303 resultados para Special purpose operations


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Pilot cars are used in one-lane two-way work zones to guide traffic and keep their speeds within posted limits. While many studies have examined the effectiveness of measures to reduce vehicle speeds in work zones, little is known about the reductions achievable through the use of pilot cars. This paper examines the effectiveness of a pilot car in reducing travel speeds in a rural highway work zone in Queensland, Australia. Analysis of speed data covering a period of five days showed that a pilot car reduced average speeds at the treatment location, but not downstream. The proportion of vehicles speeding through the activity area was also reduced, particularly those traveling at 10 km/h or more above the posted limit. Motorists were more likely to speed during the day, under a 40 kh/h limit, when traffic volumes were higher and when there were fewer vehicles in the traffic stream. Medium vehicles were less likely to speed in the presence of a pilot car than light vehicles. To maximize these benefits, it is necessary to ensure that the pilot car itself is not speeding.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Big Data presents many challenges related to volume, whether one is interested in studying past datasets or, even more problematically, attempting to work with live streams of data. The most obvious challenge, in a ‘noisy’ environment such as contemporary social media, is to collect the pertinent information; be that information for a specific study, tweets which can inform emergency services or other responders to an ongoing crisis, or give an advantage to those involved in prediction markets. Often, such a process is iterative, with keywords and hashtags changing with the passage of time, and both collection and analytic methodologies need to be continually adapted to respond to this changing information. While many of the data sets collected and analyzed are preformed, that is they are built around a particular keyword, hashtag, or set of authors, they still contain a large volume of information, much of which is unnecessary for the current purpose and/or potentially useful for future projects. Accordingly, this panel considers methods for separating and combining data to optimize big data research and report findings to stakeholders. The first paper considers possible coding mechanisms for incoming tweets during a crisis, taking a large stream of incoming tweets and selecting which of those need to be immediately placed in front of responders, for manual filtering and possible action. The paper suggests two solutions for this, content analysis and user profiling. In the former case, aspects of the tweet are assigned a score to assess its likely relationship to the topic at hand, and the urgency of the information, whilst the latter attempts to identify those users who are either serving as amplifiers of information or are known as an authoritative source. Through these techniques, the information contained in a large dataset could be filtered down to match the expected capacity of emergency responders, and knowledge as to the core keywords or hashtags relating to the current event is constantly refined for future data collection. The second paper is also concerned with identifying significant tweets, but in this case tweets relevant to particular prediction market; tennis betting. As increasing numbers of professional sports men and women create Twitter accounts to communicate with their fans, information is being shared regarding injuries, form and emotions which have the potential to impact on future results. As has already been demonstrated with leading US sports, such information is extremely valuable. Tennis, as with American Football (NFL) and Baseball (MLB) has paid subscription services which manually filter incoming news sources, including tweets, for information valuable to gamblers, gambling operators, and fantasy sports players. However, whilst such services are still niche operations, much of the value of information is lost by the time it reaches one of these services. The paper thus considers how information could be filtered from twitter user lists and hash tag or keyword monitoring, assessing the value of the source, information, and the prediction markets to which it may relate. The third paper examines methods for collecting Twitter data and following changes in an ongoing, dynamic social movement, such as the Occupy Wall Street movement. It involves the development of technical infrastructure to collect and make the tweets available for exploration and analysis. A strategy to respond to changes in the social movement is also required or the resulting tweets will only reflect the discussions and strategies the movement used at the time the keyword list is created — in a way, keyword creation is part strategy and part art. In this paper we describe strategies for the creation of a social media archive, specifically tweets related to the Occupy Wall Street movement, and methods for continuing to adapt data collection strategies as the movement’s presence in Twitter changes over time. We also discuss the opportunities and methods to extract data smaller slices of data from an archive of social media data to support a multitude of research projects in multiple fields of study. The common theme amongst these papers is that of constructing a data set, filtering it for a specific purpose, and then using the resulting information to aid in future data collection. The intention is that through the papers presented, and subsequent discussion, the panel will inform the wider research community not only on the objectives and limitations of data collection, live analytics, and filtering, but also on current and in-development methodologies that could be adopted by those working with such datasets, and how such approaches could be customized depending on the project stakeholders.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, an interactive planning and scheduling framework are proposed for optimising operations from pits to crushers in ore mining industry. Series of theoretical and practical operations research techniques are investigated to improve the overall efficiency of mining systems due to the facts that mining managers need to tackle optimisation problems within different horizons and with different levels of detail. Under this framework, mine design planning,mine production sequencing and mine transportation scheduling models are integrated and interacted within a whole optimisation system. The proposed integrated framework could be used by mining industry for reducing equipment costs, improving the production efficiency and maximising the net present value.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Promise of Law Reform the most comprehensive examination of the institutions and processes of law reform published in the common law world and provides a rich source of information, inspiration and ideas. It is an edited collection of 30 essays published to celebrate the 30th anniversary of the Australian Law Reform Commission. The authors - law reform commissioners, judges, academics, politicians, government officials, and journalists - reflect the plurality of law reform styles and structures, within Australia and overseas. They cover the broad themes of the history, purpose and function of law reform; institutional design of law reform agencies; methodology and operations; how successful law reform should be assessed and judged; cooperation and mutual assistance; other law reform initiatives; and law reform in action.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For TREC Crowdsourcing 2011 (Stage 2) we propose a networkbased approach for assigning an indicative measure of worker trustworthiness in crowdsourced labelling tasks. Workers, the gold standard and worker/gold standard agreements are modelled as a network. For the purpose of worker trustworthiness assignment, a variant of the PageRank algorithm, named TurkRank, is used to adaptively combine evidence that suggests worker trustworthiness, i.e., agreement with other trustworthy co-workers and agreement with the gold standard. A single parameter controls the importance of co-worker agreement versus gold standard agreement. The TurkRank score calculated for each worker is incorporated with a worker-weighted mean label aggregation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent years, the imperative to communicate organisational impacts to a variety of stakeholders has gained increasing importance within all sectors. Despite growing external demands for evaluation and social impact measurement, there has been limited critically informed analysis about the presumed importance of these activities to organisational success and the practical challenges faced by organisations in undertaking such assessment. In this paper, we present the findings from an action research study of five Australian small to medium social enterprises’ practices and use of evaluation and social impact analysis. Our findings have implications for social enterprise operators, policy makers and social investors regarding when, why and at what level these activities contribute to organisational performance and the fulfilment of mission.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Evaluates trends in the imagery built into GIS applications to supplement existing vector data of streets, boundaries, infrastructure and utilities. These include large area digital orthophotos, Landsat and SPOT data. Future developments include 3 to 5 metre pixel resolutions from satellites, 1 to 2 metres from aircraft. GPS and improved image analysis techniques will also assist in improving resolution and accuracy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ninety-seven percent of children who have special health care needs are cared for by their mothers. These mothers cite that their informal care work can be intrinsically rewarding, however, the role is not without substantial difficulties and consequences. We investigated differences in the health and well-being of mothers whose young children do and do not have special health care needs. Quantitative data are drawn from Growing Up in Australia: The Longitudinal Study of Australian Children. This study employs a matched-case control methodology to compare the experiences of a group of 292 mothers whose children are identified as having long term special health care needs to those mothers whose children are typically developing at two time points; Wave 1 (2004) and Wave 3 (2008). The findings support previous research that mothers of children with special health care needs have poorer general health and mental health than mothers whose children do not have special needs. Mothers of children with special health care needs also perceived life as more difficult. Longitudinally, this study also shows that maternal well-being remains relatively stable during the years when children are transitioning to formal schooling. Implications for policy makers, practitioners and early childhood professionals are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This special issue of Networking Science focuses on Next Generation Network (NGN) that enables the deployment of access independent services over converged fixed and mobile networks. NGN is a packet-based network and uses the Internet protocol (IP) to transport the various types of traffic (voice, video, data and signalling). NGN facilitates easy adoption of distributed computing applications by providing high speed connectivity in a converged networked environment. It also makes end user devices and applications highly intelligent and efficient by empowering them with programmability and remote configuration options. However, there are a number of important challenges in provisioning next generation network technologies in a converged communication environment. Some preliminary challenges include those that relate to QoS, switching and routing, management and control, and security which must be addressed on an urgent or emergency basis. The consideration of architectural issues in the design and pro- vision of secure services for NGN deserves special attention and hence is the main theme of this special issue.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This special issue of the International Journal of Technology Policy and Law considers recent developments in the reconfiguration of communication regulation to account for the impact of media convergence. It is readily apparent that media worldwide are going through a series of transformations, associated with the rise of the internet, user-created content and social media. The papers in the collection draw upon legal and policy developments in Australia, the European union and South Korea, and consider such issues as public participation in media policy and regulation, civic media governance for online platforms, the future copyright laws, the roles and responsibilities of internet intermediaries, and regulatory frameworks for internet protocol television (IPTV).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Motivated by the need of private set operations in a distributed environment, we extend the two-party private matching problem proposed by Freedman, Nissim and Pinkas (FNP) at Eurocrypt’04 to the distributed setting. By using a secret sharing scheme, we provide a distributed solution of the FNP private matching called the distributed private matching. In our distributed private matching scheme, we use a polynomial to represent one party’s dataset as in FNP and then distribute the polynomial to multiple servers. We extend our solution to the distributed set intersection and the cardinality of the intersection, and further we show how to apply the distributed private matching in order to compute distributed subset relation. Our work extends the primitives of private matching and set intersection by Freedman et al. Our distributed construction might be of great value when the dataset is outsourced and its privacy is the main concern. In such cases, our distributed solutions keep the utility of those set operations while the dataset privacy is not compromised. Comparing with previous works, we achieve a more efficient solution in terms of computation. All protocols constructed in this paper are provably secure against a semi-honest adversary under the Decisional Diffie-Hellman assumption.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

More children are now being diagnosed with chromosome abnormalities. Some chromosome disorder syndromes are relatively well known; while others are so rare that there is only limited evidence about their likely impact on learning and development. For educators, a basic level of knowledge about chromosome abnormalities is important for understanding the literature and communicating with families and professionals. This paper describes chromosomes, and the numerical and structural anomalies that can occur, usually spontaneously during early cell division. Distinctive features of various chromosome syndromes are summarised before a discussion of the rare chromosome disorders that are labelled, not with a syndrome name, but simply by a description of the chromosome number, size and shape. Because of the potential within-group variability that characterises syndromes, and the scarcity of literature about the rare chromosome disorders, expectations for learning and development of individual students need to be based on the range of possible outcomes that may be achievable.