817 resultados para Intrusion Detection, Computer Security, Misuse
Resumo:
"B-213963"--Prelim. p.
Resumo:
"B-213963."
Resumo:
"B-229223"--p. [1]
Resumo:
Seawater intrusion in coastal agricultural areas due to groundwater abstraction is a major environmental problem along the northeastern coast of Australia. Management options are being explored using numerical modelling, however, questions remain concerning the appropriate level of sophistication in models, choice of seaward boundary conditions, and how to accommodate heterogeneity and data uncertainty. The choice of seaward boundary condition is important since it affects the amount of salt transported into the aquifers and forms the focus of the present study. The impact of this boundary condition is illustrated for the seawater-intrusion problem in the Gooburrum aquifers, which occur within Tertiary sedimentary strata. A two-dimensional variable-density groundwater and solute-transport model was constructed using the computer code 2DFEMFAT (Cheng et al. 1998). The code was tested against an experiment for a steady-state freshwater-saltwater interface and against the Elder (Elder 1967) free-convection problem. Numerical simulations show that the imposition of the commonly-used equivalent hydrostatic freshwater heads, combined with a constant salt concentration at the seaward boundary, results in overestimated seawater intrusion in the lower Gooburrum aquifer. Since the imposition of this boundary condition allows water flow across the boundary, which subsequently takes salt into the aquifer, a careful check is essential to estimate whether too much mass of salt is introduced.
Resumo:
In 3 experiments, the authors examined the role of memory for prior instances for making relative judgments in conflict detection. Participants saw pairs of aircraft either repeatedly conflict with each other or pass safely before being tested on new aircraft pairs, which varied in similarity to the training pairs. Performance was influenced by the similarity between aircraft pairs. Detection time was faster when a conflict pair resembled a pair that had repeatedly conflicted. Detection time was slower, and participants missed conflicts, when a conflict pair resembled a pair that had repeatedly passed safely. The findings identify aircraft features that are used as inputs into the memory decision process and provide an indication of the processes involved in the use of memory for prior instances to make relative judgments.
Resumo:
Electronic communications devices intended for government or military applications must be rigorously evaluated to ensure that they maintain data confidentiality. High-grade information security evaluations require a detailed analysis of the device's design, to determine how it achieves necessary security functions. In practice, such evaluations are labour-intensive and costly, so there is a strong incentive to find ways to make the process more efficient. In this paper we show how well-known concepts from graph theory can be applied to a device's design to optimise information security evaluations. In particular, we use end-to-end graph traversals to eliminate components that do not need to be evaluated at all, and minimal cutsets to identify the smallest group of components that needs to be evaluated in depth.
Resumo:
Automatic signature verification is a well-established and an active area of research with numerous applications such as bank check verification, ATM access, etc. This paper proposes a novel approach to the problem of automatic off-line signature verification and forgery detection. The proposed approach is based on fuzzy modeling that employs the Takagi-Sugeno (TS) model. Signature verification and forgery detection are carried out using angle features extracted from box approach. Each feature corresponds to a fuzzy set. The features are fuzzified by an exponential membership function involved in the TS model, which is modified to include structural parameters. The structural parameters are devised to take account of possible variations due to handwriting styles and to reflect moods. The membership functions constitute weights in the TS model. The optimization of the output of the TS model with respect to the structural parameters yields the solution for the parameters. We have also derived two TS models by considering a rule for each input feature in the first formulation (Multiple rules) and by considering a single rule for all input features in the second formulation. In this work, we have found that TS model with multiple rules is better than TS model with single rule for detecting three types of forgeries; random, skilled and unskilled from a large database of sample signatures in addition to verifying genuine signatures. We have also devised three approaches, viz., an innovative approach and two intuitive approaches using the TS model with multiple rules for improved performance. (C) 2004 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved.
Resumo:
Although computer technology is central to the operation of the modern welfare state, there has been little analysis of its role or of the factors shaping the way in which it is used. Using data generated by expert informants from 13 OECD countries, this paper provides an indicative comparison of the aims of computerization in national social security systems over a 15-year period from 1985 to 2000. The paper seeks to identify and explain patterns in the data and outlines and examines four hypotheses. Building on social constructivist accounts of technology, the first three hypotheses attribute variations in the aims of computerization to different welfare state regimes, forms of capitalism, and structures of public administration. The fourth hypothesis, which plays down the importance of social factors, assumes that computerization is adopted as a means of improving operational efficiency and generating expenditure savings. The findings suggest that, in all 13 countries, computerization was adopted in the expectation that it would lead to increased productivity and higher standards of performance, thus providing most support for the fourth hypothesis. However, variations between countries suggest that the sociopolitical values associated with different welfare state regimes have also had some effect in shaping the ways in which computer technology has been used in national social security systems.
Resumo:
This correspondence considers block detection for blind wireless digital transmission. At high signal-to-noise ratio (SNR), block detection errors are primarily due to the received sequence having multiple possible decoded sequences with the same likelihood. We derive analytic expressions for the probability of detection ambiguity written in terms of a Dedekind zeta function, in the zero noise case with large constellations. Expressions are also provided for finite constellations, which can be evaluated efficiently, independent of the block length. Simulations demonstrate that the analytically derived error floors exist at high SNR.
Resumo:
Background: Study of the course of substance misuse and daily tobacco use in first-episode psychosis may enhance detection and treatment of these substance-related problems. Methods: This 15-month follow-up study examined the course of substance misuse and daily tobacco use in 103 individuals treated for first-episode psychosis. Results: Three-quarters (72.6%) of patients with lifetime substance misuse, or half (51.5%) of all patients, continued substance misuse (primarily cannabis) during the 15-month follow-up period. There was a significant reduction in the rate of any substance misuse (70.9% versus 53.4%) but not daily tobacco use (76.7% versus 75.7%) between baseline and 15-month follow-up. Patients who continued substance misuse showed a significant reduction in the severity and frequency of substance use between baseline and follow-up. Patients who continued substance misuse were more likely to be younger, male and single, less likely to have completed secondary school, and more likely to have had more severe cannabis use prior to entry to treatment compared to patients who ceased substance misuse. Discussion: A significant proportion of young patients treated for first-episode psychosis are at risk of mental and physical health problems associated with substance misuse and/or regular tobacco use. (c) 2005 Elsevier B.V. All rights reserved.
Resumo:
Communications devices for government or military applications must keep data secure, even when their electronic components fail. Combining information flow and risk analyses could make fault-mode evaluations for such devices more efficient and cost-effective.
Resumo:
User requirements of multimedia authentication are various. In some cases, the user requires an authentication system to monitor a set of specific areas with respective sensitivity while neglecting other modification. Most current existing fragile watermarking schemes are mixed systems, which can not satisfy accurate user requirements. Therefore, in this paper we designed a sensor-based multimedia authentication architecture. This system consists of sensor combinations and a fuzzy response logic system. A sensor is designed to strictly respond to given area tampering of a certain type. With this scheme, any complicated authentication requirement can be satisfied, and many problems such as error tolerant tamper method detection will be easily resolved. We also provided experiments to demonstrate the implementation of the sensor-based system