182 resultados para Hacker


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This letter has tested the canopy height profile (CHP) methodology as a way of effective leaf area index (LAIe) and vertical vegetation profile retrieval at a single-tree level. Waveform and discrete airborne LiDAR data from six swaths, as well as from the combined data of six swaths, were used to extract the LAIe of a single live Callitris glaucophylla tree. LAIe was extracted from raw waveform as an intermediate step in the CHP methodology, with two different vegetation-ground reflectance ratios. Discrete point LAIe estimates were derived from the gap probability using the following: 1) single ground returns and 2) all ground returns. LiDAR LAIe retrievals were subsequently compared to hemispherical photography estimates, yielding mean values within ±7% of the latter, depending on the method used. The CHP of a single dead Callitris glaucophylla tree, representing the distribution of vegetation material, was verified with a field profile manually reconstructed from convergent photographs taken with a fixed-focal-length camera. A binwise comparison of the two profiles showed very high correlation between the data reaching R2 of 0.86 for the CHP from combined swaths. Using a study-area-adjusted reflectance ratio improved the correlation between the profiles, but only marginally in comparison to using an arbitrary ratio of 0.5 for the laser wavelength of 1550 nm.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study has compared preliminary estimates of effective leaf area index (LAI) derived from fish-eye lens photographs to those estimated from airborne full-waveform small-footprint LiDAR data for a forest dataset in Australia. The full-waveform data was decomposed and optimized using a trust-region-reflective algorithm to extract denser point clouds. LAI LiDAR estimates were derived in two ways (1) from the probability of discrete pulses reaching the ground without being intercepted (point method) and (2) from raw waveform canopy height profile processing adapted to small-footprint laser altimetry (waveform method) accounting for reflectance ratio between vegetation and ground. The best results, that matched hemispherical photography estimates, were achieved for the waveform method with a study area-adjusted reflectance ratio of 0.4 (RMSE of 0.15 and 0.03 at plot and site level, respectively). The point method generally overestimated, whereas the waveform method with an arbitrary reflectance ratio of 0.5 underestimated the fish-eye lens LAI estimates.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Conceptualisations of disability that emphasise the contextual and cultural nature of disability and the embodiment of these within a national system of data collection present a number of challenges especially where this process is devolved to schools. The requirement for measures based on contextual and subjective experiences gives rise to particular difficulties in achieving parity in the way data is analysed and reported. This paper presents an account of the testing of a tool intended for use by schools as they collect data from parents to identify children who meet the criteria of disability established in Disability Discrimination Acts (DDAs). Data were validated through interviews with parents and teachers and observations of children and highlighted the pivotal role of the criterion of impact. The findings are set in the context of schools meeting their legal duties to identify disabled children and their support needs in a way that captures the complexity of disabled children’s school lives and provides useful and useable data.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Equality Act 2010 will be implemented in full in 2011, and schools in the UK will have to provide special aids or services for children with disabilities where this provision is considered reasonable. This paper reports on staff perspectives on the use and usefulness of a parental questionnaire on disability from a sample of 49 schools (mainstream and special) located in 12 local authorities. Most schools found the process of administering the parent questionnaire undemanding; just under half of the sample indicated that they would take some action as a result of the data collected from the parental questionnaire (e.g., to inform plans for targeting or monitoring support for children, and to contact parents and follow-up issues they had mentioned); and about one-third of schools recorded unanticipated findings from the parental questionnaire, that is, the identification of children whose disabilities were not previously known to the school. Implications for schools are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There has been an ongoing concern about the lack of reliable data on disabled children in schools. To date there has been no consistent way of identifying and categorising disabilities. Schools in England are currentlyrequired to collect data on children with Special Educational Need (SEN), but this does not capture information about all disabled children. The lack of this information may seriously restrict capacity at all levels of policy and practice to understand and respond to the needs of disabled children and their families in line with Disability Discrimination Act (2005) and the single Equality Act (2010). The aim of the project was to test the draft tools for identifying disability and accompanying guidance in a sample of all types of maintained schools in order to assess their usability and reliability and whether they resulted in the generation of robust and consistent data that could reliably inform school returns for the annual School Census.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Schools need to identify disabled pupils in accordance with their Disability Equality Duty. This research assisted in the development of suitable tools to allow them to identify disabled children in accordance with the definition set out in the Disability Discrimination Act (DDA) by surveying parents and, via the use of purpose-designed activities, the children themselves.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents an open-source canopy height profile (CHP) toolkit designed for processing small-footprint full-waveform LiDAR data to obtain the estimates of effective leaf area index (LAIe) and CHPs. The use of the toolkit is presented with a case study of LAIe estimation in discontinuous-canopy fruit plantations. The experiments are carried out in two study areas, namely, orange and almond plantations, with different percentages of canopy cover (48% and 40%, respectively). For comparison, two commonly used discrete-point LAIe estimation methods are also tested. The LiDAR LAIe values are first computed for each of the sites and each method as a whole, providing “apparent” site-level LAIe, which disregards the discontinuity of the plantations’ canopies. Since the toolkit allows for the calculation of the study area LAIe at different spatial scales, between-tree-level clumpingcan be easily accounted for and is then used to illustrate the impact of the discontinuity of canopy cover on LAIe retrieval. The LiDAR LAIe estimates are therefore computed at smaller scales as a mean of LAIe in various grid-cell sizes, providing estimates of “actual” site-level LAIe. Subsequently, the LiDAR LAIe results are compared with theoretical models of “apparent” LAIe versus “actual” LAIe, based on known percent canopy cover in each site. The comparison of those models to LiDAR LAIe derived from the smallest grid-cell sizes against the estimates of LAIe for the whole site has shown that the LAIe estimates obtained from the CHP toolkit provided values that are closest to those of theoretical models.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches.  The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a case study of a compromised Web server that was being used to distribute illegal 'warez'. The mechanism by which the server was compromised is discussed as if the way in which it was found. The hacker organisations that engage in these activities are viewed as a Virtual Community and their rules and code of ethics investigated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study shows that cyber crime is a recent addition to the list of crimes that can adversely affec tbusinesses directly or indirectly. This phenomenon was not directly prosecutable in South Africa until the enactment of the ECT Act in July 2002. However this Act also prevents businesses to fully prosecute a hacker due to incompleteness. Any kind of commercially related crime can be duplicated as cyber crime. Therefore very little research appears or has been documented about cyber crime in South African companies before 2003. The motivation to do this study was
that businesses often loose millions in cyber attacks, not necessarily through direct theft but by the loss of service and damage to the image of the company. Most of the companies that were approached for interviews on cyber crime were reluctant to share the fact that they were hacked
or that cyber crime occurred at their company as it violates their security policies and may expose their fragile security platforms.
The purpose of this study was to attempt to get an overall view on how South African businesses are affected by cyber crime in the banking and short term insurance sector of the South African industry and also to determine what legislation exist in this country to protect them.
The case study approach was used to determine the affect of cyber crime on businesses like banks and insurance companies and higher education institutions. Each case was interviewed, monitored and was observed over a period of a year. This study discloses the evaluation of the results of how cyber crime affected the cases, which were part of this study. The banks and higher education institutions felt that they were at an increased risk both externally and internally, which is likely to increase as the migration towards electronic commerce occurs. The insurance industry felt that they are not yet affected by external cyber crime attacks in this country.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Understanding and managing information infrastructure (II) security risks is a priority to most organizations dealing with information technology and information warfare (IW) scenarios today (Libicki, 2000). Traditional security risk analysis (SRA) was well suited to these tasks within the paradigm of computer security, where the focus was on securing tangible items such as computing and communications equipment (NCS,1996; Cramer, 1998). With the growth of information interchange and reliance on information infrastructure, the ability to understand where vulnerabilities lie within an organization, regardless of size, has become extremely difficult (NIPC, 1996). To place a value on the information that is owned and used by an organization is virtually an impossible task. The suitability of risk analysis to assist in managing IW and information infrastructure-related security risks is unqualified, however studies have been undertaken to build frameworks and methodologies for modeling information warfare attacks (Molander, Riddile, & Wilson, 1996; Johnson, 1997; Hutchinson & Warren, 2001) which will assist greatly in applying risk analysis concepts and methodologies to the burgeoning information technology security paradigm, information warfare.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The performance of different information criteria - namely Akaike, corrected Akaike (AICC), Schwarz-Bayesian (SBC), and Hannan-Quinn - is investigated so as to choose the optimal lag length in stable and unstable vector autoregressive (VAR) models both when autoregressive conditional heteroscedasticity (ARCH) is present and when it is not. The investigation covers both large and small sample sizes. The Monte Carlo simulation results show that SBC has relatively better performance in lag-choice accuracy in many situations. It is also generally the least sensitive to ARCH regardless of stability or instability of the VAR model, especially in large sample sizes. These appealing properties of SBC make it the optimal criterion for choosing lag length in many situations, especially in the case of financial data, which are usually characterized by occasional periods of high volatility. SBC also has the best forecasting abilities in the majority of situations in which we vary sample size, stability, variance structure (ARCH or not), and forecast horizon (one period or five). frequently, AICC also has good lag-choosing and forecasting properties. However, when ARCH is present, the five-period forecast performance of all criteria in all situations worsens.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This dissertation aims to look into the structure of the event Circuito Regional de Performance BodeArte1 to think how it collaborate with its proposal providing theoretical points to relevant questions to the comprehension of Brazilian performance art in contemporaneity, since its conceptual format until its occurrence and practical limitations. From this proposition the dissertation is organized into three chapters guided for the following aspects: the resumption of the events encompassed on the occurrence of Circuit BodeArte as well as a tabulation of the data reunited in its history, the presentation of its conceptual choices, and the metaphors conducted by the use of the term performance and how they can lead us to the idea of a performance-as-BodeArte. The methodological structures moved for this organization are qualitative, and have been formed from printed materials, texts, festival programs, blog, videos, photos, interviews, lectures and forums, plus our own memory as a producer and performer of the event, looking through these set points of the epistemological organization contained on the proposal of the Circuito, expanding and discussing them. This way this research moves between the propositions of this event in its three editions, promoting discussions that dialogue with concepts such as the emergence of Steve Johnson (2004), the metaphors of thought proposed by Christine Greiner (2005), the idea of performance hacker of Maria Beatriz de Medeiros (AQUINO, et al., 2012), as well as other propositions presented by Jan Swidzinski (2005) and Eleonora Fabião (2012)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we present the results of a coherent narrow-band search for continuous gravitational-wave signals from the Crab and Vela pulsars conducted on Virgo VSR4 data. In order to take into account a possible small mismatch between the gravitational-wave frequency and two times the star rotation frequency, inferred from measurement of the electromagnetic pulse rate, a range of 0.02 Hz around two times the star rotational frequency has been searched for both the pulsars. No evidence for a signal has been found and 95% confidence level upper limits have been computed assuming both that polarization parameters are completely unknown and that they are known with some uncertainty, as derived from x-ray observations of the pulsar wind torii. For Vela the upper limits are comparable to the spin-down limit, computed assuming that all the observed spin-down is due to the emission of gravitational waves. For Crab the upper limits are about a factor of 2 below the spin-down limit, and represent a significant improvement with respect to past analysis. This is the first time the spin-down limit is significantly overcome in a narrow-band search.