714 resultados para Multi-User Detention


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports findings from a study of user behaviours and intentions towards online news and information in Australia, undertaken by the Queensland University of Technology Creative Industries Faculty and the Smart Services Cooperative Research Centre. It has used a literature review, online survey, focus groups and interviews to explore attitudes and behaviours towards online news and information. The literature review on consumer user of online media highlighted emerging technical opportunities, and flagged existing barriers to access experienced by consumers in the Australian digital media sector. The literature review highlighted multiple disconnects between consumer interests in online news and their ability to fulfil them. This presents an opportunity for news entities to appraise and resolve. Doing so may enhance their service offering, attract consumers and improve loyalty. These themes were further explored by the survey. The survey results revealed three typologies of user, described as ‘convenience’, ‘loyal’ and ‘customising’. Convenience users tend to access news by default, for example when they log out of email. Loyal users seek out a trusted brand such as mainstream news mastheads. Customising users tend to tailor news to their preferences, and be the first to use leading edge media. Respondents to the survey were then invited to participate in focus groups, which aimed to test the survey results. Consumer perceptions and attitudes are important factors in progression towards an information economy, because ultimately consumers are customers. By segmenting the online news market according to customer typology, media providers may identify new opportunities to attract and retain customers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tzeng et al. proposed a new threshold multi-proxy multi-signature scheme with threshold verification. In their scheme, a subset of original signers authenticates a designated proxy group to sign on behalf of the original group. A message m has to be signed by a subset of proxy signers who can represent the proxy group. Then, the proxy signature is sent to the verifier group. A subset of verifiers in the verifier group can also represent the group to authenticate the proxy signature. Subsequently, there are two improved schemes to eliminate the security leak of Tzeng et al.’s scheme. In this paper, we have pointed out the security leakage of the three schemes and further proposed a novel threshold multi-proxy multi-signature scheme with threshold verification.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Association rule mining is one technique that is widely used when querying databases, especially those that are transactional, in order to obtain useful associations or correlations among sets of items. Much work has been done focusing on efficiency, effectiveness and redundancy. There has also been a focusing on the quality of rules from single level datasets with many interestingness measures proposed. However, with multi-level datasets now being common there is a lack of interestingness measures developed for multi-level and cross-level rules. Single level measures do not take into account the hierarchy found in a multi-level dataset. This leaves the Support-Confidence approach,which does not consider the hierarchy anyway and has other drawbacks, as one of the few measures available. In this paper we propose two approaches which measure multi-level association rules to help evaluate their interestingness. These measures of diversity and peculiarity can be used to help identify those rules from multi-level datasets that are potentially useful.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Association rule mining has made many advances in the area of knowledge discovery. However, the quality of the discovered association rules is a big concern and has drawn more and more attention recently. One problem with the quality of the discovered association rules is the huge size of the extracted rule set. Often for a dataset, a huge number of rules can be extracted, but many of them can be redundant to other rules and thus useless in practice. Mining non-redundant rules is a promising approach to solve this problem. In this paper, we firstly propose a definition for redundancy; then we propose a concise representation called Reliable basis for representing non-redundant association rules for both exact rules and approximate rules. An important contribution of this paper is that we propose to use the certainty factor as the criteria to measure the strength of the discovered association rules. With the criteria, we can determine the boundary between redundancy and non-redundancy to ensure eliminating as many redundant rules as possible without reducing the inference capacity of and the belief to the remaining extracted non-redundant rules. We prove that the redundancy elimination based on the proposed Reliable basis does not reduce the belief to the extracted rules. We also prove that all association rules can be deduced from the Reliable basis. Therefore the Reliable basis is a lossless representation of association rules. Experimental results show that the proposed Reliable basis can significantly reduce the number of extracted rules.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the most predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For many, an interest in Human-Computer Interaction is equivalent to an interest in usability. However, using computers is only one way of relating to them, and only one topic from which we can learn about interactions between people and technology. Here, we focus on not using computers – ways not to use them, aspects of not using them, what not using them might mean, and what we might learn by examining non-use as seriously as we examine use.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The study reported here, constitutes a full review of the major geological events that have influenced the morphological development of the southeast Queensland region. Most importantly, it provides evidence that the region’s physiography continues to be geologically ‘active’ and although earthquakes are presently few and of low magnitude, many past events and tectonic regimes continue to be strongly influential over drainage, morphology and topography. Southeast Queensland is typified by highland terrain of metasedimentary and igneous rocks that are parallel and close to younger, lowland coastal terrain. The region is currently situated in a passive margin tectonic setting that is now under compressive stress, although in the past, the region was subject to alternating extensional and compressive regimes. As part of the investigation, the effects of many past geological events upon landscape morphology have been assessed at multiple scales using features such as the location and orientation of drainage channels, topography, faults, fractures, scarps, cleavage, volcanic centres and deposits, and recent earthquake activity. A number of hypotheses for local geological evolution are proposed and discussed. This study has also utilised a geographic information system (GIS) approach that successfully amalgamates the various types and scales of datasets used. A new method of stream ordination has been developed and is used to compare the orientation of channels of similar orders with rock fabric, in a topologically controlled approach that other ordering systems are unable to achieve. Stream pattern analysis has been performed and the results provide evidence that many drainage systems in southeast Queensland are controlled by known geological structures and by past geological events. The results conclude that drainage at a fine scale is controlled by cleavage, joints and faults, and at a broader scale, large river valleys, such as those of the Brisbane River and North Pine River, closely follow the location of faults. These rivers appear to have become entrenched by differential weathering along these planes of weakness. Significantly, stream pattern analysis has also identified some ‘anomalous’ drainage that suggests the orientations of these watercourses are geologically controlled, but by unknown causes. To the north of Brisbane, a ‘coastal drainage divide’ has been recognized and is described here. The divide crosses several lithological units of different age, continues parallel to the coast and prevents drainage from the highlands flowing directly to the coast for its entire length. Diversion of low order streams away from the divide may be evidence that a more recent process may be the driving force. Although there is no conclusive evidence for this at present, it is postulated that the divide may have been generated by uplift or doming associated with mid-Cenozoic volcanism or a blind thrust at depth. Also north of Brisbane, on the D’Aguilar Range, an elevated valley (the ‘Kilcoy Gap’) has been identified that may have once drained towards the coast and now displays reversed drainage that may have resulted from uplift along the coastal drainage divide and of the D’Aguilar blocks. An assessment of the distribution and intensity of recent earthquakes in the region indicates that activity may be associated with ancient faults. However, recent movement on these faults during these events would have been unlikely, given that earthquakes in the region are characteristically of low magnitude. There is, however, evidence that compressive stress is building and being released periodically and ancient faults may be a likely place for this stress to be released. The relationship between ancient fault systems and the Tweed Shield Volcano has also been discussed and it is suggested here that the volcanic activity was associated with renewed faulting on the Great Moreton Fault System during the Cenozoic. The geomorphology and drainage patterns of southeast Queensland have been compared with expected morphological characteristics found at passive and other tectonic settings, both in Australia and globally. Of note are the comparisons with the East Brazilian Highlands, the Gulf of Mexico and the Blue Ridge Escarpment, for example. In conclusion, the results of the study clearly show that, although the region is described as a passive margin, its complex, past geological history and present compressive stress regime provide a more intricate and varied landscape than would be expected along typical passive continental margins. The literature review provides background to the subject and discusses previous work and methods, whilst the findings are presented in three peer-reviewed, published papers. The methods, hypotheses, suggestions and evidence are discussed at length in the final chapter.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Network Jamming systems provide real-time collaborative performance experiences for novice or inexperienced users. In this paper we will outline the interaction design considerations that have emerged during through evolutionary development cycles of the jam2jam Network Jamming software that employs generative techniques that require particular attention to the human computer relationship. In particular we describe the co-evolution of features and uses, explore the role of agile development methods in supporting this evolution, and show how the provision of a clear core capability can be matched with options for enhanced features support multi-levelled user experience and skill develop.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider a new form of authenticated key exchange which we call multi-factor password-authenticated key exchange, where session establishment depends on successful authentication of multiple short secrets that are complementary in nature, such as a long-term password and a one-time response, allowing the client and server to be mutually assured of each other's identity without directly disclosing private information to the other party. Multi-factor authentication can provide an enhanced level of assurance in higher-security scenarios such as online banking, virtual private network access, and physical access because a multi-factor protocol is designed to remain secure even if all but one of the factors has been compromised. We introduce a security model for multi-factor password-authenticated key exchange protocols, propose an efficient and secure protocol called MFPAK, and provide a security argument to show that our protocol is secure in this model. Our security model is an extension of the Bellare-Pointcheval-Rogaway security model for password-authenticated key exchange and accommodates an arbitrary number of symmetric and asymmetric authentication factors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As user involvement becomes a necessary part of the product development process, various ways of accessing users' latent needs have been developed and studied. Reviews of literatures in user involvement and product development have revealed that accessing users' latent needs and transferring them into design process could be facilitated by effectively implementing user-designer collaboration during the early stage of the design process. In this paper, various types of user-designer collaboration were observed and then distinct characteristics of user-designer collaboration were classified into three categories. 1) Passive objectivity, 2) workplace democratisation, and 3) shared contexts were observed as strategies for better user-designer collaboration, which have been employed in the area of user-centred design, user participatory design and design for experiencing. Based on the literature review, this paper proposed a basic collaboration mechanism between the users and the designers during the early stage of the design process and then discussed how its mechanism will help to describe the interactions between the users and the designers during the user involvement sessions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the absence of telehealth technology, rural patients must travel to a regional or metropolitan hospital for a preadmission consultation one week before their surgery. Currently, examination of the patient’s chest using a stethoscope (auscultation) is not possible over a telehealth network as existing digital stethoscopes have been designed for in-person auscultation. We report on the initial phase of research which ultimately aims to design a digital stethoscope for use in the telehealth context. This initial research phase describes the complexity of the activity of preadmission clinics and the implications for the design of the stethoscope. The research is conducted through field studies of existing face-to-face and remote consultations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Scalable video coding of H.264/AVC standard enables adaptive and flexible delivery for multiple devices and various network conditions. Only a few works have addressed the influence of different scalability parameters (frame rate, spatial resolution, and SNR) on the user perceived quality within a limited scope. In this paper, we have conducted an experiment of subjective quality assessment for video sequences encoded with H.264/SVC to gain a better understanding of the correlation between video content and UPQ at all scalable layers and the impact of rate-distortion method and different scalabilities on bitrate and UPQ. Findings from this experiment will contribute to a user-centered design of adaptive delivery of scalable video stream.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Opiine wasps (Hymenoptera: Braconidae: Opiinae) are parasitoids of dacine fruit flies (Diptera: Tephritidae: Dacinae), the primary horticultural pests of Australia and the South Pacific. Effective use of opiines for biological control of fruit flies is limited by poor taxonomy and identification difficulties. To overcome these problems, this thesis had two aims: (i) to carry out traditional taxonomic research on the fruit fly infesting opine braconids of Australia and the South Pacific; and (ii) to transfer the results of the taxonomic research into user friendly diagnostic tools. Curated wasp material was borrowed from all major Australian museum collections holding specimens. This was supplemented by a large body of material gathered as part of a major fruit fly project in Papua New Guinea: nearly 4000 specimens were examined and identified. Each wasp species was illustrated using traditional scientific drawings, full colour photomicroscopy and scanning electron microscopy. An electronic identification key was developed using Lucid software and diagnostic images were loaded on the web-based Pest and Diseases Image Library (PaDIL). A taxonomic synopsis and distribution and host records for each of the 15 species of dacine-parasitising opiine braconids found in the South Pacific is presented. Biosteres illusorius Fischer (1971) was formally transferred to the genus Fopius and a new species, Fopius ferrari Carmichael and Wharton (2005), was described. Other species dealt with were Diachasmimorpha hageni (Fullaway, 1952), D. kraussii (Fullaway, 1951), D. longicaudata (Ashmead, 1905), D. tryoni (Cameron, 1911), Fopius arisanus (Sonan, 1932), F. deeralensis (Fullaway, 1950), F. schlingeri Wharton (1999), Opius froggatti Fullaway (195), Psyttalia fijiensis (Fullaway, 1936), P. muesebecki (Fischer, 1963), P. novaguineensis (Szépliget, 1900i) and Utetes perkinsi (Fullaway, 1950). This taxonomic component of the thesis has been formally published in the scientific literature. An interactive diagnostics package (“OpiineID”) was developed, the centre of which is a Lucid based multi-access key. Because the diagnostics package is computer based, without the space limitations of the journal publication, there is no pictorial limit in OpiineID and so it is comprehensively illustrated with SEM photographs, full colour photographs, line drawings and fully rendered illustrations. The identification key is only one small component of OpiineID and the key is supported by fact sheets with morphological descriptions, host associations, geographical information and images. Each species contained within the OpiineID package has also been uploaded onto the PaDIL website (www.padil.gov.au). Because the identification of fruit fly parasitoids is largely of concern to fruit fly workers, rather than braconid specialists, this thesis deals directly with an area of growing importance to many areas of pure and applied biology; the nexus between taxonomy and diagnostics. The Discussion chapter focuses on this area, particularly the opportunities offered by new communication and information tools as new ways delivering the outputs of taxonomic science.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis presents a case study of the Special Broadcasting Service documenting the broadcasting challenges posed by user-generated content initiatives and the work-place approach to strategies for participation. Using the action research method, the project findings reveal that limitations to resources and funding determined the scope for innovation and that the practice of executive editorial control over content was considered fundamental to fulfilling the responsibilities of the public service mandate. Media workers were overwhelmingly positive about the enhanced productive capabilities of the audience and willing to facilitate moderated interactions, however the effectiveness of these initiatives differed according to the level of skills required. This thesis demonstrates how participatory initiatives can enhance aspects of the public service remit relating to cultural diversity, the servicing of niche interests, and broader social representation, and help reinvigorate the relevance of public service broadcasting in the digitalised media sphere.

Relevância:

20.00% 20.00%

Publicador: