876 resultados para Future in common
Resumo:
Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pairwise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighboring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools.
Resumo:
We find a robust relationship between motor vehicle ownership, its interaction with legal heritage and obesity in OECD countries. Our estimates indicate that an increase of 100 motor vehicles per thousand residents is associated with about a 6% point increase in obesity in common law countries, whereas it has a much smaller or insignificant impact in civil law countries. These relations hold whether we examine trend data and simple correlations, or conduct cross-section or panel data regression analysis. Our results suggest that obesity rises with motor vehicle ownership in countries following a common law tradition where individual liberty is encouraged, whereas the link is small or statistically non-existent in countries with a civil law background where the rights of the individual tend to be circumscribed by the power of the state.
Resumo:
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pair wise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighbouring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighbouring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools. Comparison to probabilistic schemes shows that our combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
Secure communications in distributed Wireless Sensor Networks (WSN) operating under adversarial conditions necessitate efficient key management schemes. In the absence of a priori knowledge of post-deployment network configuration and due to limited resources at sensor nodes, key management schemes cannot be based on post-deployment computations. Instead, a list of keys, called a key-chain, is distributed to each sensor node before the deployment. For secure communication, either two nodes should have a key in common in their key-chains, or they should establish a key through a secure-path on which every link is secured with a key. We first provide a comparative survey of well known key management solutions for WSN. Probabilistic, deterministic and hybrid key management solutions are presented, and they are compared based on their security properties and re-source usage. We provide a taxonomy of solutions, and identify trade-offs in them to conclude that there is no one size-fits-all solution. Second, we design and analyze deterministic and hybrid techniques to distribute pair-wise keys to sensor nodes before the deployment. We present novel deterministic and hybrid approaches based on combinatorial design theory and graph theory for deciding how many and which keys to assign to each key-chain before the sensor network deployment. Performance and security of the proposed schemes are studied both analytically and computationally. Third, we address the key establishment problem in WSN which requires key agreement algorithms without authentication are executed over a secure-path. The length of the secure-path impacts the power consumption and the initialization delay for a WSN before it becomes operational. We formulate the key establishment problem as a constrained bi-objective optimization problem, break it into two sub-problems, and show that they are both NP-Hard and MAX-SNP-Hard. Having established inapproximability results, we focus on addressing the authentication problem that prevents key agreement algorithms to be used directly over a wireless link. We present a fully distributed algorithm where each pair of nodes can establish a key with authentication by using their neighbors as the witnesses.
Resumo:
This paper reports on the implementation of a non-invasive electroencephalography-based brain-computer interface to control functions of a car in a driving simulator. The system is comprised of a Cleveland Medical Devices BioRadio 150 physiological signal recorder, a MATLAB-based BCI and an OKTAL SCANeR advanced driving experience simulator. The system utilizes steady-state visual-evoked potentials for the BCI paradigm, elicited by frequency-modulated high-power LEDs and recorded with the electrode placement of Oz-Fz with Fz as ground. A three-class online brain-computer interface was developed and interfaced with an advanced driving simulator to control functions of the car, including acceleration and steering. The findings are mainly exploratory but provide an indication of the feasibility and challenges of brain-controlled on-road cars for the future, in addition to a safe, simulated BCI driving environment to use as a foundation for research into overcoming these challenges.
Resumo:
Despite significant research, there is still little agreement over how to define safety culture or of what it is comprised. Due to this lack of agreement, much of the safety culture research has little more than safety management strategies in common. There is, however, a degree of acceptance of the close relationship between safety culture and organisational culture. Organisational culture can be described using traditional views of culture drawn from the anthropology and cultural psychology literature. However, the safety culture literature rarely ventures beyond organisational culture into discussions of these more traditional concepts of culture. There is a need to discuss how these concepts of culture can be applied to safety culture to provide greater understanding of safety culture and additional means by which to approach safety in the workplace. This review explores how three traditional conceptualisations of culture; the normative, anthropological and pragmatist conceptualisations, can and have been be applied to safety culture. Finally the review proposes a synthesised conceptualisation of safety culture which can be used to provide greater depth and practical applicability of safety culture, by increasing our understanding of the interactions between cultural and contextual variables in a given workplace and the effect they have on safety.
Resumo:
An increasing body of research is highlighting the involvement of illicit drugs in many road fatalities. Deterrence theory has been a core conceptual framework underpinning traffic enforcement as well as interventions designed to reduce road fatalities. Essentially the effectiveness of deterrence-based approaches is predicated on perceptions of certainty, severity, and swiftness of apprehension. However, much less is known about how the awareness of legal sanctions can impact upon the effectiveness of deterrence mechanisms and whether promoting such detection methods can increase the deterrent effect. Nevertheless, the implicit assumption is that individuals aware of the legal sanctions will be more deterred. This study seeks to explore how awareness of the testing method impacts upon the effectiveness of deterrence-based interventions and intentions to drug drive again in the future. In total, 161 participants who reported drug driving in the previous six months took part in the current study. The results show that awareness of testing had a small effect upon increasing perceptions of the certainty of apprehension and severity of punishment. However, awareness was not a significant predictor of intentions to drug drive again in the future. Importantly, higher levels of drug use were a significant predictor of intentions to drug drive in the future. Whilst awareness does have a small effect on deterrence variables, the influence of levels of drug use seems to reduce any deterrent effect.
Resumo:
Practitioners from both the upstream oil and gas industry and the space and satellite sector have repeatedly noted several striking similarities between the two industries over the years, which have in turn resulted in many direct comparisons in the media and industry press. The two sectors have previously worked together and shared ideas in ways that have yielded some important breakthroughs, but relatively little sharing or cross-pollination has occurred in the area of asset maintenance. This is somewhat surprising in light of the fact that here, too, the sectors have much in common. This paper accordingly puts forward the viewpoint that the upstream oil and gas industry could potentially make significant improvements in asset maintenance—specifically, with regard to offshore platforms and remote pipelines—by selectively applying some aspects of the maintenance strategies and philosophies that have been learned in the space and satellite sector. The paper then offers a research agenda toward accelerating the rate of learning and sharing between the two industries in this domain, and concludes with policy recommendations that could facilitate this kind of cross-industry learning.
Resumo:
Regular physical activity (PA) in youth has numerous immediate and long-term health benefits. With several studies indicating low levels of youth PA globally, schools settings have become increasingly critical settings for youth health promotion strategies. The role of physical education (PE) teachers has long been considered central to the facilitation of such strategies. However, PE teachers have a selfreported lack of knowledge, skills, understanding, and competence to successfully implement these strategies. Tertiary education programs are fundamental to adequately preparing, and shaping the attitudes and philosophies of future PE teachers towards their involvement within these programs. The aim of this investigation was to explore the beliefs and perceptions of future secondary school PE teachers, regarding their potential roles in future school-based programs designed to promote student PA. Fifty-seven (21 males and 36 females) pre-service PE teachers completed a series of open-ended survey questions concerning their perceptions towards participating in school-based PA promotion programs both as preservice during practicum, and prospectively as practising teachers. Responses were analysed thematically. Participants responded both positively and enthusiastically to both questions. Concerns regarding time, and the intention or expectation to participate in such programs were also key themes for pre-service and practicing teacher participation respectively. Critically in this study, participants did not identify any limitations which may impact upon their ability to successfully promote youth PA in school settings. This may indicate that participants have misconceptions regarding their ability to fulfil this role, or conversely, the deficiency of current PE teachers regarding school-based PA promotion has been recognised by the tertiary institution, and addressed to adequately prepare its students. School-based PA promotion is an integral element of pre-service PE teacher education, and ongoing professional development of practicing PE teachers. This trend is expected to continue in the future, in order to address ongoing public health concerns.
Resumo:
To overcome the challenge of finding placements for large student numbers, QUT has partnered with community organisations to enable students to work on community-based projects addressing a community need. Students work in interdisciplinary teams with the community organisation to resolve issues and identify solutions to suit the organisation and client base. This paper will describe the community engaged learning pedagogy that is employed in the subject and will consider the benefits and challenges to law students of working collaboratively and developing community relationships. Critical appraisal of the legal system and the role of lawyers and analysis of the professional and ethical responsibilities legal practitioners is a focus of the subject. Explicit emphasis is placed on developing a sense of social responsibility and inculcating a pro bono ethos. Students attend workshops on topics such as reflective practice, cultural competencies, client solutions, collaborative practice and ethical obligations. This paper will discuss the challenges in creating the new legal clinic subject, benefits to students and community partners, and the results of initial student evaluation of the subject.
Resumo:
Synopsis and review of the Australian prison film Stir (Stephen Wallace, 1980). Includes cast and credits. Stir was written by a former prisoner, Bob Jewson, who had witnessed first hand a notorious riot at Bathurst Gaol in New South Wales in February 1974, the second serious disturbance at the prison in four years. In 1979, prisoners at Parramatta Gaol staged a peaceful sit-in to protest against the New South Wales’ government’s decision not to pursue criminal charges against prison officers for their actions during the 1974 Bathurst riot. The bashing of China Jackson and his cellmate in the first scene of Stir follows a sit-in, with the rest of the film drawing heavily on events around the 1974 Bathurst riot. The director later claimed that he wanted to call the film ‘The Riot at Bathurst Prison’, but was persuaded by nervous bureaucrats to apply the veneer of fiction. The film was retitled Stir, and set in the fictional Gatunga Gaol. Like other films in this genre, Stir draws heavily on the experiences of former prisoners and warders. The Prisoners’ Action Group played a leading role in the planning and preparation of the film, and many former inmates and guards were employed as extras. And in common with many films in this genre, Stir is concerned to humanise the plight of prisoners. Through the depiction of the routines of punishment, violence and retribution by which order in the institution is maintained, and through careful evocation of the atmosphere of fear and intimidation that prisoners (and warders) live with every day, Stir, again like other films in this genre blames the authorities and the system itself for events like those portrayed here. As producer Richard Brennan says in an interview on the 2005 DVD release of the film, “prisons create monsters”...
Resumo:
Synopsis and review of the Australian ocker comedy The Adventures of Barry McKenzie (Bruce Beresford, 1972). Includes cast and credits. The Adventures of Barry McKenzie, adapted from a comic strip written by Barry Humphries, is a landmark film in the revival of Australian cinema. It was the first film to be fully funded by the new federal agency, the Australian Film Development Corporation (AFDC), and its unexpected success (in Britain as well as in Australia) both demonstrated that Australian films could be popular, and helped establish the ‘ocker comedy’ as the first indigenous (sub)genre of the Australian ‘new wave’. In common with other ocker comedies including Stork (Tim Burstall, 1971), and Alvin Purple (Tim Burstall, 1973), The Adventures of Barry McKenzie was derided by critics despite its popular success. But as Tom O’Regan has argued, these films were vitally important in developing a public profile for Australian films, for encouraging private investment in production, and for convincing exhibitors to screen Australian films...
Resumo:
Migraine is a common neurological disorder with a strong genetic basis. However, the complex nature of the disorder has meant that few genes or susceptibility loci have been identified and replicated consistently to confirm their involvement in migraine. Approaches to genetic studies of the disorder have included analysis of the rare migraine subtype, familial hemiplegic migraine with several causal genes identified for this severe subtype. However, the exact genetic contributors to the more common migraine subtypes are still to be deciphered. Genome-wide studies such as genome-wide association studies and linkage analysis as well as candidate genes studies have been employed to investigate genes involved in common migraine. Neurological, hormonal and vascular genes are all considered key factors in the pathophysiology of migraine and are a focus of many of these studies. It is clear that the influence of individual genes on the expression of this disorder will vary. Furthermore, the disorder may be dependent on gene–gene and gene–environment interactions that have not yet been considered. In addition, identifying susceptibility genes may require phenotyping methods outside of the International Classification of Headache Disorders II criteria, such as trait component analysis and latent class analysis to better define the ambit of migraine expression.
Resumo:
Background The methylenetetrahydrofolate reductase (MTHFR) gene variant C677T has been implicated as a genetic risk factor in migraine susceptibility, particularly in Migraine with Aura. Migraine, with and without aura (MA and MO) have many diagnostic characteristics in common. It is postulated that migraine symptomatic characteristics might themselves be influenced by MTHFR. Here we analysed the clinical profile, migraine symptoms, triggers and treatments of 267 migraineurs previously genotyped for the MTHFR C677T variant. The chi-square test was used to analyse all potential relationships between genotype and migraine clinical variables. Regression analyses were performed to assess the association of C677T with all migraine clinical variables after adjusting for gender. Findings The homozygous TT genotype was significantly associated with MA (P < 0.0001) and unilateral head pain (P = 0.002). While the CT genotype was significantly associated with physical activity discomfort (P < 0.001) and stress as a migraine trigger (P = 0.002). Females with the TT genotype were significantly associated with unilateral head pain (P < 0.001) and females with the CT genotype were significantly associated with nausea (P < 0.001), osmophobia (P = 0.002), and the use of natural remedy for migraine treatment (P = 0.003). Conversely, male migraineurs with the TT genotype experienced higher incidences of bilateral head pain (63% vs 34%) and were less likely to use a natural remedy as a migraine treatment compared to female migraineurs (5% vs 20%). Conclusions MTHFR genotype is associated with specific clinical variables of migraine including unilateral head pain, physical activity discomfort and stress.