467 resultados para Threat categories


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: The Current Population Survey (CPS) and the American Time Use Survey (ATUS) use the 2002 census occupation system to classify workers into 509 separate occupations arranged into 22 major occupational categories. Methods: We describe the methods and rationale for assigning detailed MET estimates to occupations and present population estimates (comparing outputs generated by analysis of previously published summary MET estimates to the detailed MET estimates) of intensities of occupational activity using the 2003 ATUS data comprised of 20,720 respondents, 5,323 (2,917 males and 2,406 females) of whom reported working 6+ hours at their primary occupation on their assigned reporting day. Results: Analysis using the summary MET estimates resulted in 4% more workers in sedentary occupations, 6% more in light, 7% less in moderate, and 3% less in vigorous compared to using the detailed MET estimates. The detailed estimates are more sensitive to identifying individuals who do any occupational activity that is moderate or vigorous in intensity resulting in fewer workers in sedentary and light intensity occupations. Conclusions: Since CPS/ATUS regularly captures occupation data it will be possible to track prevalence of the different intensity levels of occupations. Updates will be required with inevitable adjustments to future occupational classification systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The XML Document Mining track was launched for exploring two main ideas: (1) identifying key problems and new challenges of the emerging field of mining semi-structured documents, and (2) studying and assessing the potential of Machine Learning (ML) techniques for dealing with generic ML tasks in the structured domain, i.e., classification and clustering of semi-structured documents. This track has run for six editions during INEX 2005, 2006, 2007, 2008, 2009 and 2010. The first five editions have been summarized in previous editions and we focus here on the 2010 edition. INEX 2010 included two tasks in the XML Mining track: (1) unsupervised clustering task and (2) semi-supervised classification task where documents are organized in a graph. The clustering task requires the participants to group the documents into clusters without any knowledge of category labels using an unsupervised learning algorithm. On the other hand, the classification task requires the participants to label the documents in the dataset into known categories using a supervised learning algorithm and a training set. This report gives the details of clustering and classification tasks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes the background and methodology developed and employed in undertaking research developing a Knowledge Management Strategy for a key construction focused government agency. This paper reviews this methodology and examines a likely Knowledge Management Strategy. Two central objectives structure this Case Study: 1. Identify categories of important information generated by the Building Division, Queensland Department of Public Works in its service delivery to internal and external stake-holders, and 2. Formulate an appropriate and targeted Knowledge Management Strategy to meet the needs of the Queensland Building Capital Works program. The structure of this paper includes: *Description of the Queensland construction industry setting *Review the relevant literature *Design an appropriate research methodology *Analyse results *Formulate conclusions, contributions and implications of the targeted strategy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Video surveillance technology, based on Closed Circuit Television (CCTV) cameras, is one of the fastest growing markets in the field of security technologies. However, the existing video surveillance systems are still not at a stage where they can be used for crime prevention. The systems rely heavily on human observers and are therefore limited by factors such as fatigue and monitoring capabilities over long periods of time. To overcome this limitation, it is necessary to have “intelligent” processes which are able to highlight the salient data and filter out normal conditions that do not pose a threat to security. In order to create such intelligent systems, an understanding of human behaviour, specifically, suspicious behaviour is required. One of the challenges in achieving this is that human behaviour can only be understood correctly in the context in which it appears. Although context has been exploited in the general computer vision domain, it has not been widely used in the automatic suspicious behaviour detection domain. So, it is essential that context has to be formulated, stored and used by the system in order to understand human behaviour. Finally, since surveillance systems could be modeled as largescale data stream systems, it is difficult to have a complete knowledge base. In this case, the systems need to not only continuously update their knowledge but also be able to retrieve the extracted information which is related to the given context. To address these issues, a context-based approach for detecting suspicious behaviour is proposed. In this approach, contextual information is exploited in order to make a better detection. The proposed approach utilises a data stream clustering algorithm in order to discover the behaviour classes and their frequency of occurrences from the incoming behaviour instances. Contextual information is then used in addition to the above information to detect suspicious behaviour. The proposed approach is able to detect observed, unobserved and contextual suspicious behaviour. Two case studies using video feeds taken from CAVIAR dataset and Z-block building, Queensland University of Technology are presented in order to test the proposed approach. From these experiments, it is shown that by using information about context, the proposed system is able to make a more accurate detection, especially those behaviours which are only suspicious in some contexts while being normal in the others. Moreover, this information give critical feedback to the system designers to refine the system. Finally, the proposed modified Clustream algorithm enables the system to both continuously update the system’s knowledge and to effectively retrieve the information learned in a given context. The outcomes from this research are: (a) A context-based framework for automatic detecting suspicious behaviour which can be used by an intelligent video surveillance in making decisions; (b) A modified Clustream data stream clustering algorithm which continuously updates the system knowledge and is able to retrieve contextually related information effectively; and (c) An update-describe approach which extends the capability of the existing human local motion features called interest points based features to the data stream environment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The concept of constructability uses integration art of individual functions through a valuable and timely construction inputs into planning and design development stages. It results in significant savings in cost and time needed to finalize infrastructure projects. However, available constructability principles, developed by CII Australia (1993), do not cover Operation and Maintenance (O&M) phases of projects, whilst major cost and time in multifaceted infrastructure projects are spent in post-occupancy stages. This paper discusses the need to extend the constructability concept by examining current O&M issues in the provision of multifaceted building projects. It highlights available O&M problems and shortcomings of building projects, as well as their causes and reasons in different categories. This initial categorization is an efficient start point for testing probable present O&M issues in various cases of complex infrastructure building projects. This preliminary categorization serve as a benchmark to develop an extended constructability model that considers the whole project life cycle phases rather than a specific phase. It anticipates that the development of an extended constructability model can reduce significant number of reworks, mistakes, extra costs and time wasted during delivery stages of multifaceted building projects.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study investigates a way to systematically integrate information literacy (IL) into an undergraduate academic programme and develops a model for integrating information literacy across higher education curricula. Curricular integration of information literacy in this study means weaving information literacy into an academic curriculum. In the associated literature, it is also referred to as the information literacy embedding approach or the intra-curricular approach. The key findings identified from this study are presented in 4 categories: the characteristics of IL integration; the key stakeholders in IL integration; IL curricular design strategies; and the process of IL curricular integration. Three key characteristics of the curricular integration of IL are identified: collaboration and negotiation, contextualisation and ongoing interaction with information. The key stakeholders in the curricular integration of IL are recognised as the librarians, the course coordinators and lecturers, the heads of faculties or departments, and the students. Some strategies for IL curricular design include: the use of IL policies and standards in IL curricular design; the combination of face to face and online teaching as an emerging trend; the use of IL assessment tools which play an important role in IL integration. IL can be integrated into the intended curriculum (what an institution expects its students to learn), the offered curriculum (what the teachers teach) and the received curriculum (what students actually learn). IL integration is a process of negotiation, collaboration and the implementation of the intended curriculum. IL can be integrated at different levels of curricula such as: institutional, faculty, departmental, course and class curriculum levels. Based on these key findings, an IL curricular integration model is developed. The model integrates curriculum, pedagogy and learning theories, IL theories, IL guidelines and the collaboration of multiple partners. The model provides a practical approach to integrating IL into multiple courses across an academic degree. The development of the model was based on the IL integration experiences of various disciplines in three universities and the implementation experience of an engineering programme at another university; thus it may be of interest to other disciplines. The model has the potential to enhance IL teaching and learning, curricular development and to implement graduate attributes in higher education. Sociocultural theories are applied to the research process and IL curricular design of this study. Sociocultural theories describe learning as being embedded within social events and occurring as learners interact with other people, objects, and events in a collaborative environment. Sociocultural theories are applied to explore how academic staff and librarians experience the curricular integration of IL; they also support collaboration in the curricular integration of IL and the development of an IL integration model. This study consists of two phases. Phase I (2007) was the interview phase where both academic staff and librarians at three IL active universities were interviewed. During this phase, attention was paid specifically to the practical process of curricular integration of IL and IL activity design. Phase II, the development phase (2007-2008), was conducted at a fourth university. This phase explores the systematic integration of IL into an engineering degree from Year 1 to Year 4. Learning theories such as sociocultural theories, Bloom’s Taxonomy and IL theories are used in IL curricular development. Based on the findings from both phases, an IL integration model was developed. The findings and the model contribute to IL education, research and curricular development in higher education. The sociocultural approach adopted in this study also extends the application of sociocultural theories to the IL integration process and curricular design in higher education.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aim of this thesis has been to map the ethical journey of experienced nurses now practising in rural and remote hospitals in central and south-west Queensland and in domiciliary services in Brisbane. One group of the experienced nurses in the study were Directors of Nursing in rural and remote hospitals. These nurses were “hands on”, “multi-skilled “ nurses who also had the task of managing the hospital. Also there were two Directors of Nursing from domiciliary services in Brisbane. A grounded theory method was used. The nurses were interviewed and the data retrieved from the interviews was coded, categorised and from these categories a conceptual framework was generated. The literature which dealt with the subject of ethical decision making and nurses also became part of the data. The study revealed that all these nurses experienced moral distress as they made ethical decisions. The decision making categories revealed in the data were: the area of financial management; issues as end of life approaches; allowing to die with dignity; emergency decisions; experience of unexpected death; the dilemma of providing care in very difficult circumstances. These categories were divided into two chapters: the category related to administrative and financial constraints and categories dealing with ethical issues in clinical settings. A further chapter discussed the overarching category of coping with moral distress. These experienced nurses suffered moral distress as they made ethical decisions, confirming many instances of moral distress in ethical decision making documented in the literature to date. Significantly, the nurses in their interviews never mentioned the ethical principles used in bioethics as an influence in their decision making. Only one referred to lectures on ethics as being an influence in her thinking. As they described their ethical problems and how they worked through them, they drew on their own previous experience rather than any knowledge of ethics gained from nursing education. They were concerned for their patients, they spoke from a caring responsibility towards their patients, but they were also concerned for justice for their patients. This study demonstrates that these nurses operated from the ethic of care, tempered with the ethic of responsibility as well as a concern for justice for their patients. Reflection on professional experience, rather than formal ethics education and training, was the primary influence on their ethical decision making.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This presentation discusses some of the general issues relating to the classification of UAS for the purposes of defining and promulgating safety regulations. One possible approach for the definition of a classification scheme for UAS Type Certification Categories reviewed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It is a big challenge to clearly identify the boundary between positive and negative streams for information filtering systems. Several attempts have used negative feedback to solve this challenge; however, there are two issues for using negative relevance feedback to improve the effectiveness of information filtering. The first one is how to select constructive negative samples in order to reduce the space of negative documents. The second issue is how to decide noisy extracted features that should be updated based on the selected negative samples. This paper proposes a pattern mining based approach to select some offenders from the negative documents, where an offender can be used to reduce the side effects of noisy features. It also classifies extracted features (i.e., terms) into three categories: positive specific terms, general terms, and negative specific terms. In this way, multiple revising strategies can be used to update extracted features. An iterative learning algorithm is also proposed to implement this approach on the RCV1 data collection, and substantial experiments show that the proposed approach achieves encouraging performance and the performance is also consistent for adaptive filtering as well.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aim of this project was to implement a just-in-time hints help system into a real time strategy (RTS) computer game that would deliver information to the user at the time that it would be of the most benefit. The goal of this help system is to improve the user’s learning in terms of their rate of learning, retention and avoidance of stagnation. The first stage of this project was implementing a computer game to incorporate four different types of skill that the user must acquire, namely motor, perceptual, declarative knowledge and strategic. Subsequently, the just-in-time hints help system was incorporated into the game to assess the user’s knowledge and deliver hints accordingly. The final stage of the project was to test the effectiveness of this help system by conducting two phases of testing. The goal of this testing was to demonstrate an increase in the user’s assessment of the helpfulness of the system from phase one to phase two. The results of this testing showed that there was no significant difference in the user’s responses in the two phases. However, when the results were analysed with respect to several categories of hints that were identified, it became apparent that patterns in the data were beginning to emerge. The conclusions of the project were that further testing with a larger sample size would be required to provide more reliable results and that factors such as the user’s skill level and different types of goals should be taken into account.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Road deposited solids are a mix of pollutants originating from a range of anthropogenic sources common to urban land uses and soil inputs from surrounding areas. These particles accumulate potentially toxic pollutants thereby posing a threat to receiving waters. Reliable estimation of sources of particulate pollutants in build-up and quantification of particle composition is important for the development of best management practices for stormwater quality mitigation. The research study analysed build-up pollutants from sixteen different urban road surfaces and soil from four background locations. The road surfaces were selected from residential, industrial and commercial land uses from four suburbs in Gold Coast, Australia. Collected build-up samples were analysed for solids load, organic matter and mineralogy. The soil samples were analysed for mineralogy. Quantitative and qualitative analysis of mineralogical data, along with multivariate data analysis were employed to identify the relative source contributions to road deposited solids. The build-up load on road surfaces in different suburbs showed significant differences due to the nature of anthropogenic activities, road texture depth and antecedent dry period. Analysis revealed that build-up pollutants consists primarily of soil derived minerals (60%) and the remainder is composed of traffic generated pollutants and organic matter. Major mineral components detected were quartz and potential clay forming minerals such as albite, microline, chlorite and muscovite. An average of 40-50% of build-up pollutants by weight was made up of quartz. Comparison of the mineral component of build-up pollutants with background soil samples indicated that the minerals primarily originate from surrounding soils. About 2.2% of build-up pollutants were organic matter which originates largely from plant matter. Traffic related pollutants which are potentially toxic to the receiving water environment represented about 30% of the build-up pollutants at the study sites.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Explanations of the role of analogies in learning science at a cognitive level are made in terms of creating bridges between new information and students’ prior knowledge. In this empirical study of learning with analogies in an 11th grade chemistry class, we explore an alternative explanation at the "social" level where analogy shapes classroom discourse. Students in the study developed analogies within small groups and with their teacher. These classroom interactions were monitored to identify changes in discourse that took place through these activities. Beginning from socio-cultural perspectives and hybridity, we investigated classroom discourse during analogical activities. From our analyses, we theorized a merged discourse that explains how the analog discourse becomes intertwined with the target discourse generating a transitional state where meanings, signs, symbols, and practices are in flux. Three categories were developed that capture how students intertwined the analog and target discourses—merged words, merged utterances/sentences, and merged practices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resource-intensive, high-carbon, Western lifestyles are frequently criticised as unsustainable and deeply unsatisfying. However, these lifestyles are still attractive to the majority of Westerners and to a high proportion of the developing world’s middle classes. This paper argues that the imminent threat of catastrophic climate change constitutes an immediate political, economic and ethical challenge for citizens of the developed world that cannot be tackled by appeals to asceticism or restraint. There can be no solution to climate change until sustainable conceptions of the good life are developed that those in the west want to live and which others might want to live. While the ultimate solution to climate change is the development of low carbon lifestyles, it is important that government initiatives, governance arrangements and economic incentives support rather than undermine that search. Like the global financial crisis, the climate change crisis also demonstrates what happens when weaknesses in national, corporate and professional governance are exacerbated by weaknesses in global governance. In tackling the latter, it is critical the mistakes now evidenced in the former are avoided – including a rethinking of carbon market and carbon tax alternatives. It is also critical that individuals must take responsibility for their actions as consumers, voters and investors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The effectiveness of ‘the lockout policy’ integrated within a broader police enforcement strategy to reduce alcohol-related harm, in and around late-night licensed premises, in major drinking precincts was examined. First response operational police (n= 280) recorded all alcohol and non alcohol-related incidents they attended in and around late-night liquor trading premises. A before and after study design was used, with police completing modified activity logs prior to and following the introduction of the lockout policy in two policing regions: Gold Coast (n = 12,801 incidents); Brisbane City/Fortitude Valley (n = 9,117 incidents). Qualitative information from key stakeholders (e.g., Police, Security Staff & Politicians n = 20) was also obtained. The number of alcohol-related offences requiring police attention was significantly reduced in some policing areas and for some types of offences (e.g., sex offences, street disturbances, traffic incidents. However, there was no variation for a number of other offence categories (e.g., assault). Interviews with licensees revealed that although all were initially opposed to the lockout policy, most perceived benefits from its introduction. This study was the first of its kind to comprehensively examine the impact of a lockout policy and provides supportive evidence for the effectiveness of the lockout policy as integrating positively with police enforcement to enhance public safety in some areas in and around late-night liquor trading premises.