend the previous derivation based on a replica-symmetric- (RS)-like structure to include a more complex one-step replica-symmetry-breaking-like (1RSB-like) ansatz. To demonstrate the potential of the approach it is employed for studying critical properties of the Ising linear perceptron and for multiuser detection in code division multiple access (CDMA) under different noise models. Results obtained under the RS assumption in the noncritical regime give rise to a highly efficient signal detection algorithm in the context of CDMA; while in the critical regime one observes a first-order transition line that ends in a continuous phase transition point. Finite size effects are also observed. While the 1RSB ansatz is not required for the original problems, it was applied to the CDMA signal detection problem with a more complex noise model that exhibits RSB behavior, resulting in an improvement in performance. © 2007 The American Physical Society.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Mathematics is highly structured and also underpins most of science and engineering. For this reason, it has proved a very suitable domain for Intelligent Tutoring System (ITS) research, with the result that probably more tutoring systems have been constructed for the domain than any other. However, the literature reveals that there still exists no consensus on a credible approach or approaches for the design of such systems, despite numerous documented efforts. Current approaches to the construction of ITSs leave much to be desired. Consequently, existing ITSs in the domain suffer from a considerable number of shortcomings which render them 'unintelligent'. The thesis examines some of the reasons why this is the case. Following a critical review of existing ITSs in the domain, and some pilot studies, an alternative approach to their construction is proposed (the 'iterative-style' approach); this supports an iterative style, and also improves on at least some of the shortcomings of existing approaches. The thesis also presents an ITS for fractions which has been developed using this approach, and which has been evaluated in various ways. It has, demonstrably, improved on many of the limitations of existing ITSs; furthermore, it has been shown to be largely 'intelligent', at least more so than current tutors for the domain. Perhaps more significantly, the tutor has also been evaluated against real students with, so far, very encouraging results. The thesis thus concludes that the novel iterative-style approach is a more credible approach to the construction of ITSs in mathematics than existing techniques.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis addresses the viability of automatic speech recognition for control room systems; with careful system design, automatic speech recognition (ASR) devices can be useful means for human computer interaction in specific types of task. These tasks can be defined as complex verbal activities, such as command and control, and can be paired with spatial tasks, such as monitoring, without detriment. It is suggested that ASR use be confined to routine plant operation, as opposed the critical incidents, due to possible problems of stress on the operators' speech.  It is proposed that using ASR will require operators to adapt a commonly used skill to cater for a novel use of speech. Before using the ASR device, new operators will require some form of training. It is shown that a demonstration by an experienced user of the device can lead to superior performance than instructions. Thus, a relatively cheap and very efficient form of operator training can be supplied by demonstration by experienced ASR operators. From a series of studies into speech based interaction with computers, it is concluded that the interaction be designed to capitalise upon the tendency of operators to use short, succinct, task specific styles of speech. From studies comparing different types of feedback, it is concluded that operators be given screen based feedback, rather than auditory feedback, for control room operation. Feedback will take two forms: the use of the ASR device will require recognition feedback, which will be best supplied using text; the performance of a process control task will require task feedback integrated into the mimic display. This latter feedback can be either textual or symbolic, but it is suggested that symbolic feedback will be more beneficial. Related to both interaction style and feedback is the issue of handling recognition errors. These should be corrected by simple command repetition practices, rather than use error handling dialogues. This method of error correction is held to be non intrusive to primary command and control operations. This thesis also addresses some of the problems of user error in ASR use, and provides a number of recommendations for its reduction.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis includes analysis of disordered spin ensembles corresponding to Exact Cover, a multi-access channel problem, and composite models combining sparse and dense interactions. The satisfiability problem in Exact Cover is addressed using a statistical analysis of a simple branch and bound algorithm. The algorithm can be formulated in the large system limit as a branching process, for which critical properties can be analysed. Far from the critical point a set of differential equations may be used to model the process, and these are solved by numerical integration and exact bounding methods. The multi-access channel problem is formulated as an equilibrium statistical physics problem for the case of bit transmission on a channel with power control and synchronisation. A sparse code division multiple access method is considered and the optimal detection properties are examined in typical case by use of the replica method, and compared to detection performance achieved by interactive decoding methods. These codes are found to have phenomena closely resembling the well-understood dense codes. The composite model is introduced as an abstraction of canonical sparse and dense disordered spin models. The model includes couplings due to both dense and sparse topologies simultaneously. The new type of codes are shown to outperform sparse and dense codes in some regimes both in optimal performance, and in performance achieved by iterative detection methods in finite systems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Using a hydraulic equipment manufacturing plant as the case study, this work explores the problems of systems integration in manufacturing systems design, stressing the behavioural aspects of motivation and participation, and the constraints involved in the proper consideration of the human sub-system. The need for a simple manageable modular organisation structure is illustrated, where it is shown, by reference to systems theory, how a business can be split into semi-autonomous operating units. The theme is the development of a manufacturing system based on an analysis of the business, its market, product, technology and constraints, coupled with a critical survey of modern management literature to develop an integrated systems design to suit a specific company in the current social environment. Society currently moves through a socio-technical revolution with man seeking higher levels of motivation. The transitory environment from an autocratic/paternalistic to a participative operating mode demands systems parameters only found to a limited extent in manufacturing systems today. It is claimed, that modern manufacturing systems design needs to be based on group working, job enrichment, delegation of decision making and reduced job monotony. The analysis shows how negative aspects of cellular manufacture such as lack of flexibility and poor fixed asset utilisation are relatively irrelevant and misleading in the broader context of the need to come to terms with the social stresses imposed on a company operating in the industrial environment of the present and the immediate future.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This review focuses on the use of particulate delivery systems for the purposes of immunization. This includes poly(lactide-co-glycolide) (PLGA), ISCOMs, liposomes, niosomes, virosomes, chitosan, and other biodegradable polymers. These systems are evaluated in terms of their use as carriers for protein subunit and DNA vaccines. There is an extensive focus on recent literature, the understanding of biological interactions, and relation of this to our present understanding of immunological mechanisms of action. In addition, there is consideration of formulation techniques including emulsification, solvent diffusion, DNA complexation, and entrapment. The diversity of formulation strategies presented is a testament to the exponential growth and interest in the area of vaccine delivery systems. A case study for the application of particulate vaccine carriers is assessed in terms of vaccine development and recent insights into the possible design and application of vaccines against two of the most important pathogens that threaten mankind and for which there is a significant need: Mycobacterium tuberculosis and human immunodeficiency virus. This review addresses the rationale for the use of particulate delivery systems in vaccine design in the context of the diversity of carriers for DNA- and protein-based vaccines and their potential for application in terms of the critical need for effective vaccines. © 2005 by Begell House, Inc.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The goal of this roadmap paper is to summarize the state-of-the-art and to identify critical challenges for the systematic software engineering of self-adaptive systems. The paper is partitioned into four parts, one for each of the identified essential views of self-adaptation: modelling dimensions, requirements, engineering, and assurances. For each view, we present the state-of-the-art and the challenges that our community must address. This roadmap paper is a result of the Dagstuhl Seminar 08031 on "Software Engineering for Self-Adaptive Systems," which took place in January 2008. © 2009 Springer Berlin Heidelberg.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Re-emphasizing the need to examine human resource management (HRM) in context, this article builds around four themes. First, it analyses the main issues discussed in the existing literature regarding HRM in the Asian context. Second, it highlights the critical challenges facing HRM function in the region. Third, along with the analysis, it presents an agenda for future research. Fourth, it presents a framework useful for highlighting the context specific nature of Asian HRM functions and the main determinants of HRM policies and practices from a cross-national comparative perspective.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Increasingly users are seen as the weak link in the chain, when it comes to the security of corporate information. Should the users of computer systems act in any inappropriate or insecure manner, then they may put their employers in danger of financial losses, information degradation or litigation, and themselves in danger of dismissal or prosecution. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of inappropriate behaviours, and in so doing, protecting corporate information, is through the formulation and application of a formal ‘acceptable use policy (AUP). Whilst the AUP has attracted some academic interest, it has tended to be prescriptive and overly focussed on the role of the Internet, and there is relatively little empirical material that explicitly addresses the purpose, positioning or content of real acceptable use policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and composition of a sample of authentic policies – taken from the higher education sector – rather than simply making general prescriptions about what they ought to contain. There are two important conclusions to be drawn from this study: (1) the primary role of the AUP appears to be as a mechanism for dealing with unacceptable behaviour, rather than proactively promoting desirable and effective security behaviours, and (2) the wide variation found in the coverage and positioning of the reviewed policies is unlikely to be fostering a coherent approach to security management, across the higher education sector.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Tissue Transglutaminase (TG2) and FXIIIa, members of the transglutaminase (TG) family, catalyses a transamidating reaction and form covalent bond between or within proteins. In bone development, both enzymes expressions correlate with the initial of the mineralisation process by osteoblasts and chondrocytes. Exogenous TG2 also promotes maturation of chondrocytes and mineralisation in pre-osteoblasts. To understand the role of endogenous TG2 in osteoblast mineralisation, the TG2 expression was examined during the human osteoblast (HOB) mineralisation. The expression of the endogenous TG2 increased during the mineralisation, yet, its expression was not essential for mineral deposition due to the compensation effect by other members in the TG family. The extracellular transamidating activity of HOBs was found increased during mineralisation and a shift from FXIIIa dominant- to TG2-dominant crosslinking activity was suggested after differentiation. However, the transamidating activity of both TG2 and FXIIIa were not critical for cell mineralisation. On the other hand, Exogenous TG2 was found to enhance wild type HOB and TG2 knockdown HOB mineral deposition. The transamidating activity of TG2 was not required but most likely a close conformation was essential for this enhancement. Results also demonstrated that exogenous TG2 may activate the ß-catenin pathway through LRP5 receptor thus contribute in cell mineralisation. This enhancement could be abolished by addition of ß-catenin inhibitors. Finally, using of TG2 crosslinked collagen gel for bone and cornea repair was evaluated. Crosslinked collagen gel showed promising results in improving HOB mineralisation, human corneal fibroblast (hCF) proliferation and migration. These effects might be resulted from the trapped TG2 within the collagen matrix and the alteration of matrix topography by TG2.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This research aims to examine the effectiveness of Soft Systems Methodology (SSM) to enable systemic change within local goverment and local NHS environments and to examine the role of the facilitator within this process. Checkland's Mode 2 variant of Soft Systems Methodology was applied on an experimental basis in two environments, Herefordshire Health Authority and Sand well Health Authority. The Herefordshire application used SSM in the design of an Integrated Care Pathway for stroke patients. In Sandwell, SSM was deployed to assist in the design of an Infonnation Management and Technology (IM&T) Strategy for the boundary-spanning Sandwell Partnership. Both of these environments were experiencing significant organisational change as the experiments unfurled. The explicit objectives of the research were: To examine the evolution and development of SSM and to contribute to its further development. To apply the Soft Systems Methodology to change processes within the NHS. To evaluate the potential role of SSM in this wider process of change. To assess the role of the researcher as a facilitator within this process. To develop a critical framework through which the impact of SSM on change might be understood and assessed. In developing these objectives, it became apparent that there was a gap in knowledge relating to SSM. This gap concerns the evaluation of the role of the approach in the change process. The case studies highlighted issues in stakeholder selection and management; the communicative assumptions in SSM; the ambiguous role of the facilitator; and the impact of highly politicised problem environments on the effectiveness of the methodology in the process of change. An augmented variant on SSM that integrates an appropriate (social constructivist) evaluation method is outlined, together with a series of hypotheses about the operationalisation of this proposed method.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Transition P Systems are a parallel and distributed computational model based on the notion of the cellular membrane structure. Each membrane determines a region that encloses a multiset of objects and evolution rules. Transition P Systems evolve through transitions between two consecutive configurations that are determined by the membrane structure and multisets present inside membranes. Moreover, transitions between two consecutive configurations are provided by an exhaustive non-deterministic and parallel application of evolution rules. But, to establish the rules to be applied, it is required the previous calculation of useful, applicable and active rules. Hence, computation of useful evolution rules is critical for the whole evolution process efficiency, because it is performed in parallel inside each membrane in every evolution step. This work defines usefulness states through an exhaustive analysis of the P system for every membrane and for every possible configuration of the membrane structure during the computation. Moreover, this analysis can be done in a static way; therefore membranes only have to check their usefulness states to obtain their set of useful rules during execution.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Transition P Systems are a parallel and distributed computational model based on the notion of the cellular membrane structure. Each membrane determines a region that encloses a multiset of objects and evolution rules. Transition P Systems evolve through transitions between two consecutive configurations that are determined by the membrane structure and multisets present inside membranes. Moreover, transitions between two consecutive configurations are provided by an exhaustive non-deterministic and parallel application of active evolution rules subset inside each membrane of the P system. But, to establish the active evolution rules subset, it is required the previous calculation of useful and applicable rules. Hence, computation of applicable evolution rules subset is critical for the whole evolution process efficiency, because it is performed in parallel inside each membrane in every evolution step. The work presented here shows advantages of incorporating decision trees in the evolution rules applicability algorithm. In order to it, necessary formalizations will be presented to consider this as a classification problem, the method to obtain the necessary decision tree automatically generated and the new algorithm for applicability based on it.