260 resultados para complex script

em Queensland University of Technology - ePrints Archive


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Much of the research on the delivery of advice by professionals such as physicians, health workers and counsellors, both on the telephone and in face to face interaction more generally, has focused on the theme of client resistance and the consequent need for professionals to adopt particular formats to assist in the uptake of the advice. In this paper we consider one setting, Kid’s Helpline, the national Australian counselling service for children and young people, where there is an institutional mandate not to give explicit advice in accordance with the values of self-direction and empowerment. The paper examines one practice, the use of script proposals by counsellors, which appears to offer a way of providing support which is consistent with these values. Script proposals entail the counsellors packaging their advice as something that the caller might say – at some future time – to a third party such as a friend, teacher, parent, or partner, and involve the counsellor adopting the speaking position of the caller in what appears as a rehearsal of a forthcoming strip of interaction. Although the core feature of a script proposal is the counsellor’s use of direct reported speech they appear to be delivered, not so much as exact words to be followed, but as the type of conversation that the client needs to have with the 3rd party. Script proposals, in short, provide models of what to say as well as alluding to how these could be emulated by the client. In their design script proposals invariably incorporate one or more of the most common rhetorical formats for maximising the persuasive force of an utterance such as a three part list or a contrastive pair. Script proposals, moreover, stand in a complex relation to the prior talk and one of their functions appears to be to summarise, respecify or expand upon the client’s own ideas or suggestions for problem solving that have emerged in these preceding sequences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The problem of determining the script and language of a document image has a number of important applications in the field of document analysis, such as indexing and sorting of large collections of such images, or as a precursor to optical character recognition (OCR). In this paper, we investigate the use of texture as a tool for determining the script of a document image, based on the observation that text has a distinct visual texture. An experimental evaluation of a number of commonly used texture features is conducted on a newly created script database, providing a qualitative measure of which features are most appropriate for this task. Strategies for improving classification results in situations with limited training data and multiple font types are also proposed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The application of spectroscopy to the study of contaminants in soils is important. Among the many contaminants is arsenic, which is highly labile and may leach to non-contaminated areas. Minerals of arsenate may form depending upon the availability of specific cations for example calcium and iron. Such minerals include carminite, pharmacosiderite and talmessite. Each of these arsenate minerals can be identified by its characteristic Raman spectrum enabling identification.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Photo from process: David Megarrity, albury 2007 - example of convergence of writing/design/perfomance/video RESEARCH COMPONENT Fallen Awake was a practice-led research process that opened the development process to the influence of collaborative authorship across artforms. The project focused on of how multiple artforms and artists converge their vision into a singular text, in the context of collaborative authorship. The work also uncovered new questions relating to the dream-life of children. The stimulus for the work was a selection of verbal statements by three-year-olds, raising complex ethical questions as the project progressed about the child’s voice, mediated by the adult artist, for the eventual presentation to a child audience. With the text emergent and open to influence, this project raised other questions related to the lived experience of children, dreaming, creative play and the development of consciousness. It pushed the creative process to experiment with associative, rather then causal narratives, and to negotiate the challenges this raises for traditional story structures and the development processes that usually shape them. It led to the consideration of each artforms and artist as equal contributors in the development of story: traditionally the province of the sole author. The outcomes appeared in various artforms, none of which was live-performance based. An ‘artist’s book’ by the designer, a ‘video treatment’ - a DVD capturing the approach to the performance and a script for an innovative large-scale performance. Fallen Awake was developed with the assistance of Strut & Fret Production House, Arts Queensland, and HotHouse Theatre, Albury Wodonga, through their ‘Month in the Country’ initiative.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.