114 resultados para NEOTROPICAL STREAMS
em Queensland University of Technology - ePrints Archive
Resumo:
The eastern Australian rainforests have experienced several cycles of range contraction and expansion since the late Miocene that are closely correlated with global glaciation events. Together with ongoing aridification of the continent, this has resulted in current distributions of native closed forest that are highly fragmented along the east coast. Several closed forest endemic taxa exhibit patterns of population genetic structure that are congruent with historical isolation of populations in discrete refugia and reflect evolutionary histories dramatically affected by vicariance. Currently, limited data are available regarding the impact of these past climatic fluctuations on freshwater invertebrate taxa. The non-biting midge species Echinocladius martini Cranston is distributed along the east coast and inhabits predominantly montane streams in closed forest habitat. Phylogeographic structure in E. martini was resolved here at a continental scale by incorporating data from a previous pilot study and expanding the sampling design to encompass populations in the Wet Tropics of north-eastern Queensland, south-east Queensland, New South Wales and Victoria. Patterns of phylogeographic structure revealed several deeply divergent mitochondrial lineages from central and south-eastern Australia that were previously unrecognised and were geographically endemic to closed forest refugia. Estimated divergence times were congruent with late Miocene onset of rainforest contractions across the east coast of Australia. This suggested that dispersal and gene flow among E. martini populations isolated in refugia has been highly restricted historically. Moreover, these data imply, in contrast to existing preconceptions about freshwater invertebrates, that this taxon may be acutely susceptible to habitat fragmentation.
Resumo:
We first classify the state-of-the-art stream authentication problem in the multicast environment and group them into Signing and MAC approaches. A new approach for authenticating digital streams using Threshold Techniques is introduced. The new approach main advantages are in tolerating packet loss, up to a threshold number, and having a minimum space overhead. It is most suitable for multicast applications running over lossy, unreliable communication channels while, in same time, are pertain the security requirements. We use linear equations based on Lagrange polynomial interpolation and Combinatorial Design methods.
Resumo:
This paper presents a single pass algorithm for mining discriminative Itemsets in data streams using a novel data structure and the tilted-time window model. Discriminative Itemsets are defined as Itemsets that are frequent in one data stream and their frequency in that stream is much higher than the rest of the streams in the dataset. In order to deal with the data structure size, we propose a pruning process that results in the compact tree structure containing discriminative Itemsets. Empirical analysis shows the sound time and space complexity of the proposed method.
Resumo:
Barbadocladius n. gen. is erected and described in larval, pupal and adult stages for two species: B. andinus sp. nov. and B. limay sp. nov., from Andean streams. The larva is distinctive by virtue of the very large ventromental 'beard' and the anterior parapods with a 'sleeve' of hooklets in addition to apical pectinate claws. The pupa has hooklets on some tergal and sternal intersegmental membranes. The adult, reported only in teneral specimens has hairy eyes, no antennal apical strong seta, no acrostichals, bare and unmarked wings, cylindrical 4th tarsomere subequal in length to the 5th, pulvilli about half the claw length, and hypopygium with anal point, lacking a virga. Molecular phylogenetic analysis eliminates relationships directly to the Eukiefferiella complex (which also have pupal hooklets), or to the Cricotopus group (adults also with hairy eyes), suggesting instead a sister group relationship to a suite of predominantly austral genera of Orthocladiinae.
Resumo:
Existing business process drift detection methods do not work with event streams. As such, they are designed to detect inter-trace drifts only, i.e. drifts that occur between complete process executions (traces), as recorded in event logs. However, process drift may also occur during the execution of a process, and may impact ongoing executions. Existing methods either do not detect such intra-trace drifts, or detect them with a long delay. Moreover, they do not perform well with unpredictable processes, i.e. processes whose logs exhibit a high number of distinct executions to the total number of executions. We address these two issues by proposing a fully automated and scalable method for online detection of process drift from event streams. We perform statistical tests over distributions of behavioral relations between events, as observed in two adjacent windows of adaptive size, sliding along with the stream. An extensive evaluation on synthetic and real-life logs shows that our method is fast and accurate in the detection of typical change patterns, and performs significantly better than the state of the art.
Resumo:
The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.
Resumo:
Amphibian is an 10’00’’ musical work which explores new musical interfaces and approaches to hybridising performance practices from the popular music, electronic dance music and computer music traditions. The work is designed to be presented in a range of contexts associated with the electro-acoustic, popular and classical music traditions. The work is for two performers using two synchronised laptops, an electric guitar and a custom designed gestural interface for vocal performers - the e-Mic (Extended Mic-stand Interface Controller). This interface was developed by one of the co-authors, Donna Hewitt. The e-Mic allows a vocal performer to manipulate the voice in real time through the capture of physical gestures via an array of sensors - pressure, distance, tilt - along with ribbon controllers and an X-Y joystick microphone mount. Performance data are then sent to a computer, running audio-processing software, which is used to transform the audio signal from the microphone. In this work, data is also exchanged between performers via a local wireless network, allowing performers to work with shared data streams. The duo employs the gestural conventions of guitarist and singer (i.e. 'a band' in a popular music context), but transform these sounds and gestures into new digital music. The gestural language of popular music is deliberately subverted and taken into a new context. The piece thus explores the nexus between the sonic and performative practices of electro acoustic music and intelligent electronic dance music (‘idm’). This work was situated in the research fields of new musical interfacing, interaction design, experimental music composition and performance. The contexts in which the research was conducted were live musical performance and studio music production. The work investigated new methods for musical interfacing, performance data mapping, hybrid performance and compositional practices in electronic music. The research methodology was practice-led. New insights were gained from the iterative experimental workshopping of gestural inputs, musical data mapping, inter-performer data exchange, software patch design, data and audio processing chains. In respect of interfacing, there were innovations in the design and implementation of a novel sensor-based gestural interface for singers, the e-Mic, one of the only existing gestural controllers for singers. This work explored the compositional potential of sharing real time performance data between performers and deployed novel methods for inter-performer data exchange and mapping. As regards stylistic and performance innovation, the work explored and demonstrated an approach to the hybridisation of the gestural and sonic language of popular music with recent ‘post-digital’ approaches to laptop based experimental music The development of the work was supported by an Australia Council Grant. Research findings have been disseminated via a range of international conference publications, recordings, radio interviews (ABC Classic FM), broadcasts, and performances at international events and festivals. The work was curated into the major Australian international festival, Liquid Architecture, and was selected by an international music jury (through blind peer review) for presentation at the International Computer Music Conference in Belfast, N. Ireland.
Resumo:
Wynne and Schaffer (2003) have highlighted both the strong growth of gambling activity in recent years, and the revenue streams this has generated for governments and communities. Gambling activities and the revenues derived from them have, unsurprisingly, therefore also been seen as a way in which to increase economic development in deprived areas (Jinkner-Lloyd, 1996). Consequently, according to Brown et al (2003), gambling is now a large taxation revenue earner for many western governments, at both federal and state levels, worldwide (for example UK, USA, Australia). In size and importance, the Australian gambling industry in particular has grown significantly over the last three decades, experiencing a fourfold increase in real gambling turnover. There are, however, also concerns expressed about gambling and Electronic Gaming in particular, as illustrated in economic, social and ethical terms in Oddo (1997). There are also spatial aspects to understanding these issues. Marshall’s (1998) study, for example, highlights that benefits from gambling are more likely to accrue at the macro as opposed to the local level, because of centralised tax gathering and spending of tax revenues, whilst localities may suffer from displacement of activities with higher multipliers than the institutions with EGMs that replace them. This also highlights a regional context of costs, where benefits accrue to the centre, but the costs accrue to the regions and localities, as simultaneously resources leave those communities through both the gambling activities themselves (in the form of revenue for the EGM owners), and the government (through taxes).
Resumo:
This is the final report of research project 2002-057-C: Enabling Team Collaboration with Pervasive and Mobile Computing. The research project was carried out by the Australian Cooperative Research Centre for Construction Innovation and has two streams that consider the use of pervasive computing technologies in two different contexts. The first context was the on-site deployment of mobile computing devices, where as the second context was the use and development of intelligent rooms based on sensed environments and new human-computer interfaces (HCI) for collaboration in the design office. The two streams present a model of team collaboration that relies on continues communication to people and information to reduce information leakage. This report consists of five sections: (1) Introduction; (2) Research Project Background; (3) Project Implementation; (4) Case Studies and Outcomes; and (5) Conclusion and Recommendation. Introduction in Section 1 presents a brief description of the research project including general research objectives and structure. Section 2 introduces the background of the research and detailed information regarding project participants, objectives and significance, and also research methodology. Review of all research activities such as literature review and case studies are summarised in Project Implementation in Section 3. Following this, in Section 4 the report then focuses on analysing the case studies and presents their outcomes. Conclusion and recommendation of the research project are summarised in Section 5. Other information to support the content of the report such as research project schedule is provided in Appendices. The purpose of the final project report is to provide industry partners with detailed information on the project activities and methodology such as the implementation of pervasive computing technologies in the real contexts. The report summarises the outcomes of the case studies and provides necessary recommendation to industry partners of using new technologies to support better project collaboration.
Resumo:
This paper reports on an empirically based study of the Queensland (Australia) health and fitness industry over 15 years (1993 -2008). This study traces the development of the new occupation of fitness instructor in a service industry which has evolved si nce the 1980s and is embedded in values of consumption and individualism. It is the new world of work. The data from the 1993 study was historically significant, capturing the conditions o f employment in an unregulated setting prior to the introduction of the first industrial a ward in that industry in 1994. Fitness workers bargained directly with employers over all a spects of the employment relationship without the constraints of industrial regulation or the presence of trade unions. The substantive outcomes of the employment relationship were a direct reflection of m anagerial prerogative and worker orientation and preference, and did not reflect the rewards and outcomes traditionally found in Australian workplaces. While the focus of the 1993 research was on exploring the employment relationship in a deregulated environment, an unusual phenomenon was identified: fitness workers happily trading-off what would be considere d standard working conditions for the opportunity to work (‘take the stage’). Since then, several streams of literature have evolved providing a new context for understanding this phenomenon in the fitness industry, including: the sociology of the body (Shilling 1993; Turner 1996); emotional (Hochschild 1984) and aesthetic labour (Warhurst et al 2000); the so cial relations of production and space (Lefebvre 1991; Moss 1995); body history (Helps 2007); the sociology of consumption (Saunders 1988; Baudrillard 1998; Ritzer 2004); and work identity (Du Gay 1996; Strangleman 2004). The 2008 survey instrument replicated the 1993 study but was additionally informed b y the new literature. Surveys were sent to 310 commercial fitness centres and 4,800 fitness workers across Queensland. Worker orientation appears unchanged, and industry working conditions still seem atypical despite regulation si nce 1994. We argue that for many fitness workers the goal is to gain access to the fitness centre economy. For this they are willing to trade-off standard conditions of employment, and exchange traditional employm ent rewards for m ore intrinsic psycho-social rewards gained the through e xp o sure of their physical capital (Bourdieu 1984) o r bo dily prowess to the adoration o f their gazing clients. Building on the tradition of emotional labour and aesthetic labour, this study introduces the concept of ocularcentric labour: a state in which labour’s quest for the psychosocial rewards gained from their own body image shapes the employment relationship. With ocularcentric labour the p sycho-social rewards have greater value for the worker than ‘hard’, core conditions of employment, and are a significant factor in bargaining and outcomes, often substituting fo r direct earnings. The wo rkforce profile (young, female, casual) and their expectations (psycho-social rewards of ado ration and celebrity) challenge traditional trade unions in terms of what they can deliver, given the fitness workers’ willingness to trade-off minimum conditions, hard-won by unions.
Resumo:
In recent decades, concepts and ideas from James J. Gibson’s theory of direct perception in ecological psychology have been applied to the study of how perception and action regulate sport performance. This article examines the influence of different streams of thought in ecological psychology for studying cognition and action in the diverse behavioural contexts of sport and exercise. In discussing the origins of ecological psychology it can be concluded that psychologists such as Lewin, and to some extent Heider, provided the initial impetus for the development of key ideas. We argue that the papers in this special issue clarify that the different schools of thinking in ecological psychology have much to contribute to theoretical and practical developments in sport and exercise psychology. For example, Gibson emphasized and formalized how the individual is coupled with the environment; Brunswik raised the issue of the ontology of probability in human behaviour and the problem of representative design for experimental task constraints; Barker looked carefully into extra-individual behavioural contexts and Bronfenbrenner presented insights pertinent to the relations between behaviour contexts, and macro influences on behaviour. In this overview, we highlight essential issues from the main schools of thought of relevance to the contexts of sport and exercise, and we consider some potential theoretical linkages with dynamical systems theory.
Resumo:
It is a big challenge to clearly identify the boundary between positive and negative streams. Several attempts have used negative feedback to solve this challenge; however, there are two issues for using negative relevance feedback to improve the effectiveness of information filtering. The first one is how to select constructive negative samples in order to reduce the space of negative documents. The second issue is how to decide noisy extracted features that should be updated based on the selected negative samples. This paper proposes a pattern mining based approach to select some offenders from the negative documents, where an offender can be used to reduce the side effects of noisy features. It also classifies extracted features (i.e., terms) into three categories: positive specific terms, general terms, and negative specific terms. In this way, multiple revising strategies can be used to update extracted features. An iterative learning algorithm is also proposed to implement this approach on RCV1, and substantial experiments show that the proposed approach achieves encouraging performance.
Resumo:
An information filtering (IF) system monitors an incoming document stream to find the documents that match the information needs specified by the user profiles. To learn to use the user profiles effectively is one of the most challenging tasks when developing an IF system. With the document selection criteria better defined based on the users’ needs, filtering large streams of information can be more efficient and effective. To learn the user profiles, term-based approaches have been widely used in the IF community because of their simplicity and directness. Term-based approaches are relatively well established. However, these approaches have problems when dealing with polysemy and synonymy, which often lead to an information overload problem. Recently, pattern-based approaches (or Pattern Taxonomy Models (PTM) [160]) have been proposed for IF by the data mining community. These approaches are better at capturing sematic information and have shown encouraging results for improving the effectiveness of the IF system. On the other hand, pattern discovery from large data streams is not computationally efficient. Also, these approaches had to deal with low frequency pattern issues. The measures used by the data mining technique (for example, “support” and “confidences”) to learn the profile have turned out to be not suitable for filtering. They can lead to a mismatch problem. This thesis uses the rough set-based reasoning (term-based) and pattern mining approach as a unified framework for information filtering to overcome the aforementioned problems. This system consists of two stages - topic filtering and pattern mining stages. The topic filtering stage is intended to minimize information overloading by filtering out the most likely irrelevant information based on the user profiles. A novel user-profiles learning method and a theoretical model of the threshold setting have been developed by using rough set decision theory. The second stage (pattern mining) aims at solving the problem of the information mismatch. This stage is precision-oriented. A new document-ranking function has been derived by exploiting the patterns in the pattern taxonomy. The most likely relevant documents were assigned higher scores by the ranking function. Because there is a relatively small amount of documents left after the first stage, the computational cost is markedly reduced; at the same time, pattern discoveries yield more accurate results. The overall performance of the system was improved significantly. The new two-stage information filtering model has been evaluated by extensive experiments. Tests were based on the well-known IR bench-marking processes, using the latest version of the Reuters dataset, namely, the Reuters Corpus Volume 1 (RCV1). The performance of the new two-stage model was compared with both the term-based and data mining-based IF models. The results demonstrate that the proposed information filtering system outperforms significantly the other IF systems, such as the traditional Rocchio IF model, the state-of-the-art term-based models, including the BM25, Support Vector Machines (SVM), and Pattern Taxonomy Model (PTM).