191 resultados para Swift iOS Iphone SDK Marketcloud Api


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Key Features: "Aligns to Mastering Medical Terminology: Australia and New Zealand. Self-test to practise and revise combining forms, word roots, prefixes and suffixes. Crossword puzzles, anagrams and label-the-diagram exercises Also available iOS/Android app featuring audio glossary, flashcards and MCQs."--publisher website

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Internet-connected tablets and smart phones are being used increasingly by young children. Little is known, however, about their social interactions with family members when engaged with these technologies. This article examines video recorded interactions between a father and his two young children, one aged 18 months using an iPhone, and one aged three years accessing an iPad. Drawing on Ethnomethodology and Conversation Analysis, this analysis establishes ways the family members engage and disengage in talk to manage their individual activity with mobile devices and accomplish interaction with each other. Findings are relevant for understanding children’s everyday practices with mobile technologies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Current media attention on the crossover novel highlights the increasing permeability of the boundaries between young adult and adult fiction. This paper will focus upon some of the difficulties around definitions of young adult fiction before considering the fiction of football, or soccer as it is more commonly known in Australia. The football genre exhibits a number of discrete and identifiable differences between young adult and adult readerships including, for example, the role of the protagonist, and the narrative’s distance from the game. This paper will use Franco Moretti’s Mapping as Distant Reading model of abstraction to highlight and unpack these and other characteristic differences in the narratological and stylistic techniques employed across adult and young adult texts. Close reading analysis of the adult football fiction Striker (1992) by Hunter Davies and young adult football fiction Lucy Zeezou’s Goal (2008) by Liz Deep-Jones’ will further illustrate the range of tensions and divergences as they are reflected across those readerships. The texts have been selected because they speak to themes of fear and safety; Joe Swift (Striker) is driven by a need to move away from childhood poverty and insecurity, while Lucy Zeezou shelters a homeless friend. With both protagonists being kidnapped for ransom for example, the texts have also been selected for their striking similarities in form and content.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The cryptographic community has, of late, shown much inventiveness in the creation of powerful new IBE-like primitives that go beyond the basic IBE notion and extend it in many new directions. Virtually all of these “super-IBE” schemes rely on bilinear pairings for their implementation, which they tend to use in a surprisingly small number of different ways: three of them as of this writing. What is interesting is that, among the three main frameworks that we know of so far, one has acted as a veritable magnet for the construction of many of these “generalized IBE” primitives, whereas the other two have not been nearly as fruitful in that respect. This refers to the Commutative Blinding framework defined by the Boneh-Boyen [Bscr ][Bscr ]1 IBE scheme from 2004. The aim of this chapter is to try to shed some light on this approach's popularity, first by comparing its key properties with those of the competing frameworks, and then by providing a number of examples that illustrate how those properties have been used.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective To evaluate the effects of Optical Character Recognition (OCR) on the automatic cancer classification of pathology reports. Method Scanned images of pathology reports were converted to electronic free-text using a commercial OCR system. A state-of-the-art cancer classification system, the Medical Text Extraction (MEDTEX) system, was used to automatically classify the OCR reports. Classifications produced by MEDTEX on the OCR versions of the reports were compared with the classification from a human amended version of the OCR reports. Results The employed OCR system was found to recognise scanned pathology reports with up to 99.12% character accuracy and up to 98.95% word accuracy. Errors in the OCR processing were found to minimally impact on the automatic classification of scanned pathology reports into notifiable groups. However, the impact of OCR errors is not negligible when considering the extraction of cancer notification items, such as primary site, histological type, etc. Conclusions The automatic cancer classification system used in this work, MEDTEX, has proven to be robust to errors produced by the acquisition of freetext pathology reports from scanned images through OCR software. However, issues emerge when considering the extraction of cancer notification items.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective: To develop a system for the automatic classification of pathology reports for Cancer Registry notifications. Method: A two pass approach is proposed to classify whether pathology reports are cancer notifiable or not. The first pass queries pathology HL7 messages for known report types that are received by the Queensland Cancer Registry (QCR), while the second pass aims to analyse the free text reports and identify those that are cancer notifiable. Cancer Registry business rules, natural language processing and symbolic reasoning using the SNOMED CT ontology were adopted in the system. Results: The system was developed on a corpus of 500 histology and cytology reports (with 47% notifiable reports) and evaluated on an independent set of 479 reports (with 52% notifiable reports). Results show that the system can reliably classify cancer notifiable reports with a sensitivity, specificity, and positive predicted value (PPV) of 0.99, 0.95, and 0.95, respectively for the development set, and 0.98, 0.96, and 0.96 for the evaluation set. High sensitivity can be achieved at a slight expense in specificity and PPV. Conclusion: The system demonstrates how medical free-text processing enables the classification of cancer notifiable pathology reports with high reliability for potential use by Cancer Registries and pathology laboratories.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Phishing is deceptive collection of personal information leading to embezzlement, identity theft, and so on. Preventive and combative measures have been taken by banking institutions, software vendors, and network authorities to fight phishing. At the forefront of this resilience are consortiums such as APWG (Anti-Phishing Working Group) and PhishTank, the latter being a collaborative platform where everyone can submit potentially phishing web-pages and classify web-pages as either phish or genuine. PhishTank also has an API that the browsers use to notify users when she tries to load a phishing page. There are some organizations and individuals who are very active and highly accurate in classifying web-pages on PhishTank. In this paper, we propose a defense model that uses these experts to fight phishing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this chapter is to provide an abstraction for the class of Exponent-Inversion IBE exemplified by the [Bscr ][Bscr ]2 and [Sscr ][Kscr ] schemes, and, on the basis of that abstraction, to show that those schemes do support interesting and useful extensions such as HIBE and ABE. Our results narrow, if not entirely close, the “flexibility gap” between the Exponent-Inversion and Commutative-Blinding IBE concepts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Regulation has played a significant role in shaping the financial services sector in Australia over the past few decades. Regulatory changes have included the establishment of the Australian Prudential Regulation Authority (APRA), floating the Australian dollar, allowing foreign financial institutions to operate domestically, the introduction of the superannuation guarantee charge, and the removal of interest rate controls. As the economy emerges from the worst financial crisis since the great depression, a new force of change that is recognised as one of the most significant sources of risk and opportunity facing the business community in the foreseeable future is that of climate change. Climate change is expected to be a significant change agent in the financial services sector as extreme weather patterns, sea level rises, and atmospheric changes impact on asset values (both investment and lending), project finance, and risk products. The financial services industry will be particularly affected by these developments, both as a provider of financial products (capital, credit, investment, advice, and insurance), and also through its powerful influence on the economy in terms of capital allocation. In addition, industry constituents will be heavily impacted by government regulation in this area (reporting, emissions trading and environmental policies), with respect to their own business practices and also those of their clients. This study reports the results of interviews conducted with senior members of the finance sector working in the sustainability area to gauge their perceptions of the challenges facing the sector with respect to climate change. Our results confirm that that regulatory intervention will be critical to climate change response gaining traction and momentum. In particular, regulatory certainty will promote engagement, particularly in relation to the Carbon Pollution Reduction Scheme (CPRS), with other developments needed in terms of information disclosure, performance and remuneration, and incentive programs. Accordingly, the significant potential risks and opportunities that climate change presents to the sector, and the broader economy, will in part be managed/realised only if a swift and significant regulatory response is achieved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recently, botnet, a network of compromised computers, has been recognized as the biggest threat to the Internet. The bots in a botnet communicate with the botnet owner via a communication channel called Command and Control (C & C) channel. There are three main C & C channels: Internet Relay Chat (IRC), Peer-to-Peer (P2P) and web-based protocols. By exploiting the flexibility of the Web 2.0 technology, the web-based botnet has reached a new level of sophistication. In August 2009, such botnet was found on Twitter, one of the most popular Web 2.0 services. In this paper, we will describe a new type of botnet that uses Web 2.0 service as a C & C channel and a temporary storage for their stolen information. We will then propose a novel approach to thwart this type of attack. Our method applies a unique identifier of the computer, an encryption algorithm with session keys and a CAPTCHA verification.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Analysis of behavioural consistency is an important aspect of software engineering. In process and service management, consistency verification of behavioural models has manifold applications. For instance, a business process model used as system specification and a corresponding workflow model used as implementation have to be consistent. Another example would be the analysis to what degree a process log of executed business operations is consistent with the corresponding normative process model. Typically, existing notions of behaviour equivalence, such as bisimulation and trace equivalence, are applied as consistency notions. Still, these notions are exponential in computation and yield a Boolean result. In many cases, however, a quantification of behavioural deviation is needed along with concepts to isolate the source of deviation. In this article, we propose causal behavioural profiles as the basis for a consistency notion. These profiles capture essential behavioural information, such as order, exclusiveness, and causality between pairs of activities of a process model. Consistency based on these profiles is weaker than trace equivalence, but can be computed efficiently for a broad class of models. In this article, we introduce techniques for the computation of causal behavioural profiles using structural decomposition techniques for sound free-choice workflow systems if unstructured net fragments are acyclic or can be traced back to S- or T-nets. We also elaborate on the findings of applying our technique to three industry model collections.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Long Time, No See? is a crowd-sourced project that asks people to reflect upon what kind of long term future they would each like to promote. It is an evolving experiment in the social practice of ‘everyday futuring’. To participate download the Long Time, No See? IPhone APP that gently guides you during a short walk, encouraging you to experience new places, sensations and thoughts in your locality. At nine stages along that journey you donate ‘field notes’ as images, texts, sounds and ‘themes’, offering a unique opportunity to reveal possible pathways towards more sustaining futures. The APP records the shape of your walk on the ground and draws an island on the ‘map’ shown here, populated by your nine sets of responses. The themes you have chosen then connect your island into an evolving ‘world’ map of connections and possibilities, which you can then explore at your leisure. In these ways, Long Time, No See? doesn’t ask you for lofty visions or ask you to lay out a program of action, but instead asks you to consider what is around you today, steering your eyes, ears and embodied experiences towards new futures that demonstrate your ‘care’ for what comes after you. Please use the contribute tab below to learn how to add your voice! PARTICIPATE To contribute 1: Download the APP {bit.do/ltns}, iPhone/iPad is supported right now. 2: Register a ‘walker name’. 3: Take a leisurely walk (30 -60mins) and contribute image, text, sound and themes when asked. 4: Wait while we verify and upload your walk (allow about 24 hours) 5: View your contributions via your ‘walker name’ and discover how it relates to others, here at the Cube and at www.long-time-no-see.org. NB You can undertake each walk over more than one day if that suits. You may even drive, cycle or move by other modes. DOWNLOAD THE APP: bit.do/ltns (insert QI Code) FIND OUT MORE www.long-time-no-see.org

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we present the results of a survey conducted to measure the attitudes of the consumers of eHealth towards Accountable-eHealth systems which are designed for information privacy management. A research model is developed that can identify the factors contributing to system acceptance and is validated using quantitative data from 187 completed survey responses from university students studying non-health related courses at a university in Queensland, Australia. The research model is validated using structural equation modelling and can be used to identify how specific characteristics of Accountable-eHealth systems would affect their overall acceptance by future eHealth consumers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper strives to identify barriers that hamper eHealth implementation from different perspectives. The benefits offered by eHealth and the need for eHealth preparedness is first discussed. This is followed by a discussion on the integral components of a robust eHealth infrastructure. Then, the barriers to eHealth such as technical interoperability issues, lack of holistic approach and technology disconnect are explained in detail. Finally, solutions to promote better adoption of eHealth through government policies, standardisation and training are also discussed.