140 resultados para formal verification


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The method on concurrent multi-scale model of structural behavior (CMSM-of-SB) for the purpose of structural health monitoring including model updating and validating has been studied. The detailed process of model updating and validating is discussed in terms of reduced scale specimen of the steel box girder in longitudinal stiffening truss of a long span bridge. Firstly, some influence factors affecting the accuracy of the CMSM-of-SB including the boundary restraint regidity, the geometry and material parameters on the toe of the weld and its neighbor are analyzed using sensitivity method. Then, sensitivity-based model updating technology is adopted to update the developed CMSM-of-SB and model verification is carried out through calculating and comparing stresses on different locations under various loading from dynamic characteristic and static response. It can be concluded that the CMSM-of-SB based on the substructure method is valid.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fusion techniques have received considerable attention for achieving lower error rates with biometrics. A fused classifier architecture based on sequential integration of multi-instance and multi-sample fusion schemes allows controlled trade-off between false alarms and false rejects. Expressions for each type of error for the fused system have previously been derived for the case of statistically independent classifier decisions. It is shown in this paper that the performance of this architecture can be improved by modelling the correlation between classifier decisions. Correlation modelling also enables better tuning of fusion model parameters, ‘N’, the number of classifiers and ‘M’, the number of attempts/samples, and facilitates the determination of error bounds for false rejects and false accepts for each specific user. Error trade-off performance of the architecture is evaluated using HMM based speaker verification on utterances of individual digits. Results show that performance is improved for the case of favourable correlated decisions. The architecture investigated here is directly applicable to speaker verification from spoken digit strings such as credit card numbers in telephone or voice over internet protocol based applications. It is also applicable to other biometric modalities such as finger prints and handwriting samples.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fusion techniques have received considerable attention for achieving performance improvement with biometrics. While a multi-sample fusion architecture reduces false rejects, it also increases false accepts. This impact on performance also depends on the nature of subsequent attempts, i.e., random or adaptive. Expressions for error rates are presented and experimentally evaluated in this work by considering the multi-sample fusion architecture for text-dependent speaker verification using HMM based digit dependent speaker models. Analysis incorporating correlation modeling demonstrates that the use of adaptive samples improves overall fusion performance compared to randomly repeated samples. For a text dependent speaker verification system using digit strings, sequential decision fusion of seven instances with three random samples is shown to reduce the overall error of the verification system by 26% which can be further reduced by 6% for adaptive samples. This analysis novel in its treatment of random and adaptive multiple presentations within a sequential fused decision architecture, is also applicable to other biometric modalities such as finger prints and handwriting samples.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Statistical dependence between classifier decisions is often shown to improve performance over statistically independent decisions. Though the solution for favourable dependence between two classifier decisions has been derived, the theoretical analysis for the general case of 'n' client and impostor decision fusion has not been presented before. This paper presents the expressions developed for favourable dependence of multi-instance and multi-sample fusion schemes that employ 'AND' and 'OR' rules. The expressions are experimentally evaluated by considering the proposed architecture for text-dependent speaker verification using HMM based digit dependent speaker models. The improvement in fusion performance is found to be higher when digit combinations with favourable client and impostor decisions are used for speaker verification. The total error rate of 20% for fusion of independent decisions is reduced to 2.1% for fusion of decisions that are favourable for both client and impostors. The expressions developed here are also applicable to other biometric modalities, such as finger prints and handwriting samples, for reliable identity verification.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper investigates the use of the dimensionality-reduction techniques weighted linear discriminant analysis (WLDA), and weighted median fisher discriminant analysis (WMFD), before probabilistic linear discriminant analysis (PLDA) modeling for the purpose of improving speaker verification performance in the presence of high inter-session variability. Recently it was shown that WLDA techniques can provide improvement over traditional linear discriminant analysis (LDA) for channel compensation in i-vector based speaker verification systems. We show in this paper that the speaker discriminative information that is available in the distance between pair of speakers clustered in the development i-vector space can also be exploited in heavy-tailed PLDA modeling by using the weighted discriminant approaches prior to PLDA modeling. Based upon the results presented within this paper using the NIST 2008 Speaker Recognition Evaluation dataset, we believe that WLDA and WMFD projections before PLDA modeling can provide an improved approach when compared to uncompensated PLDA modeling for i-vector based speaker verification systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this paper is to investigate a public workforce education initiative in the context of State and agency policies designed to enhance employee capabilities to adapt to a volatile and changing environment. In particular, we are concerned with public employees’ experience of a higher educational pathway that resulted in their obtaining a Diploma level qualification. In addition to understanding the employees’ experience of this pathway we were interested in whether the experience contributed to their openness to the prospect of university level education. We conducted telephone interviews with a sample of participants from the program. Employees reported very positive experience of the program; in particular employees reported enhanced efficacy beliefs, a strong sense of achievement, and a feeling of recognition. This experience is explained by four main factors; (1) a program design that was well aligned with the employees learning needs, (2) strong support by organisational staff who delivered and assessed participants on capability criteria, (3) strong management support for employees’ participation, (4) an academic ceremony that provided participants with public recognition of their achievement by valued others. Participants’ motivation to participate was primarily intrinsic rather than extrinsic. Participants in the study reported that their experience in this educational pathway gave them the confidence to consider the possibility of university level education. The paper also discusses the practitioner-academic collaboration that led to the development of this paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report presents an analysis of quantitative data collected from the Australian Human Rights Commission, the Anti-Discrimination Commission of Queensland, the Victorian Equal Opportunity and Human Rights Commission, the Anti-Discrimination Board of New South Wales, the Equal Opportunity Commission of South Australia, the Australian Capital Territory Human Rights Commission, the Equal Opportunity Commission Western Australia, the Northern Territory Anti-Discrimination Commission, and the Office of the Anti-Discrimination Commissioner (Tasmania) (hereafter referred to as the Commissions). The data comprise formal complaints lodged under the various federal, state and territory anti-discrimination laws in the period 1 July 2009 to 31 December 2009 where a complainant had alleged sexual harassment in the area of employment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Well-established distinctions between amateur and professional are blurring as the impact of social media, changes in cultural consumption, and crises in copyright industries’ business models are felt across society and economy. I call this the increasingly rapid co-evolution of the formal market and informal household sectors and analyse it through the concept of ‘social network markets’ – individual choices are made on the basis of other’s choices and such networked preferencing is enhanced by the growing ubiquity of social media platforms. This may allow us better to understand sources of disruption and innovation in audiovisual production and distribution in wealthy Western markets which are as significant as those posed by informal practices outside the West. I examine what is happening around the monetization and professionalization of online video (YouTube, for example) and the socialization of professional production strategies (transmedia, for example) as innovation from the margins.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"Defrauding land titles systems impacts upon us all. Those who deal in land include ordinary citizens, big business, small business, governments, not-for-profit organisation, deceased estates...Fraud here touches almost everybody." the thesis presented in this paper is that the current and disparate steps taken by jurisdictions to alleviate land fraud associated with identity-based crimes are inadequate. The centrepiece of the analysis is the consideration of two scenarios that have recently occurred. One is the typical scenario where a spouse forges the partner's signature to obtain a mortgage from a financial institution. The second is atypical. It involves a sophisticated overseas fraud duping many stakeholders involved in the conveyancing process. After outlining these scenarios, we will examine how identity verification requirements of the United Kingdom, Ontario, the Australian states, and New Zealand would have been applied to these two frauds. Our conclusion is that even though some jurisdictions may have prevented the frauds from occurring, the current requirements are inadequate. We use the lessons learnt to propose what we consider core principles for identity verification in land transactions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Airports and cities inevitably recognise the value that each brings the other; however, the separation in decision-making authority for what to build, where, when and how provides a conundrum for both parties. Airports often want a say in what is developed outside of the airport fence, and cities often want a say in what is developed inside the airport fence. Defining how much of a say airports and cities have in decisions beyond their jurisdictional control is likely to be a topic that continues so long as airports and cities maintain separate formal decision-making processes for what to build, where, when and how. However, the recent Green and White Papers for a new National Aviation Policy have made early inroads to formalising relationships between Australia’s major airports and their host cities. At present, no clear indication (within practice or literature) is evident to the appropriateness of different governance arrangements for decisions to develop in situations that bring together the opposing strategic interests of airports and cities; thus leaving decisions for infrastructure development as complex decision-making spaces that hold airport and city/regional interests at stake. The line of enquiry is motivated by a lack of empirical research on networked decision-making domains outside of the realm of institutional theorists (Agranoff & McGuire, 2001; Provan, Fish & Sydow, 2007). That is, governance literature has remained focused towards abstract conceptualisations of organisation, without focusing on the minutia of how organisation influences action in real-world applications. A recent study by Black (2008) has provided an initial foothold for governance researchers into networked decision-making domains. This study builds upon Black’s (2008) work by aiming to explore and understand the problem space of making decisions subjected to complex jurisdictional and relational interdependencies. That is, the research examines the formal and informal structures, relationships, and forums that operationalise debates and interactions between decision-making actors as they vie for influence over deciding what to build, where, when and how in airport-proximal development projects. The research mobilises a mixture of qualitative and quantitative methods to examine three embedded cases of airport-proximal development from a network governance perspective. Findings from the research provide a new understanding to the ways in which informal actor networks underpin and combine with formal decision-making networks to create new (or realigned) governance spaces that facilitate decision-making during complex phases of development planning. The research is timely, and responds well to Isett, Mergel, LeRoux, Mischen and Rethemeyer’s (2011) recent critique of limitations within current network governance literature, specifically to their noted absence of empirical studies that acknowledge and interrogate the simultaneity of formal and informal network structures within network governance arrangements (Isett et al., 2011, pp. 162-166). The combination of social network analysis (SNA) techniques and thematic enquiry has enabled findings to document and interpret the ways in which decision-making actors organise to overcome complex problems for planning infrastructure. An innovative approach to using association networks has been used to provide insights to the importance of the different ways actors interact with one another, thus providing a simple yet valuable addition to the increasingly popular discipline of SNA. The research also identifies when and how different types of networks (i.e. formal and informal) are able to overcome currently known limitations to network governance (see McGuire & Agranoff, 2011), thus adding depth to the emerging body of network governance literature surrounding limitations to network ways of working (i.e. Rhodes, 1997a; Keast & Brown, 2002; Rethemeyer & Hatmaker, 2008; McGuire & Agranoff, 2011). Contributions are made to practice via the provision of a timely understanding of how horizontal fora between airports and their regions are used, particularly in the context of how they reframe the governance of decision-making for airport-proximal infrastructure development. This new understanding will enable government and industry actors to better understand the structural impacts of governance arrangements before they design or adopt them, particularly for factors such as efficiency of information, oversight, and responsiveness to change.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While a rich body of literature in television and film studies and media policy studies has tended to focus on the media activities in the formal sector, we know much less about informal media activities, its influence on state policies, as well as the dynamics between the formal and the informal sectors. This article examines these issues with reference to a particularly revealing period following a large-scale government crackdown on peer-to-peer video sharing sites in China in 2008. By analyzing the aim and consequences of the state action, I point to the counter-productive effect in terms of cultural loss and the resurgence of offline piracy; and show the positive impact on forcing the informal into the formal sector, and pressuring the formal to innovate. Meanwhile, an increasing rapprochement between professional and user-created content leads to a new relationship between formal and informal sectors. This case demonstrates the importance of considering the dynamics between the two sectors. It also offers compelling evidence of the role of the informal sector in engendering state action, which in turn impacted on the co-evolution of the formal and the informal sectors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a formal methodology for attack modeling and detection for networks. Our approach has three phases. First, we extend the basic attack tree approach 1 to capture (i) the temporal dependencies between components, and (ii) the expiration of an attack. Second, using the enhanced attack trees (EAT) we build a tree automaton that accepts a sequence of actions from input stream if there is a traverse of an attack tree from leaves to the root node. Finally, we show how to construct an enhanced parallel automaton (EPA) that has each tree automaton as a subroutine and can process the input stream by considering multiple trees simultaneously. As a case study, we show how to represent the attacks in IEEE 802.11 and construct an EPA for it.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

IT Governance (ITG) continues to be a top priority for organizations, public and non-public. While the level of awareness towards ITG is evident, it is hardly manifested in practice. The purpose of this study is to elicit factors that act as barriers to the adoption of formal ITG practice. This qualitative study consists of 9 semi-structured interviews with the key person in charge of ITG adoption and practice within their respective organizations. The interviews were analyzed using thematic content analysis, guided by themes previously obtained from the literature and from an earlier pilot study. Findings obtained supported previous findings and also reveal new factors noticeably absent from the ITG literature. The findings will provide useful input towards the development of a causal model on barriers to formal ITG practice

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The classic white formal shirt is a widely and readily familiar object with considerable historical cultural significance to diverse social groups, and is therefore deserving of iconic status. For more than two hundred years, this singular item of apparel has been able to define and represent status, wealth, gender shifts and fashion norms. This garment, which has historically been relinquished to undergarment status, deserves an escalation of standing. The classic white formal shirt, for both men and women, can be used as a mirror to map considerable social change and the diversity of influence can be traced through many examples, including: Beau Brummell’s dandy status with his legendry white shirting; the Gibson Girl with her decorated white shirt style blouse defining ideals of female beauty; IBM business employees in the 1920s marketing trustworthiness through the uniformity of white shirts; the fictional advertising creation of the Arrow Collar Man, with his rigid white shirt, promoting American masculine ideals; and the iconic 1980s Hugo Boss style crisp white dress shirt symbolising power. The origins of the influence of the white shirt can be best traced in the Victorian era where it was an important symbol of wealth and class distinction and a powerful emblem of sobriety and uniformity for men. The pure white colour fulfilled masculine ideals of resolute austerity and the shirt, through its constancy, epitomised conformity and dependability. For women, the white cloth of the ‘shirt-waist’ from this period was also linked to ideals of cleanliness and purity and was seen as an iconic symbol of the new independent working class woman. This paper will propose that the classic white formal shirt, for both men and women, has been a powerful marker of social shifts in Western society and this underrated item of apparel, with limited scholarly writing, is worthy of iconic status. The discussion will trace the historical development of both the men’s and women’s white shirt, each with their own unique history, and in doing so highlight the considerable historical cultural significance associated with the white formal shirt. Discussed first will be the men’s white formal shirt.