540 resultados para 332.642
Resumo:
At present, many approaches have been proposed for deformable face alignment with varying degrees of success. However, the common drawback to nearly all these approaches is the inaccurate landmark registrations. The registration errors which occur are predominantly heterogeneous (i.e. low error for some frames in a sequence and higher error for others). In this paper we propose an approach for simultaneously aligning an ensemble of deformable face images stemming from the same subject given noisy heterogeneous landmark estimates. We propose that these initial noisy landmark estimates can be used as an “anchor” in conjunction with known state-of-the-art objectives for unsupervised image ensemble alignment. Impressive alignment performance is obtained using well known deformable face fitting algorithms as “anchors.
Resumo:
Effective risk management is crucial for any organisation. One of its key steps is risk identification, but few tools exist to support this process. Here we present a method for the automatic discovery of a particular type of process-related risk, the danger of deadline transgressions or overruns, based on the analysis of event logs. We define a set of time-related process risk indicators, i.e., patterns observable in event logs that highlight the likelihood of an overrun, and then show how instances of these patterns can be identified automatically using statistical principles. To demonstrate its feasibility, the approach has been implemented as a plug-in module to the process mining framework ProM and tested using an event log from a Dutch financial institution.
Resumo:
This paper describes a method for measuring the creative potential of computer games. The research approach applies a behavioral and verbal protocol to analyze the factors that influence the creative processes used by people as they play computer games from the puzzle genre. Creative potential is measured by examining task motivation and domain-relevant and creativity-relevant skills. This paper focuses on the reliability of the factors used for measurement, determining those factors that are more strongly related to creativity. The findings show that creative potential may be determined by examining the relationship between skills required and the effect of intrinsic motivation within game play activities.
Resumo:
Recently, a stream of project management research has recognized the critical role of boundary objects in the organization of projects. In this paper, we investigate how one advanced scheduling tool, the Integrated Master Schedule (IMS), is used as a temporal boundary object at various stages of complex projects. The IMS is critical to megaprojects which typically span long periods of time and face a high degree of complexity and uncertainty. In this paper, we conceptualize projects of this type as complex adaptive systems (CAS). We report the findings of four case projects on how the IMS mapped interactions, interdependencies, constraints, and fractal patterns of these emerging projects, and how the process of IMS visualization enabled communication and negotiation of project realities. This paper highlights that this advanced timeline tool acts as a boundary object and elicits shared understanding of complex projects from their stakeholders.
Resumo:
Buildings are key mediators between human activity and the environment around them, but details of energy usage and activity in buildings is often poorly communicated and understood. ECOS is an Eco-Visualization project that aims to contextualize the energy generation and consumption of a green building in a variety of different climates. The ECOS project is being developed for a large public interactive space installed in the new Science and Engineering Centre of the Queensland University of Technology that is dedicated to delivering interactive science education content to the public. This paper focuses on how design can develop ICT solutions from large data sets to create meaningful engagement with environmental data.
Resumo:
The increasing ecological awareness and stringent requirements for environmental protection have led to the development of water lubricated bearings in many applications where oil was used as the lubricant. The chapter details the theoretical analysis to determine both the static and dynamic characteristics,including the stability (using both the linearised perturbation method and the nonlinear transient analysis) of multiple axial groove water lubricated bearings. Experimental measurements and computational fluid dynamics (CFD) simulations by the Tribology research group at Queensland University of Technology,Australia and Manipal Institute of Technology, India, have highlighted a significant gap in the understanding of the flow phenomena and pressure conditions within the lubricating fluid. An attempt has been made to present a CFD approach to model fluid flow in the bearing with three equi-spaced axial grooves and supplied with water from one end of the bearing. Details of the experimental method used to measure the film pressure in the bearing are outlined. The lubricant is subjected to a velocity induced flow (as the shaft rotates) and a pressure induced flow (as the water is forced from one end of the bearing to the other). Results are presented for the circumferential and axial pressure distribution in the bearing clearance for different loads, speeds and supply pressures. The axial pressure profile along the axial groove located in the loaded part of the bearing is measured. The theoretical analysis shows that smaller the groove angle better will be the load-carrying capacity and stability of these bearings. Results are compared with experimentally measured pressure distributions.
Resumo:
Background: Understanding frequency of foot problems can assist health care planners with resource deployment to new and emerging services such as paediatric podiatry and focus future research on the most salient foot conditions. Methods: A review of 2187 patient consultations during a three month period was conducted. Patient medical and podiatric history was coded using industry standards. All patients were recruited for convenience from a metropolitan university podiatry clinic. Results: 392 new patients were identified with mean age 40.6 years old (range 1–95), with 65% being female. Arthritic diseases, asthma, hypertension and allergies were the most common medical conditions reported. The frequency of new consultations in younger people (n = 102; 27%) exceeded those of the elderly (n = 75; 20%). Conversely, the elderly were nearly three times more prevalent in this cohort (n = 910; 43%) compared to younger people (n = 332; 16%). Conclusion: This study illustrates the diverse nature of pathology seen by podiatrists. Knowledge that skin lesions are highly prevalent is of relevance to health departments, given the aging nature of most populations. Moreover there appears to be a growing trend in the number of young people who present for care, however government funded access to these services are limited.
Resumo:
The International Baccalaureate’s branding and reputation targets academic high achievers aiming for university entrance. This is an empirical examination of the growing popularity of this transnational secondary credential amongst local populations in Australia, focusing on its uptake across the community, and the discourses underpinning its spread and popularity. This paper reports on online surveys of 179 parents and 231 students in schools offering the IB as an alternative to Australian state curricula. It sets out to understand the social ecology of who chooses the IB and who it chooses. Statistically significant differences between IB and non-IB choosers were found in terms of family income, parent education, student aspirations, transnational lifestyles, and neoconservative, neoliberal and cosmopolitan beliefs. The analysis demonstrates how the reproduction of advantage is accomplished through choice behaviours in stratified educational markets.
Resumo:
This paper presents a model for generating a MAC tag with a stream cipher using the input message indirectly. Several recent proposals represent instances of this model with slightly different options. We investigate the security of this model for different options, and identify cases which permit forgery attacks. Based on this, we present a new forgery attack on version 1.4 of 128-EIA3. Design recommendations to enhance the security of proposals following this general model are given.
Resumo:
Having a reliable understanding about the behaviours, problems, and performance of existing processes is important in enabling a targeted process improvement initiative. Recently, there has been an increase in the application of innovative process mining techniques to facilitate evidence-based understanding about organizations' business processes. Nevertheless, the application of these techniques in the domain of finance in Australia is, at best, scarce. This paper details a 6-month case study on the application of process mining in one of the largest insurance companies in Australia. In particular, the challenges encountered, the lessons learned, and the results obtained from this case study are detailed. Through this case study, we not only validated existing `lessons learned' from other similar case studies, but also added new insights that can be beneficial to other practitioners in applying process mining in their respective fields.
Resumo:
This paper presents a model for generating a MAC tag by injecting the input message directly into the internal state of a nonlinear filter generator. This model generalises a similar model for unkeyed hash functions proposed by Nakano et al. We develop a matrix representation for the accumulation phase of our model and use it to analyse the security of the model against man-in-the-middle forgery attacks based on collisions in the final register contents. The results of this analysis show that some conclusions of Nakano et al regarding the security of their model are incorrect. We also use our results to comment on several recent MAC proposals which can be considered as instances of our model and specify choices of options within the model which should prevent the type of forgery discussed here. In particular, suitable initialisation of the register and active use of a secure nonlinear filter will prevent an attacker from finding a collision in the final register contents which could result in a forged MAC.
Resumo:
The three-component reaction-diffusion system introduced in [C. P. Schenk et al., Phys. Rev. Lett., 78 (1997), pp. 3781–3784] has become a paradigm model in pattern formation. It exhibits a rich variety of dynamics of fronts, pulses, and spots. The front and pulse interactions range in type from weak, in which the localized structures interact only through their exponentially small tails, to strong interactions, in which they annihilate or collide and in which all components are far from equilibrium in the domains between the localized structures. Intermediate to these two extremes sits the semistrong interaction regime, in which the activator component of the front is near equilibrium in the intervals between adjacent fronts but both inhibitor components are far from equilibrium there, and hence their concentration profiles drive the front evolution. In this paper, we focus on dynamically evolving N-front solutions in the semistrong regime. The primary result is use of a renormalization group method to rigorously derive the system of N coupled ODEs that governs the positions of the fronts. The operators associated with the linearization about the N-front solutions have N small eigenvalues, and the N-front solutions may be decomposed into a component in the space spanned by the associated eigenfunctions and a component projected onto the complement of this space. This decomposition is carried out iteratively at a sequence of times. The former projections yield the ODEs for the front positions, while the latter projections are associated with remainders that we show stay small in a suitable norm during each iteration of the renormalization group method. Our results also help extend the application of the renormalization group method from the weak interaction regime for which it was initially developed to the semistrong interaction regime. The second set of results that we present is a detailed analysis of this system of ODEs, providing a classification of the possible front interactions in the cases of $N=1,2,3,4$, as well as how front solutions interact with the stationary pulse solutions studied earlier in [A. Doelman, P. van Heijster, and T. J. Kaper, J. Dynam. Differential Equations, 21 (2009), pp. 73–115; P. van Heijster, A. Doelman, and T. J. Kaper, Phys. D, 237 (2008), pp. 3335–3368]. Moreover, we present some results on the general case of N-front interactions.
Resumo:
This paper proposes a technique that supports process participants in making risk-informed decisions, with the aim to reduce the process risks. Risk reduction involves decreasing the likelihood and severity of a process fault from occurring. Given a process exposed to risks, e.g. a financial process exposed to a risk of reputation loss, we enact this process and whenever a process participant needs to provide input to the process, e.g. by selecting the next task to execute or by filling out a form, we prompt the participant with the expected risk that a given fault will occur given the particular input. These risks are predicted by traversing decision trees generated from the logs of past process executions and considering process data, involved resources, task durations and contextual information like task frequencies. The approach has been implemented in the YAWL system and its effectiveness evaluated. The results show that the process instances executed in the tests complete with substantially fewer faults and with lower fault severities, when taking into account the recommendations provided by our technique.
Resumo:
The purpose of this paper is to develop a second-moment closure with a near-wall turbulent pressure diffusion model for three-dimensional complex flows, and to evaluate the influence of the turbulent diffusion term on the prediction of detached and secondary flows. A complete turbulent diffusion model including a near-wall turbulent pressure diffusion closure for the slow part was developed based on the tensorial form of Lumley and included in a re-calibrated wall-normal-free Reynolds-stress model developed by Gerolymos and Vallet. The proposed model was validated against several one-, two, and three-dimensional complex flows.
Resumo:
In this paper, we present WebPut, a prototype system that adopts a novel web-based approach to the data imputation problem. Towards this, Webput utilizes the available information in an incomplete database in conjunction with the data consistency principle. Moreover, WebPut extends effective Information Extraction (IE) methods for the purpose of formulating web search queries that are capable of effectively retrieving missing values with high accuracy. WebPut employs a confidence-based scheme that efficiently leverages our suite of data imputation queries to automatically select the most effective imputation query for each missing value. A greedy iterative algorithm is also proposed to schedule the imputation order of the different missing values in a database, and in turn the issuing of their corresponding imputation queries, for improving the accuracy and efficiency of WebPut. Experiments based on several real-world data collections demonstrate that WebPut outperforms existing approaches.