989 resultados para Ward hierarchical scheme


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we present a novel scheme for improving speaker diarization by making use of repeating speakers across multiple recordings within a large corpus. We call this technique speaker re-diarization and demonstrate that it is possible to reuse the initial speaker-linked diarization outputs to boost diarization accuracy within individual recordings. We first propose and evaluate two novel re-diarization techniques. We demonstrate their complementary characteristics and fuse the two techniques to successfully conduct speaker re-diarization across the SAIVT-BNEWS corpus of Australian broadcast data. This corpus contains recurring speakers in various independent recordings that need to be linked across the dataset. We show that our speaker re-diarization approach can provide a relative improvement of 23% in diarization error rate (DER), over the original diarization results, as well as improve the estimated number of speakers and the cluster purity and coverage metrics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a novel method for improving hierarchical speaker clustering in the tasks of speaker diarization and speaker linking. In hierarchical clustering, a tree can be formed that demonstrates various levels of clustering. We propose a ratio that expresses the impact of each cluster on the formation of this tree and use this to rescale cluster scores. This provides score normalisation based on the impact of each cluster. We use a state-of-the-art speaker diarization and linking system across the SAIVT-BNEWS corpus to show that our proposed impact ratio can provide a relative improvement of 16% in diarization error rate (DER).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The mining industry faces three long term strategic risks in relation to its water and energy use: 1) securing enough water and energy to meet increased production; 2) reducing water use, energy consumption and emissions due to social, environmental and economic pressures; and 3) understanding the links between water and energy, so that an improvement in one area does not create an adverse effect in another. This project helps the industry analyse these risks by creating a hierarchical systems model (HSM) that represents the water and energy interactions on a sub-site, site and regional scales; which is coupled with a flexible risk framework. The HSM consists of: components that represent sources of water and energy; activities that use water and energy and off-site destinations of water and produced emissions. It can also represent more complex components on a site, with inbuilt examples including tailings dams and water treatment plants. The HSM also allows multiple sites and other infrastructure to be connected together to explore regional water and energy interactions. By representing water and energy as a single interconnected system the HSM can explore tradeoffs and synergies. For example, on a synthetic case study, which represents a typical site, simulations suggested that while a synergy in terms of water use and energy use could be made when chemical additives were used to enhance dust suppression, there were trade-offs when either thickened tailings or dry processing were used. On a regional scale, the HSM was used to simulate various scenarios, including: mines only withdrawing water when needed; achieving economics-of-scale through use of a single centralised treatment plant rather than smaller decentralised treatment plants; and capturing of fugitive emissions for energy generation. The HSM also includes an integrated risk framework for interpreting model output, so that onsite and off-site impacts of various water and energy management strategies can be compared in a managerial context. The case studies in this report explored company, social and environmental risks for scenarios of regional water scarcity, unregulated saline discharge, and the use of plantation forestry to offset carbon emissions. The HSM was able to represent the non-linear causal relationship at the regional scale, such as the forestry scheme offsetting a small percentage of carbon emissions but causing severe regional water shortages. The HSM software developed in this project will be released as an open source tool to allow industry personnel to easily and inexpensively quantify and explore the links between water use, energy use, and carbon emissions. The tool can be easily adapted to represent specific sites or regions. Case studies conducted in this project highlighted the potential complexity of these links between water, energy, and carbon emissions, as well as the significance of the cumulative effects of these links over time. A deeper understanding of these links is vital for the mining industry in order to progress to more sustainable operations, and the HSM provides an accessible, robust framework for investigating these links.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

OBJECTIVE: To explore how registered nurses (RNs) in the general ward perceive discharge processes and practices for patients recently discharged from the intensive care unit (ICU). BACKGROUND: Patients discharged from the ICU environment often require complicated and multifaceted care. The ward-based RN is at the forefront of the care of this fragile patient population, yet their views and perceptions have seldom been explored. DESIGN: A qualitative grounded theory design was used to guide focus group interviews with the RN participants. METHODS: Five semi-structured focus group interviews, including 27 RN participants, were conducted in an Australian metropolitan tertiary referral hospital in 2011. Data analyses of transcripts, field notes and memos used concurrent data generation, constant comparative analysis and theoretical sampling. RESULTS: Results yielded a core category of 'two worlds' stressing the disconnectedness between ICU and the ward setting. This category was divided into sub categories of 'communication disconnect' and 'remember the family'. Properties of 'what we say', 'what we write', 'transfer' and 'information needs' respectively were developed within those sub-categories. CONCLUSION: The discharge process for patients within the ICU setting is complicated and largely underappreciated. There are fundamental, misunderstood differences in prioritisation and care of patients between the areas, with a deep understanding of practice requirements of ward based RNs not being understood. The findings of this research may be used to facilitate inter departmental communications and progress practice development.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recently, attempts to improve decision making in species management have focussed on uncertainties associated with modelling temporal fluctuations in populations. Reducing model uncertainty is challenging; while larger samples improve estimation of species trajectories and reduce statistical errors, they typically amplify variability in observed trajectories. In particular, traditional modelling approaches aimed at estimating population trajectories usually do not account well for nonlinearities and uncertainties associated with multi-scale observations characteristic of large spatio-temporal surveys. We present a Bayesian semi-parametric hierarchical model for simultaneously quantifying uncertainties associated with model structure and parameters, and scale-specific variability over time. We estimate uncertainty across a four-tiered spatial hierarchy of coral cover from the Great Barrier Reef. Coral variability is well described; however, our results show that, in the absence of additional model specifications, conclusions regarding coral trajectories become highly uncertain when considering multiple reefs, suggesting that management should focus more at the scale of individual reefs. The approach presented facilitates the description and estimation of population trajectories and associated uncertainties when variability cannot be attributed to specific causes and origins. We argue that our model can unlock value contained in large-scale datasets, provide guidance for understanding sources of uncertainty, and support better informed decision making

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A tag-based item recommendation method generates an ordered list of items, likely interesting to a particular user, using the users past tagging behaviour. However, the users tagging behaviour varies in different tagging systems. A potential problem in generating quality recommendation is how to build user profiles, that interprets user behaviour to be effectively used, in recommendation models. Generally, the recommendation methods are made to work with specific types of user profiles, and may not work well with different datasets. In this paper, we investigate several tagging data interpretation and representation schemes that can lead to building an effective user profile. We discuss the various benefits a scheme brings to a recommendation method by highlighting the representative features of user tagging behaviours on a specific dataset. Empirical analysis shows that each interpretation scheme forms a distinct data representation which eventually affects the recommendation result. Results on various datasets show that an interpretation scheme should be selected based on the dominant usage in the tagging data (i.e. either higher amount of tags or higher amount of items present). The usage represents the characteristic of user tagging behaviour in the system. The results also demonstrate how the scheme is able to address the cold-start user problem.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Injection velocity has been recognized as a key variable in thermoplastic injection molding. Its closed-loop control is, however, difficult due to the complexity of the process dynamic characteristics. The basic requirements of the control system include tracking of a pre-determined injection velocity curve defined in a profile, load rejection and robustness. It is difficult for a conventional control scheme to meet all these requirements. Injection velocity dynamics are first analyzed in this paper. Then a novel double-controller scheme is adopted for the injection velocity control. This scheme allows an independent design of set-point tracking and load rejection and has good system robustness. The implementation of the double-controller scheme for injection velocity control is discussed. Special techniques such as profile transformation and shifting are also introduced to improve the velocity responses. The proposed velocity control has been experimentally demonstrated to be effective for a wide range of processing conditions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Unidirectional inductive power transfer (UIPT) systems allow loads to consume power while bidirectional IPT (BIPT) systems are more suitable for loads requiring two way power flow such as vehicle to grid (V2G) applications with electric vehicles (EVs). Many attempts have been made to improve the performance of BIPT systems. In a typical BIPT system, the output power is control using the pickup converter phase shift angle (PSA) while the primary converter regulates the input current. This paper proposes an optimized phase shift modulation strategy to minimize the coil losses of a series – series (SS) compensated BIPT system. In addition, a comprehensive study on the impact of power converters on the overall efficiency of the system is also presented. A closed loop controller is proposed to optimize the overall efficiency of the BIPT system. Theoretical results are presented in comparison to both simulations and measurements of a 0.5 kW prototype to show the benefits of the proposed concept. Results convincingly demonstrate the applicability of the proposed system offering high efficiency over a wide range of output power.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A Bitcoin wallet is a set of private keys known to a user and which allow that user to spend any Bitcoin associated with those keys. In a hierarchical deterministic (HD) wallet, child private keys are generated pseudorandomly from a master private key, and the corresponding child public keys can be generated by anyone with knowledge of the master public key. These wallets have several interesting applications including Internet retail, trustless audit, and a treasurer allocating funds among departments. A specification of HD wallets has even been accepted as Bitcoin standard BIP32. Unfortunately, in all existing HD wallets---including BIP32 wallets---an attacker can easily recover the master private key given the master public key and any child private key. This vulnerability precludes use cases such as a combined treasurer-auditor, and some in the Bitcoin community have suspected that this vulnerability cannot be avoided. We propose a new HD wallet that is not subject to this vulnerability. Our HD wallet can tolerate the leakage of up to m private keys with a master public key size of O(m). We prove that breaking our HD wallet is at least as hard as the so-called "one more" discrete logarithm problem.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The NLM stream cipher designed by Hoon Jae Lee, Sang Min Sung, Hyeong Rag Kim is a strengthened version of the LM summation generator that combines linear and non-linear feedback shift registers. In recent works, the NLM cipher has been used for message authentication in lightweight communication over wireless sensor networks and for RFID authentication protocols. The work analyses the security of the NLM stream cipher and the NLM-MAC scheme that is built on the top of the NLM cipher. We first show that the NLM cipher suffers from two major weaknesses that lead to key recovery and forgery attacks. We prove the internal state of the NLM cipher can be recovered with time complexity about nlog7×2, where the total length of internal state is 2⋅n+22⋅n+2 bits. The attack needs about n2n2 key-stream bits. We also show adversary is able to forge any MAC tag very efficiently by having only one pair (MAC tag, ciphertext). The proposed attacks are practical and break the scheme with a negligible error probability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Existing techniques for automated discovery of process models from event logs gen- erally produce flat process models. Thus, they fail to exploit the notion of subprocess as well as error handling and repetition constructs provided by contemporary process modeling notations, such as the Business Process Model and Notation (BPMN). This paper presents a technique for automated discovery of hierarchical BPMN models con- taining interrupting and non-interrupting boundary events and activity markers. The technique employs functional and inclusion dependency discovery techniques in order to elicit a process-subprocess hierarchy from the event log. Given this hierarchy and the projected logs associated to each node in the hierarchy, parent process and subprocess models are then discovered using existing techniques for flat process model discovery. Finally, the resulting models and logs are heuristically analyzed in order to identify boundary events and markers. By employing approximate dependency discovery tech- niques, it is possible to filter out noise in the event log arising for example from data entry errors or missing events. A validation with one synthetic and two real-life logs shows that process models derived by the proposed technique are more accurate and less complex than those derived with flat process discovery techniques. Meanwhile, a validation on a family of synthetically generated logs shows that the technique is resilient to varying levels of noise.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2008 the Australian government introduced the National Rental Affordability Scheme (NRAS) to increase the supply of affordable rental in Australia. This Federal Government initiative was progressively rolled out through four different rounds over the years with fifth round to be announced some time in 2014. Although the scheme has been successful evident there have been numerous setbacks experienced. This paper focuses on understanding lessons learnt from the performance of the scheme to make recommendations for future government initiatives. This evaluation is based on the combination of document analysis, government officers as well as approved NRAS participants operating throughout Queensland. The most significant challenges for the NRAS participants is the involvement of three levels government which cause delays in the scheme approval process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In making this submission, we suggest that Australia learn from the experiences of other jurisdictions, and avoid some of the mistakes that have been made. In particular, this involves: * Ensuring that adequate information is available to evaluate the success of the scheme * Ensuring that notices sent to consumers provide full and accurate information that helps them understand their rights and options * Limiting the potential abuse of the system, and particularly attempts to intimidate consumers into paying unfair penalties through ‘speculative invoicing’ * Avoiding the potential for actual or perceived bias in the scheme’s oversight body

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background As the increasing adoption of information technology continues to offer better distant medical services, the distribution of, and remote access to digital medical images over public networks continues to grow significantly. Such use of medical images raises serious concerns for their continuous security protection, which digital watermarking has shown great potential to address. Methods We present a content-independent embedding scheme for medical image watermarking. We observe that the perceptual content of medical images varies widely with their modalities. Recent medical image watermarking schemes are image-content dependent and thus they may suffer from inconsistent embedding capacity and visual artefacts. To attain the image content-independent embedding property, we generalise RONI (region of non-interest, to the medical professionals) selection process and use it for embedding by utilising RONI’s least significant bit-planes. The proposed scheme thus avoids the need for RONI segmentation that incurs capacity and computational overheads. Results Our experimental results demonstrate that the proposed embedding scheme performs consistently over a dataset of 370 medical images including their 7 different modalities. Experimental results also verify how the state-of-the-art reversible schemes can have an inconsistent performance for different modalities of medical images. Our scheme has MSSIM (Mean Structural SIMilarity) larger than 0.999 with a deterministically adaptable embedding capacity. Conclusions Our proposed image-content independent embedding scheme is modality-wise consistent, and maintains a good image quality of RONI while keeping all other pixels in the image untouched. Thus, with an appropriate watermarking framework (i.e., with the considerations of watermark generation, embedding and detection functions), our proposed scheme can be viable for the multi-modality medical image applications and distant medical services such as teleradiology and eHealth.