219 resultados para Android maps mappe gcm push notification push-notification sensors sensori
Resumo:
Aims Pathology notification for a Cancer Registry is regarded as the most valid information for the confirmation of a diagnosis of cancer. In view of the importance of pathology data, an automatic medical text analysis system (Medtex) is being developed to perform electronic Cancer Registry data extraction and coding of important clinical information embedded within pathology reports. Methods The system automatically scans HL7 messages received from a Queensland pathology information system and analyses the reports for terms and concepts relevant to a cancer notification. A multitude of data items for cancer notification such as primary site, histological type, stage, and other synoptic data are classified by the system. The underlying extraction and classification technology is based on SNOMED CT1 2. The Queensland Cancer Registry business rules3 and International Classification of Diseases – Oncology – Version 34 have been incorporated. Results The cancer notification services show that the classification of notifiable reports can be achieved with sensitivities of 98% and specificities of 96%5, while the coding of cancer notification items such as basis of diagnosis, histological type and grade, primary site and laterality can be extracted with an overall accuracy of 80%6. In the case of lung cancer staging, the automated stages produced were accurate enough for the purposes of population level research and indicative staging prior to multi-disciplinary team meetings2 7. Medtex also allows for detailed tumour stream synoptic reporting8. Conclusions Medtex demonstrates how medical free-text processing could enable the automation of some Cancer Registry processes. Over 70% of Cancer Registry coding resources are devoted to information acquisition. The development of a clinical decision support system to unlock information from medical free-text could significantly reduce costs arising from duplicated processes and enable improved decision support, enhancing efficiency and timeliness of cancer information for Cancer Registries.
Resumo:
True creativity sits in stark contrast with global trends to standardise education systems. It is, though, an attractive semantic and conjures up all sorts of positives. However none of the positive potentials of the creativity push are likely to materialise while process-oriented bureaucratic understandings of creativity dominate curriculum policy and development. Creativity requires pedagogy to forego substantial levels of control. It also requires ethical content because “creative” is an empty epithet, applying equally to the creation of beautiful music as it does to the creation of a nuclear weapon. In responding to Kapitzke and Hay, this chapter outlines the stark contradictions embedded in the creativity push.
Resumo:
Background Cancer monitoring and prevention relies on the critical aspect of timely notification of cancer cases. However, the abstraction and classification of cancer from the free-text of pathology reports and other relevant documents, such as death certificates, exist as complex and time-consuming activities. Aims In this paper, approaches for the automatic detection of notifiable cancer cases as the cause of death from free-text death certificates supplied to Cancer Registries are investigated. Method A number of machine learning classifiers were studied. Features were extracted using natural language techniques and the Medtex toolkit. The numerous features encompassed stemmed words, bi-grams, and concepts from the SNOMED CT medical terminology. The baseline consisted of a keyword spotter using keywords extracted from the long description of ICD-10 cancer related codes. Results Death certificates with notifiable cancer listed as the cause of death can be effectively identified with the methods studied in this paper. A Support Vector Machine (SVM) classifier achieved best performance with an overall F-measure of 0.9866 when evaluated on a set of 5,000 free-text death certificates using the token stem feature set. The SNOMED CT concept plus token stem feature set reached the lowest variance (0.0032) and false negative rate (0.0297) while achieving an F-measure of 0.9864. The SVM classifier accounts for the first 18 of the top 40 evaluated runs, and entails the most robust classifier with a variance of 0.001141, half the variance of the other classifiers. Conclusion The selection of features significantly produced the most influences on the performance of the classifiers, although the type of classifier employed also affects performance. In contrast, the feature weighting schema created a negligible effect on performance. Specifically, it is found that stemmed tokens with or without SNOMED CT concepts create the most effective feature when combined with an SVM classifier.
Resumo:
We have analyzed segregation patterns of markers among the late generation progeny of several crosses of pea. From the patterns of association of these markers we have deduced linkage orders. Salient features of these linkages are discussed, as is the relationship between the data presented here and previously published genetic and cytogenetic data.
Resumo:
In the current climate of global economic volatility, there are increasing calls for training in enterprising skills and entrepreneurship to underpin the systemic innovation required for even medium-term business sustainability. The skills long-recognised as the essential for entrepreneurship now appear on the list of employability skills demanded by industry. The QUT Innovation Space (QIS) was an experiment aimed at delivering entrepreneurship education (EE), as an extra-curricular platform across the university, to the undergraduate students of an Australian higher education institute. It was an ambitious project that built on overseas models of EE studied during an Australian Learning and Teaching Council (ALTC) Teaching Fellowship (Collet, 2011) and implemented those approaches across an institute. Such EE approaches have not been attempted in an Australian university. The project tested resonance not only with the student population, from the perspective of what worked and what didn’t work, but also with every level of university operations. Such information is needed to inform the development of EE in the Australian university landscape. The QIS comprised a physical co-working space, virtual sites (web, Twitter and Facebook) and a network of entrepreneurial mentors, colleagues, and students. All facets of the QIS enabled connection between like-minded individuals that underpins the momentum needed for a project of this nature. The QIS became an innovation community within QUT. This report serves two purposes. First, as an account of the QIS project and its evolution, the report serves to identify the student demand for skills and training as well as barriers and facilitators of the activities that promote EE in an Australian university context. Second, the report serves as a how-to manual, in the tradition of many tomes on EE, outlining the QIS activities that worked as well as those that failed. The activities represent one measure of QIS outcomes and are described herein to facilitate implementation in other institutes. The QIS initially aimed to adopt an incubation model for training in EE. The ‘learning by doing’ model for new venture creation is a highly successful and high profile training approach commonly found in overseas contexts. However, the greatest demand of the QUT student population was not for incubation and progression of a developed entrepreneurial intent, but rather for training that instilled enterprising skills in the individual. These two scenarios require different training approaches (Fayolle and Gailly, 2008). The activities of the QIS evolved to meet that student demand. In addressing enterprising skills, the QIS developed the antecedents of entrepreneurialism (i.e., entrepreneurial attitudes, motivation and behaviours) including high-level skills around risk-taking, effective communication, opportunity recognition and action-orientation. In focusing on the would-be entrepreneur and not on the (initial) idea per se, the QIS also fostered entrepreneurial outcomes that would never have gained entry to the rigid stage-gated incubation model proposed for the original QIS framework. Important lessons learned from the project for development of an innovation community include the need to: 1. Evaluate the context of the type of EE program to be delivered and the student demand for the skills training (as noted above). 2. Create a community that builds on three dimensions: a physical space, a virtual environment and a network of mentors and partners. 3. Supplement the community with external partnerships that aid in delivery of skills training materials. 4. Ensure discovery of the community through the use of external IT services to deliver advertising and networking outlets. 5. Manage unrealistic student expectations of billion dollar products. 6. Continuously renew and rebuild simple activities to maintain student engagement. 7. Accommodate the non-university end-user group within the community. 8. Recognise and address the skills bottlenecks that serve as barriers to concept progression; in this case, externally provided IT and programming skills. 9. Use available on-line and published resources rather than engage in constructing project-specific resources that quickly become obsolete. 10. Avoid perceptions of faculty ownership and operate in an increasingly competitive environment. 11. Recognise that the continuum between creativity/innovation and entrepreneurship is complex, non-linear and requires different training regimes during the different phases of the pipeline. One small entity, such as the QIS, cannot address them all. The QIS successfully designed, implemented and delivered activities that included events, workshops, seminars and services to QUT students in the extra-curricular space. That the QIS project can be considered successful derives directly from the outcomes. First, the QIS project changed the lives of emerging QUT student entrepreneurs. Also, the QIS activities developed enterprising skills in students who did not necessarily have a business proposition, at the time. Second, successful outcomes of the QIS project are evidenced as the embedding of most, perhaps all, of the QIS activities in a new Chancellery-sponsored initiative: the Leadership Development and Innovation Program hosted by QUT Student Support Services. During the course of the QIS project, the Brisbane-based innovation ecosystem underwent substantial change. From a dearth of opportunities for the entrepreneurially inclined, there is now a plethora of entities that cater for a diversity of innovation-related activities. While the QIS evolved with the landscape, the demand endpoint of the QIS activities still highlights a gap in the local and national innovation ecosystems. The freedom to experiment and to fail is not catered for by the many new entities seeking to build viable businesses on the back of the innovation push. The onus of teaching the enterprising skills, which are the employability skills now demanded by industry, remains the domain of the higher education sector.
Resumo:
In Crypto’95, Micali and Sidney proposed a method for shared generation of a pseudo-random function f(·) among n players in such a way that for all the inputs x, any u players can compute f(x) while t or fewer players fail to do so, where 0 ≤ t < u ≤ n. The idea behind the Micali-Sidney scheme is to generate and distribute secret seeds S = s1, . . . , sd of a poly-random collection of functions, among the n players, each player gets a subset of S, in such a way that any u players together hold all the secret seeds in S while any t or fewer players will lack at least one element from S. The pseudo-random function is then computed as where f s i (·)’s are poly-random functions. One question raised by Micali and Sidney is how to distribute the secret seeds satisfying the above condition such that the number of seeds, d, is as small as possible. In this paper, we continue the work of Micali and Sidney. We first provide a general framework for shared generation of pseudo-random function using cumulative maps. We demonstrate that the Micali-Sidney scheme is a special case of this general construction.We then derive an upper and a lower bound for d. Finally we give a simple, yet efficient, approximation greedy algorithm for generating the secret seeds S in which d is close to the optimum by a factor of at most u ln 2.
Resumo:
This article explores the use of digital technology such as interactive maps to enhance books.
Resumo:
Background: The two most reported mosquito-borne diseases in Queensland, a northern state of Australia, are Ross River virus (RRV) disease and Barmah Forest virus (BFV) disease. Both diseases are endemic in Queensland and have similar clinical symptoms and comparable transmission cycles involving a complex inter-relationship between human hosts, various mosquito vectors, and a range of nonhuman vertebrate hosts, including marsupial mammals that are unique to the Australasian region. Although these viruses are thought to share similar vectors and vertebrate hosts, RRV is four times more prevalent than BFV in Queensland. Methods: We performed a retrospective analysis of BFV and RRV human disease notification data collected from 1995 to 2007 in Queensland to ascertain whether there were differences in the incidence patterns of RRV and BFV disease. In particular, we compared the temporal incidence and spatial distribution of both diseases and considered the relationship between their disease dynamics. We also investigated whether a peak in BFV incidence during spring was indicative of the following RRV and BFV transmission season incidence levels. Results: Although there were large differences in the notification rates of the two diseases, they had similar annual temporal patterns, but there were regional variations between the length and magnitude of the transmission seasons. During periods of increased disease activity, however, there was no association between the dynamics of the two diseases. Conclusions: The results from this study suggest that while RRV and BFV share similar mosquito vectors, there are significant differences in the ecology of these viruses that result in different epidemic patterns of disease incidence. Further investigation is required into the ecology of each virus to determine which factors are important in promoting RRV and BFV disease outbreaks.
Resumo:
Background Detection of outbreaks is an important part of disease surveillance. Although many algorithms have been designed for detecting outbreaks, few have been specifically assessed against diseases that have distinct seasonal incidence patterns, such as those caused by vector-borne pathogens. Methods We applied five previously reported outbreak detection algorithms to Ross River virus (RRV) disease data (1991-2007) for the four local government areas (LGAs) of Brisbane, Emerald, Redland and Townsville in Queensland, Australia. The methods used were the Early Aberration Reporting System (EARS) C1, C2 and C3 methods, negative binomial cusum (NBC), historical limits method (HLM), Poisson outbreak detection (POD) method and the purely temporal SaTScan analysis. Seasonally-adjusted variants of the NBC and SaTScan methods were developed. Some of the algorithms were applied using a range of parameter values, resulting in 17 variants of the five algorithms. Results The 9,188 RRV disease notifications that occurred in the four selected regions over the study period showed marked seasonality, which adversely affected the performance of some of the outbreak detection algorithms. Most of the methods examined were able to detect the same major events. The exception was the seasonally-adjusted NBC methods that detected an excess of short signals. The NBC, POD and temporal SaTScan algorithms were the only methods that consistently had high true positive rates and low false positive and false negative rates across the four study areas. The timeliness of outbreak signals generated by each method was also compared but there was no consistency across outbreaks and LGAs. Conclusions This study has highlighted several issues associated with applying outbreak detection algorithms to seasonal disease data. In lieu of a true gold standard, a quantitative comparison is difficult and caution should be taken when interpreting the true positives, false positives, sensitivity and specificity.
Resumo:
New push-pull copolymers based on thiophene (donor) and benzothiadiazole (acceptor) units, poly[4,7-bis(3-dodecylthiophene-2-yl) benzothiadiazole-co- thiophene] (PT3B1) and poly[4,7-bis(3-dodecylthiophene-2-yl) benzothiadiazole-co-benzothiadiazole] (PT2B2), are designed and synthesized via Stille and Suzuki coupling routes respectively. Gel permeation chromatography shows the number average molecular weights are 31100 and 8400 g mol-1 for the two polymers, respectively. Both polymers have shown absorption throughout a wide range of the UV-vis region, from 300 to 650 nm. A significant red shift of the absorption edge is observed in thin films compared to solution of the copolymers; the optical band gap is in the range of 1.7 to 1.8 eV. Cyclic voltammetry indicates reversible oxidation and reduction processes with HOMO energy levels calculated to be in the range of 5.2 to 5.4 eV. Upon testing both materials for organic field-effect transistors (OFETs), PT3B1 showed a hole mobility of 6.1 × 10-4 cm2 V-1 s -1, while PT2B2 did not show any field effect transport. Both copolymers displayed a photovoltaic response when combined with a methanofullerene as an electron acceptor. The best performance was achieved when the copolymer PT3B1 was blended with [70]PCBM in a 1:4 ratio, exhibiting a short-circuit current of 7.27 mA cm-2, an open circuit voltage of 0.85 V, and a fill factor of 41% yielding a power conversion efficiency of 2.54% under simulated air mass (AM) 1.5 global (1.5 G) illumination conditions (100 mW cm-2). Similar devices utilizing PT2B2 in place of PT3B1 demonstrated reduced performance with a short-circuit current of 4.8 mA cm -2, an open circuit voltage of 0.73 V, and a fill factor of 30% resulting in a power conversion efficiency of roughly 1.06%.
Resumo:
Inspired by similar reforms introduced in New Zealand, Canada and the United States, the Commonwealth, with the co-operation of the States, seeks in the Personal Property Securities Bill 2008 (the Bill) to introduce a central repository of recorded information reflecting particular security interests in personal property in Australia. Specifically, the interest recorded is an interest in personal property provided for by a transaction that in substance secures the payment or the performance of an obligation. In addition to providing a notification of the use of the personal property as collateral to secure the payment of monies or the performance of an obligation, the Bill proposes to introduce a regime of prioritising interests in the same collateral. Central to this prioritisation are the concepts of a ‘perfected security interests’and ‘unperfected security interests’. Relevantly, a perfected security interest in collateral has priority over an unperfected security interest in the same collateral. The proposed mechanisms rely on the fundamental integer of personal property, which is defined as any property other than land. Recognising that property may take a tangible as well as an intangible form, the Bill reflects an appreciation of the fact that some property may have a tangible form which may act as collateral, and simultaneously the same property may involve other property, intangible property in the form of intellectual property rights, which in their own right may be the subject of a‘security agreement’. An example set out in the Commentary on the Consultation Draft of the Bill (the Commentary), indicates the practical implications involving certain property which have multiple profiles for the purposes of the Bill. This submission is concerned with the presumptions made in relation to the interphase between tangible property and intangible property arising from the same personal property, as set out in s 30 of the Bill.
Resumo:
It is often said that Australia is a world leader in rates of copyright infringement for entertainment goods. In 2012, the hit television show, Game of Thrones, was the most downloaded television show over bitorrent, and estimates suggest that Australians accounted for a plurality of nearly 10% of the 3-4 million downloads each week. The season finale of 2013 was downloaded over a million times within 24 hours of its release, and again Australians were the largest block of illicit downloaders over BitTorrent, despite our relatively small population. This trend has led the former US Ambassador to Australia to implore Australians to stop 'stealing' digital content, and rightsholders to push for increasing sanctions on copyright infringers. The Australian Government is looking to respond by requiring Internet Service Providers to issue warnings and potentially punish consumers who are alleged by industry groups to have infringed copyright. This is the logical next step in deterring infringement, given that the operators of infringing networks (like The Pirate Bay, for example) are out of regulatory reach. This steady ratcheting up of the strength of copyright, however, comes at a significant cost to user privacy and autonomy, and while the decentralisation of enforcement reduces costs, it also reduces the due process safeguards provided by the judicial process. This article presents qualitative evidence that substantiates a common intuition: one of the major reasons that Australians seek out illicit downloads of content like Game of Thrones in such numbers is that it is more difficult to access legitimately in Australia. The geographically segmented way in which copyright is exploited at an international level has given rise to a ‘tyranny of digital distance’, where Australians have less access to copyright goods than consumers in other countries. Compared to consumers in the US and the EU, Australians pay more for digital goods, have less choice in distribution channels, are exposed to substantial delays in access, and are sometimes denied access completely. In this article we focus our analysis on premium film and television offerings, like Game of Thrones, and through semi-structured interviews, explore how choices in distribution impact on the willingness of Australian consumers to seek out infringing copies of copyright material. Game of Thrones provides an excellent case study through which to frame this analysis: it is both one of the least legally accessible television offerings and one of the most downloaded through filesharing networks of recent times. Our analysis shows that at the same time as rightsholder groups, particularly in the film and television industries, are lobbying for stronger laws to counter illicit distribution, the business practices of their member organisations are counter-productively increasing incentives for consumers to infringe. The lack of accessibility and high prices of copyright goods in Australia leads to substantial economic waste. The unmet consumer demand means that Australian consumers are harmed by lower access to information and entertainment goods than consumers in other jurisdictions. The higher rates of infringement that fulfils some of this unmet demand increases enforcement costs for copyright owners and imposes burdens either on our judicial system or on private entities – like ISPs – who may be tasked with enforcing the rights of third parties. Most worryingly, the lack of convenient and cheap legitimate digital distribution channels risks undermining public support for copyright law. Our research shows that consumers blame rightsholders for failing to meet market demand, and this encourages a social norm that infringing copyright, while illegal, is not morally wrongful. The implications are as simple as they are profound: Australia should not take steps to increase the strength of copyright law at this time. The interests of the public and those of rightsholders align better when there is effective competition in distribution channels and consumers can legitimately get access to content. While foreign rightsholders are seeking enhanced protection for their interests, increasing enforcement is likely to increase their ability to engage in lucrative geographical price-discrimination, particularly for premium content. This is only likely to increase the degree to which Australian consumers feel that their interests are not being met and, consequently, to further undermine the legitimacy of copyright law. If consumers are to respect copyright law, increasing sanctions for infringement without enhancing access and competition in legitimate distribution channels could be dangerously counter-productive. We suggest that rightsholders’ best strategy for addressing infringement in Australia at this time is to ensure that Australians can access copyright goods in a timely, affordable, convenient, and fair lawful manner.
Resumo:
"What is Bluebird AR? Bluebird AR was the ABC's alternate reality drama set around the leak of Bluebird, a clandestine geoengineering initiative created by eco-billionaire Harrison Wyld. Proposing a fictional scenario set against a backdrop of real world possibilities, Bluebird AR took some of the conventions of the well-established alternate reality game (ARG) genre and pulled them into the relatively new area of online drama, to create a hybrid entertainment form best described as 'participatory drama'. With Bluebird AR's interactive narrative centred on the experimental science of geoengineering, the deliberate manipulation of the Earth's atmosphere to counteract global warming, the events and characters in the Bluebird story were entirely fictional but fused with reality online. Inhabiting a mixture of third party social media spaces and websites created by the ABC, the story incorporated real online articles, scientific journals, media and debate around geoengineering. In an Australian first, ABC Innovation launched Bluebird AR on 27 April 2010, with a 6 week live phase. Audience members were invited to play collectively to help 'unlock the drama' and push forward the emerging narrative, or passively watch the story unfold in real-time across the internet. Bluebird AR subverted ARG conventions with the high quality of its production and assets, and raised the stakes for online drama with its level of audience participation." © 2014 ABC "Introduction One of the most exciting creative challenges of producing Bluebird AR was formulating the broad array of visual styles and treatments required for the project's diverse range of content. Many assets also needed to translate well not only online but across other media, including television and print. With the project's producers keen to create a visually rich narrative with high production values from the outset, inspiration for the production design for various aspects of the Bluebird story began in the earliest pitching phase in September 2008. Particular visual treatments and styles for Bluebird's characters, their web spaces and real world possessions were formulated concurrently with the creation of their profiles. Ideas around how various clues and gameplay spaces might look and feel were also explored at this early stage. Bluebird AR's small but tight creative team produced 7 website designs and brands, motion graphics for title sequences and logo animations, rotoscope animation, 3D compositing and animation, 3D wireframes and schematics, countless Photoshop composites, and a vast array of character assets for the DC (including Kyle's Bluebird Labs security pass and resignation letter, Kruger's American and Russia passports and birth certificate, Harrison's divorce papers, and more)…" © 2014 ABC
Resumo:
1. Shoppers Profiles- Are Grocery Shoppers any different to Pharmacy Shoppers? 2. Awaking the Sleeping Giants- Supermarkets push into OTC Medicines 3. Price versus Value for Money- What’s the Difference? Value and Perceived Quality 4. Consumer Decision Making Process- The Pharmacists ‘Trump’ Card
Resumo:
Millions of people with print disabilities are denied the right to read. While some important efforts have been made to convert standard books to accessible formats and create accessible repositories, these have so far only addressed this crisis in an ad hoc way. This article argues that universally designed ebook libraries have the potential of substantially enabling persons with print disabilities. As a case study of what is possible, we analyse 12 academic ebook libraries to map their levels of accessibility. The positive results from this study indicate that universally designed ebooks are more than possible; they exist. While results are positive, however, we also found that most ebook libraries have some features that frustrate full accessibility, and some ebook libraries present critical barriers for people with disabilities. Based on these findings, we consider that some combination of private pressure and public law is both possible and necessary to advance the right-to-read cause. With access improving and recent advances in international law, now is the time to push for universal design and equality.