540 resultados para 332.642
Resumo:
In this paper we describe the approaches adopted to generate the runs submitted to ImageCLEFPhoto 2009 with an aim to promote document diversity in the rankings. Four of our runs are text based approaches that employ textual statistics extracted from the captions of images, i.e. MMR [1] as a state of the art method for result diversification, two approaches that combine relevance information and clustering techniques, and an instantiation of Quantum Probability Ranking Principle. The fifth run exploits visual features of the provided images to re-rank the initial results by means of Factor Analysis. The results reveal that our methods based on only text captions consistently improve the performance of the respective baselines, while the approach that combines visual features with textual statistics shows lower levels of improvements.
Resumo:
While the Probability Ranking Principle for Information Retrieval provides the basis for formal models, it makes a very strong assumption regarding the dependence between documents. However, it has been observed that in real situations this assumption does not always hold. In this paper we propose a reformulation of the Probability Ranking Principle based on quantum theory. Quantum probability theory naturally includes interference effects between events. We posit that this interference captures the dependency between the judgement of document relevance. The outcome is a more sophisticated principle, the Quantum Probability Ranking Principle, that provides a more sensitive ranking which caters for interference/dependence between documents’ relevance.
Resumo:
Semantic Space models, which provide a numerical representation of words’ meaning extracted from corpus of documents, have been formalized in terms of Hermitian operators over real valued Hilbert spaces by Bruza et al. [1]. The collapse of a word into a particular meaning has been investigated applying the notion of quantum collapse of superpositional states [2]. While the semantic association between words in a Semantic Space can be computed by means of the Minkowski distance [3] or the cosine of the angle between the vector representation of each pair of words, a new procedure is needed in order to establish relations between two or more Semantic Spaces. We address the question: how can the distance between different Semantic Spaces be computed? By representing each Semantic Space as a subspace of a more general Hilbert space, the relationship between Semantic Spaces can be computed by means of the subspace distance. Such distance needs to take into account the difference in the dimensions between subspaces. The availability of a distance for comparing different Semantic Subspaces would enable to achieve a deeper understanding about the geometry of Semantic Spaces which would possibly translate into better effectiveness in Information Retrieval tasks.
Resumo:
Integer ambiguity resolution is an indispensable procedure for all high precision GNSS applications. The correctness of the estimated integer ambiguities is the key to achieving highly reliable positioning, but the solution cannot be validated with classical hypothesis testing methods. The integer aperture estimation theory unifies all existing ambiguity validation tests and provides a new prospective to review existing methods, which enables us to have a better understanding on the ambiguity validation problem. This contribution analyses two simple but efficient ambiguity validation test methods, ratio test and difference test, from three aspects: acceptance region, probability basis and numerical results. The major contribution of this paper can be summarized as: (1) The ratio test acceptance region is overlap of ellipsoids while the difference test acceptance region is overlap of half-spaces. (2) The probability basis of these two popular tests is firstly analyzed. The difference test is an approximation to optimal integer aperture, while the ratio test follows an exponential relationship in probability. (3) The limitations of the two tests are firstly identified. The two tests may under-evaluate the failure risk if the model is not strong enough or the float ambiguities fall in particular region. (4) Extensive numerical results are used to compare the performance of these two tests. The simulation results show the ratio test outperforms the difference test in some models while difference test performs better in other models. Particularly in the medium baseline kinematic model, the difference tests outperforms the ratio test, the superiority is independent on frequency number, observation noise, satellite geometry, while it depends on success rate and failure rate tolerance. Smaller failure rate leads to larger performance discrepancy.
Resumo:
Addresses often unanswered questions about the costs and benefits of resource-based development The first book to offer a suitably comprehensive critique of Western Australia's development path Provides a multi-facetted perspective thanks to its truly cross-disciplinary and cross-institutional authorship Globalisation and rapid social and environmental change in recent decades have brought into sharper focus not only the benefits but also the costs of economic development. The once assumed link between economic development and societal well-being is being increasingly questioned in the face of growing social and environmental problems and unfulfilled expectations concerning political and commercial decision-makers. The orthodox development dogma is being tested in particular in resource-based economies such as Western Australia, where globalisation pressures and the concomitant rise in the demand for natural resources highlight the difficulties of effectively balancing broader societal interests with those of industry and the state. This book provides a critical review of the socio-political, environmental and cultural state of play in Western Australia, offering an analysis of how resource-based developments are shaping the state and its people.
Resumo:
The use of the curse or cure dichotomy to frame a discussion around the impacts of mining is an oversimplification, not least in the emphasis on one or the other (as opposed to curse and cure). It is, however, a potent trope for engaging critically with the consequences of mining not only in narrow economic terms but also in regard to political, social and environmental costs and benefits. Further, as Goodman and Worth (2008: 201) point out, to engage with the resource curse or cure question is to also engage more broadly with “the internal contradictions of capitalist development” as evident, for example, in divisions “between those who benefit from and those who bear the costs of accumulation” and the many conflicts—political, social, economic, environmental—attending resource extraction. It is in this sense that this volume mobilises the ‘resource curse or cure?’ motif.
Resumo:
This chapter examines two core dimensions of women’s gendered experiences of mining in Australia and more specifically in Western Australia (WA). First, the chapter explores what has been and continues to be women’s principal relationship to mining encapsulated in the social and cultural identity of the ‘mining wife’ and, more recently, ‘fly-in/fly-out (FIFO) wife’. Second, the chapter addresses the fraught emergence of women as mineworkers. As the research presented in this chapter makes clear, the human cost of developmentalism was and continues to be deeply gendered.
Resumo:
This chapter examines local community experiences, understandings and changes attending the presence of mining activity, in particular as occurred in the Shire of Ravensthorpe in the South West of Western Australia (WA). It does so by drawing on an extensive ethnographic study spanning the development, opening, and closure of BHP Billiton’s Ravensthorpe Nickel Operation (RNO). Given that the negative consequences of mining activity are most evident and complex at the local level, it is crucial that we understand and address how communities (and the individuals and families who are both part of and are shaped by communities) experience the impacts of mining. Though difficult to measure, social and cultural dimensions of mining at the local scale, as this chapter demonstrates, are central to our understanding of mining as a curse or cure.
Resumo:
WA’s experience, as portrayed in this volume, not only highlights the changeable nature of the mining industry, the volatility of global commodity markets and the impact of global capital on people and place, it also draws into question the promise of lasting value derived from resource development as currently practiced. It is in this context that Chapter 18 revisits WA's resource boom and assesses the sustainability of resource-led development in the state, to arrive at an answer to the question of ‘curse or cure?’. Opening up the discourse beyond the dominant developmentalist narrative invites discussion on new perspectives of economic sustainability that include well-being, equity and the protection of people, culture and place.
Resumo:
There is a wide variety of drivers for business process modelling initiatives, reaching from business evolution and process optimisation over compliance checking and process certification to process enactment. That, in turn, results in models that differ in content due to serving different purposes. In particular, processes are modelled on different abstraction levels and assume different perspectives. Vertical alignment of process models aims at handling these deviations. While the advantages of such an alignment for inter-model analysis and change propagation are out of question, a number of challenges has still to be addressed. In this paper, we discuss three main challenges for vertical alignment in detail. Against this background, the potential application of techniques from the field of process integration is critically assessed. Based thereon, we identify specific research questions that guide the design of a framework for model alignment.
Resumo:
Small Businesses account for a significant portion of the Australian business sector. With Business Process Management (BPM) gaining prominence in recent decades as a means of improving business performance, it would seem to only be a matter of time before it gains momentum within the Small Business sector. One may even question why it has not already achieved more traction within the sector. This case study involves a BPM initiative to develop process infrastructure in an establishing Small Business. It explores whether mainstream BPM tools, techniques and technologies can be applied in a Small Business setting. The chapter provides a background to the case organisation, outlines the activities undertaken in the BPM initiative and distils key observations drawn from participation in the initiative and consultation with stakeholders. Based on the case study experiences, a number of implications are identified for further consideration by the BPM discipline as it continues to address the question of how it can become more widely adopted amongst Small Businesses.
Resumo:
The present study was conducted to investigate whether ob- servers are equally prone to overlook any kinds of visual events in change blindness. Capitalizing on the finding from visual search studies that abrupt appearance of an object effectively captures observers' attention, the onset of a new object and the offset of an existing object were contrasted regarding their detectability when they occurred in a naturalistic scene. In an experiment, participants viewed a series of photograph pairs in which layouts of seven or eight objects were depicted. One object either appeared in or disappeared from the layout, and participants tried to detect this change. Results showed that onsets were detected more quickly than offsets, while they were detected with equivalent ac- curacy. This suggests that the primacy of onset over offset is a robust phenomenon that likely makes onsets more resistant to change blindness under natural viewing conditions.
Resumo:
This book constitutes the refereed proceedings of the 11th International Conference on Cryptology and Network Security, CANS 2012, held in Darmstadt, Germany, in December 2012. The 22 revised full papers, presented were carefully reviewed and selected from 99 submissions. The papers are organized in topical sections on cryptanalysis; network security; cryptographic protocols; encryption; and s-box theory.
Resumo:
Ever since Cox et. al published their paper, “A Secure, Robust Watermark for Multimedia” in 1996 [6], there has been tremendous progress in multimedia watermarking. The same pattern re-emerged with Agrawal and Kiernan publishing their work “Watermarking Relational Databases” in 2001 [1]. However, little attention has been given to primitive data collections with only a handful works of research known to the authors [11, 10]. This is primarily due to the absence of an attribute that differentiates marked items from unmarked item during insertion and detection process. This paper presents a distribution-independent, watermarking model that is secure against secondary-watermarking in addition to conventional attacks such as data addition, deletion and distortion. The low false positives and high capacity provide additional strength to the scheme. These claims are backed by experimental results provided in the paper.
Resumo:
Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia applications, which will play an important role in the future, will require security support. Lack of such security and privacy in VANETs is one of the key hindrances to the wide spread implementations of it. An insecure and unreliable VANET can be more dangerous than the system without VANET support. So it is essential to make sure that “life-critical safety” information is secure enough to rely on. Securing the VANETs along with appropriate protection of the privacy drivers or vehicle owners is a very challenging task. In this work we summarize the attacks, corresponding security requirements and challenges in VANETs. We also present the most popular generic security policies which are based on prevention as well detection methods. Many VANETs applications require system-wide security support rather than individual layer from the VANETs’ protocol stack. In this work we will review the existing works in the perspective of holistic approach of security. Finally, we will provide some possible future directions to achieve system-wide security as well as privacy-friendly security in VANETs.