929 resultados para Current systems


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The overarching goal of this research is to establish a successful forum for a transition from the existing paradigm of managing wastewater infrastructure to a more sustainable paradigm that achieves a more efficient utilisation of wastewater assets. A transitioning approach to support a more efficient utilisation of surface water and wastewater assets and infrastructure is proposed and developed. The determined transitioning approach possesses key stages namely developing the arena, developing the agenda, case study, and monitoring. The case study stage investigates a drainage utility identifying their improvement drivers, the removal of surface water through detailed drainage modelling and the financial examination of the costs incurred under the various scenarios conducted. Understanding the implications of removing/attenuating surface water from the network is improved through obtaining data by detailed drainage modelling. Infoworks software is used to investigate and assess the current and future operational scenarios of a wastewater system operating over one calendar year. Modelling scenarios were conducted removing surface water from selected areas focusing on the volumes requiring pumping and durations of pumping station(s) operation prior to treatment during storm conditions. The financial implication of removing surface water in combined sewer systems is examined in three main components. Firstly the costs of electricity incurred at the single sewage pumping station (SPS) investigated during the various scenarios modelled require to be addressed. Secondly the costs to retrofit sustainable urban drainage system (SUDS) solutions needs to be identified. Thirdly the implications of removing surface water for the drainage utility at the national level and the potential saving for householder’s committing to a surface water disconnection rebate scheme. When addressed at the macro level i.e., with over 2,100 pumping stations, some operating in sequence and contained within one drainage utility annually treating 315,360 megalitres the significance of the same multiple quantifiable and intangible benefits becomes amplified. The research aims, objectives and findings are presented to the identified and convened stakeholders. The transitioning approach developed encourages positive discourse between stakeholders. The level of success of the transitioning approach determined is then tested using a quantitative methodology through the completion of questionnaires. From the questionnaires completed the respondents unanimously agreed that surface water flows should be removed as well as reduced from the combined sewer system. The respondents agreed that the removal of surface water from a typical combined sewer system is justified by applying a transitioning approach focusing on the energy consumption required to pump increased volumes during storm events. This response is significant based upon the economic evidence and is contrary to the respondents previous position that finance was their most influencing factor. When provided with other potentially available benefits the respondents were even more supportive of the justification to remove surface water from the combined sewer system. The combined findings of the work presented in this thesis provide further justification that the transitioning approach applied to the removal of surface water from a typical combined sewer system, as determined in this research has been successful.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A primary goal of context-aware systems is delivering the right information at the right place and right time to users in order to enable them to make effective decisions and improve their quality of life. There are three key requirements for achieving this goal: determining what information is relevant, personalizing it based on the users’ context (location, preferences, behavioral history etc.), and delivering it to them in a timely manner without an explicit request from them. These requirements create a paradigm that we term as “Proactive Context-aware Computing”. Most of the existing context-aware systems fulfill only a subset of these requirements. Many of these systems focus only on personalization of the requested information based on users’ current context. Moreover, they are often designed for specific domains. In addition, most of the existing systems are reactive - the users request for some information and the system delivers it to them. These systems are not proactive i.e. they cannot anticipate users’ intent and behavior and act proactively without an explicit request from them. In order to overcome these limitations, we need to conduct a deeper analysis and enhance our understanding of context-aware systems that are generic, universal, proactive and applicable to a wide variety of domains. To support this dissertation, we explore several directions. Clearly the most significant sources of information about users today are smartphones. A large amount of users’ context can be acquired through them and they can be used as an effective means to deliver information to users. In addition, social media such as Facebook, Flickr and Foursquare provide a rich and powerful platform to mine users’ interests, preferences and behavioral history. We employ the ubiquity of smartphones and the wealth of information available from social media to address the challenge of building proactive context-aware systems. We have implemented and evaluated a few approaches, including some as part of the Rover framework, to achieve the paradigm of Proactive Context-aware Computing. Rover is a context-aware research platform which has been evolving for the last 6 years. Since location is one of the most important context for users, we have developed ‘Locus’, an indoor localization, tracking and navigation system for multi-story buildings. Other important dimensions of users’ context include the activities that they are engaged in. To this end, we have developed ‘SenseMe’, a system that leverages the smartphone and its multiple sensors in order to perform multidimensional context and activity recognition for users. As part of the ‘SenseMe’ project, we also conducted an exploratory study of privacy, trust, risks and other concerns of users with smart phone based personal sensing systems and applications. To determine what information would be relevant to users’ situations, we have developed ‘TellMe’ - a system that employs a new, flexible and scalable approach based on Natural Language Processing techniques to perform bootstrapped discovery and ranking of relevant information in context-aware systems. In order to personalize the relevant information, we have also developed an algorithm and system for mining a broad range of users’ preferences from their social network profiles and activities. For recommending new information to the users based on their past behavior and context history (such as visited locations, activities and time), we have developed a recommender system and approach for performing multi-dimensional collaborative recommendations using tensor factorization. For timely delivery of personalized and relevant information, it is essential to anticipate and predict users’ behavior. To this end, we have developed a unified infrastructure, within the Rover framework, and implemented several novel approaches and algorithms that employ various contextual features and state of the art machine learning techniques for building diverse behavioral models of users. Examples of generated models include classifying users’ semantic places and mobility states, predicting their availability for accepting calls on smartphones and inferring their device charging behavior. Finally, to enable proactivity in context-aware systems, we have also developed a planning framework based on HTN planning. Together, these works provide a major push in the direction of proactive context-aware computing.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Abstract. Two ideas taken from Bayesian optimization and classifier systems are presented for personnel scheduling based on choosing a suitable scheduling rule from a set for each person's assignment. Unlike our previous work of using genetic algorithms whose learning is implicit, the learning in both approaches is explicit, i.e. we are able to identify building blocks directly. To achieve this target, the Bayesian optimization algorithm builds a Bayesian network of the joint probability distribution of the rules used to construct solutions, while the adapted classifier system assigns each rule a strength value that is constantly updated according to its usefulness in the current situation. Computational results from 52 real data instances of nurse scheduling demonstrate the success of both approaches. It is also suggested that the learning mechanism in the proposed approaches might be suitable for other scheduling problems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

INTRODUCTION In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of computer systems in the form of firewalls, antivirus software and intrusion detection systems. The complexity of networks and dynamic nature of computer systems leaves current methods with significant room for improvement. Computer scientists have recently drawn inspiration from mechanisms found in biological systems and, in the context of computer security, have focused on the human immune system (HIS). The human immune system provides an example of a robust, distributed system that provides a high level of protection from constant attacks. By examining the precise mechanisms of the human immune system, it is hoped the paradigm will improve the performance of real intrusion detection systems. This paper presents an introduction to recent developments in the field of immunology. It discusses the incorporation of a novel immunological paradigm, Danger Theory, and how this concept is inspiring artificial immune systems (AIS). Applications within the context of computer security are outlined drawing direct reference to the underlying principles of Danger Theory and finally, the current state of intrusion detection systems is discussed and improvements suggested.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

For the formulation of policies, laws and regulations for management of fisheries and aquatic systems there is a requirement for scientific knowledge to guide in this formulation. Such knowledge is used to guide in sustainable management of capture fisheries, integrating lake productivity processes into fisheries management, prevention of pollution and eutrophication of the aquatic environment, control of invasive weeds e.g. water hyacinth, enhancement of aquaculture production, reduction of post-harvest fish losses and ensuring fish quality, development of options for optimization of socio-economic benefits from fisheries and for co-management.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Current dynamics in the Strait of Bonifacio (south Corsica) were investigated at a small scale during the STELLAMARE1 multidisciplinary cruise in summer 2012, using in situ measurements and modeling data. The Strait of Bonifacio is a particularly sensitive marine area in which specific conservation measures have been taken to preserve the natural environment and wild species. Good knowledge of the hydrodynamics in this area is essential to optimize the Marine Protected Area's management rules. Therefore, we used a high-resolution model (400 m) based on the MARS3D code to investigate the main flux exchanges and to formulate certain hypotheses about the formation of possible eddy structures. The aim of the present paper is first to synthetize the results obtained by combining Acoustic Doppler Current Profiler data, hydrological parameters, Lagrangian drifter data, and satellite observations such as MODIS OC5 chlorophyll a data or Metop-A AVHRR Sea Surface Temperature (SST) data. These elements are then used to validate the presence of the mesoscale eddies simulated by the model and their recurrence outside the cruise period. To complete the analysis, the response of the 3D hydrodynamical model was evaluated under two opposing wind systems and certain biases were detected. Strong velocities up to 1 m s(-1) were recorded in the east part due to the Venturi effect; a complementary system of vortices governed by Coriolis effect and west wind was observed in the west part, and horizontal stratification in the central part has been identified under typical wind condition.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A wide range of goals and objectives have to be taken into account in natural resources management. Defining these objectives in operational terms, including dimensions such as sustainability, productivity, and equity, is by no means easy, especially if they must capture the diversity of community and stakeholder values. This is especially true in the coastal zone where land activities affect regional marine ecosystems. In this study, the aim was firstly to identify and hierarchically organise the goals and objectives for coastal systems, as defined by local stakeholders. Two case study areas are used within the Great Barrier Reef region being Mackay and Bowen–Burdekin. Secondly, the aim was to identify similarities between the case study results and thus develop a generic set of goals to be used as a starting point in other coastal communities. Results show that overarching high-level goals have nested sub-goals that contain a set of more detailed regional objectives. The similarities in high-level environmental, governance, and socio-economic goals suggest that regionally specific objectives can be developed based on a generic set of goals. The prominence of governance objectives reflects local stakeholder perceptions that current coastal zone management is not achieving the outcomes they feel important and that there is a need for increased community engagement and co-management. More importantly, it raises the question of how to make issues relevant for the local community and entice participation in the local management of public resources to achieve sustainable environmental, social, and economic management outcomes. © 2015 Springer-Verlag Berlin Heidelberg

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks, and are becoming more and more necessary as reliance on Internet services increases and systems with sensitive data are more commonly open to Internet access. An IDS’s responsibility is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this activity. The majority of IDSs use a set of signatures that define what suspicious traffic is, and Snort is one popular and actively developing open-source IDS that uses such a set of signatures known as Snort rules. Our aim is to identify a way in which Snort could be developed further by generalising rules to identify novel attacks. In particular, we attempted to relax and vary the conditions and parameters of current Snort rules, using a similar approach to classic rule learning operators such as generalisation and specialisation. We demonstrate the effectiveness of our approach through experiments with standard datasets and show that we are able to detect previously undetected variants of various attacks. We conclude by discussing the general effectiveness and appropriateness of generalisation in Snort based IDS rule processing. Keywords: anomaly detection, intrusion detection, Snort, Snort rules

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Due to their unique physicochemical properties, including superparamagnetism, iron oxide nanoparticles (ION) have a number of interesting applications, especially in the biomedical field, that make them one of the most fascinating nanomaterials. They are used as contrast agents for magnetic resonance imaging, in targeted drug delivery, and for induced hyperthermia cancer treatments. Together with these valuable uses, concerns regarding the onset of unexpected adverse health effects following exposure have been also raised. Nevertheless, despite the numerous ION purposes being explored, currently available information on their potential toxicity is still scarce and controversial data have been reported. Although ION have traditionally been considered as biocompatible - mainly on the basis of viability tests results - influence of nanoparticle surface coating, size, or dose, and of other experimental factors such as treatment time or cell type, has been demonstrated to be important for ION in vitro toxicity manifestation. In vivo studies have shown distribution of ION to different tissues and organs, including brain after passing the blood-brain barrier; nevertheless results from acute toxicity, genotoxicity, immunotoxicity, neurotoxicity and reproductive toxicity investigations in different animal models do not provide a clear overview on ION safety yet, and epidemiological studies are almost inexistent. Much work has still to be done to fully understand how these nanomaterials interact with cellular systems and what, if any, potential adverse health consequences can derive from ION exposure.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Agricultural land has been identified as a potential source of greenhouse gas emissions offsets through biosequestration in vegetation and soil. In the extensive grazing land of Australia, landholders may participate in the Australian Government’s Emissions Reduction Fund and create offsets by reducing woody vegetation clearing and allowing native woody plant regrowth to grow. This study used bioeconomic modelling to evaluate the trade-offs between an existing central Queensland grazing operation, which has been using repeated tree clearing to maintain pasture growth, and an alternative carbon and grazing enterprise in which tree clearing is reduced and the additional carbon sequestered in trees is sold. The results showed that ceasing clearing in favour of producing offsets produces a higher net present value over 20 years than the existing cattle enterprise at carbon prices, which are close to current (2015) market levels (~$13 t–1 CO2-e). However, by modifying key variables, relative profitability did change. Sensitivity analysis evaluated key variables, which determine the relative profitability of carbon and cattle. In order of importance these were: the carbon price, the gross margin of cattle production, the severity of the tree–grass relationship, the area of regrowth retained, the age of regrowth at the start of the project, and to a lesser extent the cost of carbon project administration, compliance and monitoring. Based on the analysis, retaining regrowth to generate carbon income may be worthwhile for cattle producers in Australia, but careful consideration needs to be given to the opportunity cost of reduced cattle income.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Abstract. Two ideas taken from Bayesian optimization and classifier systems are presented for personnel scheduling based on choosing a suitable scheduling rule from a set for each person's assignment. Unlike our previous work of using genetic algorithms whose learning is implicit, the learning in both approaches is explicit, i.e. we are able to identify building blocks directly. To achieve this target, the Bayesian optimization algorithm builds a Bayesian network of the joint probability distribution of the rules used to construct solutions, while the adapted classifier system assigns each rule a strength value that is constantly updated according to its usefulness in the current situation. Computational results from 52 real data instances of nurse scheduling demonstrate the success of both approaches. It is also suggested that the learning mechanism in the proposed approaches might be suitable for other scheduling problems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

INTRODUCTION In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of computer systems in the form of firewalls, antivirus software and intrusion detection systems. The complexity of networks and dynamic nature of computer systems leaves current methods with significant room for improvement. Computer scientists have recently drawn inspiration from mechanisms found in biological systems and, in the context of computer security, have focused on the human immune system (HIS). The human immune system provides an example of a robust, distributed system that provides a high level of protection from constant attacks. By examining the precise mechanisms of the human immune system, it is hoped the paradigm will improve the performance of real intrusion detection systems. This paper presents an introduction to recent developments in the field of immunology. It discusses the incorporation of a novel immunological paradigm, Danger Theory, and how this concept is inspiring artificial immune systems (AIS). Applications within the context of computer security are outlined drawing direct reference to the underlying principles of Danger Theory and finally, the current state of intrusion detection systems is discussed and improvements suggested.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks, and are becoming more and more necessary as reliance on Internet services increases and systems with sensitive data are more commonly open to Internet access. An IDS’s responsibility is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this activity. The majority of IDSs use a set of signatures that define what suspicious traffic is, and Snort is one popular and actively developing open-source IDS that uses such a set of signatures known as Snort rules. Our aim is to identify a way in which Snort could be developed further by generalising rules to identify novel attacks. In particular, we attempted to relax and vary the conditions and parameters of current Snort rules, using a similar approach to classic rule learning operators such as generalisation and specialisation. We demonstrate the effectiveness of our approach through experiments with standard datasets and show that we are able to detect previously undetected variants of various attacks. We conclude by discussing the general effectiveness and appropriateness of generalisation in Snort based IDS rule processing. Keywords: anomaly detection, intrusion detection, Snort, Snort rules