242 resultados para Mein Name sei Gantenbein
Resumo:
Robust hashing is an emerging field that can be used to hash certain data types in applications unsuitable for traditional cryptographic hashing methods. Traditional hashing functions have been used extensively for data/message integrity, data/message authentication, efficient file identification and password verification. These applications are possible because the hashing process is compressive, allowing for efficient comparisons in the hash domain but non-invertible meaning hashes can be used without revealing the original data. These techniques were developed with deterministic (non-changing) inputs such as files and passwords. For such data types a 1-bit or one character change can be significant, as a result the hashing process is sensitive to any change in the input. Unfortunately, there are certain applications where input data are not perfectly deterministic and minor changes cannot be avoided. Digital images and biometric features are two types of data where such changes exist but do not alter the meaning or appearance of the input. For such data types cryptographic hash functions cannot be usefully applied. In light of this, robust hashing has been developed as an alternative to cryptographic hashing and is designed to be robust to minor changes in the input. Although similar in name, robust hashing is fundamentally different from cryptographic hashing. Current robust hashing techniques are not based on cryptographic methods, but instead on pattern recognition techniques. Modern robust hashing algorithms consist of feature extraction followed by a randomization stage that introduces non-invertibility and compression, followed by quantization and binary encoding to produce a binary hash output. In order to preserve robustness of the extracted features, most randomization methods are linear and this is detrimental to the security aspects required of hash functions. Furthermore, the quantization and encoding stages used to binarize real-valued features requires the learning of appropriate quantization thresholds. How these thresholds are learnt has an important effect on hashing accuracy and the mere presence of such thresholds are a source of information leakage that can reduce hashing security. This dissertation outlines a systematic investigation of the quantization and encoding stages of robust hash functions. While existing literature has focused on the importance of quantization scheme, this research is the first to emphasise the importance of the quantizer training on both hashing accuracy and hashing security. The quantizer training process is presented in a statistical framework which allows a theoretical analysis of the effects of quantizer training on hashing performance. This is experimentally verified using a number of baseline robust image hashing algorithms over a large database of real world images. This dissertation also proposes a new randomization method for robust image hashing based on Higher Order Spectra (HOS) and Radon projections. The method is non-linear and this is an essential requirement for non-invertibility. The method is also designed to produce features more suited for quantization and encoding. The system can operate without the need for quantizer training, is more easily encoded and displays improved hashing performance when compared to existing robust image hashing algorithms. The dissertation also shows how the HOS method can be adapted to work with biometric features obtained from 2D and 3D face images.
Resumo:
The increased adoption of business process management approaches, tools and practices, has led organizations to accumulate large collections of business process models. These collections can easily include hundred to thousand models, especially in the context of multinational corporations or as a result of organizational mergers and acquisitions. A concrete problem is thus how to maintain these large repositories in such a way that their complexity does not hamper their practical usefulness as a means to describe and communicate business operations. This paper proposes a technique to automatically infer suitable names for business process models and fragments thereof. This technique is useful for model abstraction scenarios, as for instance when user-specific views of a repository are required, or as part of a refactoring initiative aimed to simplify the repository’s complexity. The technique is grounded in an adaptation of the theory of meaning to the realm of business process models. We implemented the technique in a prototype tool and conducted an extensive evaluation using three process model collections from practice and a case study involving process modelers with different experience.
Resumo:
At NTCIR-10 we participated in the cross-lingual link discovery (CrossLink-2) task. In this paper we describe our systems for discovering cross-lingual links between the Chinese, Japanese, and Korean (CJK) Wikipedia and the English Wikipedia. The evaluation results show that our implementation of the cross-lingual linking method achieved promising results.
Resumo:
Background: Gestational diabetes mellitus (GDM) is increasing, along with obesity and type 2 diabetes (T2DM), with Aboriginal and Torres Strait Islander people* in Australia particularly affected. GDM causes serious complications in pregnancy, birth, and the longer term, for both women and their infants. Women diagnosed with GDM have an eightfold risk of developing T2DM after pregnancy, compared with women who have not had GDM. Indigenous women have an even higher risk, at a younger age, and progress more quickly from GDM to T2DM, compared to non-Indigenous women. If left undetected and untreated, T2DM can lead to heart disease, stroke, renal disease, kidney failure, amputations and blindness. A GDM diagnosis offers a ‘window of opportunity’ for diabetes health interventions and it is vital that acceptable and effective prevention, treatment, and post-pregnancy care are provided. Low rates of post-pregnancy screening for T2DM are reported among non-Aboriginal women in Australia and among Indigenous women in other countries, however data for Aboriginal women are scarce. Breastfeeding, a healthy diet, and exercise can also help to prevent T2DM, and together with T2DM screening are recommended elements of ‘post-pregnancy care’ for women with GDM, This paper describes methods for a data linkage study to investigate rates of post-pregnancy care among women with GDM. Methods/Design: This retrospective cohort includes all women who gave birth at Cairns Base Hospital in Far North Queensland, Australia, from 2004 to 2010, coded as having GDM in the Cairns Base Hospital Clinical Coding system. Data linkage is being conducted with the Queensland Perinatal Data Collection, and three laboratories. Hospital medical records are being reviewed to validate the accuracy of GDM case ascertainment, and gather information on breastfeeding and provision of dietary advice. Multiple logistic regression is being used to compare post-pregnancy care between Aboriginal and non-Aboriginal women, while adjusting for other factors may impact on post-pregnancy care. Survival analysis is being used to estimate the rates of progression from GDM to T2DM. Discussion: There are challenges to collecting post-pregnancy data for women with GDM. However, research is urgently needed to ensure adequate post-pregnancy care is provided for women with GDM in Australia.
Resumo:
Hitherto, the Malaconothridae contained Malaconothrus Berlese, 1904 and Trimalaconothrus Berlese, 1916, defined by the possession of one pre-tarsal claw (monodactyly) or by three claws (tridactyly) respectively. However, monodactyly is a convergent apomorphy within the Oribatida and an unreliable character for a classification. Therefore we undertook a phylogenetic analysis of 102 species as the basis for a taxonomic review of the Malaconothridae. We identified two major clades, equivalent to the genera Tyrphonothrus Knülle, 1957 and Malaconothrus. These genera are redefined. Trimala-conothrus becomes the junior subjective synonym of Malaconothrus. Some 42 species of Trimalaconothrus are recom-bined to Malaconothrus and 15 species to Tyrphonothrus. Homonyms created by the recombinations are rectified. The replacement name M. hammerae nom. nov. is proposed for M. angulatus Hammer, 1958, the junior homonym of M. an-gulatus (Willmann, 1931) and the replacement name M. luxtoni nom. nov. is proposed for M. scutatus Luxton, 1987, the junior homonym of M. scutatus Mihelč ič, 1959. Trimalaconothrus iteratus Subías, 2004 is an unnecessary replacement name and is a junior objective synonym of Malaconothrus longirostrum (Hammer 1966). Malaconothrus praeoccupatus Subías, 2004 is a junior objective synonym of M. machadoi Balogh & Mahunka, 1969. Malaconothrus obsessus (Subías, 2004), an unnecessary replacement name for Trimalaconothrus albulus Hammer 1966 sensu Tseng 1982, becomes an available name for what is in fact a previously-undescribed species of Malaconothrus. We describe four new species of Tyrphonothrus: T. gnammaensis sp. nov. from Western Australia, T. gringai sp. nov. and T. maritimus sp. nov. from New South Wales, and T. taylori sp. nov. from Queensland. We describe six new species of Malaconothrus: M. beecroftensis sp. nov., M. darwini sp. nov. M. gundungurra sp. nov. and M. knuellei sp. nov. from New South Wales, M. jowettae sp. nov. from Norfolk Island, and M. talaitae sp. nov. from Victoria.
Resumo:
Democratic governments raise taxes and charges and spend revenue on delivering peace, order and good government. The delivery process begins with a legislature as that can provide a framework of legally enforceable rules enacted according to the government’s constitution. These rules confer rights and obligations that allow particular people to carry on particular functions at particular places and times. Metadata standards as applied to public records contain information about the functioning of government as distinct from the non-government sector of society. Metadata standards apply to database construction. Data entry, storage, maintenance, interrogation and retrieval depend on a controlled vocabulary needed to enable accurate retrieval of suitably catalogued records in a global information environment. Queensland’s socioeconomic progress now depends in part on technical efficiency in database construction to address queries about who does what, where and when; under what legally enforceable authority; and how the evidence of those facts is recorded. The Survey and Mapping Infrastructure Act 2003 (Qld) addresses technical aspects of where questions – typically the officially recognised name of a place and a description of its boundaries. The current 10-year review of the Survey and Mapping Regulation 2004 provides a valuable opportunity to consider whether the Regulation makes sense in the context of a number of later laws concerned with management of Public Sector Information (PSI) as well as policies for ICT hardware and software procurement. Removing ambiguities about how official place names are to be regarded on a whole-of-government basis can achieve some short term goals. Longer-term goals depend on a more holistic approach to information management – and current aspirations for more open government and community engagement are unlikely to occur without such a longer-term vision.
Resumo:
Sandy soils have low nutrient holding capacity and high water conductivity. Consequently, nutrients applied as highly soluble chemical fertilisers are prone to leaching, particularly in heavily irrigated environments such as horticultural soils and golf courses. Amorphous derivatives of kaolin with high cation exchange capacity may be loaded with desired nutrients and applied as controlledrelease fertilisers. Kaolin is an abundant mineral, which can be converted to a meso-porous amorphous derivative (KAD) using facile chemical processes. KAD is currently being used to sequester ammonium from digester effluent in sewage treatment plants in a commercial environment. This material is also known in Australia by the trade name MesoLite. The ammonium-saturated form of KAD may be applied to soils as a nitrogen fertiliser. Up to 7% N can be loaded onto KAD by contacting it with high-ammonia concentration wastewater from sewerage treatment plants. This poster paper demonstrates plant uptake of nitrogen from KAD and compares its efficiency as a fertiliser with NH4SO4. Rye grass was grown in 1kg pots in a glass-house. Nitrogen was applied at a range of rates using NH4SO4 and two KAD materials carrying 7% and 3% nitrogen, respectively. All other nutrients were applied in adequate amounts. All treatments were replicated three times. Plants were harvested after four weeks. Dry mass and N concentrations were determined by standard methods. At all N application rates, ammonium-loaded KAD produced significantly higher plant mass than for NH4SO4. The lower fertiliser effectiveness of NH4SO4 is attributed to possible loss of some N through volatilisation. Of the two KAD types, the material with lower CEC value supported slightly higher plant yields. The KAD materials did not show any adverse effect on availability of trace elements, as evidenced by lack of deficiency symptoms and plant analyses. Clearly, nitrogen loaded on to KAD in the form of ammonium is likely to be protected from leaching, but is still available to plants. These data suggest that KAD-based fertilisers may be suitable substitutes for water soluble N, K and other cation fertilisers for leaching soils.
Resumo:
Research and practice has observed a shift toward service-oriented approaches that depend on input from users and community as co-producers of services. Yet, in delivering public infrastructure the focus is still on assets rather than services. The contribution of external stakeholders in the co-production of public services is still limited. Using the Policy Delphi with a panel of experts, we found that although practitioners understand the need for asset management to follow the service approach, guidelines and policies still lack that service-centric perspective. Findings revealed a range of obstacles to effective service delivery, related to the sub-optimal involvement of stakeholders’, asymmetric levels of power, the lack of accountability, transparency and availability of government, and the lack of genuine consultations between government and stakeholder groups. The paper concludes by offering directions and strategies for asset managers and policymakers to support and reconnect disengaged government-citizen relations for optimal service delivery outcomes in asset management.
Resumo:
With this special issue, we draw attention to the growing and diverse field of HCI researchers exploring the interstices of food, technology and everyday practices. This special issue builds on the CHI workshop of the same name (Comber et al., 2012a), where we brought together the community of researchers that take food as a point from which to understand people and design technology. The workshop aimed to ‘to attend to the practical and theoretical difficulties in designing for human–food interactions in everyday life’ identifying four thematic areas of food practices – health and wellbeing; sustainability; food experiences; and alternative food cultures. These practical and theoretical difficulties are evident in the papers that we present here, though the distinction between our four themes, premised by complexities of food practices, is a little less evident. Thus, in the papers that follow we explore how the social, technological, cultural and methodological intertwine in the field of human–food interaction.
Resumo:
This paper examines the rise in the politicisation of Islam in Malaysia and links it to the othering of the Malaysian Malay. It is my argument that both were “conquering” tools of Malaysia’s “Father of Modernisation”, Mahathir Mohamad, devised to win the support of the Malay Muslim majority in Malaysia. The many awards bestowed on Mahathir obscure the fact that he was instrumental in the systematic erosion of the power and roles of state institutions, especially at the Federal government level. This includes the significant loss of the independence of the Malaysian judiciary. Whilst per capita income in Malaysia may well have increased eight times under his 22-year leadership, this paper asks why is it that the majority of the Malays remain the largest number among the poor and the more disenfranchised of ethnicities in the country? Why have Malay and Muslim women suffered such a rapid decreasing ability to access justice? This paper examines existing research on the social and political changes Malaysia has experienced with Islamisation and under Mahathir’s rule, as well as studies on Malayness, Malay nationalism and Muslim Malay identity formation. The paper elaborates the othering of a majority people, the Malays in Malaysia, and how this othering has brought forth a fast-growing political power in the name of a supremacist Islam, a puritanical Sunni and Malay Islam. Specific events in the rise and rule of Mahathir as Malaysia’s then Prime Minister are reviewed, such as the banning of The Malay Dilemma, and the split in the United Malays National Organisation (UMNO) in 1987. Also examined is the varying emphasis between Muslim and race, and how during Mahathir’s rule, that strong misogynist and patriarchal attitudes took hold in Malay Muslim consciousness, a colonising consciousness that is othering the perceived cultural and genetic “impurities” within the Malay.
Resumo:
In early April 1998, the Centre for Disease Control in Darwin was notified of a possible case of dengue which appeared to have been acquired in the Northern Territory. Because dengue is not endemic to the Northern Territory, locally acquired infection has significant public health implications, particularly for vector identification and control to limit the spread of infection. Dengue IgM serology was positive on two occasions, but the illness was eventually presumptively identified as Kokobera infection. This case illustrates the complexity of interpreting flavivirus serology. Determining the cause of infection requires consideration of the clinical illness, the incubation period, the laboratory results and vector presence. Waiting for confirmation of results, before the institution of the public health measures necessary for a true case of dengue, was ultimately justified in this case. This is a valid approach in the Northern Territory, but may not be applicable to areas of Australia with established vectors for dengue. Commun Dis Intell 1998;22:105-107.
Resumo:
In early April 1998 the Centre for Disease Control (CDC) in Darwin was notified of a case with positive dengue serology. The illness appeared to have been acquired in the Northern Territory (NT). Because dengue is not endemic to the NT, locally acquired infection has significant public health implications, particularly for vector identification and control to limit the spread of infection. Dengue IgM serology was positive on two occasions but the illness was eventually presumptively identified as Kokobera infection. This case illustrates some important points about serology. The interpretation of flavivirus serology is complex and can be misleading, despite recent improvements. The best method of determining the cause of infection is still attempting to reconcile clinical illness details with incubation times and vector presence, as well as laboratory results. This approach ultimately justified the initial period of waiting for confirmatory results in this case, before the institution of public health measures necessary for a true case of dengue.
Resumo:
Throughout Australia (and in comparable urban contexts around the world) public spaces may be said to be under attack by developers and also attempts by civic authorities to regulate, restrict, rebrand and reframe them. A consequence of the increasingly security driven, privatised and surveilled nature of public space is the exclusion and displacement of those considered flawed and unwelcome in the ‘spectacular’ consumption spaces of many major urban centres. In the name of urban regeneration, processes of securitisation, ‘gentrification’ and creative cities discourses can refashion public space as sites of selective inclusion and exclusion. In this context of monitoring and control procedures, children and young people’s use of space in parks, neighbourhoods, shopping malls and streets is often viewed as a threat to the social order, requiring various forms of punitive and/or remedial action. This paper discusses developments in the surveillance, governance and control of public space used by children and young people in particular and the capacity for their displacement and marginality, diminishing their sense of place and belonging, and right to public space as an expression of their civil, political and social citizenship(s).
Resumo:
In April 2010, Senior lecturer A discovered a new article on strategic entrepreneurship that contained her own words and paragraphs, published under the name of two complete strangers. Over the next eight months, in search of a just outcome, A contacted various people and institutions involved: the journal editor and publisher, and more than 20 academics and academic managers at five universities located in four different countries, including vice chancellors, rectors, and university professors. While nobody disputed the plagiarism (which involved at least three documents and more than 50 pages of text, tables, and figures), most were reluctant to act. Disillusioned by institutional responses, A had to decide whether to continue pursuing a just outcome at the risk of damaging professional relationships (and her future career), or whether to accept the status quo. She wondered what it would take to change the system to genuinely reject plagiarism.