572 resultados para Let me in
em Queensland University of Technology - ePrints Archive
Resumo:
Earthquake precursor monitoring is the foundation of earthquake prediction and geothermal monitoring is one of the basic methods of earthquake precursor monitoring. High temperature well contains more information and therefore its monitoring is more important. However, electric sensors are hard to meet the monitoring requirements of high sensitivity and long lifetime. For a better observation of the earthquake precursor, a high sensitive fiber Bragg grating (FBG) temperature sensor is designed to monitoring a well at 87.5±1◦C. The performance of the FBG sensor demonstrates that it’s quite possible that applying FBG to high-sensitivity temperature-monitoring fields, such as geothermal monitoring. As far as we known, it is the first time that trying a high sensitive FBG temperature sensor in a practical application, let alone in the field of geothermal monitoring.
Resumo:
Monotony has been identified as a contributing factor to road crashes. Drivers’ ability to react to unpredictable events deteriorates when exposed to highly predictable and uneventful driving tasks, such as driving on Australian rural roads, many of which are monotonous by nature. Highway design in particular attempts to reduce the driver’s task to a merely lane-keeping one. Such a task provides little stimulation and is monotonous, thus affecting the driver’s attention which is no longer directed towards the road. Inattention contributes to crashes, especially for professional drivers. Monotony has been studied mainly from the endogenous perspective (for instance through sleep deprivation) without taking into account the influence of the task itself (repetitiveness) or the surrounding environment. The aim and novelty of this thesis is to develop a methodology (mathematical framework) able to predict driver lapses of vigilance under monotonous environments in real time, using endogenous and exogenous data collected from the driver, the vehicle and the environment. Existing approaches have tended to neglect the specificity of task monotony, leaving the question of the existence of a “monotonous state” unanswered. Furthermore the issue of detecting vigilance decrement before it occurs (predictions) has not been investigated in the literature, let alone in real time. A multidisciplinary approach is necessary to explain how vigilance evolves in monotonous conditions. Such an approach needs to draw on psychology, physiology, road safety, computer science and mathematics. The systemic approach proposed in this study is unique with its predictive dimension and allows us to define, in real time, the impacts of monotony on the driver’s ability to drive. Such methodology is based on mathematical models integrating data available in vehicles to the vigilance state of the driver during a monotonous driving task in various environments. The model integrates different data measuring driver’s endogenous and exogenous factors (related to the driver, the vehicle and the surrounding environment). Electroencephalography (EEG) is used to measure driver vigilance since it has been shown to be the most reliable and real time methodology to assess vigilance level. There are a variety of mathematical models suitable to provide a framework for predictions however, to find the most accurate model, a collection of mathematical models were trained in this thesis and the most reliable was found. The methodology developed in this research is first applied to a theoretically sound measure of sustained attention called Sustained Attention Response to Task (SART) as adapted by Michael (2010), Michael and Meuter (2006, 2007). This experiment induced impairments due to monotony during a vigilance task. Analyses performed in this thesis confirm and extend findings from Michael (2010) that monotony leads to an important vigilance impairment independent of fatigue. This thesis is also the first to show that monotony changes the dynamics of vigilance evolution and tends to create a “monotonous state” characterised by reduced vigilance. Personality traits such as being a low sensation seeker can mitigate this vigilance decrement. It is also evident that lapses in vigilance can be predicted accurately with Bayesian modelling and Neural Networks. This framework was then applied to the driving task by designing a simulated monotonous driving task. The design of such task requires multidisciplinary knowledge and involved psychologist Rebecca Michael. Monotony was varied through both the road design and the road environment variables. This experiment demonstrated that road monotony can lead to driving impairment. Particularly monotonous road scenery was shown to have the most impact compared to monotonous road design. Next, this study identified a variety of surrogate measures that are correlated with vigilance levels obtained from the EEG. Such vigilance states can be predicted with these surrogate measures. This means that vigilance decrement can be detected in a car without the use of an EEG device. Amongst the different mathematical models tested in this thesis, only Neural Networks predicted the vigilance levels accurately. The results of both these experiments provide valuable information about the methodology to predict vigilance decrement. Such an issue is quite complex and requires modelling that can adapt to highly inter-individual differences. Only Neural Networks proved accurate in both studies, suggesting that these models are the most likely to be accurate when used on real roads or for further research on vigilance modelling. This research provides a better understanding of the driving task under monotonous conditions. Results demonstrate that mathematical modelling can be used to determine the driver’s vigilance state when driving using surrogate measures identified during this study. This research has opened up avenues for future research and could result in the development of an in-vehicle device predicting driver vigilance decrement. Such a device could contribute to a reduction in crashes and therefore improve road safety.
Resumo:
Individuals with limb amputation fitted with conventional socket-suspended prostheses often experience socket-related discomfort leading to a significant decrease in quality of life. Bone-anchored prostheses are increasingly acknowledged as viable alternative method of attachment of artificial limb. In this case, the prosthesis is attached directly to the residual skeleton through a percutaneous fixation. To date, a few osseointegration fixations are commercially available. Several devices are at different stages of development particularly in Europe and the US.[1-15] Clearly, surgical procedures are currently blooming worldwide. Indeed, Australia and Queensland in particular have one of the fastest growing populations. Previous studies involving either screw-type implants or press-fit fixations for bone-anchorage have focused on fragmented biomechanics aspects as well as the clinical benefits and safety of the procedure. [16-25] However, very few publications have synthetized this information and provided an overview of the current developments in bone-anchored prostheses worldwide, let alone in Australia. The purposes of the presentation will be: 1. To provide an overview of the state-of-art developments in bone-anchored prostheses with as strong emphasis on the design of fixations, treatment, benefits, risks as well as future opportunities and challenges, 2. To present the current international developments of procedures for bone-anchored prostheses in terms of numbers of centers, number of cases and typical case-mix, 3. To highlight the current role Australia is playing as a leader worldwide in terms of growing population, broadest range of case-mix, choices of fixations, development of reimbursement schemes, unique clinical outcome registry for evidence-based practice, cutting-edge research, consumer demand and general public interest.
Resumo:
Individuals with limb amputation fitted with conventional socket-suspended prostheses often experience socket-related discomfort leading to a significant decrease in quality of life. Bone-anchored prostheses are increasingly acknowledged as viable alternative method of attachment of artificial limb. In this case, the prosthesis is attached directly to the residual skeleton through a percutaneous fixation. To date, a few osseointegration fixations are commercially available. Several devices are at different stages of development particularly in Europe and the US.[1-15] Clearly, surgical procedures are currently blooming worldwide. Indeed, Australia and Queensland in particular have one of the fastest growing populations. Previous studies involving either screw-type implants or press-fit fixations for bone-anchorage have focused on fragmented biomechanics aspects as well as the clinical benefits and safety of the procedure. However, very few publications have synthetized this information and provided an overview of the current developments in bone-anchored prostheses worldwide, let alone in Australia. The purposes of the presentation will be: 1. To provide an overview of the state-of-art developments in bone-anchored prostheses with as strong emphasis on the design of fixations, treatment, benefits, risks as well as future opportunities and challenges, 2. To present the current international developments of procedures for bone-anchored prostheses in terms of numbers of centers, number of cases and typical case-mix, 3. To highlight the current role Australia is playing as a leader worldwide in terms of growing population, broadest range of case-mix, choices of fixations, development of reimbursement schemes, unique clinical outcome registry for evidence-based practice, cutting-edge research, consumer demand and general public interest.
Resumo:
Information on foods patients like and dislike is the essential basis for planning menus which are acceptable to patients and promote adequate consumption. The aim of this study was to obtain quantitative data on the food preferences of inpatients at a large metropolitan public hospital for use in menu planning. Methodology was based on a study by Williams et al (1988), and included additional questions about appetite and taste changes. The survey used a 9 point hedonic scale to rate foods listed in random order and was modified to incorporate more contemporary foods than those used in the originalWilliams study. Surveys were conducted by final year University of Queensland dietetics students on Food Service Practicum at the Royal Brisbane and Women’s Hospital (929 beds) in 2012. The first survey (220 questions, n = 157) had a response rate of 61%. The second included more sandwich fillings and salads (231 questions, n = 219, response rate 67%). Total number surveyed was 376. Results showed the most preferred foods were roast potato, grilled steak, ice cream, fresh strawberries, roast lamb, roast beef, grapes and banana. The least preferred foods were grapefruit, soybeans, lentils, sardines, prune juice and grapefruit juice. Patients who reported taste changes (10%) had similar food preferences to those who didn’t report taste changes. Patients who reported poor/very poor appetite (10%) generally scored foods lower than those who reported OK (22%), good/very good appetite (65%). The results of this study informed planning for a new patient menu at the RBWH in December 2012.
Resumo:
STUDY QUESTION Is there a contribution of the minor allele at the KRAS single nucleotide polymorphism (SNP) rs61764370 in the let-7 microRNA-binding site to endometriosis risk? SUMMARY ANSWER We found no evidence for association between endometriosis risk and rs61764370 or any other SNPs in KRAS. WHAT IS KNOWN ALREADY The rs61764370 SNP in the 3' untranslated region of the KRAS gene is predicted to disrupt a complementary binding site (LCS6) for the let-7 microRNA, and was recently reported to be at a high frequency (31%) in 132 women of varying ancestry with endometriosis compared with frequencies in a database of population controls (up to 7.6% depending on ancestry), suggesting a strong effect of this KRAS SNP in the aetiology of endometriosis. STUDY DESIGN, SIZE AND DURATION This was a case-control study with a total of 11 206 subjects. The study was performed between February 2012 and July 2012. PARTICIPANTS/MATERIALS, SETTINGAND METHODS We first investigated a possible association between common markers in KRAS and endometriosis risk from our genome-wide association (GWA) data in 3194 surgically confirmed endometriosis cases and 7060 controls of European ancestry. Although rs61764370 was not genotyped on the GWA arrays, five SNPs typed in the study were highly correlated with this variant. The rs61764370 and two SNPs highly correlated with rs61764370 were then genotyped in 933 endometriosis cases and 952 controls using the Sequenom MassARRAY platform. MAIN RESULTS AND THE ROLE OF CHANCE There was no evidence for an association between rs61764370 and endometriosis risk P = 0.411 and odds ratio = 1.10 (95% confidence intervals: 0.88-1.36). We also found no evidence for an association between the highly correlated SNP rs17387019 and endometriosis. Their minor allele frequencies in cases and controls were of 0.087-0.091 similar to the population frequency reported previously for this variant in controls. Analyses of endometriosis cases with revised American Fertility Society stage III/IV disease also showed no evidence for an association between these SNPs and endometriosis risk. LIMITATIONS AND REASONS FOR CAUTION The GWA and genotyped data sets were not independent since individuals and cases from some families overlap. Controls in our GWA study were not screened for endometriosis. WIDER IMPLICATIONS OF THE FINDINGS The key SNP, rs61764370, was genotyped in a subset of samples. Our results do not support the suggestion that carrying the minor allele at rs61764370 contributes to a significant number of endometriosis cases and rs61764370 is, therefore, unlikely to be a useful marker of endometriosis risk. STUDY FUNDING/COMPETING INTEREST(S) The research was funded by grants from the Australian National Health and Medical Research Council and Wellcome Trust. None of the authors has competing interests for the study.
Resumo:
In Service-Oriented Architectures (SOAs), software systems are decomposed into independent units, namely services, that interact with one another through message exchanges. To promote reuse and evolvability, these interactions are explicitly described right from the early phases of the development lifecycle. Up to now, emphasis has been placed on capturing structural aspects of service interactions. Gradually though, the description of behavioral dependencies between service interactions is gaining increasing attention as a means to push forward the SOA vision. This paper deals with the description of these behavioral dependencies during the analysis and design phases. The paper outlines a set of requirements that a language for modeling service interactions at this level should fulfill, and proposes a language whose design is driven by these requirements.
Resumo:
Through media such as newspapers, letterbox flyers, corporate brochures and television we are regularly confronted with descriptions for conventional (bricks 'n' mortar style) services. These representations vary in the terminology utilised, the depth of the description, the aspects of the service that are characterised and their applicability to candidate service requestors. Existing service catalogues (such as the Yellow Pages) provide little relief for service requestors from the burdensome task of discovering, comparing and substituting services. Add to this environment the rapidly evolving area of web services with its associated surfeit of standards, and the result is a considerably fragmented approach to the description of services. It leaves the reality of the Semantic Web somewhat clouded. --------- Let's consider service description briefly, before discussing our concerns with existing approaches to description. The act of describing is performed prior to advertising. This simple fact provides an interesting paradox as services cannot be described exactly before advertisement. This doesn't mean they can't be described comprehensively. By "exactly", we are referring to the fact that context provided by a service requestor (and their service needs) will alter the description of the service that is presented to the discoverer. For example, a service provider who operates a cinema wants to describe the price of their service. Let's say the advertised price is $15. They also want to state that a pensioner discount and a student discount is available which provides a 50% discount. A customer (i.e. service requestor) uses the cinema web site to purchase tickets online. They find the movie of their choice at a time that suits. However, its not until some context is provided by the requestor that the exact price is determined. The requestor might state that they are a pensioner. The same is applicable for a service requestor who purchases multiple tickets perhaps on behalf of other people. The disconnect between when the service is described and when a requestor provides context introduces challenges to the description process. A service provider would be ill-advised to offer independent descriptions that represent all the permutations possible for a single service. The descriptive effort would be prohibitive.
Resumo:
In recent years concern has been expressed internationally about the future of the library and information services (LIS) profession: recruitment and retention, changing skill sets and declining numbers of people choosing librarianship as a career are all factors contributing to an uncertain future. One area yet explored in any depth is the topic of why LIS studies are not perceived, let alone promoted, as a good first professional qualification for high school graduates. This paper considers the professional literature that examines the uptake of librarianship as a first qualification by school leavers and discusses, in the context of the Australian library sector, the role of professional associations, library schools, National and State Libraries, as well as individual libraries and librarians. Examples of best practice are presented to highlight the opportunities for inspiring and motivating students through well structured and stimulating work experience programs. The topic is relevant to all librarians who are interested in the future of the LIS profession. It is argued that the focus of the present conference on ‘moving up’ and ‘moving on’ can only have real significance when the profession has a more complete understanding of the barriers to and the opportunities for ‘moving in’.
Resumo:
This reader in popular cultural studies meets the need for an up-to-date collection of readings on contemporary youth cultures and youth music. Table of Content: Introduction: Reading Pop(ular) Cult(ural) Stud(ie)s: Steve Redhead. Part I: Theory I:. 1. Pearls and Swine: Intellectuals and the Mass Media: Simon Frith and Jon Savage. 2. Over-the-Counter Culture: Retheorising Resistance in Popular Culture: Beverly Best. Part II: Commentaries. 3. Organised Disorder: The Changing Space of the Record Shop: Will Straw. 4. Spatial Politics: A Gendered Sense of Place: Cressida Miles. 5. Let's All Have a Disco? Football, Popular Music and Democratisation: Adam Brown. 6. Rave Culture: Living Dream or Living Death?: Simon Reynolds. 7. Fear and Lothing in Wisconsin: Sarah Champion. 8. The House Sound of Chicago: Hillegonda Rietveld. 9. Cocaine Girls: Marek Kohn. 10. In the Supermarket of Style: Ted Polhemus. 11. Love Factory: The Sites, Practices and Media Relationships of Northern Soul: Kate Milestone. 12. DJ Culture: Dave Haslam. Plates: Patrick Henry. Part III: Theory II: . 13. The Post-Subculturalist: David Muggleton. 14. Reading Pop: The Press, the Scholar and the Consequences of Popular Cultural Studies: Steve Jones. 15. Re-placing Popular Culture: Lawrence Grossberg. Index.
Resumo:
Network Jamming systems provide real-time collaborative media performance experiences for novice or inexperienced users. In this paper we will outline the theoretical and developmental drivers for our Network Jamming software, called jam2jam. jam2jam employs generative algorithmic techniques with particular implications for accessibility and learning. We will describe how theories of engagement have directed the design and development of jam2jam and show how iterative testing cycles in numerous international sites have informed the evolution of the system and its educational potential. Generative media systems present an opportunity for users to leverage computational systems to make sense of complex media forms through interactive and collaborative experiences. Generative music and art are a relatively new phenomenon that use procedural invention as a creative technique to produce music and visual media. These kinds of systems present a range of affordances that can facilitate new kinds of relationships with music and media performance and production. Early systems have demonstrated the potential to provide access to collaborative ensemble experiences to users with little formal musical or artistic expertise.This presentation examines the educational affordances of these systems evidenced by field data drawn from the Network Jamming Project. These generative performance systems enable access to a unique kind of music/media’ ensemble performance with very little musical/ media knowledge or skill and they further offer the possibility of unique interactive relationships with artists and creative knowledge through collaborative performance. Through the process of observing, documenting and analysing young people interacting with the generative media software jam2jam a theory of meaningful engagement has emerged from the need to describe and codify how users experience creative engagement with music/media performance and the locations of meaning. In this research we observed that the musical metaphors and practices of ‘ensemble’ or collaborative performance and improvisation as a creative process for experienced musicians can be made available to novice users. The relational meanings of these musical practices afford access to high level personal, social and cultural experiences. Within the creative process of collaborative improvisation lie a series of modes of creative engagement that move from appreciation through exploration, selection, direction toward embodiment. The expressive sounds and visions made in real-time by improvisers collaborating are immediate and compelling. Generative media systems let novices access these experiences with simple interfaces that allow them to make highly professional and expressive sonic and visual content simply by using gestures and being attentive and perceptive to their collaborators. These kinds of experiences present the potential for highly complex expressive interactions with sound and media as a performance. Evidence that has emerged from this research suggest that collaborative performance with generative media is transformative and meaningful. In this presentation we draw out these ideas around an emerging theory of meaningful engagement that has evolved from the development of network jamming software. Primarily we focus on demonstrating how these experiences might lead to understandings that may be of educational and social benefit.
Resumo:
Polarising the issue of governance is the increasingly acknowledged role of airports in regional economic development, both as significant sources of direct employment and as attractants of commerce through enhanced mobility (Vickerman, Spiekermann & Wegener 1999; Hakfoort, Poot & Rietveld 2001). Most airports were once considered spatially removed from their cities, but as cities have expanded their airports no longer sit distinct of the urban environment. This newfound spatial proximity means that decisions for land use and development on either city or airport land are likely to have impacts that affect one another in either or both the short- or long-term (Stevens, Baker and Freestone 2007). These impacts increase the demand for decision making to find ways of integrating strategies for future development to ensure that airport developments do not impede the sustainable growth of its city, and likewise that city developments do not impede the sustainable growth of its airport (Gillen 2006). However questions of how, under what conditions, and to what extent decision making integration might be suitable for “airport regions” are yet to be explored let alone answered.
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.
Resumo:
This book is designed with undergraduate university students in mind, with the aim of teaching you the importance of being an effective communicator.
Resumo:
LIKE much of the work that David Williamson is known for, Let the Sunshine concentrates on tensions between characters who operate mainly as mouthpieces for opposing ideologies. Left-wing documentary-maker Toby and his wife Ros have moved to Noosa to escape the rat race in Sydney and some bad press surrounding one of Toby's projects. Trying to make social connections in town, Ros has reconnected with high school classmate Natasha, now the cosmetically-enhanced wife of wealthy right-wing property developer Ron. The posturing and conflict between Toby and Ron come to a head when the women invite their grown children -- struggling songwriter Rick and stressed corporate lawyer Emma -- to dinner to celebrate Toby's birthday, and the results of this encounter drive the rest of the plot. The scenario of Let the Sunshine is contrived, the characters are stereotyped, and their conflicts are little more than an old clash of ideologies cast loosely across the mainstream news media's characterisation of the sides in debates about development, climate change and the economic crisis.