979 resultados para Prospective payment system


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay network. The AIS uses the negative selection algorithm for the selection of detectors (e.g., vectors of features such as CPU utilization, memory usage and network activity). For better detection performance, selection of all possible detectors for a node is desirable but it may not be feasible due to storage and computational overheads. Limiting the number of detectors on the other hand comes with the danger of missing attacks. We present a scheme for the controlled and decentralized division of detector sets where each IDS is assigned to a region of the feature space. We investigate the trade-off between scalability and robustness of detector sets. We address the problem of self-organization in CIDS so that each node generates a distinct set of the detectors to maximize the coverage of the feature space while pairs of nodes exchange their detector sets to provide a controlled level of redundancy. Our contribution is twofold. First, we use Symmetric Balanced Incomplete Block Design, Generalized Quadrangles and Ramanujan Expander Graph based deterministic techniques from combinatorial design theory and graph theory to decide how many and which detectors are exchanged between which pair of IDS nodes. Second, we use a classical epidemic model (SIR model) to show how properties from deterministic techniques can help us to reduce the attack spread rate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study explored the dynamic performance of an innovative Hybrid Composite Floor Plate System (HCFPS), composed of Polyurethane (PU) core, outer layers of Glass–fibre Reinforced Cement (GRC) and steel laminates at tensile regions, using experimental testing and Finite Element (FE) modelling. Experimental testing included heel impact and walking tests for 3200 mm span HCFPS panels. FE models of the HCFPS were developed using the FE program ABAQUS and validated with experimental results. HCFPS is a light-weight high frequency floor system with excellent damping ratio of 5% (bare floor) due to the central PU core. Parametric studies were conducted using the validated FE models to investigate the dynamic response of the HCFPS and to identify characteristics that influence acceleration response under human induced vibration in service. This vibration performance was compared with recommended acceptable perceptibility limits. The findings of this study show that HCFPS can be used in residential and office buildings as a light-weight floor system, which does not exceed the perceptible thresholds due to human induced vibrations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study explored the flexural performance of an innovative Hybrid Composite Floor Plate System (HCFPS), comprised of Polyurethane (PU) core, outer layers of Glass-fibre Reinforced Cement (GRC) and steel laminates at tensile regions, using experimental testing and Finite Element (FE) modelling. Bending and cyclic loading tests for the HCFPS panels and a comprehensive material testing program for component materials were carried out. HCFPS test panel exhibited ductile behaviour and flexural failure with a deflection ductility index of 4. FE models of HCFPS were developed using the program ABAQUS and validated with experimental results. The governing criteria of stiffness and flexural performance of HCFPS can be improved by enhancing the properties of component materials. HCFPS is 50-70% lighter in weight when compared to conventional floor systems. This study shows that HCFPS can be used for floor structures in commercial and residential buildings as an alternative to conventional steel concrete composite systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Capacity to Share is the first book to document how Cubans share their highly developed educational services with other low-income states, especially those in Africa, Latin America, and the Caribbean. A variety of international and Cuban authors break new ground in presenting this research. They investigate the experiences of people who have studied in Cuba on scholarships from the Cuban government, the implications for their home countries, and the work of Cuban teachers and administrators to support education in other countries. The authors discuss how the Cuban "solidarity" approach prioritizes global educational cooperation for mutual support, rather than imposing conditional aid. The book offers original and unusual insights into issues of culture, education, aid, development, and change as they relate to low-income states.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Session Initiation Protocol (SIP) is developed to provide advanced voice services over IP networks. SIP unites telephony and data world, permitting telephone calls to be transmitted over Intranets and Internet. Increase in network performance and new mechanisms for guaranteed quality of service encourage this consolidation to provide toll cost savings. Security comes up as one of the most important issues when voice communication and critical voice applications are considered. Not only the security methods provided by traditional telephony systems, but also additional methods are required to overcome security risks introduced by the public IP networks. SIP considers security problems of such a consolidation and provides a security framework. There are several security methods defined within SIP specifications and extensions. But, suggested methods can not solve all the security problems of SIP systems with various system requirements. In this thesis, a Kerberos based solution is proposed for SIP security problems, including SIP authentication and privacy. The proposed solution tries to establish flexible and scalable SIP system that will provide desired level of security for voice communications and critical telephony applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We found that scientists in Australia spent more than five centuries' worth of time preparing research-grant proposals for consideration by the largest funding scheme of 2012. Because just 20.5% of these applications were successful, the equivalent of some four centuries of effort returned no immediate benefit to researchers and wasted valuable research time. The system needs reforming and alternative funding processes should be investigated...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a self-tuning feedforward active noise control (ANC) system with online secondary path modeling. The step-size parameters of the controller and modeling filters have crucial rule on the system performance. In literature, these parameters are adjusted by trial-and-error. In other words, they are manually initialized before system starting, which require performing extensive experiments to ensure the convergence of the system. Hence there is no guarantee that the system could perform well under different situations. In the proposed method, the appropriate values for the step-sizes are obtained automatically. Computer simulation results indicate the effectiveness of the proposed method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The overrepresentation of students from minority ethnic groups in separate special education settings has been extensively documented in North America, yet little research exists for Australian school systems. To address this gap, we systematically analyzed 13 years of enrolment data from the state of New South Wales. Stark differences are seen in patterns of enrolment between Indigenous students, students from a Language Background Other than English (LBOTE), and non-Indigenous English speaking students. Moreover, these differences are increasing. While enrollments of Indigenous students in separate settings increased faster across time than did enrollments of Indigenous students in mainstream, enrollments of LBOTE students in mainstream increased faster than did enrollments of LBOTE students in separate settings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Railway bridges deteriorate with age. Factors such as environmental effects on different materials of a bridge, variation of loads, fatigue, etc will reduce the remaining life of bridges. Bridges are currently rated individually for maintenance and repair actions according to the structural conditions of their elements. Dealing with thousands of bridges and several factors that cause deterioration, makes the rating process extremely complicated. Current simplified but practical rating methods are not based on an accurate structural condition assessment system. On the other hand, the sophisticated but more accurate methods are only used for a single bridge or particular types of bridges. It is therefore necessary to develop a practical and accurate system which will be capable of rating a network of railway bridges. This paper introduces a new method for rating a network of bridges based on their current and future structural conditions. The method identifies typical bridges representing a group of railway bridges. The most crucial agents will be determined and categorized to criticality and vulnerability factors. Classification based on structural configuration, loading, and critical deterioration factors will be conducted. Finally a rating method for a network of railway bridges that takes into account the effects of damaged structural components due to variations in loading and environmental conditions on the integrity of the whole structure will be proposed. The outcome of this research is expected to significantly improve the rating methods for railway bridges by considering the unique characteristics of different factors and incorporating the correlation between them.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Railway bridges deteriorate with age. Factors such as environmental effects on different materials of a bridge, variation of loads, fatigue, etc. will reduce the remaining life of bridges. Dealing with thousands of bridges and several factors that cause deterioration, makes the rating process extremely complicated. Current simplified but practical methods of rating a network of bridges are not based on an accurate structural condition assessment system. On the other hand, the sophisticated but more accurate methods are only used for a single bridge or particular types of bridges. It is therefore necessary to develop a practical and accurate system, which will be capable of rating a network of railway bridges. This article introduces a new method to rate a network of bridges based on their current and future structural conditions. The method identifies typical bridges representing a group of railway bridges. The most crucial agents will be determined and categorized to criticality and vulnerability factors. Classification based on structural configuration, loading, and critical deterioration factors will be conducted. Finally a rating method for a network of railway bridges that takes into account the effects of damaged structural components due to variations in loading and environmental conditions on the integrity of the whole structure will be proposed. The outcome of this article is expected to significantly improve the rating methods for railway bridges by considering the unique characteristics of different factors and incorporating the correlation among them.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objectives To review the existing research on the effectiveness of heat warning systems (HWSs) in saving lives and reducing harm. Methods A systematic search of major databases was conducted, using “heat, heatwave, high temperature, hot temperature, OR hot climate” AND “warning system”. Results Fifteen articles were retrieved. Six studies asserted that fewer people died of excessive heat after HWS implementation. HWS was associated with reduction in ambulance use. One study estimated the benefits of HWS to be 468millionforsaving117livescomparedto210,000 costs of running the system. Eight studies showed that mere availability of HWS did not lead to behavioral changes. Perceived threat of heat dangers to self/others was the main factor related to heeding warnings and taking proper actions. However, costs and barriers associated with taking protective actions, such as costs of running air conditioners, were of significant concern particularly to the poor. Conclusions Research in this area is limited. Prospective designs applying health behavior theories should establish whether HWS can produce the health benefits they are purported to achieve by identifying the target vulnerable groups.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The security of industrial control systems in critical infrastructure is a concern for the Australian government and other nations. There is a need to provide local Australian training and education for both control system engineers and information technology professionals. This paper proposes a postgraduate curriculum of four courses to provide knowledge and skills to protect critical infrastructure industrial control systems. Our curriculum is unique in that it provides security awareness but also the advanced skills required for security specialists in this area. We are aware that in the Australian context there is a cultural gap between the thinking of control system engineers who are responsible for maintaining and designing critical infrastructure and information technology professionals who are responsible for protecting these systems from cyber attacks. Our curriculum aims to bridge this gap by providing theoretical and practical exercises that will raise the awareness and preparedness of both groups of professionals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Restoring a large-scale power system has always been a complicated and important issue. A lot of research work has been done on different aspects of the whole power system restoration procedure. However, more time will be required to complete the power system restoration process in an actual situation if accurate and real-time system data cannot be obtained. With the development of the wide area monitoring system (WAMS), power system operators are capable of accessing to more accurate data in the restoration stage after a major outage. The ultimate goal of the system restoration is to restore as much load as possible while in the shortest period of time after a blackout, and the restorable load can be estimated by employing WAMS. Moreover, discrete restorable loads are employed considering the limited number of circuit-breaker operations and the practical topology of distribution systems. In this work, a restorable load estimation method is proposed employing WAMS data after the network frame has been reenergized, and WAMS is also employed to monitor the system parameters in case the newly recovered system becomes unstable again. The proposed method has been validated with the New England 39-Bus system and an actual power system in Guangzhou, China.