883 resultados para network security
Resumo:
The use of Wireless Sensor Networks (WSNs) for vibration-based Structural Health Monitoring (SHM) has become a promising approach due to many advantages such as low cost, fast and flexible deployment. However, inherent technical issues such as data asynchronicity and data loss have prevented these distinct systems from being extensively used. Recently, several SHM-oriented WSNs have been proposed and believed to be able to overcome a large number of technical uncertainties. Nevertheless, there is limited research verifying the applicability of those WSNs with respect to demanding SHM applications like modal analysis and damage identification. Based on a brief review, this paper first reveals that Data Synchronization Error (DSE) is the most inherent factor amongst uncertainties of SHM-oriented WSNs. Effects of this factor are then investigated on outcomes and performance of the most robust Output-only Modal Analysis (OMA) techniques when merging data from multiple sensor setups. The two OMA families selected for this investigation are Frequency Domain Decomposition (FDD) and data-driven Stochastic Subspace Identification (SSI-data) due to the fact that they both have been widely applied in the past decade. Accelerations collected by a wired sensory system on a large-scale laboratory bridge model are initially used as benchmark data after being added with a certain level of noise to account for the higher presence of this factor in SHM-oriented WSNs. From this source, a large number of simulations have been made to generate multiple DSE-corrupted datasets to facilitate statistical analyses. The results of this study show the robustness of FDD and the precautions needed for SSI-data family when dealing with DSE at a relaxed level. Finally, the combination of preferred OMA techniques and the use of the channel projection for the time-domain OMA technique to cope with DSE are recommended.
Resumo:
The Australasian Information Security Conference (AISC) 2011 was held on 18th-19th January 2011 in Perth, Australia, as a part of the Australasian Computer Science Week 2011. AISC grew out of the Australasian Information Security Workshop and officially changed the name to Australasian Information Security Conference in 2008. The main aim of the AISC is to provide a venue for Australasian and other researchers to present their work on all aspects of information security and promote collaboration between academic and industrial researchers working in this area.
Resumo:
The Australasian Information Security Conference (AISC) 2012 was held at RMIT University in Melbourne, Australia, as a part of the Australasian Computer Science Week, January 30 - February 3, 2012. AISC grew out of the Australasian Information Security Workshop and officially changed the name to Australasian Information Security Conference in 2008. The main aim of the AISC is to provide a venue for researchers to present their work on all aspects of information security and promote collaboration between academic and industrial researchers working in this area.
Resumo:
To harness safe operation of Web-based systems in Web environments, we propose an SSPA (Server-based SHA-1 Page-digest Algorithm) to verify the integrity of Web contents before the server issues an HTTP response to a user request. In addition to standard security measures, our Java implementation of the SSPA, which is called the Dynamic Security Surveillance Agent (DSSA), provides further security in terms of content integrity to Web-based systems. Its function is to prevent the display of Web contents that have been altered through the malicious acts of attackers and intruders on client machines. This is to protect the reputation of organisations from cyber-attacks and to ensure the safe operation of Web systems by dynamically monitoring the integrity of a Web site's content on demand. We discuss our findings in terms of the applicability and practicality of the proposed system. We also discuss its time metrics, specifically in relation to its computational overhead at the Web server, as well as the overall latency from the clients' point of view, using different Internet access methods. The SSPA, our DSSA implementation, some experimental results and related work are all discussed
SWIRLnet : portable anemometer network for wind speed measurements of land-falling tropical cyclones
Resumo:
Wind speed measurement systems are sparse in the tropical regions of Australia. Tropical cyclone wind speeds impacting communities are often ‘guestimated’ from analyzing damaged structures. A re-locatable anemometer system is required to enable measurements of wind speeds. This paper discusses design criteria of the tripods and tie down system, proposed deployment of the anemometers, instrumentation, and data logging. Preliminary assessment of the anemometer response indicates a reliable system for 1 second response, however, it is noted that the Australian building code and wind loading standard uses a moving average time of approximately 0.2 seconds for its wind speed design criteria.
Resumo:
The practice of medicine has always aimed at individualized treatment of disease. The relationship between patient and physician has always been a personal one, and the physician's choice of treatment has been intended to be the best fit for the patient's needs. The necessary pooling/grouping of disease families and their assignment to a number of drugs or treatment methods has, consequently, led to an increase in the number of effective therapies. However, given the heterogeneity of most human diseases, and cancer specifically, it is currently impossible for the treating clinician to effectively predict a patient's response and outcome based on current technologies, much less the idiosyncratic resistances and adverse effects associated with the limited therapeutic options.
Resumo:
Wind speed measurement systems are sparse in the tropical regions of Australia. Given this, tropical cyclone wind speeds impacting communities are seldom measured and often only ‘guestimated’ by analysing the extent of damage to structures. In an attempt to overcome this dearth of data, a re-locatable network of anemometers to be deployed prior to tropical cyclone landfall is currently being developed. This paper discusses design criteria of the network’s tripods and tie down system, proposed deployment of the anemometers, instrumentation and data logging. Preliminary assessment of the anemometer response indicates a reliable system for measuring the spectral component of wind with frequencies of approximately 1 Hz. This system limitation highlights an important difference between the capabilities of modern instrumentation and that of the Dines anemometer (around 0.2 seconds) that was used to develop much of the design criteria within the Australian building code and wind loading standard.
Resumo:
Inhibition of cholesterol export from late endosomes causes cellular cholesterol imbalance, including cholesterol depletion in the trans-Golgi network (TGN). Here, using Chinese hamster ovary (CHO) Niemann-Pick type C1 (NPC1) mutant cell lines and human NPC1 mutant fibroblasts, we show that altered cholesterol levels at the TGN/endosome boundaries trigger Syntaxin 6 (Stx6) accumulation into VAMP3, transferrin, and Rab11-positive recycling endosomes (REs). This increases Stx6/VAMP3 interaction and interferes with the recycling of αVβ3 and α5β1 integrins and cell migration, possibly in a Stx6-dependent manner. In NPC1 mutant cells, restoration of cholesterol levels in the TGN, but not inhibition of VAMP3, restores the steady-state localization of Stx6 in the TGN. Furthermore, elevation of RE cholesterol is associated with increased amounts of Stx6 in RE. Hence, the fine-tuning of cholesterol levels at the TGN-RE boundaries together with a subset of cholesterol-sensitive SNARE proteins may play a regulatory role in cell migration and invasion.
Resumo:
This paper describes research investigating expertise and the types of knowledge used by airport security screeners. It applies a multi method approach incorporating eye tracking, concurrent verbal protocol and interviews. Results show that novice and expert security screeners primarily access perceptual knowledge and experience little difficulty during routine situations. During non-routine situations however, experience was found to be a determining factor for effective interactions and problem solving. Experts were found to use strategic knowledge and demonstrated structured use of interface functions integrated into efficient problem solving sequences. Comparatively, novices experienced more knowledge limitations and uncertainty resulting in interaction breakdowns. These breakdowns were characterised by trial and error interaction sequences. This research suggests that the quality of knowledge security screeners have access to has implications on visual and physical interface interactions and their integration into problem solving sequences. Implications and recommendations for the design of interfaces used in the airport security screening context are discussed. The motivations of recommendations are to improve the integration of interactions into problem solving sequences, encourage development of problem scheme knowledge and to support the skills and knowledge of the personnel that interact with security screening systems.
Resumo:
Cancer can be defined as a deregulation or hyperactivity in the ongoing network of intracellular and extracellular signaling events. Reverse phase protein microarray technology may offer a new opportunity to measure and profile these signaling pathways, providing data on post-translational phosphorylation events not obtainable by gene microarray analysis. Treatment of ovarian epithelial carcinoma almost always takes place in a metastatic setting since unfortunately the disease is often not detected until later stages. Thus, in addition to elucidation of the molecular network within a tumor specimen, critical questions are to what extent do signaling changes occur upon metastasis and are there common pathway elements that arise in the metastatic microenvironment. For individualized combinatorial therapy, ideal therapeutic selection based on proteomic mapping of phosphorylation end points may require evaluation of the patient's metastatic tissue. Extending these findings to the bedside will require the development of optimized protocols and reference standards. We have developed a reference standard based on a mixture of phosphorylated peptides to begin to address this challenge.
Resumo:
This paper examines a buffer scheme to mitigate the negative impacts of power-conditioned loads on network voltage and transient stabilities. The scheme is based on the use of battery energy-storage systems in the buffers. The storage systems ensure that protected loads downstream of the buffers can ride through upstream voltage sags and swells. Also, by controlling the buffers to operate in either constant impedance or constant power modes, power is absorbed or injected by the storage systems. The scheme thereby regulates the rotor-angle deviations of generators and enhances network transient stability. A computational method is described in which the capacity of the storage systems is determined to achieve simultaneously the above dual objectives of load ride-through and stability enhancement. The efficacy of the resulting scheme is demonstrated through numerical examples.