927 resultados para security network
Resumo:
The objective of this research was to develop a model to estimate future freeway pavement construction costs in Henan Province, China. A comprehensive set of factors contributing to the cost of freeway pavement construction were included in the model formulation. These factors comprehensively reflect the characteristics of region and topography and altitude variation, the cost of labour, material, and equipment, and time-related variables such as index numbers of labour prices, material prices and equipment prices. An Artificial Neural Network model using the Back-Propagation learning algorithm was developed to estimate the cost of freeway pavement construction. A total of 88 valid freeway cases were obtained from freeway construction projects let by the Henan Transportation Department during the period 1994−2007. Data from a random selection of 81 freeway cases were used to train the Neural Network model and the remaining data were used to test the performance of the Neural Network model. The tested model was used to predict freeway pavement construction costs in 2010 based on predictions of input values. In addition, this paper provides a suggested correction for the prediction of the value for the future freeway pavement construction costs. Since the change in future freeway pavement construction cost is affected by many factors, the predictions obtained by the proposed method, and therefore the model, will need to be tested once actual data are obtained.
Resumo:
This paper provides a detailed description of the current Australian e-passport implementation and makes a formal verification using model checking tools CASPER/CSP/FDR. We highlight security issues present in the current e-passport implementation and identify new threats when an e-passport system is integrated with an automated processing systems like SmartGate. Because the current e-passport specification does not provide adequate security goals, to perform a rational security analysis we identify and describe a set of security goals for evaluation of e-passport protocols. Our analysis confirms existing security issues that were previously informally identified and presents weaknesses that exists in the current e-passport implementation.
Resumo:
In many cities around the world, surveillance by a pervasive net of CCTV cameras is a common phenomenon in an attempt to uphold safety and security across the urban environment. Video footage is being recorded and stored, sometimes live feeds are being watched in control rooms hidden from public access and view. In this study, we were inspired by Steve Mann’s original work on sousveillance (surveillance from below) to examine how a network of camera equipped urban screens could allow the residents of Oulu in Finland to collaborate on the safekeeping of their city. An agile, rapid prototyping process led to the design, implementation and ‘in the wild’ deployment of the UbiOpticon screen application. Live video streams captured by web cams integrated at the top of 12 distributed urban screens were broadcast and displayed in a matrix arrangement on all screens. The matrix also included live video streams of two roaming mobile phone cameras. In our field study we explored the reactions of passers-by and users of this screen application that seeks to inverse Bentham’s original panopticon by allowing the watched to be watchers at the same time. In addition to the original goal of participatory sousveillance, the system’s live video feature sparked fun and novel user-led apprlopriations.
Resumo:
The final report for the ARC project "Airports of the Future". It contains the findings and recommendations provided by the various teams to the industry partners.
Resumo:
This study aims to explain the entrepreneurial processes as developments of entrepreneurial networks. As a theoretical framework, this study adopts the theory of experimentally organized economy and competence blocs. As suggested by this theory, entrepreneurs select profitable innovations and commercialise them. Through logistic regressions on the subjective and objective dependent variables, we find that nascent firms’ various activities to network customers, innovators, investors, and employees are positively associated with the business emergence. This study identifies the roles of entrepreneurs and the other actors in the entrepreneurial processes.
Resumo:
The Mekong is the most productive river fishery in the world, and such as, the Mekong River Basin (MRB) is very important to very large human populations across the region as a source of revenue (through fishing and marketing of aquatic resources products) and as the major source for local animal protein. Threats to biodiversity in the MRB, either to the fishery sector itself or to other sectors are a major concern, even though currently, fisheries across this region are still very productive. If not managed properly however, fish population declines will cause significant economic impact and affect livelihoods of local people and will have a major impact on food security and nutrition. Biodiversity declines will undoubtedly affect food security, income and socio-economic status of people in the MRB that depend on aquatic resources. This is an indicator of unsustainable development and hence should be avoided. Genetic diversity (biodiversity) that can be measured using techniques based on DNA markers; refers to variation within and among populations within the same species or reproductive units. In a population, new genetic variation is generated by sexual recombination contributed by individuals with mutations in genes and chromosomes. Over time, populations of a species that are not reproducing together will diverge as differential impacts of selection and genetic drift change their genetic attributes. For mud carp (Henicorhynchus spp.), understanding the status of breeding units in the MRB will be important for their long term persistence, sustainability and for implementing effective management strategies. Earlier analysis of stock structure in two economically important mud carp species (Henicorhynchus siamensis and H. lobatus) in the MRB completed with mtDNA markers identified a number of populations of both species where gene flow had apparently been interrupted or reduced but applying these data directly to management unit identification is potentially compromised because information was only available about female dispersal patterns. The current study aimed to address this problem and to fully assess the extent of current gene flow (nDNA) and reproductive exchange among selected wild populations of two species of carp (Henicorhynchus spp.) of high economic importance in the MRB using combined mtDNA and nDNA markers. In combination, the data can be used to define effective management units for each species. In general, nDNA diversity for H. lobatus (with average allelic richness (A) 7.56 and average heterozygosity (Ho) 0.61) was very similar to that identified for H. siamensis (A = 6.81 and Ho = 0.75). Both mud carp species show significant but low FST estimates among populations as a result of lower genetic diversity among sampled populations compared with genetic diversity within populations that may potentially mask any 'real' population structure. Overall, population genetic structure patterns from mtDNA and nDNA in both Henicorhynchus species were largely congruent. Different population structures however, were identified for the two Henicorhynchus species across the same geographical area. Apparent co-similarity in morphology and co-distribution of these two relatively closely related species does not apparently imply parallel evolutionary histories. Differences in each species population structure likely reflect historical drainage rearrangement of the Mekong River. The data indicate that H. siamensis is likely to have occupied the Mekong system for much longer than has H. lobatus in the past. Two divergent stocks were identified for H. lobatus in the MRB below the Khone Falls while a single stock had been evident in the earlier mtDNA study. This suggests that the two Henicorhynchus species may possess different life history traits and that different patterns of gene flow has likely influenced modern genetic structure in these close congeners. In combination, results of the earlier mtDNA and the current study have implications for effective management of both Henicorhynchus species across the MRB. Currently, both species are essentially treated as a single management unit in this region. This strategy may be appropriate for H. lobatus as a single stock was evident in the main stream of the MRB, but may not be appropriate for H. siamensis as more than a single stock was identified across the same range for this species. Management strategies should consider this difference to conserve overall biodiversity (local discrete populations) and this will include maintaining natural habitat and migration pathways, provision of fish sanctuaries (refuges) and may also require close monitoring of any stock declines, a signal that may require effective recovery strategies.
Resumo:
For the past decade, at least, varieties of small, hand held networked instruments have appeared on the global scene, selling in record numbers, and being utilized by all manner of persons from the old to the young; children, women, men, the wealthy and the poor and in all countries. Their presences bespeak a radical shift in telecommunications infrastructure and the future of communications. They are particularly visible in urban areas where mobile transmission network infrastructure (3G, 4G, cellular and Wi-Fi) is more established and substantial, options more plentiful, and density of populations more dramatic. These end user products—I phones, cell phones, Blackberries, DSi, DS, IPads, Zooms, and others – of the mobile communications industry are the latest, hottest globalized commodities. At the same time, wirelessness, or the state of being wireless, and therefore capable of taking along one's networks, communicating from unlikely spaces, and navigating with GPS, is a complex social, political and economic communications phenomenon of early 21st century life. This thesis examines the specter of being wireless in cities. It lends the entire idea an experimentally envisioned, historical and planned context wherein personalization of media tools is seen both as a design development of corporate, artistic, and military imagination, as well as a profound social phenomenon enabling new forms of sharing, belonging, and urban community. In doing that it asserts the parameters of a new mobile space which, aside from clear benefits to humankind by way of mobility, has reinscribed numerous categories including gender. Moreover, it posits the recognition of other, more nuanced theoretical spaces for complex readings of gender and gendered use, including some instantiation of the notion of 'network' itself as a cyborgian and gendered social form. Additionally, cities are studied as places where technology is not only quickly popularized, but is connected to larger political interests, such as the reading of data, tracking of information, and the new security culture. In so doing the work has been undertaken as an urban spatial analysis and experimental ethnography, utilizing architectural, feminist, techno-utopian, industrial and theoretical literatures as discursive underpinnings from whence understandings and interpretations of mobile space, the mobile office, networked mobility, and personal media have come, linking the space of cities to specific, pioneering urban public art projects in which voice, texting and MMS have been utilized in expressions of ubiquitous networks and urban history. Through numerous examples of techno art, the thesis discusses the 'wireless city' as an emerging cultural, socially constructed economic and spatial entity, both conceived and formed through historic processes of urbanization.
Resumo:
The Macroscopic Fundamental Diagram (MFD) relates space-mean density and flow, and the existence with dynamic features was confirmed in congested urban network in downtown Yokohama with real data set. Since the MFD represents the area-wide network traffic performances, studies on perimeter control strategies and an area traffic state estimation utilizing the MFD concept has been reported. However, limited works have been reported on real world example from signalised arterial network. This paper fuses data from multiple sources (Bluetooth, Loops and Signals) and presents a framework for the development of the MFD for Brisbane, Australia. Existence of the MFD in Brisbane arterial network is confirmed. Different MFDs (from whole network and several sub regions) are evaluated to discover the spatial partitioning for network performance representation. The findings confirmed the usefulness of appropriate network partitioning for traffic monitoring and incident detections. The discussion addressed future research directions.
Resumo:
Voltage rise is the main issue which limits the capacity of Low Voltage (LV) network to accommodate more Renewable Energy (RE) sources. In addition, voltage drop at peak load period is a significant power quality concern. This paper proposes a new robust voltage support strategy based on distributed coordination of multiple distribution static synchronous compensators (DSTATCOMs). The study focuses on LV networks with PV as the RE source for customers. The proposed approach applied to a typical LV network and its advantages are shown comparing with other voltage control strategies.
Resumo:
Security protocols are designed in order to provide security properties (goals). They achieve their goals using cryptographic primitives such as key agreement or hash functions. Security analysis tools are used in order to verify whether a security protocol achieves its goals or not. The analysed property by specific purpose tools are predefined properties such as secrecy (confidentiality), authentication or non-repudiation. There are security goals that are defined by the user in systems with security requirements. Analysis of these properties is possible with general purpose analysis tools such as coloured petri nets (CPN). This research analyses two security properties that are defined in a protocol that is based on trusted platform module (TPM). The analysed protocol is proposed by Delaune to use TPM capabilities and secrets in order to open only one secret from two submitted secrets to a recipient
Resumo:
INTRODUCTION Globally, one-third of food production is lost annually due to negligent authorities. India alone loses some 21 million tonnes of wheat per year even while it has 200 million food-insecure people in the nation. Disturbingly provocative as it may sound, it is amazing how national and international institutions and governments make use of human hunger for their own survival (Raghib 2013). The global food system is increasingly insecure. Challenges to long-term global food security are encapsulated by resource scarcity, environmental degradation, biodiversity loss, climate change, reductions of farm labour and a growing world population. These issues are caused and aggravated by the spread of corporatised and monopolised food systems, dietary change, and urbanisation. These factors have rapidly brought food insecurity under the umbrella of unconventional security threats (Heukelom 2011). For some, humanitarian crises associated with food insecurity, or what has been dubbed ‘the silent tsunami’, is a pending peril, notably for the world’s poorest and most vulnerable people. For others, the food production industry is an emerging market with unprecedented profits. Despite this problem of food scarcity we are witnessing extraordinary ‘food wastage’, notably in North America and Europe, on a scale that would reportedly be capable of feeding the world’s hungry six times over (Stuart 2012). As the opening quotation to this chapter suggests, governments and corporations are deeply involved in the contexts, politics, and resources associated with food related issues. As many economically developed and advanced industrial nations are reporting a rise out of recession, announcements are made by the world’s richest countries that they are to cut $US2 billion per year from food aid. The head of the World Food Aid Programme, Rosette Sheeran, warns that such cuts could result in ‘the loss of a generation’ (Walters 2011). The global food crisis has also reinvigorated debates about agricultural development and genetically modified (GM) food; as well as fuelling debates about poverty, debt and security. This chapter provides a discussion of the political economy of global food debates and explores the threats and opportunities surrounding food production and future food security.
Resumo:
This project was an innovative approach in developing smart coordination of available energy resources to improve the integration level of PV in distribution network. Voltage and loading issues are considered as the main concerns for future electricity grid which need to be avoided using such resources. A distributed control structure was proposed for the resources in distribution network to avoid noted power quality issues.
Resumo:
The termination in the 2014 budget of the ABC’s international television broadcasting contract to run the federal government’s Australia Network service, barely a year into its ten-year term, was hardly a surprise. “Soft power” or “soft diplomacy” initiatives such as the Australia Network and international aid schemes have been hit especially hard in this budget. If, as Treasurer Hockey has repeatedly claimed, this was a budget for the nation, then what do these decisions say about the value this government places on Australia’s international cultural image and internationalism more generally?
Resumo:
This article develops methods for spatially predicting daily change of dissolved oxygen (Dochange) at both sampled locations (134 freshwater sites in 2002 and 2003) and other locations of interest throughout a river network in South East Queensland, Australia. In order to deal with the relative sparseness of the monitoring locations in comparison to the number of locations where one might want to make predictions, we make a classification of the river and stream locations. We then implement optimal spatial prediction (ordinary and constrained kriging) from geostatistics. Because of their directed-tree structure, rivers and streams offer special challenges. A complete approach to spatial prediction on a river network is given, with special attention paid to environmental exceedances. The methodology is used to produce a map of Dochange predictions for 2003. Dochange is one of the variables measured as part of the Ecosystem Health Monitoring Program conducted within the Moreton Bay Waterways and Catchments Partnership.