243 resultados para temporary streams
Resumo:
We first classify the state-of-the-art stream authentication problem in the multicast environment and group them into Signing and MAC approaches. A new approach for authenticating digital streams using Threshold Techniques is introduced. The new approach main advantages are in tolerating packet loss, up to a threshold number, and having a minimum space overhead. It is most suitable for multicast applications running over lossy, unreliable communication channels while, in same time, are pertain the security requirements. We use linear equations based on Lagrange polynomial interpolation and Combinatorial Design methods.
Resumo:
Providing debtors with the opportunity for a fresh start is popularly regarded as one of the main goals of bankruptcy legislation. However, there has been limited analysis of this goal. This article confirms that the fresh start is one of the main goals of the Australian Bankruptcy Act, and argues that this fresh start focuses on discharge of debt and does not explicitly address debtor rehabilitation. A review of the key goals could examine whether, and to what extent, rehabilitation should also be a focus of the fresh start in Australian bankruptcy law.
Resumo:
This paper presents a single pass algorithm for mining discriminative Itemsets in data streams using a novel data structure and the tilted-time window model. Discriminative Itemsets are defined as Itemsets that are frequent in one data stream and their frequency in that stream is much higher than the rest of the streams in the dataset. In order to deal with the data structure size, we propose a pruning process that results in the compact tree structure containing discriminative Itemsets. Empirical analysis shows the sound time and space complexity of the proposed method.
Resumo:
Contemporary cities no longer offer the same types of permanent environments that we planned for in the latter part of the twentieth century. Our public spaces are increasingly temporary, transient, and ephemeral. The theories, principles and tactics with which we designed these spaces in the past are no longer appropriate. We need a new theory for understanding the creation, use, and reuse of temporary public space. Moe than a theory, we need new architectural tactics or strategies that can be reliably employed to create successful temporary public spaces. This paper will present ongoing research that starts that process through critical review and technical analysis of existing and historic temporary public spaces. Through the analysis of a number of public spaces, that were either designed for temporary use or became temporary through changing social conditions, this research identifies the tactics and heuristics used in such projects. These tactics and heuristics are then analysed to extract some broader principles for the design of temporary public space. The theories of time related building layers, a model of environmental sustainability, and the recycling of social meaning, are all explored. The paper will go on to identify a number of key questions that need to be explored and addressed by a theory for such developments: How can we retain social meaning in the fabric of the city and its public spaces while we disassemble it and recycle it into new purposes? What role will preservation have in the rapidly changing future; will exemplary temporary spaces be preserved and thereby become no longer temporary? Does the environmental advantage of recycling materials, components and spaces outweigh the removal or social loss of temporary public space? This research starts to identify the knowledge gaps and proposes a number of strategies for making public space in the age of temporary, recyclable, and repurposing of our urban infrastructure; a way of creating lighter, cheaper, quicker, and temporary interventions.
Resumo:
Recent literature acknowledges the need for new career development models to support the way that careers evolve in the 21st century workplace (Bloch 2005). This is particularly so within temporary organisation forms, and for those pursuing a career in project management (Hölzle 2010). Our research, explores how project managers working on projects and within temporary organisation forms and those working on project-linked contracts access the development opportunities they require to remain employable in an era of project-by-project employment. Set in Australia where a project-based economy (Crawford, French and Lloyd-Walker 2013) and contract work have led to casualisation of the workforce (Connell & Burgess, 2006; McKeown & Hanley (2009) the results suggest new approaches to career development may be required.
Resumo:
This study examines the effects of temporary tissue expanders (TTEs) on the dose distributions of photon beams in breast cancer radiotherapy treatments. EBT2 radiochromic film and ion chamber measurements were taken to quantify the attenuation and backscatter effects of the inhomogeneity. Results illustrate that the internal magnetic port present in a tissue expander causes a dose reduction of approximately 25% in photon tangent fields immediately downstream of the implant. It was also shown that the silicone elastomer shell of the tissue expander reduced the dose to the target volume by as much as 8%. This work demonstrates the importance for an accurately modelled high-density implant in the treatment planning system for post-mastectomy breast cancer patients.
Establishing the impact of temporary tissue expanders on electron and photon beam dose distributions
Resumo:
Purpose: This study investigates the effects of temporary tissue expanders (TTEs) on the dose distributions in breast cancer radiotherapy treatments under a variety of conditions. Methods: Using EBT2 radiochromic film, both electron and photon beam dose distribution measurements were made for different phantoms, and beam geometries. This was done to establish a more comprehensive understanding of the implant’s perturbation effects under a wider variety of conditions. Results: The magnetic disk present in a tissue expander causes a dose reduction of approximately 20% in a photon tangent treatment and 56% in electron boost fields immediately downstream of the implant. The effects of the silicon elastomer are also much more apparent in an electron beam than a photon beam. Conclusions: Evidently, each component of the TTE attenuates the radiation beam to different degrees. This study has demonstrated that the accuracy of photon and electron treatments of post-mastectomy patients is influenced by the presence of a tissue expander for various beam orientations. The impact of TTEs on dose distributions establishes the importance of an accurately modelled high-density implant in the treatment planning system for post-mastectomy patients.
Resumo:
This article discusses the experience of economic inequality of badli workers in the state-owned jute mills of the postcolonial state of Bangladesh, and how this inequality is constituted and perpetuated. Nominally appointed to fill posts during the temporary absence of permanent workers, the reality of badli workers’ employment is very different. They define themselves as ‘a different category of workers’, with limited economic entitlements. We undertake content analysis of the badli workers’ narratives to identify elements that they themselves consider constitute these economic entitlements. We consider their perceptions of discrimination and exclusion and explain how, in response to these feelings, they construct their survival strategy. From this, through the writings of Armatya Sen, we discuss the badli workers’ contextual experience and understanding of economic inequality in relation to extant theoretical understandings, seeking to contribute to the field and to empirical studies in the subaltern context.
Resumo:
This study investigates friendships between gay sales associates and heterosexual female customers in luxury retail settings. By employing grounded theory methodology, the study integrates theories and findings from diverse literature streams into an original conceptual framework to illustrate the resources gay sales associates and straight female customers receive from and provide to each other during retail exchanges. The study explains why gay male–straight female friendships are uniquely suited for luxury consumption settings. Female customers characterize their friendships with gay sales associates as providing honesty, security, trust, and comfort, which stems from the absence of sexual interest and a lack of inter-female competition. Gay sales associates receive acceptance for who they are and for their displays of unconventional masculinity in retail settings. They also obtain a temporary rite from their female customers, a so-called mandate of privacy, which permits both parties to ignore the bounds of modesty and accept a degree of intimacy. Such intimacy facilitates transactions that require both personalization and customer–employee closeness, such as the selling of high-end apparel, accessories, and jewelry.
Resumo:
Existing business process drift detection methods do not work with event streams. As such, they are designed to detect inter-trace drifts only, i.e. drifts that occur between complete process executions (traces), as recorded in event logs. However, process drift may also occur during the execution of a process, and may impact ongoing executions. Existing methods either do not detect such intra-trace drifts, or detect them with a long delay. Moreover, they do not perform well with unpredictable processes, i.e. processes whose logs exhibit a high number of distinct executions to the total number of executions. We address these two issues by proposing a fully automated and scalable method for online detection of process drift from event streams. We perform statistical tests over distributions of behavioral relations between events, as observed in two adjacent windows of adaptive size, sliding along with the stream. An extensive evaluation on synthetic and real-life logs shows that our method is fast and accurate in the detection of typical change patterns, and performs significantly better than the state of the art.
Resumo:
Despite greater use of temporary employment contracts, little is known about how employees react to job length uncertainty. Individual careers within the safety of one or two primary organisations are no longer the norm. This study investigates the effects of job insecurity and employment status (temporary/permanent) on work outcomes. Three hundred and ninety-one employees (122 temporary and 269 permanent) in low to medium level non-academic positions from two Australian universities completed a survey. The results show that a belief that comparable employment is easily available did not alleviate the negative effects of job insecurity. Work attitudes for temporaries and permanents though were differentially influenced by employee perceptions of their own employability.
Resumo:
Knowledge has been recognised as an important organisational asset that increases in value when shared; the opposite to other organisational assets which decrease in value during their exploitation. Effective knowledge transfer in organisations helps to achieve and maintain competitive advantage and ultimately organisational success. So far, the research on knowledge transfer has focused on traditional (functional) organisations. Only recently has attention been directed towards knowledge transfer in projects. Existing research on project learning has recognised the need for knowledge transfer within and across projects in project-based organisations (PBOs). Most projects can provide valuable new knowledge from unexpected actions, approaches or problems experienced during the project phases. The aim of this paper is to demonstrate the impact of unique projects characteristics on knowledge transfer in PBO. This is accomplished through review of the literature and a series of interviews with senior project practitioners. The interviews complement the findings from the literature. Knowledge transfer in projects occurs by social communication and transfer of lessons learned where project management offices (PMOs) and project managers play significant roles in enhancing knowledge transfer and communication within the PBO and across projects. They act as connectors between projects and the PBO ‘hub’. Moreover, some project management processes naturally facilitate knowledge transfer across projects. On the other hand, PBOs face communication challenges due to unique and temporary characteristics of projects. The distance between projects and the lack or weakness of formal links across projects, create communication problems that impede knowledge transfer across projects. The main contribution of this paper is to demonstrate that both social communication and explicit informational channels play important role in inter-project knowledge transfer. Interviews also revealed the important role organisational culture play in knowledge transfer in PBOs.
Resumo:
Purpose – Virtual prototyping technologies linked to building information models are commonplace within the aeronautical and automotive industries. Their use within the construction industry is now emerging. The purpose of this paper is to show how these technologies have been adopted on the pre-tender planning for a typical construction project. Design/methodology/approach – The research methodology taken was an “action research” approach where the researchers and developers were actively involved in the production of the virtual prototypes on behalf of the contractor thereby gaining consistent access to the decisions of the planning staff. The experiences from the case study were considered together with similar research on other construction projects. Findings – The findings from the case studies identify the role of virtual prototyping in components modelling, site modelling, construction equipment modelling, temporary works modelling, construction method visualization and method verification processes. Originality/value – The paper presents a state-of-the-art review and discusses the implications for the tendering process as these technologies are adopted. The adoption of the technologies will lead to new protocols and changes in the procurement of buildings and infrastructure.
Resumo:
The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.
Resumo:
Amphibian is an 10’00’’ musical work which explores new musical interfaces and approaches to hybridising performance practices from the popular music, electronic dance music and computer music traditions. The work is designed to be presented in a range of contexts associated with the electro-acoustic, popular and classical music traditions. The work is for two performers using two synchronised laptops, an electric guitar and a custom designed gestural interface for vocal performers - the e-Mic (Extended Mic-stand Interface Controller). This interface was developed by one of the co-authors, Donna Hewitt. The e-Mic allows a vocal performer to manipulate the voice in real time through the capture of physical gestures via an array of sensors - pressure, distance, tilt - along with ribbon controllers and an X-Y joystick microphone mount. Performance data are then sent to a computer, running audio-processing software, which is used to transform the audio signal from the microphone. In this work, data is also exchanged between performers via a local wireless network, allowing performers to work with shared data streams. The duo employs the gestural conventions of guitarist and singer (i.e. 'a band' in a popular music context), but transform these sounds and gestures into new digital music. The gestural language of popular music is deliberately subverted and taken into a new context. The piece thus explores the nexus between the sonic and performative practices of electro acoustic music and intelligent electronic dance music (‘idm’). This work was situated in the research fields of new musical interfacing, interaction design, experimental music composition and performance. The contexts in which the research was conducted were live musical performance and studio music production. The work investigated new methods for musical interfacing, performance data mapping, hybrid performance and compositional practices in electronic music. The research methodology was practice-led. New insights were gained from the iterative experimental workshopping of gestural inputs, musical data mapping, inter-performer data exchange, software patch design, data and audio processing chains. In respect of interfacing, there were innovations in the design and implementation of a novel sensor-based gestural interface for singers, the e-Mic, one of the only existing gestural controllers for singers. This work explored the compositional potential of sharing real time performance data between performers and deployed novel methods for inter-performer data exchange and mapping. As regards stylistic and performance innovation, the work explored and demonstrated an approach to the hybridisation of the gestural and sonic language of popular music with recent ‘post-digital’ approaches to laptop based experimental music The development of the work was supported by an Australia Council Grant. Research findings have been disseminated via a range of international conference publications, recordings, radio interviews (ABC Classic FM), broadcasts, and performances at international events and festivals. The work was curated into the major Australian international festival, Liquid Architecture, and was selected by an international music jury (through blind peer review) for presentation at the International Computer Music Conference in Belfast, N. Ireland.