964 resultados para Secure Authentication for Broadcast (DNP3-SAB)


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Visitors to prison are generally innocent of committing crime, but their interaction with inmates has been studied as a possible incentive to reduce recidivism. The way visitors’ centres are currently designed takes in consideration mainly security principles and the needs of guards or prison management. The human experience of the relatives or friends aiming to provide emotional support to inmates is usually not considered; facilities have been designed with an approach that often discourages people from visiting. This paper discusses possible principles to design prison visitors’ centres taking in consideration practical needs, but also human factors. A comparative case study analysis of different secure typologies, like libraries, airports or children hospitals, provides suggestions about how to approach the design of prison in order to ensure the visitor is not punished for the crimes of those they are visiting.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A key derivation function is used to generate one or more cryptographic keys from a private (secret) input value. This paper proposes a new method for constructing a generic stream cipher based key derivation function. We show that our proposed key derivation function based on stream ciphers is secure if the underlying stream cipher is secure. We simulate instances of this stream cipher based key derivation function using three eStream finalist: Trivium, Sosemanuk and Rabbit. The simulation results show these stream cipher based key derivation functions offer efficiency advantages over the more commonly used key derivation functions based on block ciphers and hash functions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper details the processes and challenges involved in collecting inventory data from smallholder and community woodlots on Leyte Island, Philippines. Over the period from 2005 through to 2012, 253 woodlots at 170 sites were sampled as part of a large multidisciplinary project, resulting in a substantial timber inventory database. The inventory was undertaken to provide information for three separate but interrelated studies, namely (1) tree growth, performance and timber availability from private smallholder woodlots on Leyte Island; (2) tree growth and performance of mixed-species plantings of native species; and (3) the assessment of reforestation outcomes from various forms of reforestation. A common procedure for establishing plots within each site was developed and applied in each study, although the basis of site selection varied. A two-stage probability proportion to size sampling framework was developed to select smallholder woodlots for inclusion in the inventory. In contrast, community-based forestry woodlots were selected using stratified random sampling. Challenges encountered in undertaking the inventory were mostly associated with the need to consult widely before the commencement of the inventory and problems in identifying woodlots for inclusion. Most smallholder woodlots were only capable of producing merchantable volumes of less than 44 % of the site potential due to a lack of appropriate silviculture. There was a clear bimodal distribution of proportion that the woodlots comprised of the total smallholding area. This bimodality reflects two major motivations for smallholders to establish woodlots, namely timber production and to secure land tenure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

NAPLAN RESULTS HAVE gained socio-political prominence and have been used as indicators of educational outcomes for all students, including Indigenous students. Despite the promise of open and in-depth access to NAPLAN data as a vehicle for intervention, we argue that the use of NAPLAN data as a basis for teachers and schools to reduce variance in learning outcomes is insufficient. NAPLAN tests are designed to show statistical variance at the level of the school and the individual, yet do not factor in the sociocultural and cognitive conditions Indigenous students’ experience when taking the tests. We contend that further understanding of these influences may help teachers understand how to develop their classroom practices to secure better numeracy and literacy outcomes for all students. Empirical research findings demonstrate how teachers can develop their classroom practices from an understanding of the extraneous cognitive load imposed by test taking. We have analysed Indigenous students’ experience of solving mathematical test problems to discover evidence of extraneous cognitive load. We have also explored conditions that are more supportive of learning derived from a classroom intervention which provides an alternative way to both assess and build learning for Indigenous students. We conclude that conditions to support assessment for more equitable learning outcomes require a reduction in cognitive load for Indigenous students while maintaining a high level of expectation and participation in problem solving.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Reliability of the performance of biometric identity verification systems remains a significant challenge. Individual biometric samples of the same person (identity class) are not identical at each presentation and performance degradation arises from intra-class variability and inter-class similarity. These limitations lead to false accepts and false rejects that are dependent. It is therefore difficult to reduce the rate of one type of error without increasing the other. The focus of this dissertation is to investigate a method based on classifier fusion techniques to better control the trade-off between the verification errors using text-dependent speaker verification as the test platform. A sequential classifier fusion architecture that integrates multi-instance and multisample fusion schemes is proposed. This fusion method enables a controlled trade-off between false alarms and false rejects. For statistically independent classifier decisions, analytical expressions for each type of verification error are derived using base classifier performances. As this assumption may not be always valid, these expressions are modified to incorporate the correlation between statistically dependent decisions from clients and impostors. The architecture is empirically evaluated by applying the proposed architecture for text dependent speaker verification using the Hidden Markov Model based digit dependent speaker models in each stage with multiple attempts for each digit utterance. The trade-off between the verification errors is controlled using the parameters, number of decision stages (instances) and the number of attempts at each decision stage (samples), fine-tuned on evaluation/tune set. The statistical validation of the derived expressions for error estimates is evaluated on test data. The performance of the sequential method is further demonstrated to depend on the order of the combination of digits (instances) and the nature of repetitive attempts (samples). The false rejection and false acceptance rates for proposed fusion are estimated using the base classifier performances, the variance in correlation between classifier decisions and the sequence of classifiers with favourable dependence selected using the 'Sequential Error Ratio' criteria. The error rates are better estimated by incorporating user-dependent (such as speaker-dependent thresholds and speaker-specific digit combinations) and class-dependent (such as clientimpostor dependent favourable combinations and class-error based threshold estimation) information. The proposed architecture is desirable in most of the speaker verification applications such as remote authentication, telephone and internet shopping applications. The tuning of parameters - the number of instances and samples - serve both the security and user convenience requirements of speaker-specific verification. The architecture investigated here is applicable to verification using other biometric modalities such as handwriting, fingerprints and key strokes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It is apparent that IT resources are important for organisations. It is also clear that organisations unique competencies, their IT-related capabilities, leverage the IT resources uniquely to create and sustain competitive advantage. However, IT resources are dynamic, and evolve at an exponential rate. This means that organisations will need to sustain their competencies to leverage opportunities offered by new IT resources. Research on ways to sustain IT-related capabilities is limited and a deeper understanding of this situation is important. Amongst other factors, a possible reason for this lack of progress in this area could be due to the lack of validated measurement items of the theoretical constructs to conduct such studies. We suggest an environment in which organisations could build new and sustain their existing IT-related capabilities. We then report on the development of valid and reliable measures for this environment. The validated measures would be useful in extending our understanding on how firms could sustain their IT-related capabilities. This effort will provide a deeper understanding of how firms can secure sustainable IT-related business value from their acquired IT resources.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An accurate PV module electrical model is presented based on the Shockley diode equation. The simple model has a photo-current current source, a single diode junction and a series resistance, and includes temperature dependences. The method of parameter extraction and model evaluation in Matlab is demonstrated for a typical 60W solar panel. This model is used to investigate the variation of maximumpower point with temperature and insolation levels. A comparison of buck versus boostmaximum power point tracker (MPPT) topologies is made, and compared with a direct connection to a constant voltage (battery) load. The boost converter is shown to have a slight advantage over the buck, since it can always track the maximum power point.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper examines a number of issues in sustainable energy generation and distribution, and explores avenues that are available for integration of our society’s energy supplies. In particular, the paper presents a way in which transport vehicle energy supplies could be integrated with distributed generation schemes to achieve synergistic and beneficial outcomes. The worldwide energy system contains fundamental problems that result directly from the use of unsustainable fuels and a lack of energy system integration. There is a need to adopt an integrated, sustainable energy system for our society. The adoption of distributed generation could result in beneficial restructuring of the energy trade, and a change in the role of energy providers. Inherent benefits in distributed generation schemes would directly combat barriers to installation of renewable generation facilities, which might prove distributed renewable energy sources to be more feasible. The presence of fuel cells, batteries, power electronic inverters and intelligent controls in vehicles of the future provides many opportunities for the integration of vehicle energy supplies into a distributed generation scheme. In such a system, vehicles could play a major role in power generation and storage.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research investigates the extent to which the World Wide Web and the participatory news media culture have contributed to the democratisation of journalism since 1997. It examined the different ways in which public service and commercial news media models use digital platforms to fulfil their obligations as members of the Fourth Estate. The research found that the digital environment provides news organisations with greater scope for transparency, interactivity, collaboration and social networking compared to the traditional print and broadcast platforms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Research is a major driver of health care improvement and evidence-based practice is becoming the foundation of health care delivery. For health professions to develop within emerging models of health care delivery, it would seem imperative to develop and monitor the research capacity and evidence-based literacy of the health care workforce. This observational paper aims to report the research capacity levels of statewide populations of public-sector podiatrists at two different time points twelve-months apart. Methods The Research Capacity & Culture (RCC) survey was electronically distributed to all Queensland Health (Australia) employed podiatrists in January 2011 (n = 58) and January 2012 (n = 60). The RCC is a validated tool designed to measure indicators of research skill in health professionals. Participants rate skill levels against each individual, team and organisation statement on a 10-point scale (one = lowest, ten = highest). Chi-squared and Mann Whitney U tests were used to determine any differences between the results of the two survey samples. A minimum significance of p < 0.05 was used throughout. Results Thirty-seven (64%) podiatrists responded to the 2011 survey and 33 (55%) the 2012 survey. The 2011 survey respondents reported low skill levels (Median < 4) on most aspects of individual research aspects, except for their ability to locate and critically review research literature (Median > 6). Whereas, most reported their organisation’s skills to perform and support research at much higher levels (Median > 6). The 2012 survey respondents reported significantly higher skill ratings compared to the 2011 survey in individuals’ ability to secure research funding, submit ethics applications, and provide research advice, plus, in their organisation’s skills to support, fund, monitor, mentor and engage universities to partner their research (p < 0.05). Conclusions This study appears to report the research capacity levels of the largest populations of podiatrists published. The 2011 survey findings indicate podiatrists have similarly low research capacity skill levels to those reported in the allied health literature. The 2012 survey, compared to the 2011 survey, suggests podiatrists perceived higher skills and support to initiate research in 2012. This improvement coincided with the implementation of research capacity building strategies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nowadays, most of the infrastructure development projects undertaken are complex in nature. Practically, public clients who do not have a good understanding of the design and management may suffer severe losses, especially for infrastructure projects. There is a need for luring the right consultant to secure client's investment in infrastructure developments. Throughout the project life cycle, consultants play vital role from the inception to completion stage of a project. A few studies in Malaysia show that infrastructure projects involving irrigation and drainage have experience problems such as poor workmanship, delay and cost overrun due to the consultant's inability or the client incompetence of recruiting consultants in time. This highlights the need of aided decision making and an efficient system to select the best consultant by using Decision Support System (DSS). On the other hand, recent trends reveal that most DSS in construction only concentrate on decision model development. These models are impractical and unused as they are complicated or difficult for laymen such as project managers to utilize. Thus, this research attempts to develop an efficient DSS for consultant selection namely consultDeSS. Driven by the motivation and research aims, this study deployed Design Science Research Methodology (DSRM) dominant with a combination of case studies at the Malaysian Department of Irrigation and Drainage (DID). Two real projects involving irrigation and drainage infrastructure were used to design, implement and evaluate the artefact. The 3-tier consultDeSS was revised after the evaluation and the design was significantly improved based on user feedback. By developing desirable tools that fit client's needs will enhance the productivity and minimize conflict within groups and organisations. The tool is more usable and efficient compared to previous studies in construction. Thus, this research has demonstrated a purposeful artefact with a practical and valid structured development approach that is applicable in a variety of problems in construction discipline.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background & Aims: Access to sufficient amounts of safe and culturally-acceptable foods is a fundamental human right. Food security exists when all people, at all times, have physical, social, and economic access to sufficient, safe and nutritious food to meet their dietary needs and food preferences for an active and healthy life. Food insecurity therefore occurs when the availability or access to sufficient amounts of nutritionally-adequate, culturally-appropriate and safe foods, or, the ability to acquire such foods in socially-acceptable ways, is limited. Food insecurity may result in significant adverse effects for the individual and these outcomes may vary between adults and children. Among adults, food insecurity may be associated with overweight or obesity, poorer self-rated general health, depression, increased health-care utilisation and dietary intakes less consistent with national recommendations. Among children, food insecurity may result in poorer self or parent-reported general health, behavioural problems, lower levels of academic achievement and poor social outcomes. The majority of research investigating the potential correlates of food insecurity has been undertaken in the United States (US), where regular national screening for food insecurity is undertaken using a comprehensive multi-item measurement. In Australia, screening for food insecurity takes place on a three yearly basis via the use of a crude, single-item included in the National Health Survey (NHS). This measure has been shown to underestimate the prevalence of food insecurity by 5%. From 1995 – 2004, the prevalence of food insecurity among the Australian population remained stable at 5%. Due to the perceived low prevalence of this issue, screening for food insecurity was not undertaken in the most recent NHS. Furthermore, there are few Australian studies investigating the potential determinants of food insecurity and none investigating potential outcomes among adults and children. This study aimed to examine these issues by a) investigating the prevalence of food insecurity among households residing in disadvantaged urban areas and comparing prevalence rates estimated by the more comprehensive 18-item and 6-item United States Department of Agriculture (USDA) Food Security Survey Module (FSSM) to those estimated by the current single-item measure used for surveillance in Australia and b) investigating the potential determinants and outcomes of food insecurity, Methods: A comprehensive literature review was undertaken to investigate the potential determinants and consequences of food insecurity among developed countries. This was followed by a cross-sectional study in which 1000 households from the most disadvantaged 5% of Brisbane areas were sampled and data collected via mail-based survey (final response rate = 53%, n = 505). Data were collected for food security status, sociodemographic characteristics (household income, education, age, gender, employment status, housing tenure and living arrangements), fruit and vegetable intakes, meat and take-away consumption, presence of depressive symptoms, presence of chronic disease and body mass index (BMI) among adults. Among children, data pertaining to BMI, parent-reported general health, days away from school and activities and behavioural problems were collected. Rasch analysis was used to investigate the psychometric properties of the 18-, 10- and 6-item adaptations of the USDA-FSSM, and McNemar's test was used to investigate the difference in the prevalence of food insecurity as measured by these three adaptations compared to the current single-item measure used in Australia. Chi square and logistic regression were used to investigate the differences in dietary and health outcomes among adults and health and behavioural outcomes among children. Results were adjusted for equivalised household income and, where necessary, for indigenous status, education and family type. Results: Overall, 25% of households in these urbanised-disadvantaged areas reported experiencing food insecurity; this increased to 34% when only households with children were analysed. The current reliance on a single-item measure to screen for food insecurity may underestimate the true burden among the Australian population, as this measure was shown to significantly underestimate the prevalence of food insecurity by five percentage points. Internationally, major potential determinants of food insecurity included poverty and indicators of poverty, such as low-income, unemployment and lower levels of education. Ethnicity, age, transportation and cooking and financial skills were also found to be potential determinants of food insecurity. Among Australian adults in disadvantaged urban areas, food insecurity was associated with a three-fold increase in experiencing poorer self-rated general health and a two-to-five-fold increase in the risk of depression. Furthermore, adults from food insecure households were twoto- three times more likely to have seen a general practitioner and/or been admitted to hospital within the previous six months, compared to their food secure counterparts. Weight status and intakes of fruits, vegetables and meat were not associated with food insecurity. Among Australian households with children, those in the lowest tertile were over 16 times more likely to experience food insecurity compared to those in the highest tertile for income. After adjustment for equivalised household income, children from food insecure households were three times more likely to have missed days away from school or other activities. Furthermore, children from food insecure households displayed a two-fold increase in atypical emotions and behavioural difficulties. Conclusions: Food insecurity is an important public health issue and may contribute to the burden on the health care system through its associations with depression and increased health care utilisation among adults and behavioural and emotional problems among children. Current efforts to monitor food insecurity in Australia do not occur frequently and use a tool that may underestimate the prevalence of food insecurity. Efforts should be made to improve the regularity of screening for food insecurity via the use of a more accurate screening measure. Most of the current strategies that aim to alleviate food insecurity do not sufficiently address the issue of insufficient financial resources for acquiring food; a factor which is an important determinant of food insecurity. Programs to address this issue should be developed in collaboration with groups at higher risk of developing food insecurity and should incorporate strategies to address the issue of low income as a barrier to food acquisition.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Even though web security protocols are designed to make computer communication secure, it is widely known that there is potential for security breakdowns at the human-machine interface. This paper examines findings from a qualitative study investigating the identification of security decisions used on the web. The study was designed to uncover how security is perceived in an individual user's context. Study participants were tertiary qualified individuals, with a focus on HCI designers, security professionals and the general population. The study identifies that security frameworks for the web are inadequate from an interaction perspective, with even tertiary qualified users having a poor or partial understanding of security, of which they themselves are acutely aware. The result is that individuals feel they must protect themselves on the web. The findings contribute a significant mapping of the ways in which individuals reason and act to protect themselves on the web. We use these findings to highlight the need to design for trust at three levels, and the need to ensure that HCI design does not impact on the users' main identified protection mechanism: separation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent years there has been a noticeable move by various public institutions, such as public service broadcasters and community media organisations, to capture and disseminate the voices and viewpoints of ‘ordinary people’ through inviting them to share stories about their lives. One of the foremost objectives of many such projects is to provide under-represented individuals and groups with an opportunity to express and represent themselves; as such, the capture and broadcast of ‘authentic voices’ is a central value. This paper discusses the notion of ‘authentic voice’, and questions the framing role of public media organisations in storytelling projects that aim to provide individuals with space for self-expression and self-representation. It considers the ways in which tensions arise on multiple levels when individuals are asked to express and represent themselves within projects and spaces that are managed by institutions. This paper begins by discussing the challenges and opportunities that arise within storytelling projects that are facilitated by public institutions and community media arts organisations, and that aim to amplify the voices of “ordinary people” (Thumim, 2009). It examines ways in which ‘voice’ is facilitated, curated, broadcast and distributed within such projects, particularly questioning the ways in which project facilitation and the curation of stories for public broadcast can both help and hinder the amplification of ‘authentic voice’. Furthermore, we seek to discuss how ‘authentic voice’ is defined, and what is involved in the process of amplification. The paper moves on to discuss a case study in order to demonstrate some of the tensions that are evident within a storytelling project that is managed by a public institution – Australia’s national broadcaster – and the ways these tensions impact upon the capture and broadcast of an ‘authentic voice’ for project participants. The Australian Broadcasting Corporation’s (ABC) ‘Heywire’ project is a storytelling competition and website that aims to ‘give voice’ to 16-22 year olds who live in rural, regional and remote parts of Australia. Looking at tensions that exist on organisational, political and philosophical levels within the Heywire project reveals a number of conflicts of interest and objectives between the institution and project participants. This leads us to question whether institutionally-managed storytelling projects can effectively support individuals to have an ‘authentic voice’, and whether struggles of aims and objectives diminish the personal benefits that people may derive from expressing and representing themselves within such projects.