881 resultados para Opinion retrieval, mining and summarization framework
Resumo:
The purpose of this paper is to emphasis the significance of public asset management in Indonesia that is by identifying opportunities and challenges of Indonesian local governments in adopting current practice of Public Asset Management System. A Case Study, in South Sulawesi Provincial government was used as the approach to achieve the research objective. The case study involved two data collection techniques i.e. interviews followed by study on documents. The result of the study indicates there are some significant opportunities and challenges that Indonesian local government might deal with in adopting current practice of public asset management. There are opportunities that can lead to more effective and efficient local government, accountable and auditable local government organization, increase local government portfolio, and improve the quality of public services. The challenges include no clear institutional and legal framework to support the asset management application, non-profit principle of public assets, cross jurisdictions in public asset management, complexity of local government objectives, and unavailability of data for managing public property. The study only covers condition of South Sulawesi Province, which could not represent exactly the whole local governments’ condition in Indonesia. Findings from this study provide useful input for the policy makers, scholars and asset management practitioners in Indonesia to establish a public asset management framework that suitable for Indonesia.
Resumo:
In a seminal data mining article, Leo Breiman [1] argued that to develop effective predictive classification and regression models, we need to move away from the sole dependency on statistical algorithms and embrace a wider toolkit of modeling algorithms that include data mining procedures. Nevertheless, many researchers still rely solely on statistical procedures when undertaking data modeling tasks; the sole reliance on these procedures has lead to the development of irrelevant theory and questionable research conclusions ([1], p.199). We will outline initiatives that the HPC & Research Support group is undertaking to engage researchers with data mining tools and techniques; including a new range of seminars, workshops, and one-on-one consultations covering data mining algorithms, the relationship between data mining and the research cycle, and limitations and problems with these new algorithms. Organisational limitations and restrictions to these initiatives are also discussed.
Resumo:
Historically, 'Creativity' has had a complex set of meanings. Not long ago, 'Creativity' had a kind of marginal or peripheral status, being seen as the province of a gifted few; in many cases it was associated almost exclusively with the arts and with artists. But these traditional attitudes to creativity are changing. Mainstream businesses are employing people with creative skills as diverse as writing, directing, graphic design and event management. So what we’re beginning to see is an innovation framework and creative content adding value not just to SMEs, but to traditional industries such as manufacturing and mining, and to wider service industries. And this is why Education is such an important element, particularly with a focus on innovation, and on creative people and the contributions they make across different parts of the economy.
Resumo:
It is a big challenge to guarantee the quality of discovered relevance features in text documents for describing user preferences because of the large number of terms, patterns, and noise. Most existing popular text mining and classification methods have adopted term-based approaches. However, they have all suffered from the problems of polysemy and synonymy. Over the years, people have often held the hypothesis that pattern-based methods should perform better than term-based ones in describing user preferences, but many experiments do not support this hypothesis. The innovative technique presented in paper makes a breakthrough for this difficulty. This technique discovers both positive and negative patterns in text documents as higher level features in order to accurately weight low-level features (terms) based on their specificity and their distributions in the higher level features. Substantial experiments using this technique on Reuters Corpus Volume 1 and TREC topics show that the proposed approach significantly outperforms both the state-of-the-art term-based methods underpinned by Okapi BM25, Rocchio or Support Vector Machine and pattern based methods on precision, recall and F measures.
Resumo:
With the increasing number of XML documents in varied domains, it has become essential to identify ways of finding interesting information from these documents. Data mining techniques were used to derive this interesting information. Mining on XML documents is impacted by its model due to the semi-structured nature of these documents. Hence, in this chapter we present an overview of the various models of XML documents, how these models were used for mining and some of the issues and challenges in these models. In addition, this chapter also provides some insights into the future models of XML documents for effectively capturing the two important features namely structure and content of XML documents for mining.
Resumo:
In this paper, we describe the main processes and operations in mining industries and present a comprehensive survey of operations research methodologies that have been applied over the last several decades. The literature review is classified into four main categories: mine design; mine production; mine transportation; and mine evaluation. Mining design models are further separated according to two main mining methods: open-pit and underground. Moreover, mine production models are subcategorised into two groups: ore mining and coal mining. Mine transportation models are further partitioned in accordance with fleet management, truck haulage and train scheduling. Mine evaluation models are further subdivided into four clusters in terms of mining method selection, quality control, financial risks and environmental protection. The main characteristics of four Australian commercial mining software are addressed and compared. This paper bridges the gaps in the literature and motivates researchers to develop more applicable, realistic and comprehensive operations research models and solution techniques that are directly linked with mining industries.
Resumo:
Key decisions at the collection, pre-processing, transformation, mining and interpretation phase of any knowledge discovery from database (KDD) process depend heavily on assumptions and theorectical perspectives relating to the type of task to be performed and characteristics of data sourced. In this article, we compare and contrast theoretical perspectives and assumptions taken in data mining exercises in the legal domain with those adopted in data mining in TCM and allopathic medicine. The juxtaposition results in insights for the application of KDD for Traditional Chinese Medicine.
Resumo:
The purpose of this paper is to provide a basis from which to start an informed and rational dialogue in Australia about voluntary euthanasia (VE) and assisted suicide (AS). It does this by seeking to chart the broad landscape of issues that can be raised as relevant to how this conduct should be regulated by the law. It is not our purpose to persuade. Rather, we have attempted to address the issues as neutrally as possible and to canvass both sides of the argument in an even-handed manner. We hope that this exercise places the reader in a position to consider the question posed by this paper: How should Australia regulate voluntary euthanasia and assisted suicide? In line with the approach taken in the paper, this question does not take sides in the debate. It simply asks how VE and AS should be regulated, acknowledging that both prohibition and legalisation of such conduct involve regulation. We begin by considering the wider legal framework that governs end of life decision-making. Decisions to withhold or withdraw life-sustaining treatment that result in a person’s death can be lawful. This could be because, for example, a competent adult refuses such treatment. Alternatively, stopping or not providing treatment can be lawful when it is no longer in a person’s best interests to receive it. The law also recognises that appropriate palliative care should not attract criminal responsibility. By contrast, VE and AS are unlawful in Australia and could lead to prosecution for crimes such as murder, manslaughter or aiding and abetting suicide. But this is not to say that such conduct does not occur in practice. Indeed, there is a body of evidence that VE and AS occur in Australia, despite them being unlawful. There have been repeated efforts to change the law in this country, mainly by the minor political parties. However, apart from a brief period when VE and AS was lawful in the Northern Territory, these attempts to reform the law have been unsuccessful. The position is different in a small but increasing number of jurisdictions overseas where such conduct is lawful. The most well known is the Netherlands but there are also statutory regimes that regulate VE and/or AS in Belgium and Luxembourg in Europe, and Oregon and Washington in the United States. A feature of these legislative models is that they incorporate review or oversight processes that enable the collection of data about how the law is being used. As a result, there is a significant body of evidence that is available for consideration to assess the operation of the law in these jurisdictions and some of this is considered briefly here. Assisting a suicide, if done for selfless motives, is also legal in Switzerland, and this has resulted in what has been referred to as ‘euthanasia tourism’. This model is also considered. The paper also identifies the major arguments in favour of, and against, legalisation of VE and AS. Arguments often advanced in favour of law reform include respect for autonomy, that public opinion favours reform, and that the current law is incoherent and discriminatory. Key arguments against legalising VE and AS point to the sanctity of life, concerns about the adequacy and effectiveness of safeguards, and a ‘slippery slope’ that will allow euthanasia to occur for minors or for adults where it is not voluntary. We have also attempted to step beyond these well trodden and often rehearsed cases ‘for and against’. To this end, we have identified some ethical values that might span both sides of the debate and perhaps be the subject of wider consensus. We then outline a framework for considering the issue of how Australia should regulate VE and AS. We begin by asking whether such conduct should be criminal acts (as they presently are). If VE and AS should continue to attract criminal responsibility, the next step is to enquire whether the law should punish such conduct more or less than is presently the case, or whether the law should stay the same. If a change is favoured as to how the criminal law punishes VE and AS, options considered include sentencing reform, creating context-specific offences or developing prosecutorial guidelines for how the criminal justice system deals with these issues. If VE and AS should not be criminal acts, then questions arise as to how and when they should be permitted and regulated. Possible elements of any reform model include: ensuring decision-making is competent and voluntary; ascertaining a person’s eligibility to utilise the regime, for example, whether it depends on him or her having a terminal illness or experiencing pain and suffering; and setting out processes for how any decision must be made and evidenced. Options to bring about decriminalisation include challenging the validity of laws that make VE and AS unlawful, recognising a defence to criminal prosecution, or creating a statutory framework to regulate the practice. We conclude the paper where we started: with a call for rational and informed consideration of a difficult and sensitive issue. How should Australia regulate voluntary euthanasia and assisted suicide?
Resumo:
The decentralisation reform in Indonesia has mandated the Central Government to transfer some functions and responsibilities to local governments including the transfer of human resources, assets and budgets. Local governments became giant asset holders almost overnight and most were ill prepared to handle these transformations. Assets were transferred without analysing local government need, ability or capability to manage the assets and no local government was provided with an asset management framework. Therefore, the aim of this research is to develop a Public Asset Management Framework for provincial governments in Indonesia, especially for infrastructure and real property assets. This framework will enable provincial governments to develop integrated asset management procedures throughout asset‘s lifecycle. Achieving the research aim means answering the following three research questions; 1) How do provincial governments in Indonesia currently manage their public assets? 2) What factors influence the provincial governments in managing these public assets? 3) How is a Public Asset Management Framework developed that is specific for the Indonesian provincial governments‘ situation? This research applied case studies approach after a literature review; document retrieval, interviews and observations were collated. Data was collected in June 2009 (preliminary data collection) and January to July 2010 in the major eastern Indonesian provinces. Once the public asset management framework was developed, a focus group was used to verify the framework. Results are threefold and indicate that Indonesian provincial governments need to improve the effectiveness and efficiency of current practice of public asset management in order to improve public service quality. The second result shows that the 5 major concerns that influence the local government public asset management processes are asset identification and inventory systems, public asset holding, asset guidance and legal arrangements, asset management efficiency and effectiveness, and, human resources and their organisational arrangements. The framework was then applied to assets already transferred to local governments and so included a system of asset identification and a needs analysis to classify the importance of these assets to local governments, their functions and responsibilities in delivering public services. Assets that support local government functions and responsibilities will then be managed using suitable asset lifecycle processes. Those categorised as surplus assets should be disposed. Additionally functions and responsibilities that do not need an asset solution should be performed directly by local governments. These processes must be measured using performance measurement indicators. All these stages should be guided and regulated with sufficient laws and regulations. Constant improvements to the quality and quantity of human resources hold an important role in successful public asset management processes. This research focuses on developing countries, and contributes toward the knowledge of a Public Asset Management Framework at local government level, particularly Indonesia. The framework provides local governments a foundation to improve their effectiveness and efficiency in managing public assets, which could lead to improved public service quality. This framework will ensure that the best decisions are made throughout asset decision ownership and provide a better asset life cycle process, leading to selection of the most appropriate asset, improve its acquisition and delivery process, optimise asset performance, and provide an appropriate disposal program.
Resumo:
Water reporting is becoming increasingly common amongst minerals companies. The Minerals Council of Australia’s (MCA) Water Accounting Framework (WAF), co-developed by the Centre for Water in the Minerals Industry (CWiMI), provides a standard set of terms for water reporting. The WAF was established due to the need of the minerals industry to report on its water management consistently, rather than report using company-specific terms which can cause confusion and makes company comparisons impossible. The WAF consists of two models: The Input-Output Model, which represents interactions between a site and its surrounding community and environment, and the Operational Model, which represents the interactions within a site.
Resumo:
Identifying product families has been considered as an effective way to accommodate the increasing product varieties across the diverse market niches. In this paper, we propose a novel framework to identifying product families by using a similarity measure for a common product design data BOM (Bill of Materials) based on data mining techniques such as frequent mining and clus-tering. For calculating the similarity between BOMs, a novel Extended Augmented Adjacency Matrix (EAAM) representation is introduced that consists of information not only of the content and topology but also of the fre-quent structural dependency among the various parts of a product design. These EAAM representations of BOMs are compared to calculate the similarity between products and used as a clustering input to group the product fami-lies. When applied on a real-life manufacturing data, the proposed framework outperforms a current baseline that uses orthogonal Procrustes for grouping product families.
Resumo:
Industrial control systems (ICS) have been moving from dedicated communications to switched and routed corporate networks, making it probable that these devices are being exposed to the Internet. Many ICS have been designed with poor or little security features, making them vulnerable to potential attack. Recently, several tools have been developed that can scan the internet, including ZMap, Masscan and Shodan. However, little in-depth analysis has been done to compare these Internet-wide scanning techniques, and few Internet-wide scans have been conducted targeting ICS and protocols. In this paper we present a Taxonomy of Internet-wide scanning with a comparison of three popular network scanning tools, and a framework for conducting Internet-wide scans.
Resumo:
On our first day in Kalgoorlie, a local woman in her mid-thirties tells us that ‘Kal wouldn’t exist if it wasn’t for mining and prostitution’. In the ensuing days many others would tell us the same thing. More explicitly, in the words of another local resident, ‘The town was founded on brothels. [Without them] the men wouldn’t have been happy and they wouldn’t have got as much gold.’ These two phenomena – mining and prostitution – and their seemingly natural and straightforward connection to each other are also routinely invoked in tourist and popular culture depictions of Kalgoorlie. The Lonely Planet, for example, notes that ‘historically, mineworkers would come straight to town to spend disposable income at Kalgoorlie’s infamous brothels, or at pubs staffed by “skimpies” (scantily clad female bar staff)’.
Resumo:
An intrinsic challenge associated with evaluating proposed techniques for detecting Distributed Denial-of-Service (DDoS) attacks and distinguishing them from Flash Events (FEs) is the extreme scarcity of publicly available real-word traffic traces. Those available are either heavily anonymised or too old to accurately reflect the current trends in DDoS attacks and FEs. This paper proposes a traffic generation and testbed framework for synthetically generating different types of realistic DDoS attacks, FEs and other benign traffic traces, and monitoring their effects on the target. Using only modest hardware resources, the proposed framework, consisting of a customised software traffic generator, ‘Botloader’, is capable of generating a configurable mix of two-way traffic, for emulating either large-scale DDoS attacks, FEs or benign traffic traces that are experimentally reproducible. Botloader uses IP-aliasing, a well-known technique available on most computing platforms, to create thousands of interactive UDP/TCP endpoints on a single computer, each bound to a unique IP-address, to emulate large numbers of simultaneous attackers or benign clients.