969 resultados para Community detection
Resumo:
The aetiology of secondary lymphoedema seems to be multifactorial, with acquired abnormalities as well as pre-existing conditions being contributory factors. Many characteristics bear inconsistent relationships to lymphoedema risk, and the few that are consistently associated with an increased risk of developing the condition, do not alone distinguish the at-risk population. Further, our current prevention and management recommendations are not backed by strong evidence. Consequently, there remains much to be learned about who gets it, how can it be prevented and how can we best treat it. Nonetheless, it is clear that lymphoedema is associated with adverse side effects, which have a profound impact on daily life, and that preliminary evidence suggests that early detection may lead to more effective treatment and lack of treatment may lead to progression. These represent important reasons as to why lymphoedema deserves clinical attention. However, several pragmatic issues must be considered when discussing whether a routine objective measure of lymphoedema could be integrated among the standard clinical care of those undertaking treatment for cancers known to be associated with the development of lymphoedema.
Resumo:
Surveillance networks are typically monitored by a few people, viewing several monitors displaying the camera feeds. It is then very difficult for a human operator to effectively detect events as they happen. Recently, computer vision research has begun to address ways to automatically process some of this data, to assist human operators. Object tracking, event recognition, crowd analysis and human identification at a distance are being pursued as a means to aid human operators and improve the security of areas such as transport hubs. The task of object tracking is key to the effective use of more advanced technologies. To recognize an event people and objects must be tracked. Tracking also enhances the performance of tasks such as crowd analysis or human identification. Before an object can be tracked, it must be detected. Motion segmentation techniques, widely employed in tracking systems, produce a binary image in which objects can be located. However, these techniques are prone to errors caused by shadows and lighting changes. Detection routines often fail, either due to erroneous motion caused by noise and lighting effects, or due to the detection routines being unable to split occluded regions into their component objects. Particle filters can be used as a self contained tracking system, and make it unnecessary for the task of detection to be carried out separately except for an initial (often manual) detection to initialise the filter. Particle filters use one or more extracted features to evaluate the likelihood of an object existing at a given point each frame. Such systems however do not easily allow for multiple objects to be tracked robustly, and do not explicitly maintain the identity of tracked objects. This dissertation investigates improvements to the performance of object tracking algorithms through improved motion segmentation and the use of a particle filter. A novel hybrid motion segmentation / optical flow algorithm, capable of simultaneously extracting multiple layers of foreground and optical flow in surveillance video frames is proposed. The algorithm is shown to perform well in the presence of adverse lighting conditions, and the optical flow is capable of extracting a moving object. The proposed algorithm is integrated within a tracking system and evaluated using the ETISEO (Evaluation du Traitement et de lInterpretation de Sequences vidEO - Evaluation for video understanding) database, and significant improvement in detection and tracking performance is demonstrated when compared to a baseline system. A Scalable Condensation Filter (SCF), a particle filter designed to work within an existing tracking system, is also developed. The creation and deletion of modes and maintenance of identity is handled by the underlying tracking system; and the tracking system is able to benefit from the improved performance in uncertain conditions arising from occlusion and noise provided by a particle filter. The system is evaluated using the ETISEO database. The dissertation then investigates fusion schemes for multi-spectral tracking systems. Four fusion schemes for combining a thermal and visual colour modality are evaluated using the OTCBVS (Object Tracking and Classification in and Beyond the Visible Spectrum) database. It is shown that a middle fusion scheme yields the best results and demonstrates a significant improvement in performance when compared to a system using either mode individually. Findings from the thesis contribute to improve the performance of semi-automated video processing and therefore improve security in areas under surveillance.
Resumo:
This research investigates wireless intrusion detection techniques for detecting attacks on IEEE 802.11i Robust Secure Networks (RSNs). Despite using a variety of comprehensive preventative security measures, the RSNs remain vulnerable to a number of attacks. Failure of preventative measures to address all RSN vulnerabilities dictates the need for a comprehensive monitoring capability to detect all attacks on RSNs and also to proactively address potential security vulnerabilities by detecting security policy violations in the WLAN. This research proposes novel wireless intrusion detection techniques to address these monitoring requirements and also studies correlation of the generated alarms across wireless intrusion detection system (WIDS) sensors and the detection techniques themselves for greater reliability and robustness. The specific outcomes of this research are: A comprehensive review of the outstanding vulnerabilities and attacks in IEEE 802.11i RSNs. A comprehensive review of the wireless intrusion detection techniques currently available for detecting attacks on RSNs. Identification of the drawbacks and limitations of the currently available wireless intrusion detection techniques in detecting attacks on RSNs. Development of three novel wireless intrusion detection techniques for detecting RSN attacks and security policy violations in RSNs. Development of algorithms for each novel intrusion detection technique to correlate alarms across distributed sensors of a WIDS. Development of an algorithm for automatic attack scenario detection using cross detection technique correlation. Development of an algorithm to automatically assign priority to the detected attack scenario using cross detection technique correlation.
Resumo:
This project utilised the materials of the Index for Inclusion (Booth & Ainscow, 2002) to enhance the development of a learning community of educators in Education Queensland in 2009. The values, dimensions and indicators of the Index for Inclusion, were incorporated into the professional development package, On the Same Page (Education Queensland, 2008), to enhance its wider purpose to improve inclusive education practices explicit within the P-12 Curriculum Framework (Education Queensland, 2008). The incorporation of the values, dimensions and indicators of the Index enabled deeper reflection by participants about their expectations of students and their resulting teaching practices. The subsequent development of action plans assisted participants to develop “a curriculum for all” (Education Queensland, 2008, p. 9). Deeper reflection, action planning and ‘distance travelled’ in understanding of inclusive education were apparent in the comments by participants and their evaluation of the professional development package.
Resumo:
Spoken term detection (STD) popularly involves performing word or sub-word level speech recognition and indexing the result. This work challenges the assumption that improved speech recognition accuracy implies better indexing for STD. Using an index derived from phone lattices, this paper examines the effect of language model selection on the relationship between phone recognition accuracy and STD accuracy. Results suggest that language models usually improve phone recognition accuracy but their inclusion does not always translate to improved STD accuracy. The findings suggest that using phone recognition accuracy to measure the quality of an STD index can be problematic, and highlight the need for an alternative that is more closely aligned with the goals of the specific detection task.
Resumo:
While spoken term detection (STD) systems based on word indices provide good accuracy, there are several practical applications where it is infeasible or too costly to employ an LVCSR engine. An STD system is presented, which is designed to incorporate a fast phonetic decoding front-end and be robust to decoding errors whilst still allowing for rapid search speeds. This goal is achieved through mono-phone open-loop decoding coupled with fast hierarchical phone lattice search. Results demonstrate that an STD system that is designed with the constraint of a fast and simple phonetic decoding front-end requires a compromise to be made between search speed and search accuracy.
Resumo:
Community service learning is the integration of experiential learning and community service into coursework such that community needs are met and students gain both professional skills and a sense of civic responsibility. A critical component is student reflection. This paper provides an example of the application of community service learning within an undergraduate health unit at the Queensland University of Technology. Based on survey data from 36 program participants, it demonstrates the impact of CSL on student outcomes. Results show that students benefited by developing autonomy through real world experiences, through increased self-assurance and achievement of personal growth, through gaining new insights into the operations of community service organisations and through moving towards becoming responsible citizens. Students expect their CSL experience to have long-lasting impact on their lives, with two-thirds of participants noting that they would like to continue volunteering as part of their future development.
Resumo:
Network-based Intrusion Detection Systems (NIDSs) analyse network traffic to detect instances of malicious activity. Typically, this is only possible when the network traffic is accessible for analysis. With the growing use of Virtual Private Networks (VPNs) that encrypt network traffic, the NIDS can no longer access this crucial audit data. In this paper, we present an implementation and evaluation of our approach proposed in Goh et al. (2009). It is based on Shamir's secret-sharing scheme and allows a NIDS to function normally in a VPN without any modifications and without compromising the confidentiality afforded by the VPN.
Resumo:
The automatic extraction of road features from remote sensed images has been a topic of great interest within the photogrammetric and remote sensing communities for over 3 decades. Although various techniques have been reported in the literature, it is still challenging to efficiently extract the road details with the increasing of image resolution as well as the requirement for accurate and up-to-date road data. In this paper, we will focus on the automatic detection of road lane markings, which are crucial for many applications, including lane level navigation and lane departure warning. The approach consists of four steps: i) data preprocessing, ii) image segmentation and road surface detection, iii) road lane marking extraction based on the generated road surface, and iv) testing and system evaluation. The proposed approach utilized the unsupervised ISODATA image segmentation algorithm, which segments the image into vegetation regions, and road surface based only on the Cb component of YCbCr color space. A shadow detection method based on YCbCr color space is also employed to detect and recover the shadows from the road surface casted by the vehicles and trees. Finally, the lane marking features are detected from the road surface using the histogram clustering. The experiments of applying the proposed method to the aerial imagery dataset of Gympie, Queensland demonstrate the efficiency of the approach.
Resumo:
This practice-led research project examines some of the factors and issues facing artists working in the public domain who wish to engage with the community as audience. Using the methodology of action research, the three major creative projects in this study use art as a socio-political tool with the aim of providing an effective vehicle for broadening awareness, understanding forms of social protest and increasing tolerance for diversity. The three projects: Floodline November 7, 2004, Look in, Look out, and The Urban Terrorist Project, dealt with issues of marginalisation of communities, audiences and graffiti artists respectively. The artist/researcher is outlined as both creator and collaborator in the work. Processes included ephemeral elements, such as temporary installation and performance, as well as interactive elements that encouraged direct audience involvement as part of the work. In addition to the roles of creator and collaborator, both of which included audience as well as artist, the presence of an outside entity was evident. Whether local, legal authorities or prevailing attitudes, outside entities had an unavoidable impact on the processes and outcomes of the work. Each project elicited a range of responses from their respective audiences; however, the overarching concept of reciprocity was seen to be the crucial factor in conception, artistic methods and outcomes.