886 resultados para Data transfer
Resumo:
In today’s information society, electronic tools, such as computer networks for the rapid transfer of data and composite databases for information storage and management, are critical in ensuring effective environmental management. In particular environmental policies and programs for federal, state, and local governments need a large volume of up-to-date information on the quality of water, air, and soil in order to conserve and protect natural resources and to carry out meteorology. In line with this, the utilization of information and communication technologies (ICTs) is crucial to preserve and improve the quality of life. In handling tasks in the field of environmental protection a range of environmental and technical information is often required for a complex and mutual decision making in a multidisciplinary team environment. In this regard e-government provides a foundation of the transformative ICT initiative which can lead to better environmental governance, better services, and increased public participation in environmental decision- making process.
Resumo:
A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.
Resumo:
The aim of this thesis has been to map the ethical journey of experienced nurses now practising in rural and remote hospitals in central and south-west Queensland and in domiciliary services in Brisbane. One group of the experienced nurses in the study were Directors of Nursing in rural and remote hospitals. These nurses were “hands on”, “multi-skilled “ nurses who also had the task of managing the hospital. Also there were two Directors of Nursing from domiciliary services in Brisbane. A grounded theory method was used. The nurses were interviewed and the data retrieved from the interviews was coded, categorised and from these categories a conceptual framework was generated. The literature which dealt with the subject of ethical decision making and nurses also became part of the data. The study revealed that all these nurses experienced moral distress as they made ethical decisions. The decision making categories revealed in the data were: the area of financial management; issues as end of life approaches; allowing to die with dignity; emergency decisions; experience of unexpected death; the dilemma of providing care in very difficult circumstances. These categories were divided into two chapters: the category related to administrative and financial constraints and categories dealing with ethical issues in clinical settings. A further chapter discussed the overarching category of coping with moral distress. These experienced nurses suffered moral distress as they made ethical decisions, confirming many instances of moral distress in ethical decision making documented in the literature to date. Significantly, the nurses in their interviews never mentioned the ethical principles used in bioethics as an influence in their decision making. Only one referred to lectures on ethics as being an influence in her thinking. As they described their ethical problems and how they worked through them, they drew on their own previous experience rather than any knowledge of ethics gained from nursing education. They were concerned for their patients, they spoke from a caring responsibility towards their patients, but they were also concerned for justice for their patients. This study demonstrates that these nurses operated from the ethic of care, tempered with the ethic of responsibility as well as a concern for justice for their patients. Reflection on professional experience, rather than formal ethics education and training, was the primary influence on their ethical decision making.
Resumo:
Purpose: The purpose of this paper is to explain variations in discretionary information shared between buyers and key suppliers. The paper also aims to examine how the extent of information shared affects buyers’ performance in terms of resource usage, output, and flexibility. ----- ----- Design/methodology/approach: The data for the paper comprise 221 Finnish and Swedish non-service companies obtained through a mail survey. The hypothesized relationships were tested using partial least squares modelling with reflective and formative constructs.----- ----- Findings: The results of the study suggest that (environmental and demand) uncertainty and interdependency can to some degree explain the extent of information shared between a buyer and key supplier. Furthermore, information sharing improves buyers’ performance with respect to resource usage, output, and flexibility.----- ----- Research limitations/implications: A limitation to the paper relates to the data, which only included buyers.Abetter approach would have been to collect data from both, buyers and key suppliers. Practical implications – Companies face a wide range of supply chain solutions that enable and encourage collaboration across organizations. This paper suggests a more selective and balanced approach toward adopting the solutions offered as the benefits are contingent on a number of factors such as uncertainty. Also, the risks of information sharing are far too high for a one size fits all approach.----- ----- Originality/value: The paper illustrates the applicability of transaction cost theory to the contemporary era of e-commerce. With this finding, transaction cost economics can provide a valuable lens with which to view and interpret interorganizational information sharing, a topic that has received much attention in the recent years.
Resumo:
When an organisation becomes aware that one of its products may pose a safety risk to customers, it must take appropriate action as soon as possible or it can be held liable. The ability to automatically trace potentially dangerous goods through the supply chain would thus help organisations fulfill their legal obligations in a timely and effective manner. Furthermore, product recall legislation requires manufacturers to separately notify various government agencies, the health department and the public about recall incidents. This duplication of effort and paperwork can introduce errors and data inconsistencies. In this paper, we examine traceability and notification requirements in the product recall domain from two perspectives: the activities carried out during the manufacturing and recall processes and the data collected during the enactment of these processes. We then propose a workflow-based coordination framework to support these data and process requirements.
Supply chain sustainability : a relationship management approach moderated by culture and commitment
Resumo:
This research explores the nature of relationship management on construction projects in Australia and examines the effects of culture, by means of Schwarz’s value survey, on relationships under different contract strategies. The research was based on the view that the development of a sustainable supply chain depends on the transfer of knowledge and capabilities from the larger players in the supply chain through collaboration brought about by relationship management. The research adopted a triangulated approach in which quantitative data were collected by questionnaire, interviews were conducted to explore and enrich the quantitative data and case studies were undertaken in order to illustrate and validate the findings. The aim was to investigate how values and attitudes enhance or reduce the incorporation of the supply chain into the project. From the research it was found that the degree of match and mismatch between values and contract strategy impacts commitment and the engagement and empowerment of the supply chain.
Resumo:
Monitoring and assessing environmental health is becoming increasingly important as human activity and climate change place greater pressure on global biodiversity. Acoustic sensors provide the ability to collect data passively, objectively and continuously across large areas for extended periods of time. While these factors make acoustic sensors attractive as autonomous data collectors, there are significant issues associated with large-scale data manipulation and analysis. We present our current research into techniques for analysing large volumes of acoustic data effectively and efficiently. We provide an overview of a novel online acoustic environmental workbench and discuss a number of approaches to scaling analysis of acoustic data; collaboration, manual, automatic and human-in-the loop analysis.
Resumo:
The structures of the 1:1 proton-transfer compounds of isonipecotamide (4-piperidinecarboxamide) with 4-nitrophthalic acid, 4-carbamoylpiperidinium 2-carboxy-4-nitrobenzoate, C6H13N2O8+ C8H4O6- (I), 4,5-dichlorophthalic acid, 4-carbamoylpiperidinium 2-carboxy-4,5-dichlorobenzoate, C6H13N2O8+ C8H3Cl2O4- (II) and 5-nitroisophthalic acid, 4-carbamoylpiperidinium 3-carboxy-5-nitrobenzoate, C6H13N2O8+ C8H4O6- (III) as well as the 2:1 compound with terephthalic acid, bis(4-carbamoylpiperidinium)benzene-1,2-dicarboxylate dihydrate, 2(C6H13N2O8+) C8H4O42- . 2H2O (IV)have been determined at 200 K. All salts form hydrogen-bonded structures, one-dimensional in (II) and three-dimensional in (I), (III) and (IV). In (I) and (III) the centrosymmetric R2/2(8) cyclic amide-amide association is found while in (IV) several different types of water-bridged cyclic associations are present [graph sets R2/4(8), R3/4(10), R4/4(12), R3/3(18) and R4/6(22)]. The one-dimensional structure of (I), features the common 'planar' hydrogen 4,5-dichlorophthalate anion together with enlarged cyclic R3/3(13) and R3/4(17) associations. With the structures of (I) and (III) the presence of head-to-tail hydrogen phthalate chain substructures is found. In (IV) head-to-tail primary cation-anion associations are extended longitudinally into chains through the water-bridged cation associations and laterally by piperidinium N-H...O(carboxyl) and water O-H...O(carboxyl) hydrogen bonds. The structures reported here further demonstrate the utility of the isonipecotamide cation as a synthon for the generation of stable hydrogen-bonded structures. An additional example of cation--anion association with this cation is also shown in the asymmetric three-centre piperidinium N-H...O,O'(carboxyl) interaction in the first-reported structure of a 2:1 isonipecotamide-carboxylate salt.
Resumo:
Participatory sensing enables collection, processing, dissemination and analysis of environmental sensory data by ordinary citizens, through mobile devices. Researchers have recognized the potential of participatory sensing and attempted applying it to many areas. However, participants may submit low quality, misleading, inaccurate, or even malicious data. Therefore, finding a way to improve the data quality has become a significant issue. This study proposes using reputation management to classify the gathered data and provide useful information for campaign organizers and data analysts to facilitate their decisions.
Resumo:
Plasmodium spp. parasites cause malaria in 300 to 500 million individuals each year. Disease occurs during the blood-stage of the parasite’s life cycle, where the parasite is thought to replicate exclusively within erythrocytes. Infected individuals can also suffer relapses after several years, from Plasmodium vivax and Plasmodium ovale surviving in hepatocytes. Plasmodium falciparum and Plasmodium malariae can also persist after the original bout of infection has apparently cleared in the blood, suggesting that host cells other than erythrocytes (but not hepatocytes) may harbor these blood-stage parasites, thereby assisting their escape from host immunity. Using blood stage transgenic Plasmodium berghei-expressing GFP (PbGFP) to track parasites in host cells, we found that the parasite had a tropism for CD317+ dendritic cells. Other studies using confocal microscopy, in vitro cultures, and cell transfer studies showed that blood-stage parasites could infect, survive, and replicate within CD317+ dendritic cells, and that small numbers of these cells released parasites infectious for erythrocytes in vivo. These data have identified a unique survival strategy for blood-stage Plasmodium, which has significant implications for understanding the escape of Plasmodium spp. from immune-surveillance and for vaccine development.