921 resultados para MNCs (Multi-National Corporations)
Resumo:
In this paper, we propose a new multi-class steganalysis for binary image. The proposed method can identify the type of steganographic technique used by examining on the given binary image. In addition, our proposed method is also capable of differentiating an image with hidden message from the one without hidden message. In order to do that, we will extract some features from the binary image. The feature extraction method used is a combination of the method extended from our previous work and some new methods proposed in this paper. Based on the extracted feature sets, we construct our multi-class steganalysis from the SVM classifier. We also present the empirical works to demonstrate that the proposed method can effectively identify five different types of steganography.
Resumo:
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P 1, ..., P n , each with their own private input x i , to compute a function Y = F(x 1, ..., x n ), such that at the end of the protocol, all participants learn the correct value of Y, while secrecy of the private inputs is maintained. Classical results in the unconditionally secure MPC indicate that in the presence of an active adversary, every function can be computed if and only if the number of corrupted participants, t a , is smaller than n/3. Relaxing the requirement of perfect secrecy and utilizing broadcast channels, one can improve this bound to t a < n/2. All existing MPC protocols assume that uncorrupted participants are truly honest, i.e., they are not even curious in learning other participant secret inputs. Based on this assumption, some MPC protocols are designed in such a way that after elimination of all misbehaving participants, the remaining ones learn all information in the system. This is not consistent with maintaining privacy of the participant inputs. Furthermore, an improvement of the classical results given by Fitzi, Hirt, and Maurer indicates that in addition to t a actively corrupted participants, the adversary may simultaneously corrupt some participants passively. This is in contrast to the assumption that participants who are not corrupted by an active adversary are truly honest. This paper examines the privacy of MPC protocols, and introduces the notion of an omnipresent adversary, which cannot be eliminated from the protocol. The omnipresent adversary can be either a passive, an active or a mixed one. We assume that up to a minority of participants who are not corrupted by an active adversary can be corrupted passively, with the restriction that at any time, the number of corrupted participants does not exceed a predetermined threshold. We will also show that the existence of a t-resilient protocol for a group of n participants, implies the existence of a t’-private protocol for a group of n′ participants. That is, the elimination of misbehaving participants from a t-resilient protocol leads to the decomposition of the protocol. Our adversary model stipulates that a MPC protocol never operates with a set of truly honest participants (which is a more realistic scenario). Therefore, privacy of all participants who properly follow the protocol will be maintained. We present a novel disqualification protocol to avoid a loss of privacy of participants who properly follow the protocol.
Resumo:
The Australian Government’s Skills for the Carbon Challenge (SCC) initiative aims to accelerate industry and the education sectors response to climate change. As part of the SCC initiative, the Department of Industry, Innovation, Climate Change, Science, Research and Tertiary Education (DIICCSRTE) provided funding to investigate the state of energy efficiency education in engineering-related Australian Technical and Further Education (TAFE) Programs. The following document reports on the outcomes of a multi-stage consultation project that engaged with participants from over 80% of TAFE institutions across Australia with the aim of supporting and enhancing future critical skills development in this area. Specifically, this report presents the findings of a national survey, based on a series of TAFE educator focus groups, conducted in May 2013 aimed at understanding the experiences and insights of Australian TAFE educators teaching engineering-related courses. Responses were received from 224 TAFE Educators across 50 of the 61 TAFE institutions in Australia (82% response rate).
Resumo:
Local representations of the significance of Albany, Western Australia, in the first world war and of the city's part in the birth of Anzac register substantial points of departure from national histories. While both the Anzac mythos and official renderings of Australia's wars are vigorously contested, Albany's reformulation offers a clear example of the ways in which communities actively inflect national narratives to create expressions of differentiated local identity. This article explores the relationship between the national and the local by focusing on the local narrative of the massing and departure of'The Great Anzac Convoy' in King George Sound in 1914. Particular attention is given to the way Albany has been able to appropriate and localise this event and the origins of Anzac, consequently promoting itself as an important element of the national identity, from which it nevertheless remains distinct. This localisation of an important element of national identity confers cultural standing and a potentially empowered position in relation to this national identity.
Resumo:
Today, many sectors across society are recognising the need to swiftly reduce their growing energy demand, as well as meeting remaining demand with low emissions options. A key ingredient to addressing such issues is equipping professionals – in particular engineers – with emerging energy efficiency knowledge and skills. This paper responds to an identified engineering education gap in Australia, by investigating options to increase energy efficiency content for both undergraduate and postgraduate engineers. The authors summarise the findings of the multi-stage methodology funded by the National Framework for Energy Efficiency (2008-2009), highlighting identified key barriers and benefits to such curriculum renewal. The findings are intended for use by engineering departments, accreditation agencies, professional bodies and government, to identify opportunities for moving forward based on rigorous research, and then to strategically plan the transition. This process, focused on energy efficiency, may also provide valuable parallels for a range of sustainable engineering related topics.
Resumo:
A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. In 2005, Shao and Cao developed a verifiable multi-secret sharing scheme where each participant’s share can be used several times which reduces the number of interactions between the dealer and the group members. In addition some secrets may require a higher security level than others involving the need for different threshold values. Recently Chan and Chang designed such a scheme but their construction only allows a single secret to be shared per threshold value. In this article we combine the previous two approaches to design a multiple time verifiable multi-secret sharing scheme where several secrets can be shared for each threshold value. Since the running time is an important factor for practical applications, we will provide a complexity comparison of our combined approach with respect to the previous schemes.
Resumo:
This study presents an acoustic emission (AE) based fault diagnosis for low speed bearing using multi-class relevance vector machine (RVM). A low speed test rig was developed to simulate the various defects with shaft speeds as low as 10 rpm under several loading conditions. The data was acquired using anAEsensor with the test bearing operating at a constant loading (5 kN) andwith a speed range from20 to 80 rpm. This study is aimed at finding a reliable method/tool for low speed machines fault diagnosis based on AE signal. In the present study, component analysis was performed to extract the bearing feature and to reduce the dimensionality of original data feature. The result shows that multi-class RVM offers a promising approach for fault diagnosis of low speed machines.
Resumo:
This study investigated the population genetics, demographic history and pathway of invasion of the Russian wheat aphid (RWA) from its native range in Central Asia, the Middle East and Europe to South Africa and the Americas. We screened microsatellite markers, mitochondrial DNA and endosymbiont genes in 504 RWA clones from nineteen populations worldwide. Following pathway analyses of microsatellite and endosymbiont data, we postulate that Turkey and Syria were the most likely sources of invasion to Kenya and South Africa, respectively. Furthermore, we found that one clone transferred between South Africa and the Americas was most likely responsible for the New World invasion. Finally, endosymbiont DNA was found to be a high resolution population genetic marker, extremely useful for studies of invasion over a relatively short evolutionary history time frame. This study has provided valuable insights into the factors that may have facilitated the recent global invasion by this damaging pest.
Resumo:
Presentation by Dr Joe Young, ITS-HPC and Research Support, Managing your research data seminar, 2012
Resumo:
There is a growing recognition of the interests and rights of individuals conceived using donated gametes in assisted reproductive technology to information about their biological parentage. In Australia these rights vary between jurisdictions according to differing statutory provisions. In February 2011 the Senate's Legal and Constitutional Affairs References Committee published its report on Donor Conception Practices in Australia. The report recommended the development of a nationally consistent approach to donor conception and recommended the enactment of legislation in those Australian jurisdictions without legislation regulating donor conception. This editorial reviews the Senate Committee report and its recommendations and supports calls for a nationally harmonised approach to donor conception in Australia.
Resumo:
In 1989 the first National Women's Health Policy was launched in Australia. Now, 20 years later, the Federal Government has announced plans for the development of a new National Women's Health Policy to address the health needs of Australian women. The Policy will be based on five principles: gender equity; health equity between women; a focus on prevention; an evidence base for interventions; and a life course approach. This editorial examines the role for law in the development of a new National Women's Health Policy. It considers the relevance of regulatory frameworks for health research in supporting an evidence base for health interventions and analyses the requirement in the National Health and Medical Research Council's National Statement on Ethical Conduct in Human Research for "fair inclusion" of research participants. The editorial argues for a holistic approach to women's health that includes regulatory frameworks for research, identification of funding priorities for research, and the need for a dedicated government department or agency to promote women's health.
Resumo:
The ABC’s major arts announcement this month appears at first glance to be good news for one of its core constituencies. The national broadcaster will establish an Arts Council and will roll out several new arts programming initiatives. The Corporation’s relationship with the arts community has been strained in recent years, so the new programming initiatives should be greeted positively. But without significant new funding, coupled with the uncertainties of a looming federal budget, some commentators are seeing this as little more than a shuffling of the deckchairs.
Resumo:
This paper describes the Teaching Teachers of the Future (TTF) Project – a national project funded ($8.8mil AUD) by the Australian Government. The project was aimed at building the capacity of student teachers to use technology to improve student learning outcomes. It discusses the aims and objectives of the project, its genesis in a changing educational and political landscape, the use of TPACK as a theoretical scaffold, and briefly reports on the operations of the various components and part-ners. Further, it discusses the research opportunities afforded by the project includ-ing a national survey of all PSTs in Australia gauging their TPACK confidence and the use of the Most Significant Change (MSC) methodology. Finally the paper dis-cusses the outcomes of the project and its future.
Resumo:
Ramp signalling is an access control for motorways, in which a traffic signal is placed at on-ramps to regulate the rate of vehicles entering the motorway and thus to preserve the motorway capacity. In general, ramp signalling algorithms fall into two categories: local control and coordinated control by their effective scope. Coordinated ramp signalling strategies make use of measurements from the entire motorway network to operate individual ramp signals for the optimal performances at the network level. This study proposes a multi-hierarchical strategy for coordinated ramp signalling. The strategy is structured in two layers. At the higher layer with a longer update interval, coordination group is assembled and disassembled based on the location of high-risk breakdown flow. At the lower layer with a shorter update interval, individual ramps are hired to serve the coordination and are also released based on the prevailing congestion level on the ramp. This strategy is modelled and applied to the northbound Pacific Motorway micro-simulation platform (AIMSUN). The simulation results show an effective congestion mitigation of the proposed strategy.
Resumo:
Since Queensland Wire Industries Pty Ltd v Broken Hill Pty Co Ltd (1989) 167 CLR 177 it has been recognised that corporations with substantial market power are subject to special responsibilities and restraints that corporations without market power are not. In NT Power Generation Pty Ltd v Power and Water Authority (2004) 219 CLR 90 McHugh A-CJ, Gummow, Callinan and Heydon JJ in their joint reasons stated (at [76]), that s 46 of the Competition and Consumer Act 2010 (Cth) (CCA) can operate not only to prevent firms with substantial market power from doing prohibited things, but also compel them positively to do things they do not want to do. Their Honours also stated (at [126]) that the proposition that a private property owner who declines to permit competitors to use the property is immune from s 46 is “intrinsically unsound”. However, the circumstances in which a firm with substantial power must accommodate competitors, and private property rights give way to the public interest are uncertain. The purpose of this Note is to consider recent developments in two areas of the CCA where the law requires private property rights to give way to the public interest. The first part of the Note considers two recent cases which clarify the circumstances in which s 46 of the CCA can be used to compel a firm with substantial market power to accommodate a competitor and allow the competitor to make use of private property rights in the public interest. Secondly, on 12 February 2014 the Minister for Small Business, the Hon Bruce Billson,released the Productivity Commission’s Final Report, on the National Access Regime in Pt IIIA of the CCA (National Access Regime, Inquiry Report No 66, Canberra). Pt IIIA provides for the processes by which third parties may obtain access to infrastructure owned by others in the public interest. The Report recommends that Pt IIIA be retained but makes a number of suggestions for its reform, some of which will be briefly considered.