998 resultados para Electronic Collections
Resumo:
Gambling activities and the revenues derived have been seen as a way to increase economic development in deprived areas. There are also, however, concerns about the effects of gambling in general and electronic gaming machines (EGMs) in particular, on the resources available to the localities in which they are situated. This paper focuses on the factors that determine the extent and spending of community benefit-related EGM-generated resources within Victoria, Australia, focusing in particular on the relationships between EGM activity and socio-economic and social capital indicators, and how this relates to the community benefit resources generated by gaming.
Resumo:
We present an approach to automatically de-identify health records. In our approach, personal health information is identified using a Conditional Random Fields machine learning classifier, a large set of linguistic and lexical features, and pattern matching techniques. Identified personal information is then removed from the reports. The de-identification of personal health information is fundamental for the sharing and secondary use of electronic health records, for example for data mining and disease monitoring. The effectiveness of our approach is first evaluated on the 2007 i2b2 Shared Task dataset, a widely adopted dataset for evaluating de-identification techniques. Subsequently, we investigate the robustness of the approach to limited training data; we study its effectiveness on different type and quality of data by evaluating the approach on scanned pathology reports from an Australian institution. This data contains optical character recognition errors, as well as linguistic conventions that differ from those contained in the i2b2 dataset, for example different date formats. The findings suggest that our approach compares to the best approach from the 2007 i2b2 Shared Task; in addition, the approach is found to be robust to variations of training size, data type and quality in presence of sufficient training data.
Resumo:
This thesis presents novel techniques for addressing the problems of continuous change and inconsistencies in large process model collections. The developed techniques treat process models as a collection of fragments and facilitate version control, standardization and automated process model discovery using fragment-based concepts. Experimental results show that the presented techniques are beneficial in consolidating large process model collections, specifically when there is a high degree of redundancy.
Resumo:
In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.
Resumo:
Automated process discovery techniques aim at extracting process models from information system logs. Existing techniques in this space are effective when applied to relatively small or regular logs, but generate spaghetti-like and sometimes inaccurate models when confronted to logs with high variability. In previous work, trace clustering has been applied in an attempt to reduce the size and complexity of automatically discovered process models. The idea is to split the log into clusters and to discover one model per cluster. This leads to a collection of process models – each one representing a variant of the business process – as opposed to an all-encompassing model. Still, models produced in this way may exhibit unacceptably high complexity and low fitness. In this setting, this paper presents a two-way divide-and-conquer process discovery technique, wherein the discovered process models are split on the one hand by variants and on the other hand hierarchically using subprocess extraction. Splitting is performed in a controlled manner in order to achieve user-defined complexity or fitness thresholds. Experiments on real-life logs show that the technique produces collections of models substantially smaller than those extracted by applying existing trace clustering techniques, while allowing the user to control the fitness of the resulting models.
Resumo:
This article presents an overview of two aspects of the role the internet now plays in the court system - first, the extent to which judges, administrators and court officials at the different levels in the court hierarchy are using the internet to deliver enhanced access to the Australian justice system for the community as a whole, and second, how they have embraced that same technology as an aid for accessing information for better judgment delivery and administration.
Resumo:
The aim of this study was to determine compliance with the National Association for Sport and Physical Education (NASPE) guideline for physical activity and American Academy of Pediatrics (AAP) recommendation for electronic media use among urban pre-school children in two large cities on the East Coast of Australia. Cross-sectional data were collected from 266 parents. Time spent using electronic media (watching television, DVDs or on the computer) and in physical activity were parent reported. The proportion who met each guideline was calculated. 56 per cent and 79% of children met the NASPE guideline on weekdays and weekends, respectively, while 73% and 70% met the AAP recommendation on weekdays and weekends, with no difference between boys and girls. A substantial minority do not meet physical activity and electronic media use recommendations, highlighting the need to better understand what factors contribute to physical activity and electronic media use among this group of pre-schoolers.
Resumo:
Information and communications technologies are a significant component of the healthcare domain, and electronic health records play a major role in it. Therefore, it is important that they are accepted en masse by healthcare professionals. How healthcare professionals perceive the usefulness of electronic health records and their attitudes towards them have been shown to have significant effects on the overall acceptance in many healthcare systems around the world. This paper investigates the role of perceived usefulness and attitude on the intention to use electronic health records by future healthcare professionals using polynomial regression with response surface analysis. Results show that the relationships between these variables are more complex than predicted in prior research. The paper concludes that the properties of the above determinants must be further investigated to clearly understand: (i) their role in predicting the intention to use electronic health records; and (ii) in designing systems that are better adopted by healthcare professionals of the future.
Resumo:
Electronic Medical Record (EMR) systems are being implemented increasingly worldwide. Saudi Arabia is one of the developing countries that commenced implementing such systems in 1988. Whilst EMR uptake has been low in Saudi Arabia until now, a number of hospitals have implemented EMR systems successfully. This paper analyses available studies (n = 28) in the literature regarding EMR implementation in Saudi Arabia to identify the progress of EMR implementation to date and to identify the facilitators and barriers to implementation.
Resumo:
With the introduction of Check 21 law and the development of FSTC's echeck system, there has been an increasing usage of e-cheque conversions and acceptance among retailers, banks, and consumers. However, the current e-cheque system does not address issues concerning privacy, confidentiality, and traceability. We highlight the issues concerning the current electronic cheque system and provide a solution to overcome those drawbacks.
Resumo:
The highly unusual structural and electronic properties of the α-phase of (Si1-xCx)3N4 are determined by density functional theory (DFT) calculations using the Generalized Gradient Approximation (GGA). The electronic properties of α-(Si 1-xCx)3N4 are found to be very close to those of α-C3N4. The bandgap of α-(Si 1-xCx)3N4 significantly decreases as C atoms are substituted by Si atoms (in most cases, smaller than that of either α-Si3N4 or α-C3N4) and attains a minimum when the ratio of C to Si is close to 2. On the other hand, the bulk modulus of α-(Si1-xCx)3N 4 is found to be closer to that of α-Si3N 4 than of α-C3N4. Plasma-assisted synthesis experiments of CNx and SiCN films are performed to verify the accuracy of the DFT calculations. TEM measurements confirm the calculated lattice constants, and FT-IR/XPS analysis confirms the formation and lengths of C-N and Si-N bonds. The results of DFT calculations are also in a remarkable agreement with the experiments of other authors.
Resumo:
The electronic transport in both intrinsic and acid-treated single-walled carbon nanotube networks containing more than 90% semiconducting nanotubes is investigated using temperature-dependent resistance measurements. The semiconducting behavior observed in the intrinsic network is attributed to the three-dimensional electron hopping mechanism. In contrast, the chemical doping mechanism in the acid-treated network is found to be responsible for the revealed metal-like linear resistivity dependence in a broad temperature range. This effective method to control the electrical conductivity of single-walled carbon nanotube networks is promising for future nanoscale electronics, thermometry, and bolometry. © 2010 American Institute of Physics.
Resumo:
Structural stability, electronic, and optical properties of InN under high pressure are studied using the first-principles calculations. The lattice constants and electronic band structure are found consistent with the available experimental and theoretical values. The pressure of the wurtzite-to-rocksalt structural transition is 13.4 GPa, which is in an excellent agreement with the most recent experimental values. The optical characteristics reproduce the experimental data thus justifying the feasibility of our theoretical predictions of the optical properties of InN at high pressures.
Resumo:
This paper reports on ab initio numerical simulations of the effect of Co and Cu dopings on the electronic structure and optical properties of ZnO, pursued to develop diluted magnetic semiconductors vitally needed for spintronic applications. The simulations are based upon the Perdew-Burke-Enzerh generalized gradient approximation on the density functional theory. It is revealed that the electrons with energies close to the Fermi level effectively transfer only between Cu and Co ions which substitute Zn atoms, and are located in the neighbor sites connected by an O ion. The simulation results are consistent with the experimental observations that addition of Cu helps achieve stable ferromagnetism of Co-doped ZnO. It is shown that simultaneous insertion of Co and Cu atoms leads to smaller energy band gap, redshift of the optical absorption edge, as well as significant changes in the reflectivity, dielectric function, refractive index, and electron energy loss function of ZnO as compared to the doping with either Co or Cu atoms. These highly unusual optical properties are explained in terms of the computed electronic structure and are promising for the development of the next-generation room-temperature ferromagnetic semiconductors for future spintronic devices on the existing semiconductor micromanufacturing platform.