922 resultados para GSI (Grid Security Infrastructure)
Resumo:
Improved information on the product quality of the plantation resource is needed to allow businesses to consider investing in the development of value-adding processing facilities. These facilities are likely to require customised design that optimises the utilisation of future small diameter plantation hardwood logs. This log resource will become available as wood supply in Queensland transitions from native forests to 100% from sustainable plantations. This resource will be controlled by plantations established prior to 2000. A survey of the three main growers (former Forest Enterprises Australia Pty Ltd, former Forestry Corporation of New South Wales, Hancock Queensland Plantation Pty Ltd) revealed that C. citriodora subsp.variegata – CCV (28.0%), Eucalyptus dunnii (27.5%), E. pilularis (23.0%), E. grandis (11.3%) and E. cloeziana –GMS (7.1%) were the most widely planted species in the southern Queensland and northern New South Wales subtropical hardwood estate and would potentially dominate the supply of plantation hardwoods to sawmill processing facilities.
Resumo:
The prospect of climate change has revived both fears of food insecurity and its corollary, market opportunities for agricultural production. In Australia, with its long history of state-sponsored agricultural development, there is renewed interest in the agricultural development of tropical and sub-tropical northern regions. Climate projections suggest that there will be less water available to the main irrigation systems of the eastern central and southern regions of Australia, while net rainfall could be sustained or even increase in the northern areas. Hence, there could be more intensive use of northern agricultural areas, with the relocation of some production of economically important commodities such as vegetables, rice and cotton. The problem is that the expansion of cropping in northern Australia has been constrained by agronomic and economic considerations. The present paper examines the economics, at both farm and regional level, of relocating some cotton production from the east-central irrigation areas to the north where there is an existing irrigation scheme together with some industry and individual interest in such relocation. Integrated modelling and expert knowledge are used to examine this example of prospective climate change adaptation. Farm-level simulations show that without adaptation, overall gross margins will decrease under a combination of climate change and reduction in water availability. A dynamic regional Computable General Equilibrium model is used to explore two scenarios of relocating cotton production from south east Queensland, to sugar-dominated areas in northern Queensland. Overall, an increase in real economic output and real income was realized when some cotton production was relocated to sugar cane fallow land/new land. There were, however, large negative effects on regional economies where cotton production displaced sugar cane. It is concluded that even excluding the agronomic uncertainties, which are not examined here, there is unlikely to be significant market-driven relocation of cotton production.
Resumo:
Wireless technologies are continuously evolving. Second generation cellular networks have gained worldwide acceptance. Wireless LANs are commonly deployed in corporations or university campuses, and their diffusion in public hotspots is growing. Third generation cellular systems are yet to affirm everywhere; still, there is an impressive amount of research ongoing for deploying beyond 3G systems. These new wireless technologies combine the characteristics of WLAN based and cellular networks to provide increased bandwidth. The common direction where all the efforts in wireless technologies are headed is towards an IP-based communication. Telephony services have been the killer application for cellular systems; their evolution to packet-switched networks is a natural path. Effective IP telephony signaling protocols, such as the Session Initiation Protocol (SIP) and the H 323 protocol are needed to establish IP-based telephony sessions. However, IP telephony is just one service example of IP-based communication. IP-based multimedia sessions are expected to become popular and offer a wider range of communication capabilities than pure telephony. In order to conjoin the advances of the future wireless technologies with the potential of IP-based multimedia communication, the next step would be to obtain ubiquitous communication capabilities. According to this vision, people must be able to communicate also when no support from an infrastructured network is available, needed or desired. In order to achieve ubiquitous communication, end devices must integrate all the capabilities necessary for IP-based distributed and decentralized communication. Such capabilities are currently missing. For example, it is not possible to utilize native IP telephony signaling protocols in a totally decentralized way. This dissertation presents a solution for deploying the SIP protocol in a decentralized fashion without support of infrastructure servers. The proposed solution is mainly designed to fit the needs of decentralized mobile environments, and can be applied to small scale ad-hoc networks or also bigger networks with hundreds of nodes. A framework allowing discovery of SIP users in ad-hoc networks and the establishment of SIP sessions among them, in a fully distributed and secure way, is described and evaluated. Security support allows ad-hoc users to authenticate the sender of a message, and to verify the integrity of a received message. The distributed session management framework has been extended in order to achieve interoperability with the Internet, and the native Internet applications. With limited extensions to the SIP protocol, we have designed and experimentally validated a SIP gateway allowing SIP signaling between ad-hoc networks with private addressing space and native SIP applications in the Internet. The design is completed by an application level relay that permits instant messaging sessions to be established in heterogeneous environments. The resulting framework constitutes a flexible and effective approach for the pervasive deployment of real time applications.
Resumo:
Major infrastructure and construction (MIC) projects are those with significant traffic or environmental impact, of strategic and regional significance and high sensitivity. The decision making process of schemes of this type is becoming ever more complicated, especially with the increasing number of stakeholders involved and their growing tendency to defend their own varied interests. Failing to address and meet the concerns and expectations of stakeholders may result in project failures. To avoid this necessitates a systematic participatory approach to facilitate decision-making. Though numerous decision models have been established in previous studies (e.g. ELECTRE methods, the analytic hierarchy process and analytic network process) their applicability in the decision process during stakeholder participation in contemporary MIC projects is still uncertain. To resolve this, the decision rule approach is employed for modeling multi-stakeholder multi-objective project decisions. Through this, the result is obtained naturally according to the “rules” accepted by any stakeholder involved. In this sense, consensus is more likely to be achieved since the process is more convincing and the result is easier to be accepted by all concerned. Appropriate “rules”, comprehensive enough to address multiple objectives while straightforward enough to be understood by multiple stakeholders, are set for resolving conflict and facilitating consensus during the project decision process. The West Kowloon Cultural District (WKCD) project is used as a demonstration case and a focus group meeting is conducted in order to confirm the validity of the model established. The results indicate that the model is objective, reliable and practical enough to cope with real world problems. Finally, a suggested future research agenda is provided.
Resumo:
In this paper I conduct a Foucauldian discourse analysis of a political speech given by Brendon Nelson in 2006 when the Australian Minister for Defence in the Howard Coalition Government. The speech connects conceptualisations of terror, globalization, education and literacy as part of a whole of government security strategy. The analysis examines this speech as an example of a liberal way of governing the conduct of diverse and unpredictable populations. My analysis suggests that the apparatus of government has been strategically used in order to biopolitically contain the rise of complex social forces and protect a set of homogenous cultural values. The purposes of education and uses of literacy are seen as instruments for the inscription of a coded set of values understood to be synonymous with civil society.
Resumo:
Any plan for decoupling growth from fossil fuel use needs to prioritise locally appropriate, integrated and multi-faceted outcomes. Such transitions can be highly complex, given the physical and institutional characteristics of existing electricity infrastructure as well as various financial, technical and practical challenges. This Chapter applies a whole systems perspective to developing decoupling solutions, reflecting on the Dutch Sustainable Technology Development Program and Townsville City (Queensland, Australia). Key aspects considered include the need for demonstrating outcomes to multiple stakeholders, using pilot projects with integrated monitoring and evaluation, fostering collaborative approaches to energy management, cultivating cultures of ‘learning by doing’, and seeking synergies across multiple agendas.
Resumo:
This thesis evaluates the security of Supervisory Control and Data Acquisition (SCADA) systems, which are one of the key foundations of many critical infrastructures. Specifically, it examines one of the standardised SCADA protocols called the Distributed Network Protocol Version 3, which attempts to provide a security mechanism to ensure that messages transmitted between devices, are adequately secured from rogue applications. To achieve this, the thesis applies formal methods from theoretical computer science to formally analyse the correctness of the protocol.
Resumo:
This demonstration highlights the applications of our research work i.e. second generation (Scalable Fault Tolerant Agent Grooming Environment - SAGE) Multi Agent System, Integration of Software Agents and Grid Computing and Autonomous Agent Architecture in the Agent Platform. It is a conference planner application that uses collaborative effort of services deployed geographically wide in different technologies i.e. Software Agents, Grid computing and Web services to perform useful tasks as required. Copyright 2005 ACM.
Resumo:
Distributed Collaborative Computing services have taken over centralized computing platforms allowing the development of distributed collaborative user applications. These applications enable people and computers to work together more productively. Multi-Agent System (MAS) has emerged as a distributed collaborative environment which allows a number of agents to cooperate and interact with each other in a complex environment. We want to place our agents in problems whose solutions require the collation and fusion of information, knowledge or data from distributed and autonomous information sources. In this paper we present the design and implementation of an agent based conference planner application that uses collaborative effort of agents which function continuously and autonomously in a particular environment. The application also enables the collaborative use of services deployed geographically wide in different technologies i.e. Software Agents, Grid computing and Web service. The premise of the application is that it allows autonomous agents interacting with web and grid services to plan a conference as a proxy to their owners (humans). © 2005 IEEE.
Resumo:
An isolated wind power generation scheme using slip ring induction machine (SRIM) is proposed. The proposed scheme maintains constant load voltage and frequency irrespective of the wind speed or load variation. The power circuit consists of two back-to-back connected inverters with a common dc link, where one inverter is directly connected to the rotor side of SRIM and the other inverter is connected to the stator side of the SRIM through LC filter. Developing a negative sequence compensation method to ensure that, even under the presence of unbalanced load, the generator experiences almost balanced three-phase current and most of the unbalanced current is directed through the stator side converter is the focus here. The SRIM controller varies the speed of the generator with variation in the wind speed to extract maximum power. The difference of the generated power and the load power is either stored in or extracted from a battery bank, which is interfaced to the common dc link through a multiphase bidirectional fly-back dc-dc converter. The SRIM control scheme, maximum power point extraction algorithm and the fly-back converter topology are incorporated from available literature. The proposed scheme is both simulated and experimentally verified.
Resumo:
The network scenario is that of an infrastructure IEEE 802.11 WLAN with a single AP with which several stations (STAs) are associated. The AP has a finite size buffer for storing packets. In this scenario, we consider TCP-controlled upload and download file transfers between the STAs and a server on the wireline LAN (e.g., 100 Mbps Ethernet) to which the AP is connected. In such a situation, it is well known that because of packet losses due to finite buffers at the AP, upload file transfers obtain larger throughputs than download transfers. We provide an analytical model for estimating the upload and download throughputs as a function of the buffer size at the AP. We provide models for the undelayed and delayed ACK cases for a TCP that performs loss recovery only by timeout, and also for TCP Reno. The models are validated incomparison with NS2 simulations.
Resumo:
There has been a recent spate of high profile infrastructure cost overruns in Australia and internationally. This is just the tip of a longer-term and more deeply-seated problem with initial budget estimating practice, well recognised in both academic research and industry reviews: the problem of uncertainty. A case study of the Sydney Opera House is used to identify and illustrate the key causal factors and system dynamics of cost overruns. It is conventionally the role of risk management to deal with such uncertainty, but the type and extent of the uncertainty involved in complex projects is shown to render established risk management techniques ineffective. This paper considers a radical advance on current budget estimating practice which involves a particular approach to statistical modelling complemented by explicit training in estimating practice. The statistical modelling approach combines the probability management techniques of Savage, which operate on actual distributions of values rather than flawed representations of distributions, and the data pooling technique of Skitmore, where the size of the reference set is optimised. Estimating training employs particular calibration development methods pioneered by Hubbard, which reduce the bias of experts caused by over-confidence and improve the consistency of subjective decision-making. A new framework for initial budget estimating practice is developed based on the combined statistical and training methods, with each technique being explained and discussed.
Resumo:
The main objective of on-line dynamic security assessment is to take preventive action if required or decide remedial action if a contingency actually occurs. Stability limits are obtained for different contingencies. The mode of instability is one of the outputs of dynamic security analysis. When a power system becomes unstable, it splits initially into two groups of generators, and there is a unique cutset in the transmission network known as critical cutset across which the angles become unbounded. The knowledge of critical cutset is additional information obtained from dynamic security assessment, which can be used for initiating preventive control actions, deciding emergency control actions, and adaptive out-of-step relaying. In this article, an analytical technique for the fast prediction of the critical cutset by system simulation for a short duration is presented. Case studies on the New England ten-generator system are presented. The article also suggests the applications of the identification of critical cutsets.
Resumo:
A comprehensive study was conducted on potential systems of integrated building utilities and transport power solutions that can simultaneously contain rising electricity, hot water and personal transport costs for apartment residents. The research developed the Commuter Energy and Building Utilities System (CEBUS) and quantified the economic, social and environmental benefits of incorporating such a system in future apartment developments. A decision support tool was produced to assist the exploration of the CEBUS design variants. A set of implementation guidelines for CEBUS was also developed for the property development industry.