932 resultados para Policy Networks
Resumo:
A novel intelligent online demand side management system is proposed for peak load management in low-voltage distribution networks. This method uses low-cost controllers with low-bandwidth two-way communication installed in custumers’ premises and at distribution transformers to manage the peak load while maximising customer satisfaction. A multi-objective decision making process is proposed to select the load(s) to be delayed or controlled. The efficacy of the proposed control system is verified by simulation of three different feeder types.
Resumo:
The development of creative industries has been connected to urban development since the end of the 20th century. However, the causality of why creative industries always cluster and develop in certain cities hasn‘t been adequately demonstrated, especially as to how various resources grow, interact and nurture the creative capacity of the locality. Therefore it is vital to observe how the local institutional environment nurtures creative industries and how creative industries consequently change the environment in order to better address the connection between creative industries and localities. In Beijing, the relocation of CCTV, BTV and Phoenix to Chaoyang District raises the possibility of a new era for Chinese media, one in which the stodginess of propaganda content will give way to exciting new forms and genres. The mixing of media companies in an open commercial environment (away from the political power district of Xicheng) holds the promise of more freedom of expression and, ultimately, to a =media capital‘ (Curtin, 2003). These are the dreams of many media practitioners in Beijing. But just how realistic are their expectations? This study adopts the concept of =media capital‘ to demonstrate how participants, including state-media organisations, private media companies and international media conglomerates, are seeking out space and networks to survive in Beijing. Drawing on policy analysis, interviews and case studies, this study illustrates how different agents meet, confront and adapt in Beijing. This study identifies factors responsible for the media industries clustering in China, and argues that Beijing is very likely to be the next Chinese media capital, after enough accumulation and development, although as a lower tier version compared to other media capitals in the world. This study contributes to Curtin‘s =media capital‘ concept, develops his interpretation on the relationship of media industries and the government, and suggests that the influence over the government of media companies and professionals should be acknowledged. Therefore, empirically, this study assists media practitioners in understanding how the Chinese government perceives media industries and, consequently, how media industries are operated in China. The study also reveals that despite the government‘s aspirations, China‘s media industries are still greatly constrained by institutional obstacles. Hence Beijing really needs to speed up its pace on the path of media reform, abandon the old mindset and create more room for creativity. Policy-makers in China should keep in mind that the only choice left to them is to further the reform.
Resumo:
Online social networks can be modelled as graphs; in this paper, we analyze the use of graph metrics for identifying users with anomalous relationships to other users. A framework is proposed for analyzing the effectiveness of various graph theoretic properties such as the number of neighbouring nodes and edges, betweenness centrality, and community cohesiveness in detecting anomalous users. Experimental results on real-world data collected from online social networks show that the majority of users typically have friends who are friends themselves, whereas anomalous users’ graphs typically do not follow this common rule. Empirical analysis also shows that the relationship between average betweenness centrality and edges identifies anomalies more accurately than other approaches.
Resumo:
We introduce a lightweight biometric solution for user authentication over networks using online handwritten signatures. The algorithm proposed is based on a modified Hausdorff distance and has favorable characteristics such as low computational cost and minimal training requirements. Furthermore, we investigate an information theoretic model for capacity and performance analysis for biometric authentication which brings additional theoretical insights to the problem. A fully functional proof-of-concept prototype that relies on commonly available off-the-shelf hardware is developed as a client-server system that supports Web services. Initial experimental results show that the algorithm performs well despite its low computational requirements and is resilient against over-the-shoulder attacks.
Resumo:
The actin microfilament plays a critical role in many cellular processes including embryonic development, wound healing, immune response, and tissue development. It is commonly organized in the form of networks whose mechanical properties change with changes in their architecture due to cell evolution processes. This paper presents a new nonlinear continuum mechanics model of single filamentous actin (F-actin) that is based on nanoscale molecular simulations. Following this continuum model of the single F-actin, mechanical properties of differently architected lamellipodia are studied. The results provide insight that can contribute to the understanding of the cell edge motions of living cells.
Resumo:
Urban design that harnesses natural features (such as green roofs and green walls) to improve design outcomes is gaining significant interest, particularly as there is growing evidence of links between human health and wellbeing, and contact with nature. The use of such natural features can provide many significant benefits, such as reduced urban heat island effects, reduced peak energy demand for building cooling, enhanced stormwater attenuation and management, and reduced air pollution and greenhouse gas emissions. The principle of harnessing natural features as functional design elements, particularly in buildings, is becoming known as ‘biophilic urbanism’. Given the potential for global application and benefits for cities from biophilic urbanism, and the growing number of successful examples of this, it is timely to develop enabling policies that help overcome current barriers to implementation. This paper describes a basis for inquiry into policy considerations related to increasing the application of biophilic urbanism. The paper draws on research undertaken as part of the Sustainable Built Environment National Research Centre (SBEnrc) In Australia in partnership with the Western Australian Department of Finance, Parsons Brinckerhoff, Green Roofs Australasia, and Townsville City Council (CitySolar Program). The paper discusses the emergence of a qualitative, mixed-method approach that combines an extensive literature review, stakeholder workshops and interviews, and a detailed study of leading case studies. It highlights the importance of experiential and contextual learnings to inform biophilic urbanism and provides a structure to distil such learnings to benefit other applications.
Resumo:
Computer worms represent a serious threat for modern communication infrastructures. These epidemics can cause great damage such as financial losses or interruption of critical services which support lives of citizens. These worms can spread with a speed which prevents instant human intervention. Therefore automatic detection and mitigation techniques need to be developed. However, if these techniques are not designed and intensively tested in realistic environments, they may cause even more harm as they heavily interfere with high volume communication flows. We present a simulation model which allows studies of worm spread and counter measures in large scale multi-AS topologies with millions of IP addresses.
Resumo:
Reasoning with uncertain knowledge and belief has long been recognized as an important research issue in Artificial Intelligence (AI). Several methodologies have been proposed in the past, including knowledge-based systems, fuzzy sets, and probability theory. The probabilistic approach became popular mainly due to a knowledge representation framework called Bayesian networks. Bayesian networks have earned reputation of being powerful tools for modeling complex problem involving uncertain knowledge. Uncertain knowledge exists in domains such as medicine, law, geographical information systems and design as it is difficult to retrieve all knowledge and experience from experts. In design domain, experts believe that design style is an intangible concept and that its knowledge is difficult to be presented in a formal way. The aim of the research is to find ways to represent design style knowledge in Bayesian net works. We showed that these networks can be used for diagnosis (inferences) and classification of design style. The furniture design style is selected as an example domain, however the method can be used for any other domain.
Resumo:
"This essay is a critique of the scientific and policy rationales for transnational standardization. It analyzes two examples of policy export: early childhood standards in one of North America’s oldest Indigenous communities and the ongoing development of international standards for university teaching. It examines calls for American education to look to Finland, Canada, and Singapore for models of reform and innovation, focusing on the complex historical, cultural, and political settlements at work in these countries. The author addresses two affiliated challenges: first, the possibility of a principled understanding of evidence and policy in cultural and political-economic context, and second, the possibility of a mediative educational science that might guide policy formation." -- EDUCATIONAL RESEARCHER November 2011 vol. 40 no. 8 367-377
Resumo:
Advances in technology introduce new application areas for sensor networks. Foreseeable wide deployment of mission critical sensor networks creates concerns on security issues. Security of large scale densely deployed and infrastructure less wireless networks of resource limited sensor nodes requires efficient key distribution and management mechanisms. We consider distributed and hierarchical wireless sensor networks where unicast, multicast and broadcast type of communications can take place. We evaluate deterministic, probabilistic and hybrid type of key pre-distribution and dynamic key generation algorithms for distributing pair-wise, group-wise and network-wise keys.
Resumo:
We consider the problem of how to maximize secure connectivity of multi-hop wireless ad hoc networks after deployment. Two approaches, based on graph augmentation problems with nonlinear edge costs, are formulated. The first one is based on establishing a secret key using only the links that are already secured by secret keys. This problem is in NP-hard and does not accept polynomial time approximation scheme PTAS since minimum cutsets to be augmented do not admit constant costs. The second one is based of increasing the power level between a pair of nodes that has a secret key to enable them physically connect. This problem can be formulated as the optimal key establishment problem with interference constraints with bi-objectives: (i) maximizing the concurrent key establishment flow, (ii) minimizing the cost. We show that both problems are NP-hard and MAX-SNP (i.e., it is NP-hard to approximate them within a factor of 1 + e for e > 0 ) with a reduction to MAX3SAT problem. Thus, we design and implement a fully distributed algorithm for authenticated key establishment in wireless sensor networks where each sensor knows only its one- hop neighborhood. Our witness based approaches find witnesses in multi-hop neighborhood to authenticate the key establishment between two sensor nodes which do not share a key and which are not connected through a secure path.
Resumo:
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pair wise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighbouring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighbouring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools. Comparison to probabilistic schemes shows that our combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
Secure communications in distributed Wireless Sensor Networks (WSN) operating under adversarial conditions necessitate efficient key management schemes. In the absence of a priori knowledge of post-deployment network configuration and due to limited resources at sensor nodes, key management schemes cannot be based on post-deployment computations. Instead, a list of keys, called a key-chain, is distributed to each sensor node before the deployment. For secure communication, either two nodes should have a key in common in their key-chains, or they should establish a key through a secure-path on which every link is secured with a key. We first provide a comparative survey of well known key management solutions for WSN. Probabilistic, deterministic and hybrid key management solutions are presented, and they are compared based on their security properties and re-source usage. We provide a taxonomy of solutions, and identify trade-offs in them to conclude that there is no one size-fits-all solution. Second, we design and analyze deterministic and hybrid techniques to distribute pair-wise keys to sensor nodes before the deployment. We present novel deterministic and hybrid approaches based on combinatorial design theory and graph theory for deciding how many and which keys to assign to each key-chain before the sensor network deployment. Performance and security of the proposed schemes are studied both analytically and computationally. Third, we address the key establishment problem in WSN which requires key agreement algorithms without authentication are executed over a secure-path. The length of the secure-path impacts the power consumption and the initialization delay for a WSN before it becomes operational. We formulate the key establishment problem as a constrained bi-objective optimization problem, break it into two sub-problems, and show that they are both NP-Hard and MAX-SNP-Hard. Having established inapproximability results, we focus on addressing the authentication problem that prevents key agreement algorithms to be used directly over a wireless link. We present a fully distributed algorithm where each pair of nodes can establish a key with authentication by using their neighbors as the witnesses.
Resumo:
Widespread adoption by electricity utilities of Non-Conventional Instrument Transformers, such as optical or capacitive transducers, has been limited due to the lack of a standardised interface and multi-vendor interoperability. Low power analogue interfaces are being replaced by IEC 61850 9 2 and IEC 61869 9 digital interfaces that use Ethernet networks for communication. These ‘process bus’ connections achieve significant cost savings by simplifying connections between switchyard and control rooms; however the in-service performance when these standards are employed is largely unknown. The performance of real-time Ethernet networks and time synchronisation was assessed using a scale model of a substation automation system. The test bed was constructed from commercially available timing and protection equipment supplied by a range of vendors. Test protocols have been developed to thoroughly evaluate the performance of Ethernet networks and network based time synchronisation. The suitability of IEEE Std 1588 Precision Time Protocol (PTP) as a synchronising system for sampled values was tested in the steady state and under transient conditions. Similarly, the performance of hardened Ethernet switches designed for substation use was assessed under a range of network operating conditions. This paper presents test methods that use a precision Ethernet capture card to accurately measure PTP and network performance. These methods can be used for product selection and to assess ongoing system performance as substations age. Key findings on the behaviour of multi-function process bus networks are presented. System level tests were performed using a Real Time Digital Simulator and transformer protection relay with sampled value and Generic Object Oriented Substation Events (GOOSE) capability. These include the interactions between sampled values, PTP and GOOSE messages. Our research has demonstrated that several protocols can be used on a shared process bus, even with very high network loads. This should provide confidence that this technology is suitable for transmission substations.
Resumo:
Carbon taxation governance is becoming increasingly popular, further evolving the polluter pays concept already well established in the built environment as a mechanism to controlling and licensing waste generation. This paper presents an explanation of property asset ‘regeneration reuse’ principles following deconstruction, which reduce waste generation associated with the process of demolition, construction and operation. An analysis is made of strategies in Australia and the United Kingdom, comparing jurisdiction targets pertaining to construction and demolition waste that encourage ‘regeneration reuse’. From examination of applicable Australian and United Kingdom legislation, strategic, fiscal and policy that influence on the 'regeneration reuse' of property assets, an evaluation to the variety of issues relevant to waste and resource management practices is reached. The paper concludes that a systematic evaluation framework to selecting building components and structures suitable for reuse after deconstruction must be considered in legislation.