159 resultados para World Conference on Faith and Order.
Resumo:
This paper describes a novel method for determining the extrinsic calibration parameters between 2D and 3D LIDAR sensors with respect to a vehicle base frame. To recover the calibration parameters we attempt to optimize the quality of a 3D point cloud produced by the vehicle as it traverses an unknown, unmodified environment. The point cloud quality metric is derived from Rényi Quadratic Entropy and quantifies the compactness of the point distribution using only a single tuning parameter. We also present a fast approximate method to reduce the computational requirements of the entropy evaluation, allowing unsupervised calibration in vast environments with millions of points. The algorithm is analyzed using real world data gathered in many locations, showing robust calibration performance and substantial speed improvements from the approximations.
Resumo:
The representation of business process models has been a continuing research topic for many years now. However, many process model representations have not developed beyond minimally interactive 2D icon-based representations of directed graphs and networks, with little or no annotation for information over- lays. With the rise of desktop computers and commodity mobile devices capable of supporting rich interactive 3D environments, we believe that much of the research performed in computer human interaction, virtual reality, games and interactive entertainment has much potential in areas of BPM; to engage, pro- vide insight, and to promote collaboration amongst analysts and stakeholders alike. This initial visualization workshop seeks to initiate the development of a high quality international forum to present and discuss research in this field. Via this workshop, we intend to create a community to unify and nurture the development of process visualization topics as a continuing research area.
Resumo:
Well-designed indoor environments can support people’s health and welfare. In this literature review, we identify the environmental features that affect human health and wellbeing. Environmental characteristics found to influence health outcomes and/or wellbeing included: environmental safety; indoor air quality (e.g. odour and temperature); sound and noise; premises and interior design (e.g. construction materials, viewing nature and experiencing nature, windows versus no windows, light, colours, unit layout and placement of the furniture, the type of room, possibilities to control environmental elements, environmental complexity and sensory simulations, cleanliness, ergonomics and accessibility, ‛‛wayfinding’’); art, and music, among others. Indoor environments that incorporate healing elements can, for instance, reduce anxiety, lower blood pressure, lessen pain and shorten hospital stays.
Resumo:
Security indicators in web browsers alert users to the presence of a secure connection between their computer and a web server; many studies have shown that such indicators are largely ignored by users in general. In other areas of computer security, research has shown that technical expertise can decrease user susceptibility to attacks. In this work, we examine whether computer or security expertise affects use of web browser security indicators. Our study takes place in the context of web-based single sign-on, in which a user can use credentials from a single identity provider to login to many relying websites; single sign-on is a more complex, and hence more difficult, security task for users. In our study, we used eye trackers and surveyed participants to examine the cues individuals use and those they report using, respectively. Our results show that users with security expertise are more likely to self-report looking at security indicators, and eye-tracking data shows they have longer gaze duration at security indicators than those without security expertise. However, computer expertise alone is not correlated with recorded use of security indicators. In survey questions, neither experts nor novices demonstrate a good understanding of the security consequences of web-based single sign-on.
Resumo:
One of the greatest challenges facing the Roman Catholic Church (the Church) across the world continues to be found in addressing complaints of child sexual abuse (csa) by clergy. The list of Catholic clergy in Australia who have been criminally processed for sexual offences against children is disturbingly long. As disturbing as this list is, more disturbing are the accounts of clergy who have not been criminally prosecuted, but protected within the cloister of the Church. It is increasingly recognised that the significant difficulty with child sexual abuse in Catholic Churches, in particular, has not been the presence of perpetrators but the response of Church leadership to allegations of csa by clergy. Those who have faced criminal charges have often done so due to the resilience of victim/survivors and not because of the support of Church structures or culture. The Church has been slow to come to terms with the realities of the perpetration of csa by its clergy and even slower to recognise the need to prioritise victims in any effective, just response. The church has been slowest of all recognising that there are significant cultural and discursive challenges to confront in addressing the management of csa by clergy. There is, however, progressive recognition of the role that discursive constructs of forgiveness have played in perpetuating the crises and ultimately in perpetuating abuse. The institutional praxis of forgiveness can be demonstrated not only in the Church, but in lessons learned from use of forgiveness as an institutional response to mass violations of human rights. This paper explores the juncture between criminality, church culture and forgiveness in responding to csa by clergy.
Resumo:
This study aimed to explore experienced mentors’ understandings about professional learning communities (PLCs), mentoring and leadership. This research analyses audio-taped transcripts and written responses from 27 experienced mentors who operate in varied roles (e.g., university academics, school executives, teachers, learning support personnel). Findings indicated that PLCs can provide professional renewal for existing teachers and that mentoring within PLCs can further advance knowledge about effective practices. PLCs can include other staff members and key stakeholders (e.g., preservice teachers, teacher aides) who can contribute to the learning within the group. Mentoring and PLCs can be cost-effective strategic levers for advancing professional knowledge.
Resumo:
Topic recommendation can help users deal with the information overload issue in micro-blogging communities. This paper proposes to use the implicit information network formed by the multiple relationships among users, topics and micro-blogs, and the temporal information of micro-blogs to find semantically and temporally relevant topics of each topic, and to profile users' time-drifting topic interests. The Content based, Nearest Neighborhood based and Matrix Factorization models are used to make personalized recommendations. The effectiveness of the proposed approaches is demonstrated in the experiments conducted on a real world dataset that collected from Twitter.com.
Resumo:
The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.
Resumo:
Bridges are currently rated individually for maintenance and repair action according to the structural conditions of their elements. Dealing with thousands of bridges and the many factors that cause deterioration, makes this rating process extremely complicated. The current simplified but practical methods are not accurate enough. On the other hand, the sophisticated, more accurate methods are only used for a single or particular bridge type. It is therefore necessary to develop a practical and accurate rating system for a network of bridges. The first most important step in achieving this aim is to classify bridges based on the differences in nature and the unique characteristics of the critical factors and the relationship between them, for a network of bridges. Critical factors and vulnerable elements will be identified and placed in different categories. This classification method will be used to develop a new practical rating method for a network of railway bridges based on criticality and vulnerability analysis. This rating system will be more accurate and economical as well as improve the safety and serviceability of railway bridges.
Resumo:
Throughout the Asia Pacific Economic Cooperation (APEC) and across the world, riders and passengers of motorcycles and scooters are among the most vulnerable road users. Such vulnerability is especially pertinent for nations that more often use motorcycles and scooters as a method of transportation. In developing effective countermeasures to reduce motorcycle and scooter death and injury across multiple regions, consideration is required of various situational and socio-cultural factors that vary across APEC economies. This compendium aims to facilitate implementation of best practice countermeasures to improve motorcycle safety in APEC member economies.
Resumo:
Throughout the Asia Pacific Economic Cooperation (APEC) and across the world, riders and passengers of motorcycles and scooters are among the most vulnerable road users. There is considerably greater likelihood of death or injury from use of these vehicles compared with other motor vehicles. Such vulnerability is especially pertinent for economies that more often use motorcycles and scooters as a method of transportation. In developing effective countermeasures to reduce motorcycle and scooter death and injury across multiple regions consideration is required of various situational and socio-cultural factors that vary across APEC economies. The study presented here sought to understand important motorcycle and scooter safety issues across APEC economies and any current barriers that might exist in implementing potentially effective countermeasures. This is the first stage of a wider project which also includes a literature review and ultimately the production of a compendium to facilitate implementation of best practice countermeasures.
Resumo:
For any discipline to be regarded as a professional undertaking by which its members may be treated as true “professionals” in a specific area, practitioners must clearly understand that discipline’s history as well as the place and significance of that history in current practice as well as its relevance to available technologies and artefacts at the time. This is common for many professional disciplines such as medicine, pharmacy, engineering, law and so on but not yet, this paper submits, in information technology. Based on twenty five elapsed years of experience in developing and delivering Cybersecurity courses at undergraduate and postgraduate levels, this paper proposes a rationale and set of differing perspectives for the planning and development of curricula relevant to the delivery of appropriate courses in the history of cybersecurity or information assurance to information and communications technology (ICT) students and thus to potential information technology professionals.
Resumo:
Background: Demand for pre-hospital emergency care is increasing in Australia as in many other countries. Using posthoc criteria such as triage, diagnosis and admission status, some authors view a considerable number of these as "inappropriate". Yet, calling an ambulance at the time of emergency is rarely studied from the patients’ or their carers’ perspective. This study interviewed patients about the decision, circumstances surrounding and reasons for calling an ambulance in Queensland, Australia. Methods: A cross-sectional survey of patients attending a sample of eight public hospital emergency departments in Queensland was undertaken between March and May 2011. In total, 911 questionnaires were collected (response rate: 67%), of whom 226 (24.8%) had arrived by ambulance. Results: In 35.6% of ambulance arrivals, the decision to request an ambulance was made by the patient; 25% by a doctor; 20% by a family member, friend or carer. Other callers included nurse, people at work or school, and passers-by. Reasons to request an ambulance included urgency (87%) and severity (84%) of the condition. Other reasons included requiring special care (76%), getting higher priority at the emergency department (34%), not having a car (34%), and financial concerns (17%). Decision to request an ambulance varied significantly according to the time of illness onset (e.g. on the day, week before), and location (e.g. home, outside). Conclusion: The decision to call an ambulance is made mostly by non-medical professionals in a perceived emergency situation. They call the ambulance for different reasons but mainly take into account the patient’s welfare and safety. Better understanding of these reasons will affect the direction and effectiveness of demand management strategies.
Resumo:
The price formation of financial assets is a complex process. It extends beyond the standard economic paradigm of supply and demand to the understanding of the dynamic behavior of price variability, the price impact of information, and the implications of trading behavior of market participants on prices. In this thesis, I study aggregate market and individual assets volatility, liquidity dimensions, and causes of mispricing for US equities over a recent sample period. How volatility forecasts are modeled, what determines intradaily jumps and causes changes in intradaily volatility and what drives the premium of traded equity indexes? Are they induced, for example, by the information content of lagged volatility and return parameters or by macroeconomic news, changes in liquidity and volatility? Besides satisfying our intellectual curiosity, answers to these questions are of direct importance to investors developing trading strategies, policy makers evaluating macroeconomic policies and to arbitrageurs exploiting mispricing in exchange-traded funds. Results show that the leverage effect and lagged absolute returns improve forecasts of continuous components of daily realized volatility as well as jumps. Implied volatility does not subsume the information content of lagged returns in forecasting realized volatility and its components. The reported results are linked to the heterogeneous market hypothesis and demonstrate the validity of extending the hypothesis to returns. Depth shocks, signed order flow, the number of trades, and resiliency are the most important determinants of intradaily volatility. In contrast, spread shock and resiliency are predictive of signed intradaily jumps. There are fewer macroeconomic news announcement surprises that cause extreme price movements or jumps than those that elevate intradaily volatility. Finally, the premium of exchange-traded funds is significantly associated with momentum in net asset value and a number of liquidity parameters including the spread, traded volume, and illiquidity. The mispricing of industry exchange traded funds suggest that limits to arbitrage are driven by potential illiquidity.