118 research outputs found

    Cliff top habitats provide important alternative feeding resources for wading birds of conservation importance wintering on non-estuarine coasts

    Get PDF
    Rocky shores and beaches are important over-wintering areas for non-estuarine waders but have rarely been studied. We examined cliff top habitat use by 6 species of wader over 75 km of coast to assess their potential value as alternative feeding sites to rocky and sandy shores. Both the regional and local survey showed that waders occurred on golf courses and recreational grasslands in higher frequencies than expected but arable and pasture use was lower than expected. We also compared local wader densities on rocky and sandy shores, pastures, golf courses, caravan parks and recreational grasslands over two winters. Sanderling predominantly fed on the beach whereas Oystercatcher, Dunlin, Turnstone and Redshank numbers significantly increased on golf courses and recreational grasslands over the winter period, with pasture being rarely used. General linear models were used to relate environmental factors to the presence and absence of each species on the cliff top habitats. Redshank was the only species that showed a higher probability of occurrence on cliff top habitats at high tide whereas the probability of Turnstone, Oystercatcher and Redshank occurring increased as temperatures declined. Using core sampling, we determined that invertebrate richness and abundance was significantly higher on the recreational grasslands and golf courses than on the pasture or the beach. Our data demonstrated that cliff top habitats are important alternative feeding areas for over-wintering waders in areas where the intertidal is bounded by cliffs. Current management creates short sward, open field habitats with a diverse and abundant invertebrate food supply exploited by waders. Any alterations to the land use of these areas should be carefully considered by planning authorities in light of the fact that they support species that are of conservation concern

    Quantitative chemical analysis of perovskite deposition using spin coating

    Get PDF
    Lead and halide ion compositions of spin coated organo-lead halide perovskite films have been quantified using ion chromatography (IC) and atomic absorption spectroscopy (AAS) using perovskite films manufactured by 5 different researchers (3 replicates per treatment) to monitor variability between researchers and individual researcher reproducibility. Planar and mesoporous TiO2-coated glass substrates have been studied along with tribromide (CH3NH3PbBr3), triiodide (CH3NH3PbI3) and mixed halide (CH3NH3PbI3�xClx) perovskite films. The data show low yields of spin coated perovskite material (ca. 1%) and preferential deposition of I� over Cl� in mixed halide films

    Gamification techniques for raising cyber security awareness

    Get PDF
    Due to the prevalence of online services in modern society, such as internet banking and social media, it is important for users to have an understanding of basic security measures in order to keep themselves safe online. However, users often do not know how to make their online interactions secure, which demonstrates an educational need in this area. Gamification has grown in popularity in recent years and has been used to teach people about a range of subjects. This paper presents an exploratory study investigating the use of gamification techniques to educate average users about password security, with the aim of raising overall security awareness. To explore the impact of such techniques, a role-playing quiz application (RPG) was developed for the Android platform to educate users about password security. Results gained from the work highlightedthat users enjoyed learning via the use of the password application, and felt they benefitted from the inclusion of gamification techniques. Future work seeks to expand the prototype into a full solution, covering a range of security awareness issues

    Device- versus Network-Centric Authentication Paradigms for Mobile Devices: Operational and Perceptual Trade-Offs

    Get PDF
    The increasing capability and functionality of mobile devices is leading to a corresponding increase in the need for security to prevent unauthorised access. Indeed, as the data and services accessed via mobile devices become more sensitive, the existing method of user authentication (predominately based upon Personal Identification Numbers) appears increasingly insufficient. An alternative basis for authentication is offered by biometric approaches; which have the potential to be implemented in a non-intrusive manner and also enable authentication to be applied in an ongoing manner, beyond initial point-of-entry. However, the implementation of any authentication mechanism, particularly biometric approaches, introduces considerations of where the main elements of functionality (such as the processing of authentication data, decisions making, and storing user templates/profiles) should reside. At the extremes, there are two alternatives: a device-centric paradigm, in which the aforementioned aspects are handled locally; or a network-centric paradigm, in which the actions occur remotely and under the jurisdiction of the network operator. This paper examines the alternatives and determines that each context introduces considerations in relation to the privacy of user data, the processing and storage of authentication data, network bandwidth demands, and service availability. In view of the various advantages and disadvantages, it is concluded that a hybrid approach represents the most feasible solution; enabling data storage and processing to be split between the two locations depending upon individual circumstances. This represents the most flexible approach, and will enable an authentication architecture to be more adaptable to the needs of different users, devices and security requirements

    E-Invigilator: A biometric-based supervision system for e-Assessments

    Get PDF
    The creation of Virtual Learning Environments (VLEs) have revolutionized the online delivery of learning materials, from traditional lectures slides through to podcasts, blogs and wikis. However, such advances in how we assess such learning have not evolved - with physical attendance at proctored exams still a necessity for formal assessments. This paper presents a novel model to enable remote and electronic invigilation of students during formal assessment. The approach utilizes transparent authentication to provide for a non-intrusive and continuous verification of the candidates identity throughout the examination timeframe. A prototype is developed and a technology evaluation of the platform demonstrates the feasibility of the approach

    Towards An Automated Forensic Examiner (AFE) Based Upon Criminal Profiling & Artificial Intelligence

    Get PDF
    Digital forensics plays an increasingly important role within society as the approach to the identification of criminal and cybercriminal activities. It is however widely known that a combination of the time taken to undertake a forensic investigation, the volume of data to be analysed and the number of cases to be processed are all significantly increasing resulting in an ever growing backlog of investigations and mounting costs. Automation approaches have already been widely adopted within digital forensic processes to speed up the identification of relevant evidence – hashing for notable files, file signature analysis and data carving to name a few. However, to date, little research has been undertaken in identifying how more advanced techniques could be applied to perform “intelligent” processing of cases. This paper proposes one such approach, the Automated Forensic Examiner (AFE) that seeks to apply artificial intelligence to the problem of sorting and identifying relevant artefacts. The proposed approach utilises a number of techniques, including a technical competency measure, a dynamic criminal knowledge base and visualisation to provide an investigator with an in depth understanding of the case. The paper also describes how its implementation within a cloud based infrastructure will also permit a more timely and cost effective solution
    • …
    corecore