50 resultados para anomalies

em Queensland University of Technology - ePrints Archive


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Discusses two aspects of Hong Kong law: 1) the judgment of the Hong Kong Court of Final Appeal in A Solicitor v The Law Society of Hong Kong on whether Hong Kong courts were bound, post-1997, by pre-1997 House of Lords or Privy Council decisions, by pre-1997 decisions of their own, or by post-1997 overseas decisions from any jurisdiction; and 2) the need for clarification in the Hong Kong Companies Ordinance of whether a company can have a single legal representative, the ultra vires rule and the duties of company directors

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We describe research into the identification of anomalous events and event patterns as manifested in computer system logs. Prototype software has been developed with a capability that identifies anomalous events based on usage patterns or user profiles, and alerts administrators when such events are identified. To reduce the number of false positive alerts we have investigated the use of different user profile training techniques and introduce the use of abstractions to group together applications which are related. Our results suggest that the number of false alerts that are generated is significantly reduced when a growing time window is used for user profile training and when abstraction into groups of applications is used.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The increasingly widespread use of large-scale 3D virtual environments has translated into an increasing effort required from designers, developers and testers. While considerable research has been conducted into assisting the design of virtual world content and mechanics, to date, only limited contributions have been made regarding the automatic testing of the underpinning graphics software and hardware. In the work presented in this paper, two novel neural network-based approaches are presented to predict the correct visualization of 3D content. Multilayer perceptrons and self-organizing maps are trained to learn the normal geometric and color appearance of objects from validated frames and then used to detect novel or anomalous renderings in new images. Our approach is general, for the appearance of the object is learned rather than explicitly represented. Experiments were conducted on a game engine to determine the applicability and effectiveness of our algorithms. The results show that the neural network technology can be effectively used to address the problem of automatic and reliable visual testing of 3D virtual environments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research investigated the visual demands in modern primary school classrooms and also the impact of common refractive anomalies on a child's ability to perform academic-related tasks. The results showed that relatively high levels of visual acuity, contrast demand and sustained accommodative-convergence are required to perform optimally in the modern classroom environment. It was also demonstrated that relatively low magnitudes of uncorrected refractive error may have a detrimental impact on children's ability to perform academic-related activities at school, with sustained near work further exacerbating this effect. These findings have important implications for both eye care practitioners and education authorities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We show that the well-known Kohn anomaly predicts Tc for ordered AlB2-type structures. We use ab initio Density Functional Theory to calculate phonon dispersions for Mg1-xAlxB2 compositions and identify a phonon anomaly with magnitude that predicts experimental values of Tc for all x. Key features of these anomalies correlate with the electronic structure of Mg1-xAlxB2. This approach predicts Tc for other known AlB2-type structures as well as new compositions. We predict that Mg0.5Ba0.5B2 will show Tc = 63.6 ± 6.6 K. Other forms of the Mg1-xBaxB2 series will also be superconductors when successfully synthesised. Our calculations predict that the end-member composition, BaB2, is likely to show a Tc significantly higher than currently achieved by other diborides although an applied pressure ~16 GPa may be required to stabilise the structure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Community awareness and the perception on the traffic noise related health impacts have increased significantly over the last decade resulting in a large volume of public inquiries flowing to Road Authorities for planning advice. Traffic noise management in the urban environment is therefore becoming a “social obligation”, essentially due to noise related health concerns. Although various aspects of urban noise pollution and mitigation have been researched independently, an integrated approach by stakeholders has not been attempted. Although the current treatment and mitigation strategies are predominantly handled by the Road Agencies, a concerted effort by all stakeholders is becoming mandatory for effective and tangible outcomes in the future. A research project is underway a RMIT University, Australia, led by the second author to consider the use of “hedonic pricing” for alternative noise amelioration treatments within the road reserve and outside the road reserve. The project aims to foster a full range noise abatement strategy encompassing source, path and noise receiver. The benefit of such a study would be to mitigate the problem where it is most effective and would defuse traditional “authority” boundaries to produce the optimum outcome. The project is conducted in collaboration with the Department of Main Roads Queensland, Australia and funded by the CRC for Construction Innovation. As part of this study, a comprehensive literature search is currently underway to investigate the advancements in community health research, related to environmental noise pollution, and the advancements in technical and engineering research in mitigating the issue. This paper presents the outcomes of this work outlining state of the art, national and international good practices and gap analysis to identify major anomalies and developments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Much has been written on Off-site Manufacture (OSM) in construction, particularly regarding the perceived benefits and barriers to implementation. However, very little understanding of the state of OSM in the Australian construction industry exists. A ‘scoping study' has recently been undertaken to determine the ‘state-of-the-art’ of OSM in Australia. This involved several industry workshops, interviews and case studies across four major states of Australia. The study surveyed a range of suppliers across the construction supply-chain, incorporating the civil, commercial and housing segments of the market. This revealed that skills shortages and lack of adequate OSM knowledge are generally the greatest issues facing OSM in Australia. The drivers and constraints that emerged from the research were, in large measure, consistent with those found in the US and UK, although some Australian anomalies are evident, such as the geographical disparity of markets. A comparative analysis with similar studies in the UK and US is reported, illustrating both the drivers and constraints confronting the industry in Australia. OSM uptake into the future is however dependent on many factors, not least of which is a better understanding of the construction process and its associated costs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This report focuses on our examination of extant data which have been sourced with respect to self-harm and suicide in Australia. Moreover, specific areas of concern regarding elevated rates of suicide for rural males and data anomalies which emerged during our examination of these data are discussed. Additional commentary resulting from exploration, examination and analyses of secondary data is published online in complementary reports in this series.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study is the first to investigate the effect of prolonged reading on reading performance and visual functions in students with low vision. The study focuses on one of the most common modes of achieving adequate magnification for reading by students with low vision, their close reading distance (proximal or relative distance magnification). Close reading distances impose high demands on near visual functions, such as accommodation and convergence. Previous research on accommodation in children with low vision shows that their accommodative responses are reduced compared to normal vision. In addition, there is an increased lag of accommodation for higher stimulus levels as may occur at close reading distance. Reduced accommodative responses in low vision and higher lag of accommodation at close reading distances together could impact on reading performance of students with low vision especially during prolonged reading tasks. The presence of convergence anomalies could further affect reading performance. Therefore, the aims of the present study were 1) To investigate the effect of prolonged reading on reading performance in students with low vision 2) To investigate the effect of prolonged reading on visual functions in students with low vision. This study was conducted as cross-sectional research on 42 students with low vision and a comparison group of 20 students with normal vision, aged 7 to 20 years. The students with low vision had vision impairments arising from a range of causes and represented a typical group of students with low vision, with no significant developmental delays, attending school in Brisbane, Australia. All participants underwent a battery of clinical tests before and after a prolonged reading task. An initial reading-specific history and pre-task measurements that included Bailey-Lovie distance and near visual acuities, Pelli-Robson contrast sensitivity, ocular deviations, sensory fusion, ocular motility, near point of accommodation (pull-away method), accuracy of accommodation (Monocular Estimation Method (MEM)) retinoscopy and Near Point of Convergence (NPC) (push-up method) were recorded for all participants. Reading performance measures were Maximum Oral Reading Rates (MORR), Near Text Visual Acuity (NTVA) and acuity reserves using Bailey-Lovie text charts. Symptoms of visual fatigue were assessed using the Convergence Insufficiency Symptom Survey (CISS) for all participants. Pre-task measurements of reading performance and accuracy of accommodation and NPC were compared with post-task measurements, to test for any effects of prolonged reading. The prolonged reading task involved reading a storybook silently for at least 30 minutes. The task was controlled for print size, contrast, difficulty level and content of the reading material. Silent Reading Rate (SRR) was recorded every 2 minutes during prolonged reading. Symptom scores and visual fatigue scores were also obtained for all participants. A visual fatigue analogue scale (VAS) was used to assess visual fatigue during the task, once at the beginning, once at the middle and once at the end of the task. In addition to the subjective assessments of visual fatigue, tonic accommodation was monitored using a photorefractor (PlusoptiX CR03™) every 6 minutes during the task, as an objective assessment of visual fatigue. Reading measures were done at the habitual reading distance of students with low vision and at 25 cms for students with normal vision. The initial history showed that the students with low vision read for significantly shorter periods at home compared to the students with normal vision. The working distances of participants with low vision ranged from 3-25 cms and half of them were not using any optical devices for magnification. Nearly half of the participants with low vision were able to resolve 8-point print (1M) at 25 cms. Half of the participants in the low vision group had ocular deviations and suppression at near. Reading rates were significantly reduced in students with low vision compared to those of students with normal vision. In addition, there were a significantly larger number of participants in the low vision group who could not sustain the 30-minute task compared to the normal vision group. However, there were no significant changes in reading rates during or following prolonged reading in either the low vision or normal vision groups. Individual changes in reading rates were independent of their baseline reading rates, indicating that the changes in reading rates during prolonged reading cannot be predicted from a typical clinical assessment of reading using brief reading tasks. Contrary to previous reports the silent reading rates of the students with low vision were significantly lower than their oral reading rates, although oral and silent reading was assessed using different methods. Although the visual acuity, contrast sensitivity, near point of convergence and accuracy of accommodation were significantly poorer for the low vision group compared to those of the normal vision group, there were no significant changes in any of these visual functions following prolonged reading in either group. Interestingly, a few students with low vision (n =10) were found to be reading at a distance closer than their near point of accommodation. This suggests a decreased sensitivity to blur. Further evaluation revealed that the equivalent intrinsic refractive errors (an estimate of the spherical dioptirc defocus which would be expected to yield a patient’s visual acuity in normal subjects) were significantly larger for the low vision group compared to those of the normal vision group. As expected, accommodative responses were significantly reduced for the low vision group compared to the expected norms, which is consistent with their close reading distances, reduced visual acuity and contrast sensitivity. For those in the low vision group who had an accommodative error exceeding their equivalent intrinsic refractive errors, a significant decrease in MORR was found following prolonged reading. The silent reading rates however were not significantly affected by accommodative errors in the present study. Suppression also had a significant impact on the changes in reading rates during prolonged reading. The participants who did not have suppression at near showed significant decreases in silent reading rates during and following prolonged reading. This impact of binocular vision at near on prolonged reading was possibly due to the high demands on convergence. The significant predictors of MORR in the low vision group were age, NTVA, reading interest and reading comprehension, accounting for 61.7% of the variances in MORR. SRR was not significantly influenced by any factors, except for the duration of the reading task sustained; participants with higher reading rates were able to sustain a longer reading duration. In students with normal vision, age was the only predictor of MORR. Participants with low vision also reported significantly greater visual fatigue compared to the normal vision group. Measures of tonic accommodation however were little influenced by visual fatigue in the present study. Visual fatigue analogue scores were found to be significantly associated with reading rates in students with low vision and normal vision. However, the patterns of association between visual fatigue and reading rates were different for SRR and MORR. The participants with low vision with higher symptom scores had lower SRRs and participants with higher visual fatigue had lower MORRs. As hypothesized, visual functions such as accuracy of accommodation and convergence did have an impact on prolonged reading in students with low vision, for students whose accommodative errors were greater than their equivalent intrinsic refractive errors, and for those who did not suppress one eye. Those students with low vision who have accommodative errors higher than their equivalent intrinsic refractive errors might significantly benefit from reading glasses. Similarly, considering prisms or occlusion for those without suppression might reduce the convergence demands in these students while using their close reading distances. The impact of these prescriptions on reading rates, reading interest and visual fatigue is an area of promising future research. Most importantly, it is evident from the present study that a combination of factors such as accommodative errors, near point of convergence and suppression should be considered when prescribing reading devices for students with low vision. Considering these factors would also assist rehabilitation specialists in identifying those students who are likely to experience difficulty in prolonged reading, which is otherwise not reflected during typical clinical reading assessments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The management of congenital talipes equinovarus (TEV) has received much clinical and research attention within the disciplines of medicine and physiotherapy. However, few articles have been published about the role of the registered nurse in contributing to the optimum health and wellbeing of the child and family presenting for assessment and treatment of the condition. Much of the most intense treatment for TEV occurs in the first few weeks of the child’s life; a time of critical growth and development when the infant is both sensitive and vulnerable to the environment within which it is nurtured. This is also a crucial time for developing a secure attachment to the caregiver and nurses can assist parents in optimising their infant’s opportunities for a secure attachment relationship. This paper thus provides an overview of the medical and physiotherapy management of TEV and highlights the role nurses have in providing nursing care and psycho-social support to parents of infants with TEV, in areas such as the maintenance of skin integrity and circulation, providing effective pain relief, and optimising growth, development, and a secure attachment relationship. Congenital TEV or 'club foot' is one of the most common congenital orthopaedic anomalies of infants. In Queensland in 2000, in approximately 50,000 births, 244 infants were born with talipes; almost five infants per 1000 births. National statistics are not as specific, with coding providing only 'other lower limb' as the category that would encompass talipes; the 1997 national incidence of such lower limb congenital malformations is reported as 1.7 per 10,000 births 1.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Today’s evolving networks are experiencing a large number of different attacks ranging from system break-ins, infection from automatic attack tools such as worms, viruses, trojan horses and denial of service (DoS). One important aspect of such attacks is that they are often indiscriminate and target Internet addresses without regard to whether they are bona fide allocated or not. Due to the absence of any advertised host services the traffic observed on unused IP addresses is by definition unsolicited and likely to be either opportunistic or malicious. The analysis of large repositories of such traffic can be used to extract useful information about both ongoing and new attack patterns and unearth unusual attack behaviors. However, such an analysis is difficult due to the size and nature of the collected traffic on unused address spaces. In this dissertation, we present a network traffic analysis technique which uses traffic collected from unused address spaces and relies on the statistical properties of the collected traffic, in order to accurately and quickly detect new and ongoing network anomalies. Detection of network anomalies is based on the concept that an anomalous activity usually transforms the network parameters in such a way that their statistical properties no longer remain constant, resulting in abrupt changes. In this dissertation, we use sequential analysis techniques to identify changes in the behavior of network traffic targeting unused address spaces to unveil both ongoing and new attack patterns. Specifically, we have developed a dynamic sliding window based non-parametric cumulative sum change detection techniques for identification of changes in network traffic. Furthermore we have introduced dynamic thresholds to detect changes in network traffic behavior and also detect when a particular change has ended. Experimental results are presented that demonstrate the operational effectiveness and efficiency of the proposed approach, using both synthetically generated datasets and real network traces collected from a dedicated block of unused IP addresses.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Rare earth element geochemistry in carbonate rocks is utilized increasingly for studying both modern oceans and palaeoceanography, with additional applications for investigating water–rock interactions in groundwater and carbonate diagenesis. However, the study of rare earth element geochemistry in ancient rocks requires the preservation of their distribution patterns through subsequent diagenesis. The subjects of this study, Pleistocene scleractinian coral skeletons from Windley Key, Florida, have undergone partial to complete neomorphism from aragonite to calcite in a meteoric setting; they allow direct comparison of rare earth element distributions in original coral skeleton and in neomorphic calcite. Neomorphism occurred in a vadose setting along a thin film, with degradation of organic matter playing an initial role in controlling the morphology of the diagenetic front. As expected, minor element concentrations vary significantly between skeletal aragonite and neomorphic calcite, with Sr, Ba and U decreasing in concentration and Mn increasing in concentration in the calcite, suggesting that neomorphism took place in an open system. However, rare earth elements were largely retained during neomorphism, with precipitating cements taking up excess rare earth elements released from dissolved carbonates from higher in the karst system. Preserved rare earth element patterns in the stabilized calcite closely reflect the original rare earth element patterns of the corals and associated reef carbonates. However, minor increases in light rare earth element depletion and negative Ce anomalies may reflect shallow oxidized groundwater processes, whereas decreasing light rare earth element depletion may reflect mixing of rare earth elements from associated microbialites or contamination from insoluble residues. Regardless of these minor disturbances, the results indicate that rare earth elements, unlike many minor elements, behave very conservatively during meteoric diagenesis. As the meteoric transformation of aragonite to calcite is a near worst case scenario for survival of original marine trace element distributions, this study suggests that original rare earth element patterns may commonly be preserved in ancient limestones, thus providing support for the use of ancient marine limestones as proxies for marine rare earth element geochemistry.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Workflow nets, a particular class of Petri nets, have become one of the standard ways to model and analyze workflows. Typically, they are used as an abstraction of the workflow that is used to check the so-called soundness property. This property guarantees the absence of livelocks, deadlocks, and other anomalies that can be detected without domain knowledge. Several authors have proposed alternative notions of soundness and have suggested to use more expressive languages, e.g., models with cancellations or priorities. This paper provides an overview of the different notions of soundness and investigates these in the presence of different extensions of workflow nets.We will show that the eight soundness notions described in the literature are decidable for workflow nets. However, most extensions will make all of these notions undecidable. These new results show the theoretical limits of workflow verification. Moreover, we discuss some of the analysis approaches described in the literature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose: Important performance objectives manufacturers sought can be achieved through adopting the appropriate manufacturing practices. This paper presents a conceptual model proposing relationship between advanced quality practices, perceived manufacturing difficulties and manufacturing performances. Design/methodology/approach: A survey-based approach was adopted to test the hypotheses proposed in this study. The selection of research instruments for inclusion in this survey was based on literature review, the pilot case studies and relevant industrial experience of the author. A sample of 1000 manufacturers across Australia was randomly selected. Quality managers were requested to complete the questionnaire, as the task of dealing with the quality and reliability issues is a quality manager’s major responsibility. Findings: Evidence indicates that product quality and reliability is the main competitive factor for manufacturers. Design and manufacturing capability and on time delivery came second. Price is considered as the least important factor for the Australian manufacturers. Results show that collectively the advanced quality practices proposed in this study neutralize the difficulties manufacturers face and contribute to the most performance objectives of the manufacturers. The companies who have put more emphasize on the advanced quality practices have less problem in manufacturing and better performance in most manufacturing performance indices. The results validate the proposed conceptual model and lend credence to hypothesis that proposed relationship between quality practices, manufacturing difficulties and manufacturing performances. Practical implications: The model shown in this paper provides a simple yet highly effective approach to achieving significant improvements in product quality and manufacturing performance. This study introduces a relationship based ‘proactive’ quality management approach and provides great potential for managers and engineers to adopt the model in a wide range of manufacturing organisations. Originality/value: Traditional ways of checking product quality are different types of testing, inspection and screening out bad products after manufacturing them. In today’s manufacturing where product life cycle is very short, it is necessary to focus on not to manufacturing them first rather than screening out the bad ones. This study introduces, for the first time, the idea of relationship based advanced quality practices (AQP) and suggests AQPs will enable manufacturers to develop reliable products and minimize the manufacturing anomalies. This paper explores some of the attributes of AQP capable of reducing manufacturing difficulties and improving manufacturing performances. The proposed conceptual model contributes to the existing knowledge base of quality practices and subsequently provides impetus and guidance towards increasing manufacturing performance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.