58 resultados para DRIFT
em Queensland University of Technology - ePrints Archive
Resumo:
Unstructured text data, such as emails, blogs, contracts, academic publications, organizational documents, transcribed interviews, and even tweets, are important sources of data in Information Systems research. Various forms of qualitative analysis of the content of these data exist and have revealed important insights. Yet, to date, these analyses have been hampered by limitations of human coding of large data sets, and by bias due to human interpretation. In this paper, we compare and combine two quantitative analysis techniques to demonstrate the capabilities of computational analysis for content analysis of unstructured text. Specifically, we seek to demonstrate how two quantitative analytic methods, viz., Latent Semantic Analysis and data mining, can aid researchers in revealing core content topic areas in large (or small) data sets, and in visualizing how these concepts evolve, migrate, converge or diverge over time. We exemplify the complementary application of these techniques through an examination of a 25-year sample of abstracts from selected journals in Information Systems, Management, and Accounting disciplines. Through this work, we explore the capabilities of two computational techniques, and show how these techniques can be used to gather insights from a large corpus of unstructured text.
Resumo:
This paper is directed towards providing an answer to the question, ”Can you control the trajectory of a Lagrangian float?” Being a float that has minimal actuation (only buoyancy control), their horizontal trajectory is dictated through drifting with ocean currents. However, with the appropriate vertical actuation and utilising spatio-temporal variations in water speed and direction, we show here that broad controllabilty results can be met such as waypoint following to keep a float inside of a bay or out of a designated region. This paper extends theory experimen- tally evaluted on horizontally actuated Autonomous Underwater Vehicles (AUVs) for trajectory control utilising ocean forecast models and presents an initial investi- gation into the controllability of these minimally actuated drifting AUVs. Simulated results for offshore coastal and within highly dynamic tidal bays illustrate two tech- niques with the promise for an affirmative answer to the posed question above.
Resumo:
In this video, text floats on screen amidst a field of swirling coloured orbs and a stock music soundtrack. The text is sourced from Internet dating websites and combine into a single animated portrait charting an array of likes, dislikes, influences, beliefs and hobbies. This work examines the nature of consciousness and identity in a contemporary context. It reworks the languages of Internet dating websites to question how we construct and communicate our sense of self. Drawing on Zygmunt Bauman’s theoretical work on “liquid modernity”, this work presents an exaggerated take on contemporary identity that emphasizes its construction through consumer tastes, lifestyle choices and relationships with popular culture.
Resumo:
Microenterprise development programs (MEPs) have been recognised as a valuable way to help the poor engage in micro-businesses (Green et al., 2006; Vargas, 2000), presenting a way out of poverty (Choudhury et al., 2008; Strier, 2010). Concerns have been raised however, that the benefits of MEPs often don’t reach the extremely poor (Jones et al., 2004; Midgley, 2008; Mosley and Hulme, 1998; Nawaz, 2010; Pritchett, 2006). Balancing reach of these programs with depth is a challenging task. Targeting as many poor people as possible often results in MEPs focusing on the upper or middle poor, overlooking the most challenging group. As such, MEPs have been criticised for mission drift – losing sight of the organisation’s core purpose; assisting those more likely to succeed.
Resumo:
This thesis examines the stewardship and investment style monitoring by managers and boards of U.S. equity funds. Results indicate that complying with a fund’s declared style, especially in value-growth dimension, remains a challenge for fund managers and boards, and that style-based investors should be aware of the risk of style drift since fund managers and boards do not always monitor the fund’s investment style as stated in the prospectus. Results also show that the quality of fund stewardship, as reflected by fund board quality, corporate culture, manager compensation, regulatory history, and fees are effective in ensuring that fund managers and boards perform their fiduciary obligation by increasing monitoring of the fund investment style.
Resumo:
Business processes are prone to continuous and unexpected changes. Process workers may start executing a process differently in order to adjust to changes in workload, season, guidelines or regulations for example. Early detection of business process changes based on their event logs – also known as business process drift detection – enables analysts to identify and act upon changes that may otherwise affect process performance. Previous methods for business process drift detection are based on an exploration of a potentially large feature space and in some cases they require users to manually identify the specific features that characterize the drift. Depending on the explored feature set, these methods may miss certain types of changes. This paper proposes a fully automated and statistically grounded method for detecting process drift. The core idea is to perform statistical tests over the distributions of runs observed in two consecutive time windows. By adaptively sizing the window, the method strikes a trade-off between classification accuracy and drift detection delay. A validation on synthetic and real-life logs shows that the method accurately detects typical change patterns and scales up to the extent it is applicable for online drift detection.
Resumo:
Existing business process drift detection methods do not work with event streams. As such, they are designed to detect inter-trace drifts only, i.e. drifts that occur between complete process executions (traces), as recorded in event logs. However, process drift may also occur during the execution of a process, and may impact ongoing executions. Existing methods either do not detect such intra-trace drifts, or detect them with a long delay. Moreover, they do not perform well with unpredictable processes, i.e. processes whose logs exhibit a high number of distinct executions to the total number of executions. We address these two issues by proposing a fully automated and scalable method for online detection of process drift from event streams. We perform statistical tests over distributions of behavioral relations between events, as observed in two adjacent windows of adaptive size, sliding along with the stream. An extensive evaluation on synthetic and real-life logs shows that our method is fast and accurate in the detection of typical change patterns, and performs significantly better than the state of the art.
Resumo:
The thermal behaviour of halloysite fully expanded with hydrazine-hydrate has been investigated in nitrogen atmosphere under dynamic heating and at a constant, pre-set decomposition rate of 0.15 mg min-1. Under controlled-rate thermal analysis (CRTA) conditions it was possible to resolve the closely overlapping decomposition stages and to distinguish between adsorbed and bonded reagent. Three types of bonded reagent could be identified. The loosely bonded reagent amounting to 0.20 mol hydrazine-hydrate per mol inner surface hydroxyl is connected to the internal and external surfaces of the expanded mineral and is present as a space filler between the sheets of the delaminated mineral. The strongly bonded (intercalated) hydrazine-hydrate is connected to the kaolinite inner surface OH groups by the formation of hydrogen bonds. Based on the thermoanalytical results two different types of bonded reagent could be distinguished in the complex. Type 1 reagent (approx. 0.06 mol hydrazine-hydrate/mol inner surface OH) is liberated between 77 and 103°C. Type 2 reagent is lost between 103 and 227°C, corresponding to a quantity of 0.36 mol hydrazine/mol inner surface OH. When heating the complex to 77°C under CRTA conditions a new reflection appears in the XRD pattern with a d-value of 9.6 Å, in addition to the 10.2 Ĺ reflection. This new reflection disappears in contact with moist air and the complex re-expands to the original d-value of 10.2 Å in a few h. The appearance of the 9.6 Å reflection is interpreted as the expansion of kaolinite with hydrazine alone, while the 10.2 Å one is due to expansion with hydrazine-hydrate. FTIR (DRIFT) spectroscopic results showed that the treated mineral after intercalation/deintercalation and heat treatment to 300°C is slightly more ordered than the original (untreated) clay.
Resumo:
The effect of mechanochemical activation upon the intercalation of formamide into a high-defect kaolinite has been studied using a combination of X-ray diffraction, thermal analysis, and DRIFT spectroscopy. X-ray diffraction shows that the intensity of the d(001) spacing decreases with grinding time and that the intercalated high-defect kaolinite expands to 10.2 A. The intensity of the peak of the expanded phase of the formamide-intercalated kaolinite decreases with grinding time. Thermal analysis reveals that the evolution temperature of the adsorbed formamide and loss of the inserting molecule increases with increased grinding time. The temperature of the dehydroxylation of the formamide-intercalated high-defect kaolinite decreases from 495 to 470oC with mechanochemical activation. Changes in the surface structure of the mechanochemically activated formamide-intercalated high-defect kaolinite were followed by DRIFT spectroscopy. Fundamentally the intensity of the high-defect kaolinite hydroxyl stretching bands decreases exponentially with grinding time and simultaneously the intensity of the bands attributed to the OH stretching vibrations of water increased. It is proposed that the mechanochemical activation of the high-defect kaolinite caused the conversion of the hydroxyls to water which coordinates the kaolinite surface. Significant changes in the infrared bands assigned to the hydroxyl deformation and amide stretching and bending modes were observed. The intensity decrease of these bands was exponentially related to the grinding time. The position of the amide C&unknown;O vibrational mode was found to be sensitive to grinding time. The effect of mechanochemical activation of the high-defect kaolinite reduces the capacity of the kaolinite to be intercalated with formamide.
Resumo:
The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.
Resumo:
This article observes a paradox in the recent history of the Special Broadcasting Service. It is argued that, in contrast to the Australian Broadcasting Corporation, the role and general direction of SBS were not extensively debated as part of the ‘culture wars’ that occurred during the years of the Howard government. While that made SBS a less fraught space during that period, it may now be a factor in the comparative lack of support being given by the Rudd Labor government to SBS in comparison with the ABC, as some of the ‘special’ status of SBS has been blunted by its drift towards more mainstream programming and a mixed economy of commercial advertising, as well as government funding.
Seismic performance of brick infilled RC frame structures in low and medium rise buildings in Bhutan
Resumo:
The construction of reinforced concrete buildings with unreinforced infill is common practice even in seismically active country such as Bhutan, which is located in high seismic region of Eastern Himalaya. All buildings constructed prior 1998 were constructed without seismic provisions while those constructed after this period adopted seismic codes of neighbouring country, India. However, the codes have limited information on the design of infilled structures besides having differences in architectural requirements which may compound the structural problems. Although the influence of infill on the reinforced concrete framed structures is known, the present seismic codes do not consider it due to the lack of sufficient information. Time history analyses were performed to study the influence of infill on the performance of concrete framed structures. Important parameters were considered and the results presented in a manner that can be used by practitioners. The results show that the influence of infill on the structural performance is significant. The structural responses such as fundamental period, roof displacement, inter-storey drift ratio, stresses in infill wall and structural member forces of beams and column generally reduce, with incorporation of infill wall. The structures designed and constructed with or without seismic provision perform in a similar manner if the infills of high strength are used.
Resumo:
In this thesis an investigation into theoretical models for formation and interaction of nanoparticles is presented. The work presented includes a literature review of current models followed by a series of five chapters of original research. This thesis has been submitted in partial fulfilment of the requirements for the degree of doctor of philosophy by publication and therefore each of the five chapters consist of a peer-reviewed journal article. The thesis is then concluded with a discussion of what has been achieved during the PhD candidature, the potential applications for this research and ways in which the research could be extended in the future. In this thesis we explore stochastic models pertaining to the interaction and evolution mechanisms of nanoparticles. In particular, we explore in depth the stochastic evaporation of molecules due to thermal activation and its ultimate effect on nanoparticles sizes and concentrations. Secondly, we analyse the thermal vibrations of nanoparticles suspended in a fluid and subject to standing oscillating drag forces (as would occur in a standing sound wave) and finally on lattice surfaces in the presence of high heat gradients. We have described in this thesis a number of new models for the description of multicompartment networks joined by a multiple, stochastically evaporating, links. The primary motivation for this work is in the description of thermal fragmentation in which multiple molecules holding parts of a carbonaceous nanoparticle may evaporate. Ultimately, these models predict the rate at which the network or aggregate fragments into smaller networks/aggregates and with what aggregate size distribution. The models are highly analytic and describe the fragmentation of a link holding multiple bonds using Markov processes that best describe different physical situations and these processes have been analysed using a number of mathematical methods. The fragmentation of the network/aggregate is then predicted using combinatorial arguments. Whilst there is some scepticism in the scientific community pertaining to the proposed mechanism of thermal fragmentation,we have presented compelling evidence in this thesis supporting the currently proposed mechanism and shown that our models can accurately match experimental results. This was achieved using a realistic simulation of the fragmentation of the fractal carbonaceous aggregate structure using our models. Furthermore, in this thesis a method of manipulation using acoustic standing waves is investigated. In our investigation we analysed the effect of frequency and particle size on the ability for the particle to be manipulated by means of a standing acoustic wave. In our results, we report the existence of a critical frequency for a particular particle size. This frequency is inversely proportional to the Stokes time of the particle in the fluid. We also find that for large frequencies the subtle Brownian motion of even larger particles plays a significant role in the efficacy of the manipulation. This is due to the decreasing size of the boundary layer between acoustic nodes. Our model utilises a multiple time scale approach to calculating the long term effects of the standing acoustic field on the particles that are interacting with the sound. These effects are then combined with the effects of Brownian motion in order to obtain a complete mathematical description of the particle dynamics in such acoustic fields. Finally, in this thesis, we develop a numerical routine for the description of "thermal tweezers". Currently, the technique of thermal tweezers is predominantly theoretical however there has been a handful of successful experiments which demonstrate the effect it practise. Thermal tweezers is the name given to the way in which particles can be easily manipulated on a lattice surface by careful selection of a heat distribution over the surface. Typically, the theoretical simulations of the effect can be rather time consuming with supercomputer facilities processing data over days or even weeks. Our alternative numerical method for the simulation of particle distributions pertaining to the thermal tweezers effect use the Fokker-Planck equation to derive a quick numerical method for the calculation of the effective diffusion constant as a result of the lattice and the temperature. We then use this diffusion constant and solve the diffusion equation numerically using the finite volume method. This saves the algorithm from calculating many individual particle trajectories since it is describes the flow of the probability distribution of particles in a continuous manner. The alternative method that is outlined in this thesis can produce a larger quantity of accurate results on a household PC in a matter of hours which is much better than was previously achieveable.