999 resultados para Traffic Records.


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since World War II, however, the term has increasingly referred to law enforcement operations, as a means to enforce trade sanctions, to prevent the movement of weapons of mass destruction (WMDs), and particularly in the Caribbean Sea, to prevent the smuggling of illicit drugs. Such ambiguity should allow flexibility when deciding whom should be targeted, as well as allowing states with veto powers in the UN Security Council, which may legitimately ship nuclear weapons and materials, to avoid being targeted as long as they do not export WMDs to rogue states or non-state groups or individuals.2 The ISPS Code was created under the auspices of the International Maritime Organization (IMO) and is part of the 1974 Safety of Life at Sea Convention (SOLAS) concerning the safety of merchant ships.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

During action research projects a great deal of written material is produced. Some of this is data generated about the project, some about the process of the research and some is reflective writing about the researcher(s). In this article I propose that a deliberate focus on the tracking of texts might be helpful in action research, particularly if the inquiry is working within significant constraints. Working with a range of documents and informed by the work of Dorothy Smith on the texting of ruling relations, I show how a multiagency project based in one school slipped away from its original community development goals into a more 'professional service' model. I also show how the project was able to resist partially the requirement by the funding body to use a rational strategic planning model through the production of taped conversations and meta-analytic papers. Although this is a single case, I contend that this example points to the potential utility of an explicit focus on the textual practices of action research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A traffic control device in the form of a humanoid character robot, doll or dummy is used to warn driver of danger ahead on the road. The device can be used on roads, streets and in other sites where there are moving vehicles. The robotic device informs drivers of impending danger by moving its arms and sounding an acoustic alarm. In this way the robot can simulate a policeman or road flagging operator. The device may also include speed detection and preferably speed indication means. The robot may make decisions based on the detected speed of a vehicle and the limit for the area in operating the arms and sound warning means. The robot may also be equipped with a camera or video. The robot may also be controlled wirelessly.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents an innovative fusion-based multi-classifier e-mail classification on a ubiquitous multicore architecture. Many previous approaches used text-based single classifiers to identify spam messages from a large e-mail corpus with some amount of false positive tradeoffs. Researchers are trying to prevent false positive in their filtering methods, but so far none of the current research has claimed zero false positive results. In e-mail classification false positive can potentially cause serious problems for the user. In this paper, we use fusion-based multi-classifier classification technique in a multi-core framework. By running each classifier process in parallel within their dedicated core, we greatly improve the performance of our multi-classifier-based filtering system in terms of running time, false positive rate, and filtering accuracy. Our proposed architecture also provides a safeguard of user mailbox from different malicious attacks. Our experimental results show that we achieved an average of 30% speedup at an average cost of 1.4 ms. We also reduced the instances of false positives, which are one of the key challenges in a spam filtering system, and increases e-mail classification accuracy substantially compared with single classification techniques.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines the value of real-time traffic information gathered through Geographic Information Systems for achieving an optimal vehicle routing within a dynamically stochastic transportation network. We present a systematic approach in determining the dynamically varying parameters and implementation attributes that were used for the development of a Web-based transportation routing application integrated with real-time GIS services. We propose and implement an optimal routing algorithm by modifying Dijkstra’s algorithm in order to incorporate stochastically changing traffic flows. We describe the significant features of our Web application in making use of the real-time dynamic traffic flow information from GIS services towards achieving total costs savings and vehicle usage reduction. These features help users and vehicle drivers in improving their service levels and productivity as the Web application enables them to interactively find the optimal path and in identifying destinations effectively.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction: Cost-effectiveness analyses are important tools in efforts to prioritise interventions for obesity prevention.
Modelling facilitates evaluation of multiple scenarios with varying assumptions. This study compares the cost-effectiveness of
conservative scenarios for two commonly proposed policy-based interventions: front-of-pack ‘traffic-light’ nutrition labelling
(traffic-light labelling) and a tax on unhealthy foods (‘junk-food’ tax).
Methods: For traffic-light labelling, estimates of changes in energy intake were based on an assumed 10% shift in consumption
towards healthier options in four food categories (breakfast cereals, pastries, sausages and preprepared meals) in 10% of adults. For the ‘junk-food’ tax, price elasticities were used to estimate a change in energy intake in response to a 10% price increase in seven food categories (including soft drinks, confectionery and snack foods). Changes in population weight and body mass index by sex were then estimated based on these changes in population energy intake, along with subsequent impacts on disability-adjusted life years (DALYs). Associated resource use was measured and costed using pathway analysis, based on a health sector perspective (with some industry costs included). Costs and health outcomes were discounted at 3%. The cost-effectiveness of each intervention was modelled for the 2003 Australian adult population.
Results: Both interventions resulted in reduced mean weight (traffic-light labelling: 1.3 kg (95% uncertainty interval (UI): 1.2;
1.4); ‘junk-food’ tax: 1.6 kg (95% UI: 1.5; 1.7)); and DALYs averted (traffic-light labelling: 45 100 (95% UI: 37 700; 60 100);
‘junk-food’ tax: 559 000 (95% UI: 459 500; 676 000)). Cost outlays were AUD81 million (95% UI: 44.7; 108.0) for traffic-light
labelling and AUD18 million (95% UI: 14.4; 21.6) for ‘junk-food’ tax. Cost-effectiveness analysis showed both interventions were
‘dominant’ (effective and cost-saving).
Conclusion: Policy-based population-wide interventions such as traffic-light nutrition labelling and taxes on unhealthy foods are
likely to offer excellent ‘value for money’ as obesity prevention measures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Distributed denial of service (DDoS) attack is a continuous critical threat to the Internet. Derived from the low layers, new application-layer-based DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. The case may be more serious when suchattacks mimic or occur during the flash crowd event of a popular Website. In this paper, we present the design and implementation of CALD, an architectural extension to protect Web servers against various DDoS attacks that masquerade as flash crowds. CALD provides real-time detection using mess tests but is different from other systems that use resembling methods. First, CALD uses a front-end sensor to monitor thetraffic that may contain various DDoS attacks or flash crowds. Intense pulse in the traffic means possible existence of anomalies because this is the basic property of DDoS attacks and flash crowds. Once abnormal traffic is identified, the sensor sends ATTENTION signal to activate the attack detection module. Second, CALD dynamically records the average frequency of each source IP and check the total mess extent. Theoretically, the mess extent of DDoS attacks is larger than the one of flash crowds. Thus, with some parameters from the attack detection module, the filter is capable of letting the legitimate requests through but the attack traffic stopped. Third, CALD may divide the security modules away from the Web servers. As a result, it keeps maximum performance on the kernel web services, regardless of the harassment from DDoS. In the experiments, the records from www.sina.com and www.taobao.com have proved the value of CALD.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Identifying applications and classifying network traffic flows according to their source applications are critical for a broad range of network activities. Such a decision can be based on packet header fields, packet payload content, statistical characteristics of traffic and communication patterns of network hosts. However, most present techniques rely on some sort of apriori knowledge, which means they require labor-intensive preprocessing before running and cannot deal with previously unknown applications. In this paper, we propose a traffic classification system based on application signatures, with a novel approach to fully automate the process of deriving signatures from unidentified traffic. The key idea is to integrate statistics-based flow clustering with payload-based signature matching method, so as to eliminate the requirement of pre-labeled training data sets. We evaluate the efficiency of our approach using real-world traffic trace, and the results indicate that signature classifiers built from clustered data and pre-labeled data are able to achieve similar high accuracy better than 99%.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

During periods of high energy demand an animal may be constrained by a physiological maximum to its energy intake rate. Predictions by allometric equations describing this maximum for endotherms were significantly surpassed during a few recent laboratory experiments on birds and mammals, being given access to food 24 h day-1. How relevant this is in the field remains to be assessed. We predicted that Bewick’s swans Cygnus columbianus bewickii might surpass this maximum during stopover on their migration. We determined intake rate by measuring initial and final biomass density, and dividing the biomass difference by the feeding time required to reach this difference. This feeding time was given by the functional response. After conversion to daily energy intake rates, these exceeded the previously assumed maximum on two of the three stopover sites studied. The exception was a stopover site where daily foraging time was limited by the tidal cycle. Our study confirms that intake rates may exceed the formerly generally supposed maximum under natural conditions when foraging is possible day and night.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report provides a brief report detailing the methods and approach used to classify the 2007-2009 theses by ANZSRC Fields of Research codes and any recommendations.