69 resultados para Information access


Relevância:

30.00% 30.00%

Publicador:

Resumo:

We consider a cloud data storage involving three entities, the cloud customer, the cloud business centre which provides services, and the cloud data storage centre. Data stored in the data storage centre comes from a variety of customers and some of these customers may compete with each other in the market place or may own data which comprises confidential information about their own clients. Cloud staff have access to data in the data storage centre which could be used to steal identities or to compromise cloud customers. In this paper, we provide an efficient method of data storage which prevents staff from accessing data which can be abused as described above. We also suggest a method of securing access to data which requires more than one staff member to access it at any given time. This ensures that, in case of a dispute, a staff member always has a witness to the fact that she accessed data.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The thesis has covered a range of algorithms that help to improve the security of web services. The research focused on the problems of DDoS attack and traffic analysis attack against service availability and information privacy respectively. Finally, this research significantly advantaged DDoS attack detection and web access anonymity.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Previous studies in speculative prefetching focus on building and evaluating access models for the purpose of access prediction. This paper investigates a complementary area which has been largely ignored, that of performance modelling. We use improvement in access time as the performance metric, for which we derive a formula in terms of resource parameters (time available and time required for prefetching) and speculative parameters (probabilities for next access). The performance maximization problem is expressed as a stretch knapsack problem. We develop an algorithm to maximize the improvement in access time by solving the stretch knapsack problem, using theoretically proven apparatus to reduce the search space. Integration between speculative prefetching and caching is also investigated, albeit under the assumption of equal item sizes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Even if the class label information is unknown, side information represents some equivalence constraints between pairs of patterns, indicating whether pairs originate from the same class. Exploiting side information, we develop algorithms to preserve both the intra-class and inter-class local structures. This new type of locality preserving projection (LPP), called LPP with side information (LPPSI), preserves the data's local structure in the sense that the close, similar training patterns will be kept close, whilst the close but dissimilar ones are separated. Our algorithms balance these conflicting requirements, and we further improve this technique using kernel methods. Experiments conducted on popular face databases demonstrate that the proposed algorithm significantly outperforms LPP. Further, we show that the performance of our algorithm with partial side information (that is, using only small amount of pair-wise similarity/dissimilarity information during training) is comparable with that when using full side information. We conclude that exploiting side information by preserving both similar and dissimilar local structures of the data significantly improves performance.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent growth in broadband access and proliferation of small personal devices that capture images and videos has led to explosive growth of multimedia content available everywhereVfrom personal disks to the Web. While digital media capture and upload has become nearly universal with newer device technology, there is still a need for better tools and technologies to search large collections of multimedia data and to find and deliver the right content to a user according to her current needs and preferences. A renewed focus on the subjective dimension in the multimedia lifecycle, fromcreation, distribution, to delivery and consumption, is required to address this need beyond what is feasible today. Integration of the subjective aspects of the media itselfVits affective, perceptual, and physiological potential (both intended and achieved), together with those of the users themselves will allow for personalizing the content access, beyond today’s facility. This integration, transforming the traditional multimedia information retrieval (MIR) indexes to more effectively answer specific user needs, will allow a richer degree of personalization predicated on user intention and mode of interaction, relationship to the producer, content of the media, and their history and lifestyle. In this paper, we identify the challenges in achieving this integration, current approaches to interpreting content creation processes, to user modelling and profiling, and to personalized content selection, and we detail future directions. The structure of the paper is as follows: In Section I, we introduce the problem and present some definitions. In Section II, we present a review of the aspects of personalized content and current approaches for the same. Section III discusses the problem of obtaining metadata that is required for personalized media creation and present eMediate as a case study of an integrated media capture environment. Section IV presents the MAGIC system as a case study of capturing effective descriptive data and putting users first in distributed learning delivery. The aspects of modelling the user are presented as a case study in using user’s personality as a way to personalize summaries in Section V. Finally, Section VI concludes the paper with a discussion on the emerging challenges and the open problems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background
Previous studies have provided mixed evidence with regards to associations between food store access and dietary outcomes. This study examines the most commonly applied measures of locational access to assess whether associations between supermarket access and fruit and vegetable consumption are affected by the choice of access measure and scale.

Method
Supermarket location data from Glasgow, UK (n = 119), and fruit and vegetable intake data from the 'Health and Well-Being' Survey (n = 1041) were used to compare various measures of locational access. These exposure variables included proximity estimates (with different points-of-origin used to vary levels of aggregation) and density measures using three approaches (Euclidean and road network buffers and Kernel density estimation) at distances ranging from 0.4 km to 5 km. Further analysis was conducted to assess the impact of using smaller buffer sizes for individuals who did not own a car. Associations between these multiple access measures and fruit and vegetable consumption were estimated using linear regression models.

Results
Levels of spatial aggregation did not impact on the proximity estimates. Counts of supermarkets within Euclidean buffers were associated with fruit and vegetable consumption at 1 km, 2 km and 3 km, and for our road network buffers at 2 km, 3 km, and 4 km. Kernel density estimates provided the strongest associations and were significant at a distance of 2 km, 3 km, 4 km and 5 km. Presence of a supermarket within 0.4 km of road network distance from where people lived was positively associated with fruit consumption amongst those without a car (coef. 0.657; s.e. 0.247; p0.008).

Conclusions
The associations between locational access to supermarkets and individual-level dietary behaviour are sensitive to the method by which the food environment variable is captured. Care needs to be taken to ensure robust and conceptually appropriate measures of access are used and these should be grounded in a clear a priori reasoning.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the February 2011 report on its inquiry into the past and present practices of donor conception in Australia, the Australian Senate Legal and Constitutional Affairs References Committee called for the introduction of legislation to regulate donor conception in all jurisdictions that do not have it in place "as a matter of priority". It further called for the establishment, "as a matter of priority", of a national register of donors to enable donor-conceived individuals to access identifying information about their donor. The Senate Committee left open the question as to whether the legislation and central register should have retrospective effect. This article focuses upon that question. It shows that arguments concerning the privacy, confidentiality and anonymity of some donors who may wish to remain anonymous are outweighed by the manifest injustice faced by donor-conceived individuals who are denied access to such information, as well as their families and donors who wish to exchange this information.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Farmers living in rural villages of Sri Lanka do not have proper access to information to make informed decisions about their livelihoods and as a result they face constant hardships in their lives. They use mobile phones to communicate but these are not currently connected to the Internet. We are investigating how to provide personalized information to farmers with the aim of empowering them to make informed decisions and take appropriate actions. In this paper we propose an empowerment model that has been designed to achieve their goals which have been identified using a scenario-based approach. The model examines several empowerment processes and supporting tools that would help them to achieve their goals with the hope that they would have an increased sense of control, self-efficacy, knowledge and competency. This empowerment model is applied to the development of a mobile based information system that is being developed by an international collaborative research group to address the issues of the farmers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A Feral Information Systems (FIS) is any technological artefact (e.g. spreadsheets) that end users employ instead of the mandated Enterprise System (ES). ES proponents suggest that the installation of an ES will boost productivity. However, Production Possibility Frontier theory provides insights as to why the introduction of an ES may instead suppress an end user's productivity. Structuration Theory offers insights that explain how certain end users may have access to powerful resources. Rather than submitting to the ES, the end user can employ FIS to block or circumvent aspects of the ES. Further, the concept of life chances helps explain why individuals may or may not develop the core skills required to construct an alternate to the ES, the FIS. In relation to the ES usage, an end user may adopt one of four Modes of Operation, namely: Submit, Dismiss, Hidden, or Defiant.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Information technology outsourcing has become a pervasive and important phenomenon in business organizations and there is substantial evidence about its benefits and pitfalls. Initially, firms used outsourcing as a way to lower costs, gain access to expertise and focus on core activities. Recently, there is a shift in focus and more firms are outsourcing to attain innovative products and services. However, current research is still unclear about how innovation can be achieved through outsourcing. Drawing predominantly from the dynamic capability theory, the objective of this paper is to explore how absorptive capacity unfolds as a process within and between firms when client firms outsource their information technology services with expectations of innovation generation. In this paper, we propose a research model that links absorptive capacity to innovation generation. We draw on three case studies to focus on how absorptive capacity, as a process, impacts innovation generation. Results show that assimilation and transformation stages are critical in generating radical innovation while acquisition and exploitation play a key role in incremental innovation. The implications of these findings for both researchers and practitioners are discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Sharing data that contains personally identifiable or sensitive information, such as medical records, always has privacy and security implications. The issues can become rather complex when the methods of access can vary, and accurate individual data needs to be provided whilst mass data release for specific purposes (for example for medical research) also has to be catered for. Although various solutions have been proposed to address the different aspects individually, a comprehensive approach is highly desirable. This paper presents a solution for maintaining the privacy of data released en masse in a controlled manner, and for providing secure access to the original data for authorized users. The results show that the solution is provably secure and maintains privacy in a more efficient manner than previous solutions.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background Type 2 diabetes (T2DM) is increasingly prevalent in young adults but there is very little information about what information they need to undertake diabetes self-management.

Aim To undertake a structured literature review to identify what information people with type 2 diabetes aged 25 to 45 years need to manage their diabetes and how they would like to receive it.

Methods A structured literature search was conducted. The MEDLINE, CINAHL, AMI, APAIS-Health databases were searched for articles published between 1980 and 2011. The reference list of journals and relevant websites were searched. Inclusion criteria were: literature about T2DM in young adults and literature about education and information needs of young adults with T2DM.

Results Only one article specifically focussed on the information needs of young people with T2DM and two reports included some information about T2DM and young adults. The limited data available suggested young adults with T2DM have specific information needs that are not sufficiently addressed in current resources, and have some needs different from young people with type 1 diabetes. Young people with T2DM want clear, consistent information from credible sources, delivered in a range of formats. They also want psychological support and counselling, age-specific education groups, after hours access to health professionals and education provided to family members and the community about T2DM in young people and about how to support people with T2DM.

Conclusion With the prevalence of T2DM in young adults continuing to increase, the need to address the specific information needs and learning styles of people with T2DM aged 25 to 45 is increasingly important.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background Much research has been conducted into the determinants of physical activity (PA) participation among adolescent girls. However, the more specific question of what are the determinants of particular forms of PA participation, such as the link between participation through a sports club, has not been investigated. Accordingly, the aim of this study was to investigate the relationships between participation in a sports club and socio-economic status (SES), access to facilities, and family and peer support, for female adolescents.

Methods A survey of 732 female adolescent school students (521 metropolitan, 211 non-metropolitan; 489 Year 7, 243 Year 11) was conducted. The survey included demographic information (living arrangements, ethnicity indicators, and indicators of SES such as parental education and employment status and locality); access to facilities; and family and peer support (travel, encouragement, watching, praise, joint participation). For each characteristic, sports club participants and non-participants were compared using chi-square tests. Multiple mediation analyses were used to investigate the role of access, family and peer support in the link between SES and sport participation.

Results There were significant associations (p<0.05) between sports club participation and: all demographic characteristics; all measures of family and peer support; and access to sport-related facilities. Highest levels of participation were associated with monolingual Australian-born families, with two parents, at least one of whom was well-educated, with both parents employed, and high levels of parental assistance, engagement and support. Participation in club sport among both younger and older adolescent girls was significantly positively associated with the SES of both their neighbourhoods and their households, particularly in metropolitan areas. These associations were most strongly mediated by family support and by access to facilities.

Conclusions To facilitate and promote greater participation in club sport among adolescent girls from low SES neighbourhoods and households, strategies should target modifiable determinants such as facility access and parental support. This will involve improving access to sports facilities and promoting, encouraging and assisting parents to provide support for their daughters’ participation in sport clubs.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Illumination and pose invariance are the most challenging aspects of face recognition. In this paper we describe a fully automatic face recognition system that uses video information to achieve illumination and pose robustness. In the proposed method, highly nonlinear manifolds of face motion are approximated using three Gaussian pose clusters. Pose robustness is achieved by comparing the corresponding pose clusters and probabilistically combining the results to derive a measure of similarity between two manifolds. Illumination is normalized on a per-pose basis. Region-based gamma intensity correction is used to correct for coarse illumination changes, while further refinement is achieved by combining a learnt linear manifold of illumination variation with constraints on face pattern distribution, derived from video. Comparative experimental evaluation is presented and the proposed method is shown to greatly outperform state-of-the-art algorithms. Consistent recognition rates of 94-100% are achieved across dramatic changes in illumination.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Personal information and communication technologies (ICTs) have become commonplace. Today many people own, or have access to, a range of different computing and communication devices, information technologies, and services, which they incorporate into their everyday routines. Increasingly, these technologies impact the way that individuals work, socialize, and play. Workers are bringing their personal ICTs to the office, and organizations are tailoring their computing environments toward ubiquitous integration with personal ICTs. These developments are opening up new ways of working, but they also create new challenges for organizations in accommodating this “nonaffiliated” use as part of their information systems environments. In this article we propose a framework for analyzing the composition and impact of personal ICT ensembles. The framework is positioned as pre-theory that invites further development and empirical testing. We illustrate how the proposed framework could be applied to consider personal ICT use across the work/home context. Several implications stemming from the notion of a personal ICT ensemble are highlighted, including practical considerations for nonaffiliated use in organizations. We conclude with suggestions for further development of the proposed framework.