69 resultados para Text similarity analysis


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Modelling video sequences by subspaces has recently shown promise for recognising human actions. Subspaces are able to accommodate the effects of various image variations and can capture the dynamic properties of actions. Subspaces form a non-Euclidean and curved Riemannian manifold known as a Grassmann manifold. Inference on manifold spaces usually is achieved by embedding the manifolds in higher dimensional Euclidean spaces. In this paper, we instead propose to embed the Grassmann manifolds into reproducing kernel Hilbert spaces and then tackle the problem of discriminant analysis on such manifolds. To achieve efficient machinery, we propose graph-based local discriminant analysis that utilises within-class and between-class similarity graphs to characterise intra-class compactness and inter-class separability, respectively. Experiments on KTH, UCF Sports, and Ballet datasets show that the proposed approach obtains marked improvements in discrimination accuracy in comparison to several state-of-the-art methods, such as the kernel version of affine hull image-set distance, tensor canonical correlation analysis, spatial-temporal words and hierarchy of discriminative space-time neighbourhood features.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Identifying the design features that impact construction is essential to developing cost effective and constructible designs. The similarity of building components is a critical design feature that affects method selection, productivity, and ultimately construction cost and schedule performance. However, there is limited understanding of what constitutes similarity in the design of building components and limited computer-based support to identify this feature in a building product model. This paper contributes a feature-based framework for representing and reasoning about component similarity that builds on ontological modelling, model-based reasoning and cluster analysis techniques. It describes the ontology we developed to characterize component similarity in terms of the component attributes, the direction, and the degree of variation. It also describes the generic reasoning process we formalized to identify component similarity in a standard product model based on practitioners' varied preferences. The generic reasoning process evaluates the geometric, topological, and symbolic similarities between components, creates groupings of similar components, and quantifies the degree of similarity. We implemented this reasoning process in a prototype cost estimating application, which creates and maintains cost estimates based on a building product model. Validation studies of the prototype system provide evidence that the framework is general and enables a more accurate and efficient cost estimating process.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

There are different ways to authenticate humans, which is an essential prerequisite for access control. The authentication process can be subdivided into three categories that rely on something someone i) knows (e.g. password), and/or ii) has (e.g. smart card), and/or iii) is (biometric features). Besides classical attacks on password solutions and the risk that identity-related objects can be stolen, traditional biometric solutions have their own disadvantages such as the requirement of expensive devices, risk of stolen bio-templates etc. Moreover, existing approaches provide the authentication process usually performed only once initially. Non-intrusive and continuous monitoring of user activities emerges as promising solution in hardening authentication process: iii-2) how so. behaves. In recent years various keystroke dynamic behavior-based approaches were published that are able to authenticate humans based on their typing behavior. The majority focuses on so-called static text approaches, where users are requested to type a previously defined text. Relatively few techniques are based on free text approaches that allow a transparent monitoring of user activities and provide continuous verification. Unfortunately only few solutions are deployable in application environments under realistic conditions. Unsolved problems are for instance scalability problems, high response times and error rates. The aim of this work is the development of behavioral-based verification solutions. Our main requirement is to deploy these solutions under realistic conditions within existing environments in order to enable a transparent and free text based continuous verification of active users with low error rates and response times.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Small-angle and ultra-small-angle neutron scattering (SANS and USANS) measurements were performed on samples from the Triassic Montney tight gas reservoir in Western Canada in order to determine the applicability of these techniques for characterizing the full pore size spectrum and to gain insight into the nature of the pore structure and its control on permeability. The subject tight gas reservoir consists of a finely laminated siltstone sequence; extensive cementation and moderate clay content are the primary causes of low permeability. SANS/USANS experiments run at ambient pressure and temperature conditions on lithologically-diverse sub-samples of three core plugs demonstrated that a broad pore size distribution could be interpreted from the data. Two interpretation methods were used to evaluate total porosity, pore size distribution and surface area and the results were compared to independent estimates derived from helium porosimetry (connected porosity) and low-pressure N2 and CO2 adsorption (accessible surface area and pore size distribution). The pore structure of the three samples as interpreted from SANS/USANS is fairly uniform, with small differences in the small-pore range (<2000 Å), possibly related to differences in degree of cementation, and mineralogy, in particular clay content. Total porosity interpreted from USANS/SANS is similar to (but systematically higher than) helium porosities measured on the whole core plug. Both methods were used to estimate the percentage of open porosity expressed here as a ratio of connected porosity, as established from helium adsorption, to the total porosity, as estimated from SANS/USANS techniques. Open porosity appears to control permeability (determined using pressure and pulse-decay techniques), with the highest permeability sample also having the highest percentage of open porosity. Surface area, as calculated from low-pressure N2 and CO2 adsorption, is significantly less than surface area estimates from SANS/USANS, which is due in part to limited accessibility of the gases to all pores. The similarity between N2 and CO2-accessible surface area suggests an absence of microporosity in these samples, which is in agreement with SANS analysis. A core gamma ray profile run on the same core from which the core plug samples were taken correlates to profile permeability measurements run on the slabbed core. This correlation is related to clay content, which possibly controls the percentage of open porosity. Continued study of these effects will prove useful in log-core calibration efforts for tight gas.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

There is currently little information available about reasons for contraceptive use or non-use among young Australian women and the reasons for choosing specific types of contraceptive methods. A comprehensive life course perspective of women's experiences in using and obtaining contraceptives is lacking, particularly relating to women's perceived or physical barriers to access. This paper presents an analysis of qualitative data gathered from free-text comments provided by women born between 1973 and 1978 as part of their participation in the Australian Longitudinal Study on Women's Health. The Australian Longitudinal Study on Women's Health is a large cohort study involving over 40,000 women from three age groups (aged 18-23, aged 40-45 and aged 70-75) who were selected from the database of Medicare the Australian universal health insurance system in 1995. The women have been surveyed every 3 years about their health by mailed self-report surveys, and more recently online. Written comments from 690 women across five surveys from 1996 (when they were aged 18-23 years) to 2009 (aged 31-36 years) were examined. Factors relating to contraceptive use and barriers to access were identified and explored using thematic analysis. Side-effects, method satisfaction, family timing, and hormonal balance were relevant to young women using contraception. Most women who commented about a specific contraceptive method wrote about the oral contraceptive pill. While many women were positive or neutral about their method, noting its convenience or non-contraceptive benefits, many others were concerned about adverse effects, affordability, method failure, and lack of choice. Negative experiences with health services, lack of information, and cost were identified as barriers to access. As the cohort aged over time, method choice, changing patterns of use, side-effects, and negative experiences with health services remained important themes. Side-effects, convenience, and family timing play important roles in young Australian women's experiences of contraception and barriers to access. Contrary to assumptions, barriers to contraceptive access continue to be experienced by young women as they move into adulthood. Further research is needed about how to decrease barriers to contraceptive use and minimise negative experiences in order to ensure optimal contraceptive access for Australian women.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

There is currently little information available about reasons for contraceptive use or non-use among young Australian women and the reasons for choosing specific types of contraceptive methods. A comprehensive life course perspective of women's experiences in using and obtaining contraceptives is lacking, particularly relating to women's perceived or physical barriers to access. This paper presents an analysis of qualitative data gathered from free-text comments provided by women born between 1973 and 1978 as part of their participation in the Australian Longitudinal Study on Women's Health. The Australian Longitudinal Study on Women's Health is a large cohort study involving over 40,000 women from three age groups (aged 18-23, aged 40-45 and aged 70-75) who were selected from the database of Medicare the Australian universal health insurance system in 1995. The women have been surveyed every 3 years about their health by mailed self-report surveys, and more recently online. Written comments from 690 women across five surveys from 1996 (when they were aged 18-23 years) to 2009 (aged 31-36 years) were examined. Factors relating to contraceptive use and barriers to access were identified and explored using thematic analysis. Side-effects, method satisfaction, family timing, and hormonal balance were relevant to young women using contraception. Most women who commented about a specific contraceptive method wrote about the oral contraceptive pill. While many women were positive or neutral about their method, noting its convenience or non-contraceptive benefits, many others were concerned about adverse effects, affordability, method failure, and lack of choice. Negative experiences with health services, lack of information, and cost were identified as barriers to access. As the cohort aged over time, method choice, changing patterns of use, side-effects, and negative experiences with health services remained important themes. Side-effects, convenience, and family timing play important roles in young Australian women's experiences of contraception and barriers to access. Contrary to assumptions, barriers to contraceptive access continue to be experienced by young women as they move into adulthood. Further research is needed about how to decrease barriers to contraceptive use and minimise negative experiences in order to ensure optimal contraceptive access for Australian women.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A novel method was developed for studying the genetic relatedness of Pseudomonas aeruginosa isolates from clinical and environmental sources. This bacterium is ubiquitous in the natural environment and is an important pathogen known to infect Cystic Fibrosis (CF) patients. The transmission route of strains has not yet been defined; current theories include acquisition from an environmental source or through patient-to-patient spread. A highly discriminatory, bioinformatics based, DNA typing method was developed to investigate the relatedness of clinical and environmental isolates. This study found a similarity between the environmental and several CF clonal strains and also highlighted occurrence of environmental P. aeruginosa strains in CF infections.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We propose a cluster ensemble method to map the corpus documents into the semantic space embedded in Wikipedia and group them using multiple types of feature space. A heterogeneous cluster ensemble is constructed with multiple types of relations i.e. document-term, document-concept and document-category. A final clustering solution is obtained by exploiting associations between document pairs and hubness of the documents. Empirical analysis with various real data sets reveals that the proposed meth-od outperforms state-of-the-art text clustering approaches.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Reliability of the performance of biometric identity verification systems remains a significant challenge. Individual biometric samples of the same person (identity class) are not identical at each presentation and performance degradation arises from intra-class variability and inter-class similarity. These limitations lead to false accepts and false rejects that are dependent. It is therefore difficult to reduce the rate of one type of error without increasing the other. The focus of this dissertation is to investigate a method based on classifier fusion techniques to better control the trade-off between the verification errors using text-dependent speaker verification as the test platform. A sequential classifier fusion architecture that integrates multi-instance and multisample fusion schemes is proposed. This fusion method enables a controlled trade-off between false alarms and false rejects. For statistically independent classifier decisions, analytical expressions for each type of verification error are derived using base classifier performances. As this assumption may not be always valid, these expressions are modified to incorporate the correlation between statistically dependent decisions from clients and impostors. The architecture is empirically evaluated by applying the proposed architecture for text dependent speaker verification using the Hidden Markov Model based digit dependent speaker models in each stage with multiple attempts for each digit utterance. The trade-off between the verification errors is controlled using the parameters, number of decision stages (instances) and the number of attempts at each decision stage (samples), fine-tuned on evaluation/tune set. The statistical validation of the derived expressions for error estimates is evaluated on test data. The performance of the sequential method is further demonstrated to depend on the order of the combination of digits (instances) and the nature of repetitive attempts (samples). The false rejection and false acceptance rates for proposed fusion are estimated using the base classifier performances, the variance in correlation between classifier decisions and the sequence of classifiers with favourable dependence selected using the 'Sequential Error Ratio' criteria. The error rates are better estimated by incorporating user-dependent (such as speaker-dependent thresholds and speaker-specific digit combinations) and class-dependent (such as clientimpostor dependent favourable combinations and class-error based threshold estimation) information. The proposed architecture is desirable in most of the speaker verification applications such as remote authentication, telephone and internet shopping applications. The tuning of parameters - the number of instances and samples - serve both the security and user convenience requirements of speaker-specific verification. The architecture investigated here is applicable to verification using other biometric modalities such as handwriting, fingerprints and key strokes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Managing large cohorts of undergraduate student nurses during off-campus clinical placement is complex and challenging. Clinical facilitators are required to support and assess nursing students during clinical placement. Therefore clear communication between university academic coordinators and clinical facilitators is essential for consistency and prompt management of emerging issues. Increasing work demands require both coordinators and facilitators to have an efficient and effective mode of communication. The aim of this study was to explore the use of Short Message Service (SMS) texts, sent between mobile phones, for communication between university Unit Coordinators and off-campus Clinical Facilitators. This study used an after-only design. During a two week clinical placement 46 clinical facilitators working with first and second year Bachelor of Nursing students from a large metropolitan Australian university were regularly sent SMS texts of relevant updates and reminders from the university coordinator. A 15 item questionnaire comprising x of 5 point likert scale and 3 open-ended questions was then used to survey the clinical facilitators. The response rate was 47.8% (n=22). Correlations were found between the approachability of the coordinator and facilitator perception of a) that the coordinator understood issues on clinical placement (r=0.785, p<0.001,), and b) being part of the teaching team (r=0.768, p<0.001). Analysis of responses to qualitative questions revealed three themes: connection, approachability and collaboration. Results indicate that SMS communication is convenient and appropriate in this setting. This quasi-experimental after-test study found regular SMS communication improves a sense of connection, approachability and collaboration.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An updated version, this excellent text is a timely addition to the library of any nurse researching in oncology or other settings where individuals’ quality of life must be understood. Health-related quality of life should be a central aspect of studies concerned with health and illness. Indeed, considerable evidence has recently emerged in oncology and other research settings that selfreported quality of life is of great prognostic significance and may be the most reliable predictor of subsequent morbidity and mortality. From a nursing perspective, it is also gratifying to note that novel therapy and other oncology studies increasingly recognize the importance of understanding patients’ subjective experiences of an intervention over time and to ascertain whether patients perceive that a new intervention makes a difference to their quality of life and treatment outcomes. Measurements of quality of life are now routine in clinical trials of chemotherapy drugs and are often considered the prime outcome of interest in the cost/benefit analyses of these treatments. The authors have extensive experience in qualityof- life assessment in cancer clinical trials, where most of the pioneering work into quality of life has been conducted. That said, many of the health-related qualityof- life issues discussed are common to many illnesses, and researchers outside of cancer should find the book equally helpful.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the algebraic attack approach of Berbain et al. to Trivium-like ciphers and perform new analyses on them. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analyses. We also answer an open question posed by Berbain et al. on the feasibility of applying their technique on Trivium-like ciphers. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail. Analysis of Bivium-B and Trivium-N are omitted from this manuscript. The full paper is available on the IACR ePrint Archive.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background Managing large student cohorts can be a challenge for university academics, coordinating these units. Bachelor of Nursing programmes have the added challenge of managing multiple groups of students and clinical facilitators whilst completing clinical placement. Clear, time efficient and effective communication between coordinating academics and clinical facilitators is needed to ensure consistency between student and teaching groups and prompt management of emerging issues. Methods This study used a descriptive survey to explore the use of text messaging via a mobile phone, sent from coordinating academics to off-campus clinical facilitators, as an approach to providing direction and support. Results The response rate was 47.8% (n = 22). Correlations were found between the approachability of the coordinating academic and clinical facilitator perception that, a) the coordinating academic understood issues on clinical placement (r = 0.785, p < 0.001), and b) being part of the teaching team (r = 0.768, p < 0.001). Analysis of responses to qualitative questions revealed three themes: connection, approachability and collaboration. Conclusions This study demonstrates that use of regular text messages improves communication between coordinating academics and clinical facilitators. Findings suggest improved connection, approachability and collaboration between the coordinating academic and clinical facilitation staff.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Genomic sequences are fundamentally text documents, admitting various representations according to need and tokenization. Gene expression depends crucially on binding of enzymes to the DNA sequence at small, poorly conserved binding sites, limiting the utility of standard pattern search. However, one may exploit the regular syntactic structure of the enzyme's component proteins and the corresponding binding sites, framing the problem as one of detecting grammatically correct genomic phrases. In this paper we propose new kernels based on weighted tree structures, traversing the paths within them to capture the features which underpin the task. Experimentally, we and that these kernels provide performance comparable with state of the art approaches for this problem, while offering significant computational advantages over earlier methods. The methods proposed may be applied to a broad range of sequence or tree-structured data in molecular biology and other domains.