895 resultados para Realistic threat


Relevância:

10.00% 10.00%

Publicador:

Resumo:

"This column is distinguished from previous Impact columns in that it concerns the development tightrope between research and commercial take-up and the role of the LGPL in an open source workflow toolkit produced in a University environment. Many ubiquitous systems have followed this route, (Apache, BSD Unix, ...), and the lessons this Service Oriented Architecture produces cast yet more light on how software diffuses out to impact us all." Michiel van Genuchten and Les Hatton Workflow management systems support the design, execution and analysis of business processes. A workflow management system needs to guarantee that work is conducted at the right time, by the right person or software application, through the execution of a workflow process model. Traditionally, there has been a lack of broad support for a workflow modeling standard. Standardization efforts proposed by the Workflow Management Coalition in the late nineties suffered from limited support for routing constructs. In fact, as later demonstrated by the Workflow Patterns Initiative (www.workflowpatterns.com), a much wider range of constructs is required when modeling realistic workflows in practice. YAWL (Yet Another Workflow Language) is a workflow language that was developed to show that comprehensive support for the workflow patterns is achievable. Soon after its inception in 2002, a prototype system was built to demonstrate that it was possible to have a system support such a complex language. From that initial prototype, YAWL has grown into a fully-fledged, open source workflow management system and support environment

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Large igneous provinces (LIPs) are sites of the most frequently recurring, largest volume basaltic and silicic eruptions in Earth history. These large-volume (N1000 km3 dense rock equivalent) and large-magnitude (NM8) eruptions produce areally extensive (104–105 km2) basaltic lava flow fields and silicic ignimbrites that are the main building blocks of LIPs. Available information on the largest eruptive units are primarily from the Columbia River and Deccan provinces for the dimensions of flood basalt eruptions, and the Paraná–Etendeka and Afro-Arabian provinces for the silicic ignimbrite eruptions. In addition, three large-volume (675– 2000 km3) silicic lava flows have also been mapped out in the Proterozoic Gawler Range province (Australia), an interpreted LIP remnant. Magma volumes of N1000 km3 have also been emplaced as high-level basaltic and rhyolitic sills in LIPs. The data sets indicate comparable eruption magnitudes between the basaltic and silicic eruptions, but due to considerable volumes residing as co-ignimbrite ash deposits, the current volume constraints for the silicic ignimbrite eruptions may be considerably underestimated. Magma composition thus appears to be no barrier to the volume of magma emitted during an individual eruption. Despite this general similarity in magnitude, flood basaltic and silicic eruptions are very different in terms of eruption style, duration, intensity, vent configuration, and emplacement style. Flood basaltic eruptions are dominantly effusive and Hawaiian–Strombolian in style, with magma discharge rates of ~106–108 kg s−1 and eruption durations estimated at years to tens of years that emplace dominantly compound pahoehoe lava flow fields. Effusive and fissural eruptions have also emplaced some large-volume silicic lavas, but discharge rates are unknown, and may be up to an order of magnitude greater than those of flood basalt lava eruptions for emplacement to be on realistic time scales (b10 years). Most silicic eruptions, however, are moderately to highly explosive, producing co-current pyroclastic fountains (rarely Plinian) with discharge rates of 109– 1011 kg s−1 that emplace welded to rheomorphic ignimbrites. At present, durations for the large-magnitude silicic eruptions are unconstrained; at discharge rates of 109 kg s−1, equivalent to the peak of the 1991 Mt Pinatubo eruption, the largest silicic eruptions would take many months to evacuate N5000 km3 of magma. The generally simple deposit structure is more suggestive of short-duration (hours to days) and high intensity (~1011 kg s−1) eruptions, perhaps with hiatuses in some cases. These extreme discharge rates would be facilitated by multiple point, fissure and/or ring fracture venting of magma. Eruption frequencies are much elevated for large-magnitude eruptions of both magma types during LIP-forming episodes. However, in basaltdominated provinces (continental and ocean basin flood basalt provinces, oceanic plateaus, volcanic rifted margins), large magnitude (NM8) basaltic eruptions have much shorter recurrence intervals of 103–104 years, whereas similar magnitude silicic eruptions may have recurrence intervals of up to 105 years. The Paraná– Etendeka province was the site of at least nine NM8 silicic eruptions over an ~1 Myr period at ~132 Ma; a similar eruption frequency, although with a fewer number of silicic eruptions is also observed for the Afro- Arabian Province. The huge volumes of basaltic and silicic magma erupted in quick succession during LIP events raises several unresolved issues in terms of locus of magma generation and storage (if any) in the crust prior to eruption, and paths and rates of ascent from magma reservoirs to the surface.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The transformation of urban spaces that occurs once darkness falls is simultaneously exhilarating and menacing, and over the past 20 months we have investigated the potential for mobile technology to help users manage their personal safety concerns in the city at night. Our findings subverted commonly held notions of vulnerability, with the threat of violence felt equally by men and women. But while women felt protected because of their mobile technology, men dismissed it as digital Man Mace. We addressed this macho design challenge by studying remote engineers in outback Australia to inspire our personal safety design prototype MATE (Mobile Artifact for Taming Environments).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Damage to genetic material represents a persistent and ubiquitous threat to genomic stability. Once DNA damage is detected, a multifaceted signaling network is activated that halts the cell cycle, initiates repair, and in some instances induces apoptotic cell death. In this article, we will review DNA damage surveillance networks, which maintain the stability of our genome, and discuss the efforts underway to identify chemotherapeutic compounds targeting the core components of DNA double-strand breaks (DSB) response pathway. The majority of tumor cells have defects in maintaining genomic stability owing to the loss of an appropriate response to DNA damage. New anticancer agents are exploiting this vulnerability of cancer cells to enhance therapeutic indexes, with limited normal tissue toxicity. Recently inhibitors of the checkpoint kinases Chk1 and Chk2 have been shown to sensitize tumor cells to DNA damaging agents. In addition, the treatment of BRCA1- or BRCA2-deficient tumor cells with poly(ADP-ribose) polymerase (PARP) inhibitors also leads to specific tumor killing. Due to the numerous roles of p53 in genomic stability and its defects in many human cancers, therapeutic agents that restore p53 activity in tumors are the subject of multiple clinical trials. In this article we highlight the proteins mentioned above and catalog several additional players in the DNA damage response pathway, including ATM, DNA-PK, and the MRN complex, which might be amenable to pharmacological interventions and lead to new approaches to sensitize cancer cells to radio- and chemotherapy. The challenge is how to identify those patients most receptive to these treatments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Since the launch of the ‘Clean Delhi, Green Delhi’ campaign in 2003, slums have become a significant social and political issue in India’s capital city. Through this campaign, the state, in collaboration with Delhi’s middle class through the ‘Bhagidari system’ (literally translated as ‘participatory system’), aims to transform Delhi into a ‘world-class city’ that offers a sanitised, aesthetically appealing urban experience to its citizens and Western visitors. In 2007, Delhi won the bid to host the 2010 Commonwealth Games; since then, this agenda has acquired an urgent, almost violent, impetus to transform Delhi into an environmentally friendly, aesthetically appealing and ‘truly international city’. Slums and slum-dwellers, with their ‘filth, dirt, and noise’, have no place in this imagined city. The violence inflicted upon slum-dwellers, including the denial of their judicial rights, is justified on these accounts. In addition, the juridical discourse since 2000 has ‘re-problematised slums as ‘nuisance’. The rising antagonism of the middle-classes against the poor, supported by the state’s ambition to have a ‘world-class city’, has allowed a new rhetoric to situate the slums in the city. These representations articulate slums as homogenised spaces of experience and identity. The ‘illegal’ status of slum-dwellers, as encroachers upon public space, is stretched to involve ‘social, cultural, and moral’ decadence and depravity. This thesis is an ethnographic exploration of everyday life in a prominent slum settlement in Delhi. It sensually examines the social, cultural and political materiality of slums, and the relationship of slums with the middle class. In doing so, it highlights the politics of sensorial ordering of slums as ‘filthy, dirty, and noisy’ by the middle classes to calcify their position as ‘others’ in order to further segregate, exclude and discriminate the slums. The ethnographic experience in the slums, however, highlights a complex sensorial ordering and politics of its own. Not only are the interactions between diverse communities in slums highly restricted and sensually ordained, but the middle class is identified as a sensual ‘other’, and its sensual practices prohibited. This is significant in two ways. First, it highlights the multiplicity of social, cultural experience and engagement in the slums, thereby challenging its homogenised representation. Second, the ethnographic exploration allowed me to frame a distinct sense of self amongst the slums, which is denied in mainstream discourses, and allowed me to identify the slums’ own ’others’, middle class being one of them. This thesis highlights sound – its production, performances and articulations – as an act with social, cultural, and political implications and manifestations. ‘Noise’ can be understood as a political construct to identify ‘others’ – and both slum-dwellers and the middle classes identify different sonic practices as noise to situate the ‘other’ sonically. It is within this context that this thesis frames the position of Listener and Hearer, which corresponds to their social-political positions. These positions can be, and are, resisted and circumvented through sonic practices. For instance, amplification tactics in the Karimnagar slums, which are understood as ‘uncultured, callous activities to just create more noise’ by the slums’ middle-class neighbours, also serve definite purposes in shaping and navigating the space through the slums’ soundscapes, asserting a presence that is otherwise denied. Such tactics allow the residents to define their sonic territories and scope of sonic performances; they are significant in terms of exerting one’s position, territory and identity, and they are very important in subverting hierarchies. The residents of the Karimnagar slums have to negotiate many social, cultural, moral and political prejudices in their everyday lives. Their identity is constantly under scrutiny and threat. However, the sonic cultures and practices in the Karimnagar slums allow their residents to exert a definite sonic presence – which the middle class has to hear. The articulation of noise and silence is an act manifesting, referencing and resisting social, cultural, and political power and hierarchies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the late 1990’s, intense and vigorous debate surrounded the impact of minority communities on Australia’s mainstream society. The rise of far-right populism took the stage with the introduction to the political landscape of Pauline Hanson and her One Nation party, whilst John Howard’s Liberal-National Coalition Government took the fore on debate over immigration issues corresponding with an influx of irregular arrivals. In 2001, following the September 11 terrorist attacks in the United States of America and subsequent attacks on western targets globally, many of these issues continued to be debated through the security posturing that followed. In recent years, much effort has been afforded to countering the threat of terrorism from home grown assailants. The Government has introduced stringent legislative responses whilst researchers have studied social movements and trends within Australian communities, particularly with respect to minorities. In 2008, the Scanlon Foundation, in association with Monash University and various government entities, released its findings into its survey approach to mapping social cohesion in Australia. It identified a number of spheres of exploration which it believed were essential to measuring cohesiveness of Australian communities generally including, economic, political and socio-cultural factors (Markus and Dharmalingam, 2008). This doctoral project report will explore the political sphere as identified in the Mapping Social Cohesion project and apply it to identified minority ethnic communities. The Scanlon Foundation project identified political participation as one of a number of true indicators of social cohesion. This project acknowledges that democracy in Australia is represented predominantly by two political entities representing a vast majority of constituents under a compulsory voting regime. This essay will identify the levels of political activism achieved by minority ethnic communities and access to democratic participation within the Australian political structure. It will define a ten year period from 1999 to 2009, identifying trends and issues within minority communities that have proactively and reactively promoted engagement in achieving a political voice, framed within a mainstream-dominated political system. It will research social movements and other influential factors over that period to enrich existing knowledge in relation to political participation rates across Australian communities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Hot spot identification (HSID) plays a significant role in improving the safety of transportation networks. Numerous HSID methods have been proposed, developed, and evaluated in the literature. The vast majority of HSID methods reported and evaluated in the literature assume that crash data are complete, reliable, and accurate. Crash under-reporting, however, has long been recognized as a threat to the accuracy and completeness of historical traffic crash records. As a natural continuation of prior studies, the paper evaluates the influence that under-reported crashes exert on HSID methods. To conduct the evaluation, five groups of data gathered from Arizona Department of Transportation (ADOT) over the course of three years are adjusted to account for fifteen different assumed levels of under-reporting. Three identification methods are evaluated: simple ranking (SR), empirical Bayes (EB) and full Bayes (FB). Various threshold levels for establishing hotspots are explored. Finally, two evaluation criteria are compared across HSID methods. The results illustrate that the identification bias—the ability to correctly identify at risk sites--under-reporting is influenced by the degree of under-reporting. Comparatively speaking, crash under-reporting has the largest influence on the FB method and the least influence on the SR method. Additionally, the impact is positively related to the percentage of the under-reported PDO crashes and inversely related to the percentage of the under-reported injury crashes. This finding is significant because it reveals that despite PDO crashes being least severe and costly, they have the most significant influence on the accuracy of HSID.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Video surveillance technology, based on Closed Circuit Television (CCTV) cameras, is one of the fastest growing markets in the field of security technologies. However, the existing video surveillance systems are still not at a stage where they can be used for crime prevention. The systems rely heavily on human observers and are therefore limited by factors such as fatigue and monitoring capabilities over long periods of time. To overcome this limitation, it is necessary to have “intelligent” processes which are able to highlight the salient data and filter out normal conditions that do not pose a threat to security. In order to create such intelligent systems, an understanding of human behaviour, specifically, suspicious behaviour is required. One of the challenges in achieving this is that human behaviour can only be understood correctly in the context in which it appears. Although context has been exploited in the general computer vision domain, it has not been widely used in the automatic suspicious behaviour detection domain. So, it is essential that context has to be formulated, stored and used by the system in order to understand human behaviour. Finally, since surveillance systems could be modeled as largescale data stream systems, it is difficult to have a complete knowledge base. In this case, the systems need to not only continuously update their knowledge but also be able to retrieve the extracted information which is related to the given context. To address these issues, a context-based approach for detecting suspicious behaviour is proposed. In this approach, contextual information is exploited in order to make a better detection. The proposed approach utilises a data stream clustering algorithm in order to discover the behaviour classes and their frequency of occurrences from the incoming behaviour instances. Contextual information is then used in addition to the above information to detect suspicious behaviour. The proposed approach is able to detect observed, unobserved and contextual suspicious behaviour. Two case studies using video feeds taken from CAVIAR dataset and Z-block building, Queensland University of Technology are presented in order to test the proposed approach. From these experiments, it is shown that by using information about context, the proposed system is able to make a more accurate detection, especially those behaviours which are only suspicious in some contexts while being normal in the others. Moreover, this information give critical feedback to the system designers to refine the system. Finally, the proposed modified Clustream algorithm enables the system to both continuously update the system’s knowledge and to effectively retrieve the information learned in a given context. The outcomes from this research are: (a) A context-based framework for automatic detecting suspicious behaviour which can be used by an intelligent video surveillance in making decisions; (b) A modified Clustream data stream clustering algorithm which continuously updates the system knowledge and is able to retrieve contextually related information effectively; and (c) An update-describe approach which extends the capability of the existing human local motion features called interest points based features to the data stream environment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Road deposited solids are a mix of pollutants originating from a range of anthropogenic sources common to urban land uses and soil inputs from surrounding areas. These particles accumulate potentially toxic pollutants thereby posing a threat to receiving waters. Reliable estimation of sources of particulate pollutants in build-up and quantification of particle composition is important for the development of best management practices for stormwater quality mitigation. The research study analysed build-up pollutants from sixteen different urban road surfaces and soil from four background locations. The road surfaces were selected from residential, industrial and commercial land uses from four suburbs in Gold Coast, Australia. Collected build-up samples were analysed for solids load, organic matter and mineralogy. The soil samples were analysed for mineralogy. Quantitative and qualitative analysis of mineralogical data, along with multivariate data analysis were employed to identify the relative source contributions to road deposited solids. The build-up load on road surfaces in different suburbs showed significant differences due to the nature of anthropogenic activities, road texture depth and antecedent dry period. Analysis revealed that build-up pollutants consists primarily of soil derived minerals (60%) and the remainder is composed of traffic generated pollutants and organic matter. Major mineral components detected were quartz and potential clay forming minerals such as albite, microline, chlorite and muscovite. An average of 40-50% of build-up pollutants by weight was made up of quartz. Comparison of the mineral component of build-up pollutants with background soil samples indicated that the minerals primarily originate from surrounding soils. About 2.2% of build-up pollutants were organic matter which originates largely from plant matter. Traffic related pollutants which are potentially toxic to the receiving water environment represented about 30% of the build-up pollutants at the study sites.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Simulating passenger flows within airports is very important as it can provide an indication of queue lengths, bottlenecks, system capacity and overall level of service. To date, visual simulation tools such as agent based models have focused on processing formalities such as check-in, and not incorporate discretionary activities such as duty-free shopping. As airport retail contributes greatly to airport revenue generation, but also has potentially detrimental effects on facilitation efficiency benchmarks, this study developed a simplistic simulation model which captures common duty-free purchasing opportunities, as well as high-level behaviours of passengers. It is argued that such a model enables more realistic simulation of passenger facilitation, and provides a platform for simulating real-time revenue generation as well as more complex passenger behaviours within the airport. Simulations are conducted to verify the suitability of the model for inclusion in the international arrivals process for assessing passenger flow and infrastructure utilization.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resource-intensive, high-carbon, Western lifestyles are frequently criticised as unsustainable and deeply unsatisfying. However, these lifestyles are still attractive to the majority of Westerners and to a high proportion of the developing world’s middle classes. This paper argues that the imminent threat of catastrophic climate change constitutes an immediate political, economic and ethical challenge for citizens of the developed world that cannot be tackled by appeals to asceticism or restraint. There can be no solution to climate change until sustainable conceptions of the good life are developed that those in the west want to live and which others might want to live. While the ultimate solution to climate change is the development of low carbon lifestyles, it is important that government initiatives, governance arrangements and economic incentives support rather than undermine that search. Like the global financial crisis, the climate change crisis also demonstrates what happens when weaknesses in national, corporate and professional governance are exacerbated by weaknesses in global governance. In tackling the latter, it is critical the mistakes now evidenced in the former are avoided – including a rethinking of carbon market and carbon tax alternatives. It is also critical that individuals must take responsibility for their actions as consumers, voters and investors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resource-intensive, high-carbon, Western lifestyles are frequently criticised as unsustainable and deeply unsatisfying. However, these lifestyles are still attractive to the majority of Westerners and to a high proportion of the developing world’s middle classes. This paper argues that the imminent threat of catastrophic climate change constitutes an immediate political, economic and ethical challenge for citizens of the developed world that cannot be tackled by appeals to asceticism or restraint. There can be no solution to climate change until sustainable conceptions of the good life are developed that those in the west want to live and which others might want to live. While the ultimate solution to climate change is the development of low carbon lifestyles, it is important that government initiatives, governance arrangements and economic incentives support rather than undermine that search. Like the global financial crisis, the climate change crisis also demonstrates what happens when weaknesses in national, corporate and professional governance are exacerbated by weaknesses in global governance. In tackling the latter, it is critical the mistakes now evidenced in the former are avoided – including a rethinking of carbon market and carbon tax alternatives. It is also critical that individuals must take responsibility for their actions as consumers, voters and investors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Coral reefs are biologically complex ecosystems that support a wide variety of marine organisms. These are fragile communities under enormous threat from natural and human-based influences. Properly assessing and measuring the growth and health of reefs is essential to understanding impacts of ocean acidification, coastal urbanisation and global warming. In this paper, we present an innovative 3-D reconstruction technique based on visual imagery as a non-intrusive, repeatable, in situ method for estimating physical parameters, such as surface area and volume for efficient assessment of long-term variability. The reconstruction algorithms are presented, and benchmarked using an existing data set. We validate the technique underwater, utilising a commercial-off-the-shelf camera and a piece of staghorn coral, Acropora cervicornis. The resulting reconstruction is compared with a laser scan of the coral piece for assessment and validation. The comparison shows that 77% of the pixels in the reconstruction are within 0.3 mm of the ground truth laser scan. Reconstruction results from an unknown video camera are also presented as a segue to future applications of this research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Academic Skills and Scholarship for Nurses is a pilot programme which addresses academic aspiration and study preparedness of mature aged students. It is a series of four workshops designed and implemented by QUT Library staff in collaboration with Nursing and Midwifery academics, for pre- and post- registration nursing staff within the region of Caboolture, Redcliffe and Kilcoy. The programme extends QUT Library’s learning and study support expertise to the local community. The intended outcomes of the programme are fourfold. Firstly, encourage educational aspirations of mature age students, to establish realistic expectations and practical strategies for beginning tertiary study. Secondly, skills developed will be congruent with lifelong learning principles and continuing professional development requirements of professional nursing bodies. Thirdly, alignment with QUT strategies for widening participation in higher education and finally, strengthen existing relationships between academic and professional staff, and QUT and the local community for the benefit of all stakeholders.