960 resultados para high security
Resumo:
It is widely recognized that the quality of design is crucial to the success of the construction or production process and fairly minor changes in design can often result in giving major effects on the cost and efficiency of production and construction as well as on the usefulness, constructability and marketability of the product especially in developing high rise residential property development. The purpose of this study is to suggest a framework model for property manager, considering the sustainable and building quality of property development in high rise residential complex. This paper evaluates and ranks the importance, and frequency of the building quality factors that affect the sustainability and comfort of living for the resident in the selected high rise residential complex in Malaysia. A total of 500 respondents consisting of 20 property managers participated in this study. The respondents were asked to indicate how important each of building equipments in giving them the comfort of living in the selected high rise residential complex. The data were then subjected to the calculation of important indices which enabled the factors to be ranked. After that, a framework model will be developed to make sure all property managers will be guided to prepare their property for the resident to stay in the complex. Accordingly, the living satisfaction by the framework model plays a meaningful role in preparing and developing sustainable and good building quality in Malaysia high rise residential complex.
Resumo:
This article proposes offence-specific guidelines for how prosecutorial discretion should be exercised in cases of voluntary euthanasia and assisted suicide. Similar guidelines have been produced in England and Wales but we consider them to be deficient in a number of respects, including that they lack a set of coherent guiding principles. In light of these concerns, we outline an approach to constructing alternative guidelines that begins with identifying three guiding principles that we argue are appropriate for this purpose: respect for autonomy, the need for high quality prosecutorial decision-making and the importance of public confidence in that decision-making.
Resumo:
This article examines the High Court case of Woods v Multi-Sport that considers the liability of an indoor cricket centre for an injury sustained by a player. It is a good example of how the issue of breach is dealt with in a sports law context and also shows how difficult it can be to determine when a sporting body will in breach of a duty of care owed to its participants.
Resumo:
The R statistical environment and language has demonstrated particular strengths for interactive development of statistical algorithms, as well as data modelling and visualisation. Its current implementation has an interpreter at its core which may result in a performance penalty in comparison to directly executing user algorithms in the native machine code of the host CPU. In contrast, the C++ language has no built-in visualisation capabilities, handling of linear algebra or even basic statistical algorithms; however, user programs are converted to high-performance machine code, ahead of execution. A new method avoids possible speed penalties in R by using the Rcpp extension package in conjunction with the Armadillo C++ matrix library. In addition to the inherent performance advantages of compiled code, Armadillo provides an easy-to-use template-based meta-programming framework, allowing the automatic pooling of several linear algebra operations into one, which in turn can lead to further speedups. With the aid of Rcpp and Armadillo, conversion of linear algebra centered algorithms from R to C++ becomes straightforward. The algorithms retains the overall structure as well as readability, all while maintaining a bidirectional link with the host R environment. Empirical timing comparisons of R and C++ implementations of a Kalman filtering algorithm indicate a speedup of several orders of magnitude.
Resumo:
The recent release of the Gonski Review recognises the decline in Australia’s schooling performances over the last decade, noting in particular a distressing increase in the ‘achievement gap’ affecting students from low SES backgrounds (Gonski, 2012). The report details the need for more quality in teachers throughout the schooling system, particularly within the schools with the greatest academic needs. This paper specifically focuses on a group of high-achieving pre-service English teachers. In their last two years of university study, they participated in a program called Exceptional Teachers for Disadvantaged Schools (ETDS), designed to prepare them to work in disadvantaged or low SES schools. We wanted to capture their experiences of teaching in challenging settings during their practicum, and as they prepared to graduate, we wondered what they now felt about teaching English in low SES schools. Using narrative inquiry, we analysed a range of reflective data to gain insight into such things as their initial motivations for entering the teaching profession and how their preconceived expectations may or may not have shifted after practicum experiences in low SES schools. We encouraged open reflection about how they perceived themselves as English teachers.
Resumo:
ICT (Information and Communication Technology) creates numerous opportunities for teachers to re-think their pedagogies. In subjects like mathematics which draws upon abstract concepts, ICT creates such an opportunity. Instead of a mimetic pedagogical approach, suitably designed activities with ICT can enable learners to engage more proactively with their learning. In this quasi-experimental designed study, ICT was used in teaching mathematics to a group of first year high school students (N=25) in Australia. The control group was taught predominantly through traditional pedagogies (N=22). Most of the variables that had previously impacted on the design of such studies were suitably controlled in this yearlong investigation. Quantitative and qualitative results showed that students who were taught by ICT driven pedagogies benefitted from the experience. Pre and post-test means showed that there was a difference between the treatment and control groups. Of greater significance was that the students (in the treatment group) believed that the technology enabled them to engage more with their learning.
Resumo:
NeSSi (network security simulator) is a novel network simulation tool which incorporates a variety of features relevant to network security distinguishing it from general-purpose network simulators. Its capabilities such as profile-based automated attack generation, traffic analysis and support for detection algorithm plug-ins allow it to be used for security research and evaluation purposes. NeSSi has been successfully used for testing intrusion detection algorithms, conducting network security analysis and developing overlay security frameworks. NeSSi is built upon the agent framework JIAC, resulting in a distributed and extensible architecture. In this paper, we provide an overview of the NeSSi architecture as well as its distinguishing features and briefly demonstrate its application to current security research projects.
Resumo:
Collaborative methods are promising tools for solving complex security tasks. In this context, the authors present the security overlay framework CIMD (Collaborative Intrusion and Malware Detection), enabling participants to state objectives and interests for joint intrusion detection and find groups for the exchange of security-related data such as monitoring or detection results accordingly; to these groups the authors refer as detection groups. First, the authors present and discuss a tree-oriented taxonomy for the representation of nodes within the collaboration model. Second, they introduce and evaluate an algorithm for the formation of detection groups. After conducting a vulnerability analysis of the system, the authors demonstrate the validity of CIMD by examining two different scenarios inspired sociology where the collaboration is advantageous compared to the non-collaborative approach. They evaluate the benefit of CIMD by simulation in a novel packet-level simulation environment called NeSSi (Network Security Simulator) and give a probabilistic analysis for the scenarios.
Resumo:
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pairwise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighboring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools.
Resumo:
Return side streams from anaerobic digesters and dewatering facilities at wastewater treatment plants (WWTPs) contribute a significant proportion of the total nitrogen load on a mainstream process. Similarly, significant phosphate loads are also recirculated in biological nutrient removal (BNR) wastewater treatment plants. Ion exchange using a new material, known by the name MesoLite, shows strong potential for the removal of ammonia from these side streams and an opportunity to concurrently reduce phosphate levels. A pilot plant was designed and operated for several months on an ammonia rich centrate from a dewatering centrifuge at the Oxley Creek WWTP, Brisbane, Australia. The system operated with a detention time in the order of one hour and was operated for between 12 and 24 hours prior to regeneration with a sodium rich solution. The same pilot plant was used to demonstrate removal of phosphate from an abattoir wastewater stream at similar flow rates. Using MesoLite materials, >90% reduction of ammonia was achieved in the centrate side stream. A full-scale process would reduce the total nitrogen load at the Oxley Creek WWTP by at least 18%. This reduction in nitrogen load consequently improves the TKN/COD ratio of the influent and enhances the nitrogen removal performance of the biological nutrient removal process.
Resumo:
HRTEM has been used to examine illite/smectite from the Mancos shale, rectorite from Garland County, Arkansas; illite from Silver Hill, Montana; Na-smectite from Crook County, Wyoming; corrensite from Packwood, Washington; and diagenetic chlorite from the Tuscaloosa formation. Thin specimens were prepared by ion milling, ultra-microtome sectioning and/or grain dispersal on a porous carbon substrate. Some smectite-bearing clays were also examined after intercalation with dodecylamine hydrochloride (DH). Intercalation of smectite with DH proved to be a reliable method of HRTEM imaging of expanded smectite, d(001) 16 A which could then be distinguished from unexpanded illite, d(001) 10 A. Lattice fringes of basal spacings of DH-intercalated rectorite and illite/smectite showed 26 A periodicity. These data support XRD studies which suggest that these samples are ordered, interstratified varieties of illite and smectite. The ion-thinned, unexpanded corrensite sample showed discrete crystallites containing 10 A and 14 A basal spacings corresponding with collapsed smectite and chlorite, respectively. Regions containing disordered layers of chlorite and smectite were also noted. Crystallites containing regular alternations of smectite and chlorite were not common. These HRTEM observations of corrensite did not corroborate XRD data. Particle sizes parallel to the c axis ranged widely for each sample studied, and many particles showed basal dimensions equivalent to > five layers. -J.M.H.
Resumo:
Many commentators have treated the internet as a site of democratic freedom and as a new kind of public sphere. While there are good reasons for optimism, like any social space digital space also has its dark side. Citizens and governments alike have expressed anxiety about cybercrime and cyber-security. In August 2011, the Australian government introduced legislation to give effect to Australia becoming a signatory to the European Convention on Cybercrime (2001). At the time of writing, that legislation is still before the Parliament. In this article, attention is given to how the legal and policy-making process enabling Australia to be compliant with the European Convention on Cybercrime came about. Among the motivations that informed both the development of the Convention in Europe and then the Australian exercise of legislating for compliance with it was a range of legitimate concerns about the impact that cybercrime can have on individuals and communities. This article makes the case that equal attention also needs to be given to ensuring that legislators and policy makers differentiate between legitimate security imperatives and any over-reach evident in the implementation of this legislation that affects rule of law principles, our capacity to engage in democratic practices, and our civic and human rights.
Resumo:
Two samples of boron carbide have been examined using high resolution transmission electron microscopy (HRTEM). A hot pressed B13C2 sample shows a high density of variable width twins normal to (10-11). Subtle shifts or offsets of lattice fringes along the twin plane and normal to (10 5) were also observed. A B4C powder showed little evidence of stacking disorder in crystalline regions.