875 resultados para Security Studies


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Queensland fruit fly, Bactrocera tryoni (Froggatt), is a polyphagous pest, and many citrus types are included among its hosts. While quantification of citrus host use by B. tryoni is lacking, citrus is generally considered a ‘low pressure’ crop. This paper investigates B. tryoni female oviposition preference and offspring performance in five citrus types; Murcott mandarin (Citrus reticulata), Navel orange and Valencia orange (Citrus sinensis), Eureka lemon (Citrus limon) and yellow grapefruit (Citrus paradisi). Oviposition preference was investigated in laboratory-based choice and no-choice experiments, while immature survival and offspring performance were investigated by infesting fruits in the laboratory and evaluating pupal recovery, pupal emergence and F1 fecundity. Fruit size, Brix level and peel toughness were also measured for correlation with host use. Bactrocera tryoni demonstrated an oviposition preference hierarchy among the citrus fruits tested; Murcott and grapefruit were most preferred for oviposition and lemon the least, while preference for Navel and Valencia was intermediate. Peel toughness was negatively correlated with B. tryoni oviposition preference, while no significant correlations were detected between oviposition and Brix level or fruit size. Immature survival in the tested fruit was very low. Murcott was the best host (21% pupal recovery), while all other citrus types that showed pupal recovery of 6% or lower and no pupae were recovered from Valencia orange. In pupae recovered from Navel orange and lemon, adult eclosion was greatly reduced, while in grapefruit and lemon, no eggs were recovered from F1 adults. Based on these laboratory results, many commercial citrus varieties appear to be poor hosts for B. tryoni and may pose a low post-harvest and quarantine risk. These findings need to be confirmed in the field, as they impact on both pre-harvest and post-harvest countermeasures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We introduce the Network Security Simulator (NeSSi2), an open source discrete event-based network simulator. It incorporates a variety of features relevant to network security distinguishing it from general-purpose network simulators. Compared to the predecessor NeSSi, it was extended with a three-tier plugin architecture and a generic network model to shift its focus towards simulation framework for critical infrastructures. We demonstrate the gained adaptability by different use cases

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Session Initiation Protocol (SIP) is developed to provide advanced voice services over IP networks. SIP unites telephony and data world, permitting telephone calls to be transmitted over Intranets and Internet. Increase in network performance and new mechanisms for guaranteed quality of service encourage this consolidation to provide toll cost savings. Security comes up as one of the most important issues when voice communication and critical voice applications are considered. Not only the security methods provided by traditional telephony systems, but also additional methods are required to overcome security risks introduced by the public IP networks. SIP considers security problems of such a consolidation and provides a security framework. There are several security methods defined within SIP specifications and extensions. But, suggested methods can not solve all the security problems of SIP systems with various system requirements. In this thesis, a Kerberos based solution is proposed for SIP security problems, including SIP authentication and privacy. The proposed solution tries to establish flexible and scalable SIP system that will provide desired level of security for voice communications and critical telephony applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present and analyze several gaze-based graphical password schemes based on recall and cued-recall of grid points; eye-trackers are used to record user's gazes, which can prevent shoulder-surfing and may be suitable for users with disabilities. Our 22-subject study observes that success rate and entry time for the grid-based schemes we consider are comparable to other gaze-based graphical password schemes. We propose the first password security metrics suitable for analysis of graphical grid passwords and provide an in-depth security analysis of user-generated passwords from our study, observing that, on several metrics, user-generated graphical grid passwords are substantially weaker than uniformly random passwords, despite our attempts at designing schemes to improve quality of user-generated passwords.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Chromium oxyhydroxide nanomaterials with narrow size-distribution were synthesised through a simple hydrothermal method. Experimental conditions, such as reaction duration and pH values of the precipitation process and hydrothermal treatment played important roles in determining the nature of the final product chromium oxyhydroxide nanomaterials. The effect of these synthesis parameters were studied with the assistance of X-ray diffraction, scanning electron microscopy, X-ray photoelectron spectroscopy and thermogravimetric analyses. This research has developed a controllable synthesis of Chromium oxyhydroxide nanomaterials from Chromium oxide colloids.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Attributed to the changing social, political and economic landscape of the ‘knowledge economy’, Australian universities are under pressure to produce researchers that have a variety of skills which meet the demands of an increasingly diverse job market. As a consequence, the Australian PhD now includes a range of doctoral degrees. This paper reports on the experiences of two PhD students engaged in an informally managed research higher degree program described in this paper as a Work Integrated Research Higher Degree (WIRHD). Their learning process shares the attributes from both the traditional PhD program and professional doctorates. However, because of the blended nature of the learning contexts, what students need to manage within the WIRHD is much more complicated than the established RHD programs. An exploratory case study approach exploring experiences, benefits, barriers and coping strategies was conducted with the view to develop a preliminary integrative framework that attempts to explain the various contexts that influence the learning experience of WIRHD candidates. The paper concludes with some recommended strategies for helping WIRHD candidates to manage the challenges associated with their learning process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The security of industrial control systems in critical infrastructure is a concern for the Australian government and other nations. There is a need to provide local Australian training and education for both control system engineers and information technology professionals. This paper proposes a postgraduate curriculum of four courses to provide knowledge and skills to protect critical infrastructure industrial control systems. Our curriculum is unique in that it provides security awareness but also the advanced skills required for security specialists in this area. We are aware that in the Australian context there is a cultural gap between the thinking of control system engineers who are responsible for maintaining and designing critical infrastructure and information technology professionals who are responsible for protecting these systems from cyber attacks. Our curriculum aims to bridge this gap by providing theoretical and practical exercises that will raise the awareness and preparedness of both groups of professionals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Extracting and aggregating the relevant event records relating to an identified security incident from the multitude of heterogeneous logs in an enterprise network is a difficult challenge. Presenting the information in a meaningful way is an additional challenge. This paper looks at solutions to this problem by first identifying three main transforms; log collection, correlation, and visual transformation. Having identified that the CEE project will address the first transform, this paper focuses on the second, while the third is left for future work. To aggregate by correlating event records we demonstrate the use of two correlation methods, simple and composite. These make use of a defined mapping schema and confidence values to dynamically query the normalised dataset and to constrain result events to within a time window. Doing so improves the quality of results, required for the iterative re-querying process being undertaken. Final results of the process are output as nodes and edges suitable for presentation as a network graph.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents the details of numerical studies on the shear behaviour and strength of lipped channel beams (LCBs) with stiffened web openings. Over the last couple of decades, cold-formed steel beams have been used extensively in residential, industrial and commercial buildings as primary load bearing structural components. Their shear strengths are considerably reduced when web openings are included for the purpose of locating building services. Our research has shown that shear strengths of LCBs were reduced by up to 70% due to the inclusion of web openings. Hence there is a need to improve the shear strengths of LCBs with web openings. A cost effective way to improve the detrimental effects of a large web opening is to attach appropriate stiffeners around the web openings in order to restore the original shear strength and stiffness of LCBs. Hence numerical studies were undertaken to investigate the shear strengths of LCBs with stiffened web openings. In this research, finite element models of LCBs with stiffened web openings in shear were developed to simulate the shear behaviour and strength of LCBs. Various stiffening methods using plate and LCB stud stiffeners attached to LCBs using screw-fastening were attempted. The developed models were then validated by comparing their results with experimental results and used in parametric studies. Both finite element analysis and experimental results showed that the stiffening arrangements recommended by past re-search for cold-formed steel channel beams are not adequate to restore the shear strengths of LCBs with web openings. Therefore new stiffener arrangements were proposed for LCBs with web openings based on experimental and finite element analysis results. This paper presents the details of finite element models and analyses used in this research and the results including the recommended stiffener arrangements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fire safety of light gauge steel frame (LSF) stud walls is important in the design of buildings. Currently LSF walls are increasingly used in the building industry, and are usually made of cold-formed and thin-walled steel studs that are fire-protected by two layers of plasterboard on both sides. Many experimental and numerical studies have been undertaken to investigate the fire performance of load bearing LSF walls under standard fire conditions. However, the standard time-temperature curve does not represent the fire load present in typical residential and commercial buildings that include considerable amount of thermoplastic materials. Real building fires are unlikely to follow a standard time-temperature curve. However, only limited research has been undertaken to investigate the fire performance of load bearing LSF walls under realistic design fire conditions. Therefore in this research, finite element thermal models of the traditional LSF wall panels without cavity insulation and the new LSF composite wall panels were developed to simulate their fire performance under recently developed realistic design fire curves. Suitable thermal properties were proposed for plasterboards and insulations based on laboratory tests and literature review. The developed models were then validated by comparing their thermal performance results with available results from realistic design fire tests, and were later used in parametric studies. This paper presents the details of the developed finite element thermal models of load bearing LSF wall panels under realistic design fire time-temperature curves and the re-sults. It shows that finite element thermal models can be used to predict the fire performance of load bearing LSF walls with varying configurations of insulations and plasterboards under realistic design fires. Failure times of load bearing LSF walls were also predicted based on the results from finite element thermal analyses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The VESUVIO project aims to provide unique prototype instrumentation at the ISIS-pulsed neutron source and to establish a routine experimental and theoretical program in neutron scattering spectroscopy at eV energies. This instrumentation will be specifically designed for high momentum, , and energy transfer inelastic neutron scattering studies of microscopic dynamical processes in materials and will represent a unique facility for EU researchers. It will allow to derive single-particle kinetic energies and single-particle momentum distributions, n(p), providing additional and/or complementary information to other neutron inelastic spectroscopic techniques.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Context: Anti-Müllerian hormone (AMH) concentration reflects ovarian aging and is argued to be a useful predictor of age at menopause (AMP). It is hypothesized that AMH falling below a critical threshold corresponds to follicle depletion, which results in menopause. With this threshold, theoretical predictions of AMP can be made. Comparisons of such predictions with observed AMP from population studies support the role for AMH as a forecaster of menopause. Objective: The objective of the study was to investigate whether previous relationships between AMH and AMP are valid using a much larger data set. Setting: AMH was measured in 27 563 women attending fertility clinics. Study Design: From these data a model of age-related AMH change was constructed using a robust regression analysis. Data on AMP from subfertile women were obtained from the population-based Prospect-European Prospective Investigation into Cancer and Nutrition (Prospect- EPIC) cohort (n � 2249). By constructing a probability distribution of age at which AMH falls below a critical threshold and fitting this to Prospect-EPIC menopausal age data using maximum likelihood, such a threshold was estimated. Main Outcome: The main outcome was conformity between observed and predicted AMP. Results: To get a distribution of AMH-predicted AMP that fit the Prospect-EPIC data, we found the critical AMH threshold should vary among women in such a way that women with low age-specific AMH would have lower thresholds, whereas women with high age-specific AMH would have higher thresholds (mean 0.075 ng/mL; interquartile range 0.038–0.15 ng/mL). Such a varying AMH threshold for menopause is a novel and biologically plausible finding. AMH became undetectable (�0.2 ng/mL) approximately 5 years before the occurrence of menopause, in line with a previous report. Conclusions: The conformity of the observed and predicted distributions of AMP supports the hypothesis that declining population averages of AMH are associated with menopause, making AMH an excellent candidate biomarker for AMP prediction. Further research will help establish the accuracy of AMH levels to predict AMP within individuals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Australian Business Assessment of Computer User Security (ABACUS) survey is a nationwide assessment of the prevalence and nature of computer security incidents experienced by Australian businesses. This report presents the findings of the survey which may be used by businesses in Australia to assess the effectiveness of their information technology security measures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The availability of health information is rapidly increasing; its expansion and proliferation is inevitable. At the same time, breeding of health information silos is an unstoppable and relentless exercise. Information security and privacy concerns are therefore major barriers in the eHealth socio-eco system. We proposed Information Accountability as a measurable human factor that should eliminate and mitigate security concerns. Information accountability measures would be practicable and feasible if legislative requirements are also embedded. In this context, information accountability constitutes a key component for the development of effective information technology requirements for health information system. Our conceptual approach to measuring human factors related to information accountability in eHealth is presented in this paper with some limitations.