429 resultados para Biometric attributes
Resumo:
In a commercial environment, it is advantageous to know how long it takes customers to move between different regions, how long they spend in each region, and where they are likely to go as they move from one location to another. Presently, these measures can only be determined manually, or through the use of hardware tags (i.e. RFID). Soft biometrics are characteristics that can be used to describe, but not uniquely identify an individual. They include traits such as height, weight, gender, hair, skin and clothing colour. Unlike traditional biometrics, soft biometrics can be acquired by surveillance cameras at range without any user cooperation. While these traits cannot provide robust authentication, they can be used to provide identification at long range, and aid in object tracking and detection in disjoint camera networks. In this chapter we propose using colour, height and luggage soft biometrics to determine operational statistics relating to how people move through a space. A novel average soft biometric is used to locate people who look distinct, and these people are then detected at various locations within a disjoint camera network to gradually obtain operational statistics
Resumo:
Green building is building that the focus is to maximize the energy efficiency and resources used. While, retrofitting is the process of renovate or refurnish the existing building. Therefore by retrofit existing buildings that comply with green building requirement, it improves the environmental attributes of the buildings. In Malaysia, existing buildings and its communities contribute over 40% of green house gases to the environment. This paper describes a study that explores the potential to retrofit existing campus buildings that response to sustainable green building standard. A validation survey was carried out and the data collected was analysed using SPSS in order to confirm the significance of retrofitting Universiti Teknologi Malaysia (UTM) buildings toward green building initiative. The results show that all the twenty eight identified green elements recorded average index of higher than 3.5 which means that there is significant needs to retrofit the existing buildings to green buildings. This study concludes that it is urgently need for the campus to response to green building requirements in order to achieve higher energy effeciency and this can be done through effective etrofitting of existing buildings.
Resumo:
With increasing rate of shipping traffic, the risk of collisions in busy and congested port waters is expected to rise. However, due to low collision frequencies it is difficult to analyze such risk in a sound statistical manner. This study aims at examining the occurrence of traffic conflicts in order to understand the characteristics of vessels involved in navigational hazards. A binomial logit model was employed to evaluate the association of vessel attributes and the kinematic conditions with conflict severity levels. Results show a positive association for vessels of small gross tonnage, overall vessel length, vessel height and draft with conflict risk. Conflicts involving a pair of dynamic vessels sailing at low speeds also have similar effects.
Resumo:
-First, the incidence of psychological distress in law students is uncomfortably high. -Second, we cannot identify with precision the exact factors that are causing this psychological distress. -Third, cross sectional studies (by themselves) cannot tell us whether it is law school that is creating these levels of psychological distress, or whether prospective law students already possess these attributes. -Fourth, if law school is somehow causing or contributing to this psychological distress, cross sectional studies (by themselves) cannot tell us when in the law degree psychological distress is most likely to occur.
Resumo:
We introduce the concept of Revocable Predicate Encryption (RPE), which extends current predicate encryption setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We formalize the notion of attribute hiding in the presence of revocation and propose an RPE scheme, called AH-RPE, which achieves attribute-hiding under the Decision Linear assumption in the standard model. We then present a stronger privacy notion, termed full hiding, which further cares about privacy of revoked users. We propose another RPE scheme, called FH-RPE, that adopts the Subset Cover Framework and offers full hiding under the Decision Linear assumption in the standard model. The scheme offers very flexible privacy-preserving access control to encrypted data and can be used in sender-local revocation scenarios.
Resumo:
Monitoring the natural environment is increasingly important as habit degradation and climate change reduce theworld’s biodiversity.We have developed software tools and applications to assist ecologists with the collection and analysis of acoustic data at large spatial and temporal scales.One of our key objectives is automated animal call recognition, and our approach has three novel attributes. First, we work with raw environmental audio, contaminated by noise and artefacts and containing calls that vary greatly in volume depending on the animal’s proximity to the microphone. Second, initial experimentation suggested that no single recognizer could dealwith the enormous variety of calls. Therefore, we developed a toolbox of generic recognizers to extract invariant features for each call type. Third, many species are cryptic and offer little data with which to train a recognizer. Many popular machine learning methods require large volumes of training and validation data and considerable time and expertise to prepare. Consequently we adopt bootstrap techniques that can be initiated with little data and refined subsequently. In this paper, we describe our recognition tools and present results for real ecological problems.
Resumo:
This book sensitizes the reader to the fact that there is substantial disagreement within the academic community, and among policymakers and the general public, over what behaviors, conditions (e.g., physical attributes), and people should be designated as deviant or criminal. Normative conceptions, the societal reaction/labeling approach, and the critical approach are offered as frameworks within which to study these definitions. A comprehensive explanation of theory and social policy on deviance is constructed.
Resumo:
A collaborative research project conducted by five Australian universities inquired into the philosophy and motivation for Assurance of Learning (AoL) as a process of education evaluation. Associate Deans Teaching and Learning representing Business schools from twenty-five universities across Australia participated in telephone interviews. Data was analysed using NVIVO9. Results indicated that articulated rationale for AoL was both ensuring that students had acquired the attributes and skills the universities claimed they had, and the philosophy of continuous improvement. AoL was motivated both by ritualistic objectives to satisfy accreditation requirements and virtuous agendas for quality improvement. Closing-the-loop was emphasised, but was mostly wishful thinking for next steps beyond data collection and reporting. AoL was conceptualised as one element within the larger context of quality review, but there was no evidence of comprehensive frameworks or strategic plans.
Resumo:
Assurance of learning (AoL) is an important process in quality education, designed to measure the accomplishment of educational aims at the core of an institution’s programs, whilst encouraging faculty to continuously develop and improve the programs and courses. This paper reports on a study of Australian business schools to investigate current AoL practices through semi structured interviews with senior faculty leaders followed by focus group interviews with groups of senior program leaders and groups of academic teaching staff. Initial findings indicate there are significant challenges in encouraging academic staff to commit to the process and recognise the benefits of assuring learning. The differences in understanding between the various leaders and the academics were highlighted through the different focus groups. Leaders’ stressed strategic issues such as staff engagement and change, while academics focussed on process issues such as teaching graduate attributes and external accreditation. Understanding the differences in the perspectives of leaders and faculty is important, as without a shared understanding between the two groups, there is likely to be limited engagement, which creates difficulties in developing effective assurance of learning processes. Findings indicate that successful strategies developed to foster shared values on assurance of learning include: strong senior leaders’ commitment; developing champions among program and unit level staff; providing professional development opportunities; promoting and celebrating success and effectiveness; and ensuring an inclusive process with academics of all levels collaborating in the development and implementation of the process.
Resumo:
A prominent research focus, especially in the context of EU public funding, has been the systematic use of the Internet for new ways of value creation in the services sector. This idea of service networks in the Internet, frequently dubbed the Internet of Services or Web service ecosystems, wants to make services tradable in digital media. In order to enable communication and trade between providers and consumers of services, the Internet of Services requires a standard that creates a "commercial envelope" around a service. This is where the Unified Service Description Language (USDL) comes into play as a normative and balanced unification of service information. The unified description established by USDL is machine-processable, considers technical and business aspects of a service as well as functional and non-functional attributes.
Resumo:
This study compared the corneal and total higher order aberrations between the fellow eyes in monocular amblyopia. Nineteen amblyopic subjects (8 refractive and 11 strabismic) (mean age 30 ± 11 years) were recruited. A range of biometric and optical measurements were collected from the amblyopic and non-amblyopic eye including; axial length, corneal topography and total higher order aberrations. For a sub-group of eleven non-presbyopic subjects (6 refractive and 5 strabismic amblyopes, mean age 29 ± 10 years) total higher order aberrations were also measured during accommodation (2.5 D stimuli). Amblyopic eyes were significantly shorter and more hyperopic compared to non-amblyopic eyes and the interocular difference in axial length correlated with both the magnitude of anisometropia and amblyopia (both p < 0.01). Significant differences in higher order aberrations were observed between fellow eyes, which varied with the type of amblyopia. Refractive amblyopes displayed higher levels of 4th order corneal aberrations C(4, 0)(spherical aberration), C(4, 2)(secondary astigmatism 90°) and C(4, −2)(secondary astigmatism along 45°) in the amblyopic eye compared to the non-amblyopic eye. Strabismic amblyopes exhibited significantly higher levels of C(3, 3)(trefoil) in the amblyopic eye for both corneal and total higher order aberrations. During accommodation, the amblyopic eye displayed a significantly greater lag of accommodation compared to the non-amblyopic eye, while the changes in higher order aberrations were similar in magnitude between fellow eyes. Asymmetric visual experience during development appears to be associated with asymmetries in higher order aberrations, in some cases proportional to the magnitude of anisometropia and dependent upon the amblyogenic factor.
Resumo:
The research team recognized the value of network-level Falling Weight Deflectometer (FWD) testing to evaluate the structural condition trends of flexible pavements. However, practical limitations due to the cost of testing, traffic control and safety concerns and the ability to test a large network may discourage some agencies from conducting the network-level FWD testing. For this reason, the surrogate measure of the Structural Condition Index (SCI) is suggested for use. The main purpose of the research presented in this paper is to investigate data mining strategies and to develop a prediction method of the structural condition trends for network-level applications which does not require FWD testing. The research team first evaluated the existing and historical pavement condition, distress, ride, traffic and other data attributes in the Texas Department of Transportation (TxDOT) Pavement Maintenance Information System (PMIS), applied data mining strategies to the data, discovered useful patterns and knowledge for SCI value prediction, and finally provided a reasonable measure of pavement structural condition which is correlated to the SCI. To evaluate the performance of the developed prediction approach, a case study was conducted using the SCI data calculated from the FWD data collected on flexible pavements over a 5-year period (2005 – 09) from 354 PMIS sections representing 37 pavement sections on the Texas highway system. The preliminary study results showed that the proposed approach can be used as a supportive pavement structural index in the event when FWD deflection data is not available and help pavement managers identify the timing and appropriate treatment level of preventive maintenance activities.
Resumo:
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz (Eurocrypt 2003), reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. The FS property was also shown to be achievable in (Hierarchical) Identity-Based Encryption (HIBE) by Yao, Fazio, Dodis, and Lysyanskaya (ACM CCS 2004). Yet, for emerging encryption techniques, offering flexible access control to encrypted data, by means of functional relationships between ciphertexts and decryption keys, FS protection was not known to exist.\smallskip In this paper we introduce FS to the powerful setting of \emph{Hierarchical Predicate Encryption (HPE)}, proposed by Okamoto and Takashima (Asiacrypt 2009). Anticipated applications of FS-HPE schemes can be found in searchable encryption and in fully private communication. Considering the dependencies amongst the concepts, our FS-HPE scheme implies forward-secure flavors of Predicate Encryption and (Hierarchical) Attribute-Based Encryption.\smallskip Our FS-HPE scheme guarantees forward security for plaintexts and for attributes that are hidden in HPE ciphertexts. It further allows delegation of decrypting abilities at any point in time, independent of FS time evolution. It realizes zero-inner-product predicates and is proven adaptively secure under standard assumptions. As the ``cross-product" approach taken in FS-HIBE is not directly applicable to the HPE setting, our construction resorts to techniques that are specific to existing HPE schemes and extends them with what can be seen as a reminiscent of binary tree encryption from FS-PKE.
Resumo:
Teleradiology allows medical images to be transmitted over electronic networks for clinical interpretation, and for improved healthcare access, delivery and standards. Although, such remote transmission of the images is raising various new and complex legal and ethical issues, including image retention and fraud, privacy, malpractice liability, etc., considerations of the security measures used in teleradiology remain unchanged. Addressing this problem naturally warrants investigations on the security measures for their relative functional limitations and for the scope of considering them further. In this paper, starting with various security and privacy standards, the security requirements of medical images as well as expected threats in teleradiology are reviewed. This will make it possible to determine the limitations of the conventional measures used against the expected threats. Further, we thoroughly study the utilization of digital watermarking for teleradiology. Following the key attributes and roles of various watermarking parameters, justification for watermarking over conventional security measures is made in terms of their various objectives, properties, and requirements. We also outline the main objectives of medical image watermarking for teleradiology, and provide recommendations on suitable watermarking techniques and their characterization. Finally, concluding remarks and directions for future research are presented.
Resumo:
The common brown leafhopper Orosius orientalis (Hemiptera: Cicadellidae) is a polyphagous vector of a range of economically important pathogens, including phytoplasmas and viruses, which infect a diverse range of crops. Studies on the plant penetration behaviour by O. orientalis were conducted using the electrical penetration graph (EPG) technique to assist in the characterisation of pathogen acquisition and transmission. EPG waveforms representing different probing activities were acquired from adult O. orientalis probing in planta, using two host species, tobacco Nicotiana tabacum and bean Phaseolus vulgaris, and in vitro using a simple sucrose-based artificial diet. Five waveforms (O1–O5) were evident when O. orientalis fed on bean, whereas only four waveforms (O1–O4) and three waveforms (O1–O3) were observed when the leafhopper fed on tobacco and on the artificial diet, respectively. Both the mean duration of each waveform and waveform type differed markedly depending on the food substrate. Waveform O4 was not observed on the artificial diet and occurred relatively rarely on tobacco plants when compared with bean plants. Waveform O5 was only observed with leafhoppers probing on beans. The attributes of the waveforms and comparative analyses with previously published Hemipteran data are presented and discussed, but further characterisation studies will be needed to confirm our suggestions.