967 resultados para MARC format


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Management of the industrial nations' hazardous waste is a current and exponentially increasing, global threatening situation. Improved environmental information must be obtained and managed concerning the current status, temporal dynamics and potential future status of these critical sites. To test the application of spatial environmental techniques to the problem of hazardous waste sites, as Superfund (CERCLA) test site was chosen in an industrial/urban valley experiencing severe TCE, PCE, and CTC ground water contamination. A paradigm is presented for investigating spatial/environmental tools available for the mapping, monitoring and modelling of the environment and its toxic contaminated plumes. This model incorporates a range of technical issues concerning the collection of data as augmented by remotely sensed tools, the format and storage of data utilizing geographic information systems, and the analysis and modelling of environment through the use of advance GIS analysis algorithms and geophysic models of hydrologic transport including statistical surface generation. This spatial based approach is evaluated against the current government/industry standards of operations. Advantages and lessons learned of the spatial approach are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The article introduces a novel platform for conducting controlled and risk-free driving and traveling behavior studies, called Cyber-Physical System Simulator (CPSS). The key features of CPSS are: (1) simulation of multiuser immersive driving in a threedimensional (3D) virtual environment; (2) integration of traffic and communication simulators with human driving based on dedicated middleware; and (3) accessibility of multiuser driving simulator on popular software and hardware platforms. This combination of features allows us to easily collect large-scale data on interesting phenomena regarding the interaction between multiple user drivers, which is not possible with current single-user driving simulators. The core original contribution of this article is threefold: (1) we introduce a multiuser driving simulator based on DiVE, our original massively multiuser networked 3D virtual environment; (2) we introduce OpenV2X, a middleware for simulating vehicle-to-vehicle and vehicle to infrastructure communication; and (3) we present two experiments based on our CPSS platform. The first experiment investigates the “rubbernecking” phenomenon, where a platoon of four user drivers experiences an accident in the oncoming direction of traffic. Second, we report on a pilot study about the effectiveness of a Cooperative Intelligent Transport Systems advisory system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Surface Ocean Aerosol Production (SOAP) study was undertaken in February/March 2012 in the biologically active waters of the Chatham Rise, NZ. Aerosol hygroscopicity and volatility were examined with a volatility hygroscopicity tandem differential mobility analyser. These observations confirm results from other hygroscopicity-based studies that the dominant fraction of the observed remote marine particles were non-sea salt sulfates. Further observations are required to clarify the influences of seawater composition, meteorology and analysis techniques seasonally across different ocean basins.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

One of the concerns about the use of Bluetooth MAC Scanner (BMS) data, especially from urban arterial, is the bias in the travel time estimates from multiple Bluetooth devices being transported by a vehicle. For instance, if a bus is transporting 20 passengers with Bluetooth equipped mobile phones, then the discovery of these mobile phones by BMS will be considered as 20 different vehicles, and the average travel time along the corridor estimated from the BMS data will be biased with the travel time from the bus. This paper integrates Bus Vehicle Identification system with BMS network to empirically evaluate such bias, if any. The paper also reports an interesting finding on the uniqueness of MAC IDs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There has been tremendous interest in watermarking multimedia content during the past two decades, mainly for proving ownership and detecting tamper. Digital fingerprinting, that deals with identifying malicious user(s), has also received significant attention. While extensive work has been carried out in watermarking of images, other multimedia objects still have enormous research potential. Watermarking database relations is one of the several areas which demand research focus owing to the commercial implications of database theft. Recently, there has been little progress in database watermarking, with most of the watermarking schemes modeled after the irreversible database watermarking scheme proposed by Agrawal and Kiernan. Reversibility is the ability to re-generate the original (unmarked) relation from the watermarked relation using a secret key. As explained in our paper, reversible watermarking schemes provide greater security against secondary watermarking attacks, where an attacker watermarks an already marked relation in an attempt to erase the original watermark. This paper proposes an improvement over the reversible and blind watermarking scheme presented in [5], identifying and eliminating a critical problem with the previous model. Experiments showing that the average watermark detection rate is around 91% even with attacker distorting half of the attributes. The current scheme provides security against secondary watermarking attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The cryptographic hash function literature has numerous hash function definitions and hash function requirements, and many of them disagree. This survey talks about the various definitions, and takes steps towards cleaning up the literature by explaining how the field has evolved and accurately depicting the research aims people have today.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Implementation of an electronic tendering (e-tendering) systems requires careful attention to the needs of the system and its various participants. Fairness in an e-tendering is of utmost importance. Current proposals and implementations do not provide fairness and thus, are vulnerable to collusion and favourism. Dishonest participants, either the principal or tenderer may collude to alter or view competing tenders which would give the favoured tenderer a greater chance of winning the contract. This paper proposes an e-tendering system that is secure and fair to all participants. We employ the techniques of anonymous token system along with signed commitment approach to achieve a publicly verifiable fair e-tendering protocol. We also provide an analysis of the protocol that confirms the security of our proposal against security goals for an e-tendering system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The M¨obius transform of Boolean functions is often involved in cryptographic design and analysis. As studied previously, a Boolean function f is said to be coincident if it is identical with its M¨obius transform fμ, i.e., f = fμ...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We identify the 10 major terrestrial and marine ecosystems in Australia most vulnerable to tipping points, in which modest environmental changes can cause disproportionately large changes in ecosystem properties. To accomplish this we independently surveyed the coauthors of this paper to produce a list of candidate ecosystems, and then refined this list during a 2-day workshop. The list includes (1) elevationally restricted mountain ecosystems, (2) tropical savannas, (3) coastal floodplains and wetlands, (4) coral reefs, (5) drier rainforests, (6) wetlands and floodplains in the Murray-Darling Basin, (7) the Mediterranean ecosystems of southwestern Australia, (8) offshore islands, (9) temperate eucalypt forests, and (10) salt marshes and mangroves. Some of these ecosystems are vulnerable to widespread phase-changes that could fundamentally alter ecosystem properties such as habitat structure, species composition, fire regimes, or carbon storage. Others appear susceptible to major changes across only part of their geographic range, whereas yet others are susceptible to a large-scale decline of key biotic components, such as small mammals or stream-dwelling amphibians. For each ecosystem we consider the intrinsic features and external drivers that render it susceptible to tipping points, and identify subtypes of the ecosystem that we deem to be especially vulnerable. © 2011 Elsevier Ltd.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Trivium is a stream cipher candidate of the eStream project. It has successfully moved into phase three of the selection process under the hardware category. No attacks faster than the exhaustive search have so far been reported on Trivium. Bivium-A and Bivium-B are simplified versions of Trivium that are built on the same design principles but with two registers. The simplified design is useful in investigating Trivium type ciphers with a reduced complexity and provides insight into effective attacks which could be extended to Trivium. This paper focuses on an algebraic analysis which uses the boolean satisfiability problem in propositional logic. For reduced variants of the cipher, this analysis recovers the internal state with a minimal amount of keystream observations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the current market, extensive software development is taking place and the software industry is thriving. Major software giants have stated source code theft as a major threat to revenues. By inserting an identity-establishing watermark in the source code, a company can prove it's ownership over the source code. In this paper, we propose a watermarking scheme for C/C++ source codes by exploiting the language restrictions. If a function calls another function, the latter needs to be defined in the code before the former, unless one uses function pre-declarations. We embed the watermark in the code by imposing an ordering on the mutually independent functions by introducing bogus dependency. Removal of dependency by the attacker to erase the watermark requires extensive manual intervention thereby making the attack infeasible. The scheme is also secure against subtractive and additive attacks. Using our watermarking scheme, an n-bit watermark can be embedded in a program having n independent functions. The scheme is implemented on several sample codes and performance changes are analyzed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents the details of an experimental study of a cold-formed steel hollow flange channel beam known as LiteSteel Beam (LSB) subject to web crippling actions (ETF and ITF). Due to the geometry of the LSB, as well as its unique residual stress characteristics and initial geometric imperfections resultant of manufacturing processes, much of the existing research for common cold-formed steel sections is not directly applicable to LSB. Experimental and numerical studies have been carried out to evaluate the behaviour and design of LSBs subject to pure bending actions, predominant shear actions and combined actions. To date, however, no investigation has been conducted into the web crippling behaviour and strength of LSB sections under ETF and ITF load conditions. Hence experimental studies were conducted to assess the web crippling behaviour and strengths of LSBs. Twenty eight web crippling tests were conducted and the results were compared with the current AS/NZS 4600[1] and AISI S100 [2]design equations. Comparison of the ultimate web crippling capacities from tests showed that AS/NZS 4600[1] and AISI S100 [2] design equations are unconservative for LSB sections under ETF and ITF load cases. Hence new equations were proposed to determine the web crippling capacities of LSBs. Suitable design rules were also developed under the DSM format.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aims To evaluate if a revamped business management course for 4th year undergraduate pharmacy students had achieved the course aims of not only improving pharmacy students’ perceived understanding of pharmacy business management topics but also increasing their confidence in their business management knowledge and skills. Background Student feedback from previous years had indicated that the cohort had struggled to translate theoretical business management concepts learned in the classroom into practice in the workplace. To address this problem the course has been changed to a ‘flipped classroom’ format with face-to-face time focusing on case-based scenarios and interactive classroom discussion with some role plays. Method Both course assessment throughout the semester and a student survey informed the evaluation process. Results After completing the course, students felt they had increased their knowledge of business management concepts but many indicated that they lacked the confidence to undertake basic management functions. Conclusions Further course restructuring is required with a greater focus on skills development.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The selection of cytochrome P450 enzymes from large variant libraries, and the subsequent use of these enzymes in preparative scale biotransformations, remains a formidable challenge due to the complexities of the associated electron transport systems. Here, a powerful approach for the generation and screening of P450cam libraries for new function is presented that is both flexible and robust. A targeted library was generated wherein only the P450cam active-site amino acids Y96 and F98 were fully randomized and biotransformations, using a novel P450cam whole-cell system, were screened by GC–MS for the hydroxylation of diphenylmethane. One in 50 of the reactions screened, including 16 different variants, produced 4-hydroxydiphenylmethane with up to 92% conversion observed in the case of the Y96A variant. These results demonstrate a primary example of the screening of P450cam libraries in a format that is compatible with extension to preparative scale reactions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objectives To review the effects of physical activity on health and behavior outcomes and develop evidence-based recommendations for physical activity in youth. Study design A systematic literature review identified 850 articles; additional papers were identified by the expert panelists. Articles in the identified outcome areas were reviewed, evaluated and summarized by an expert panelist. The strength of the evidence, conclusions, key issues, and gaps in the evidence were abstracted in a standardized format and presented and discussed by panelists and organizational representatives. Results Most intervention studies used supervised programs of moderate to vigorous physical activity of 30 to 45 minutes duration 3 to 5 days per week. The panel believed that a greater amount of physical activity would be necessary to achieve similar beneficial effects on health and behavioral outcomes in ordinary daily circumstances (typically intermittent and unsupervised activity). Conclusion School-age youth should participate daily in 60 minutes or more of moderate to vigorous physical activity that is developmentally appropriate, enjoyable, and involves a variety of activities.