66 resultados para Slide-rule


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A rule-based approach for classifying previously identified medical concepts in the clinical free text into an assertion category is presented. There are six different categories of assertions for the task: Present, Absent, Possible, Conditional, Hypothetical and Not associated with the patient. The assertion classification algorithms were largely based on extending the popular NegEx and Context algorithms. In addition, a health based clinical terminology called SNOMED CT and other publicly available dictionaries were used to classify assertions, which did not fit the NegEx/Context model. The data for this task includes discharge summaries from Partners HealthCare and from Beth Israel Deaconess Medical Centre, as well as discharge summaries and progress notes from University of Pittsburgh Medical Centre. The set consists of 349 discharge reports, each with pairs of ground truth concept and assertion files for system development, and 477 reports for evaluation. The system’s performance on the evaluation data set was 0.83, 0.83 and 0.83 for recall, precision and F1-measure, respectively. Although the rule-based system shows promise, further improvements can be made by incorporating machine learning approaches.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although the Uniform Civil Procedure Rules 1999 (Qld) (UCPR) have always included a power for the court to order a party to pay an amount for costs to be fixed by the court, until recently the power was rarely used in the higher courts. In light of recent practice directions, and the changes to the procedures for assessment of costs contained in the new Chapter 17A of the UCPR, this is no longer the case. The judgment of Mullins J in ASIC v Atlantic 3 Financial (Aust) Pty Ltd [2008] QSC 9 provides some helpful guidance for practitioners about the principles which might be applied.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Please see the updated published version of this work at http://eprints.qut.edu.au/37850/ There is a severe tendency in cyberlaw theory to delegitimize state intervention in the governance of virtual communities. Much of the existing theory makes one of two fundamental flawed assumptions: that communities will always be best governed without the intervention of the state; or that the territorial state can best encourage the development of communities by creating enforceable property rights and allowing the market to resolve any disputes. These assumptions do not ascribe sufficient weight to the value-laden support that the territorial state always provides to private governance regimes, the inefficiencies that will tend to limit the development utopian communities, and the continued role of the territorial state in limiting autonomy in accordance with communal values...

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Malaria is a significant threat to population health in the border areas of Yunnan Province, China. How to accurately measure malaria transmission is an important issue. This study aimed to examine the role of slide positivity rates (SPR) in malaria transmission in Mengla County, Yunnan Province, China. Methods: Data on annual malaria cases, SPR and socio-economic factors for the period of 1993 to 2008 were obtained from the Center for Disease Control and Prevention (CDC) and the Bureau of Statistics, Mengla, China. Multiple linear regression models were conducted to evaluate the relationship between socio-ecologic factors and malaria incidence. Results: The results show that SPR was significantly positively associated with the malaria incidence rates. The SPR (beta = 1.244, p = 0.000) alone and combination (SPR, beta = 1.326, p < 0.001) with other predictors can explain about 85% and 95% of variation in malaria transmission, respectively. Every 1% increase in SPR corresponded to an increase of 1.76/100,000 in malaria incidence rates. Conclusion: SPR is a strong predictor of malaria transmission, and can be used to improve the planning and implementation of malaria elimination programmes in Mengla and other similar locations. SPR might also be a useful indicator of malaria early warning systems in China.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An advanced rule-based Transit Signal Priority (TSP) control method is presented in this paper. An on-line transit travel time prediction model is the key component of the proposed method, which enables the selection of the most appropriate TSP plans for the prevailing traffic and transit condition. The new method also adopts a priority plan re-development feature that enables modifying or even switching the already implemented priority plan to accommodate changes in the traffic conditions. The proposed method utilizes conventional green extension and red truncation strategies and also two new strategies including green truncation and queue clearance. The new method is evaluated against a typical active TSP strategy and also the base case scenario assuming no TSP control in microsimulation. The evaluation results indicate that the proposed method can produce significant benefits in reducing the bus delay time and improving the service regularity with negligible adverse impacts on the non-transit street traffic.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sfinks is a shift register based stream cipher designed for hardware implementation and submitted to the eSTREAM project. In this paper, we analyse the initialisation process of Sfinks. We demonstrate a slid property of the loaded state of the Sfinks cipher, where multiple key-IV pairs may produce phase shifted keystream sequences. The state update functions of both the initialisation process and keystream generation and also the pattern of the padding affect generation of the slid pairs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A5/1 is a shift register based stream cipher which uses a majority clocking rule to update its registers. It is designed to provide privacy for the GSM system. In this paper, we analyse the initialisation process of A5/1. We demonstrate a sliding property of the A5/1 cipher, where every valid internal state is also a legitimate loaded state and multiple key-IV pairs produce phase shifted keystream sequences. We describe a possible ciphertext only attack based on this property.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The secondary phosphate mineral sigloite Fe3+Al2(PO4)2(OH)3·7H2O is the exception to the rule that phosphate mineral paragenesis is related to the final phase of hydrothermal mineralization at low temperatures. Sigloite was formed as an oxidation pseudomorph after paravauxite, during the last supergene paragenetic stage. We have studied the secondary phosphate mineral sigloite Fe3+Al2(PO4)2(OH)3·7H2O using vibrational spectroscopic techniques. Because the mineral is a phosphate mineral, it is readily studied by spectroscopic techniques as the phosphate and hydrogen phosphate units are readily measured. Indeed, sigloite shows the presence of both phosphate and hydrogen phosphate units in its structure. Raman bands at 1009 cm−1 with shoulders at 993 and 1039 cm−1 are assigned to stretching vibrations of and units. The Raman band at 993 cm−1 is assigned to the ν1 symmetric stretching mode of the POH units, whereas the Raman band at 1009 cm−1 is assigned to the ν1 symmetric stretching mode. Raman bands observed at 506, 528, 571, 596, 619 and 659 cm−1 are attributed to the ν4 out of plane bending modes of the PO4 and H2PO4 units. The Raman bands at 2988, 3118 and 3357 cm−1 are assigned to water stretching vibration. The series of bands at 3422, 3449, 3493, 3552 and 3615 cm−1 are assigned to the OH stretching vibrations of the hydroxyl units. The observation of multiple bands gives credence to the non-equivalence of the OH units in the sigloite structure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The function of environmental governance and the principle of the rule of law are both controversial and challenging. To apply the principle of the rule of law to the function of environmental governance is perhaps even more controversial and challenging. A system of environmental governance seeks to bring together the range of competitive and potentially conflicting interests in how the environment and its resources are managed. Increasingly it is the need for economic, social and ecological sustainability that brings these interests – both public and private – together. Then there is the relevance of the principle of the rule of law. Economic, social and ecological sustainability will be achieved – if at all – by a complex series of rules of law that are capable of enforcement so as to ensure compliance with them. To what extent do these rules of law reflect the principle of the rule of law? Is the principle of the rule of law the formally unstated value that is expected to underpin the legal system or is it the normative predicate that directs the legal system both vertically and horizontally? Is sustainability an aspirational value or a normative predicate according to which the environment and its resources are managed? Let us deal sequentially with these issues by reviewing a number of examples that demonstrate the relationship between environmental governance and the rule of law.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Understanding network traffic behaviour is crucial for managing and securing computer networks. One important technique is to mine frequent patterns or association rules from analysed traffic data. On the one hand, association rule mining usually generates a huge number of patterns and rules, many of them meaningless or user-unwanted; on the other hand, association rule mining can miss some necessary knowledge if it does not consider the hierarchy relationships in the network traffic data. Aiming to address such issues, this paper proposes a hybrid association rule mining method for characterizing network traffic behaviour. Rather than frequent patterns, the proposed method generates non-similar closed frequent patterns from network traffic data, which can significantly reduce the number of patterns. This method also proposes to derive new attributes from the original data to discover novel knowledge according to hierarchy relationships in network traffic data and user interests. Experiments performed on real network traffic data show that the proposed method is promising and can be used in real applications. Copyright2013 John Wiley & Sons, Ltd.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article examines the fast moving debate on the law and policy surrounding shareholder voting on their companies’ remuneration report, at the AGM. Recently, Australia has moved from the ‘non-binding’ vote provided to shareholders, to the more prescriptive ‘two strikes rule’; that is, two negative shareholder resolutions after 1 July 2011 may result in a board re-election. While much commentary has focused on the potential threats— impacts on remuneration reports and the potential costs to the company — we discuss another potential consequence: an opportunity for board recruitment. At a time when companies are also expected to comment on their diversity policies, planning for a threatened ‘spill’ creates an opportunity for board composition planning and succession. The arguments presented are also placed in the context of the UK debate, where recent proposals advocate for wider stakeholder engagement and diversity in remuneration planning.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Detecting anomalies in the online social network is a significant task as it assists in revealing the useful and interesting information about the user behavior on the network. This paper proposes a rule-based hybrid method using graph theory, Fuzzy clustering and Fuzzy rules for modeling user relationships inherent in online-social-network and for identifying anomalies. Fuzzy C-Means clustering is used to cluster the data and Fuzzy inference engine is used to generate rules based on the cluster behavior. The proposed method is able to achieve improved accuracy for identifying anomalies in comparison to existing methods.