995 resultados para user agent
Resumo:
This project investigated 1) Australian web designers’ cultural perceptions towards Australian Indigenous users and 2) Australian Indigenous cultural features in terms of user interface design. In doing so, it reviews the literature of cross-cultural user interface design by focusing on feasible models and arguments to articulate and integrate Australian Indigenous Internet users’ cultural needs of web user interface. The online survey results collected from 101 Indigenous users and 126 Web designers showed a distinctive difference between them on the integration of Indigenous users' cultural in Web sites. The interview data collected from 14 Indigenous users and 14 web designers suggested practical approaches to the design implications of Indigenous culture.
Resumo:
Six consecutively hatched cohorts and one cohort of pre-hatch eggs of farmed barramundi (Lates calcarifer) from south Australia were examined for Chlamydia-like organisms associated with epitheliocystis. To identify and characterise the bacteria, 59 gill samples and three pre-hatch egg samples were processed for histology, in situ hybridisation and 16S rRNA amplification, sequencing and comprehensive phylogenetic analysis. Cases of epitheliocystis were observed microscopically and characterised by membrane-enclosed basophilic cysts filled with a granular material that caused hypertrophy of the epithelial cells. In situ hybridisation with a Chlamydiales-specific probe lead to specific labelling of the epitheliocystis inclusions within the gill epithelium. Two distinct but closely related 16S rRNA chlamydial sequences were amplified from gill DNA across the seven cohorts, including from pre-hatch eggs. These genotype sequences were found to be novel, sharing 97.1 - 97.5% similarity to the next closest 16S rRNA sequence, Ca. Similichlamydia latridicola, from Australian striped trumpeter. Comprehensive phylogenetic analysis of these genotype sequences against representative members of the Chlamydiales order and against other epitheliocystis agents revealed these Chlamydia-like organisms to be novel and taxonomically placed them within the recently proposed genus Ca. Similichlamydia. Following Fredricks and Relman's molecular postulates and based on these observations, we propose the epitheliocystis agents of barramundi to be known as "Candidatus Similichlamydia laticola" (sp. nov.).
Resumo:
Three cohorts of farmed yellowtail kingfish (Seriola lalandi) from South Australia were examined for Chlamydia-like organisms associated with epitheliocystis. To characterize the bacteria, 38 gill samples were processed for histopathology, electron microscopy, and 16S rRNA amplification, sequencing, and phylogenetic analysis. Microscopically, the presence of membrane-enclosed cysts was observed within the gill lamellae. Also observed was hyperplasia of the epithelial cells with cytoplasmic vacuolization and fusion of the gill lamellae. Transmission electron microscopy revealed morphological features of the reticulate and intermediate bodies typical of members of the order Chlamydiales. A novel 1,393-bp 16S chlamydial rRNA sequence was amplified from gill DNA extracted from fish in all cohorts over a 3-year period that corresponded to the 16S rRNA sequence amplified directly from laser-dissected cysts. This sequence was only 87% similar to the reported "Candidatus Piscichlamydia salmonis" (AY462244) from Atlantic salmon and Arctic charr. Phylogenetic analysis of this sequence against 35 Chlamydia and Chlamydia-like bacteria revealed that this novel bacterium belongs to an undescribed family lineage in the order Chlamydiales. Based on these observations, we propose this bacterium of yellowtail kingfish be known as "Candidatus Parilichlamydia carangidicola" and that the new family be known as "Candidatus Parilichlamydiaceae."
Resumo:
Histological analysis of gill samples taken from individuals of Latris lineata reared in aquaculture in Tasmania, Australia, and those sampled from the wild revealed the presence of epitheliocystis-like basophilic inclusions. Subsequent morphological, in situ hybridization, and molecular analyses were performed to confirm the presence of this disease and discovered a Chlamydia-like organism associated with this condition, and the criteria set by Fredericks and Relman's postulates were used to establish disease causation. Three distinct 16S rRNA genotypes were sequenced from 16 fish, and phylogenetic analyses of the nearly full-length 16S rRNA sequences generated for this bacterial agent indicated that they were nearly identical novel members of the order Chlamydiales. This new taxon formed a well-supported clade with "Candidatus Parilichlamydia carangidicola" from the yellowtail kingfish (Seriola lalandi). On the basis of sequence divergence over the 16S rRNA region relative to all other members of the order Chlamydiales, a new genus and species are proposed here for the Chlamydia-like bacterium from L. lineata, i.e., "Candidatus Similichlamydia latridicola" gen. nov., sp. nov.
Resumo:
Term-based approaches can extract many features in text documents, but most include noise. Many popular text-mining strategies have been adapted to reduce noisy information from extracted features; however, text-mining techniques suffer from low frequency. The key issue is how to discover relevance features in text documents to fulfil user information needs. To address this issue, we propose a new method to extract specific features from user relevance feedback. The proposed approach includes two stages. The first stage extracts topics (or patterns) from text documents to focus on interesting topics. In the second stage, topics are deployed to lower level terms to address the low-frequency problem and find specific terms. The specific terms are determined based on their appearances in relevance feedback and their distribution in topics or high-level patterns. We test our proposed method with extensive experiments in the Reuters Corpus Volume 1 dataset and TREC topics. Results show that our proposed approach significantly outperforms the state-of-the-art models.
Resumo:
The safety of passengers is a major concern to airports. In the event of crises, having an effective and efficient evacuation process in place can significantly aid in enhancing passenger safety. Hence, it is necessary for airport operators to have an in-depth understanding of the evacuation process of their airport terminal. Although evacuation models have been used in studying pedestrian behaviour for decades, little research has been done in considering the evacuees’ group dynamics and the complexity of the environment. In this paper, an agent-based model is presented to simulate passenger evacuation process. Different exits were allocated to passengers based on their location and security level. The simulation results show that the evacuation time can be influenced by passenger group dynamics. This model also provides a convenient way to design airport evacuation strategy and examine its efficiency. The model was created using AnyLogic software and its parameters were initialised using recent research data published in the literature.
Resumo:
Scenario 1 A buys a two storey commercial building built along the only street frontage to the property. Vehicles cannot reach the rear of the property as the building extends across the entire width of the land. A bought the building with full knowledge that vehicular access to the rest of the property had been compromised by a desire to obtain maximum street frontage for the building which was occupied by a commercial tenant. On street parking is scarce in the surrounding area. A (to the knowledge of the adjoining owner B) constructs a carpark at the rear of the building. The employees of A’s tenant have been using the carpark obtaining access via a driveway on B’s land. To formalise this arrangement, A seeks a right of way for vehicles to travel down B’s driveway to access the carpark...
Resumo:
We propose a new kind of asymmetric mutual authentication from passwords with stronger privacy against malicious servers, lest they be tempted to engage in “cross-site user impersonation” to each other. It enables a person to authenticate (with) arbitrarily many independent servers, over adversarial channels, using a memorable and reusable single short password. Beside the usual PAKE security guarantees, our framework goes to lengths to secure the password against brute-force cracking from privileged server information.
Resumo:
Mitchell critiques Georges Perec's Life a User's Manual, which articulates compellingly the confluence of literature and architecture studies that emerged in the late twentieth century. He argues the Perec's novel diverges from this tradition, for, rather than being a search for origins and true expression, Life a User's Manual denies the very possibility of originality. He adds that Perec's architext is de-constructive and ironic.
Resumo:
This paper describes the design and implementation of a wireless neural telemetry system that enables new experimental paradigms, such as neural recordings during rodent navigation in large outdoor environments. RoSco, short for Rodent Scope, is a small lightweight user-configurable module suitable for digital wireless recording from freely behaving small animals. Due to the digital transmission technology, RoSco has advantages over most other wireless modules of noise immunity and online user-configurable settings. RoSco digitally transmits entire neural waveforms for 14 of 16 channels at 20 kHz with 8-bit encoding which are streamed to the PC as standard USB audio packets. Up to 31 RoSco wireless modules can coexist in the same environment on non-overlapping independent channels. The design has spatial diversity reception via two antennas, which makes wireless communication resilient to fading and obstacles. In comparison with most existing wireless systems, this system has online user-selectable independent gain control of each channel in 8 factors from 500 to 32,000 times, two selectable ground references from a subset of channels, selectable channel grounding to disable noisy electrodes, and selectable bandwidth suitable for action potentials (300 Hz–3 kHz) and low frequency field potentials (4 Hz–3 kHz). Indoor and outdoor recordings taken from freely behaving rodents are shown to be comparable to a commercial wired system in sorting for neural populations. The module has low input referred noise, battery life of 1.5 hours and transmission losses of 0.1% up to a range of 10 m.
Resumo:
As the Journal of Media Innovations comes into existence, this article reflects on the first and most obvious question: just what do we mean by “media innovations”? Drawing on the examples of a range of recent innovations in media technologies and practices, initiated by a variety of media audiences, users, professionals, and providers, it explores the interplay between the different drivers of innovation and the effects of such innovation on the complex frameworks of contemporary society and the media ecology which supports it. In doing so, this article makes a number of key observations: first, it notes that media innovation is an innovation in media practices at least as much as in media technologies, and that changes to the practices of media both reflect and promote societal changes as well – media innovations are never just media technology innovations. Second, it shows that the continuing mediatisation of society, and the shift towards a more widespread participation of ordinary users as active content creators and media innovators, make it all the more important to investigate in detail these interlinked, incremental, everyday processes of media and societal change – media innovations are almost always also user innovations. Finally, it suggests that a full understanding of these processes as they unfold across diverse interleaved media spaces and complex societal structures necessarily requires a holistic perspective on media innovations, which considers the contemporary media ecology as a crucial constitutive element of societal structures and seeks to trace the repercussions of innovations across both media and society – media innovations are inextricably interlinked with societal innovations (even if, at times, they may not be considered to be improvements to the status quo).
Resumo:
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.
Resumo:
Software to create individualised finite element (FE) models of the osseoligamentous spine using pre-operative computed tomography (CT) data-sets for spinal surgery patients has recently been developed. This study presents a geometric sensitivity analysis of this software to assess the effect of intra-observer variability in user-selected anatomical landmarks. User-selected landmarks on the osseous anatomy were defined from CT data-sets for three scoliosis patients and these landmarks were used to reconstruct patient-specific anatomy of the spine and ribcage using parametric descriptions. The intra-observer errors in landmark co-ordinates for these anatomical landmarks were calculated. FE models of the spine and ribcage were created using the reconstructed anatomy for each patient and these models were analysed for a loadcase simulating clinical flexibility assessment. The intra-observer error in the anatomical measurements was low in comparison to the initial dimensions, with the exception of the angular measurements for disc wedge and zygapophyseal joint (z-joint) orientation and disc height. This variability suggested that CT resolution may influence such angular measurements, particularly for small anatomical features, such as the z-joints, and may also affect disc height. The results of the FE analysis showed low variation in the model predictions for spinal curvature with the mean intra-observer variability substantially less than the accepted error in clinical measurement. These findings demonstrate that intra-observer variability in landmark point selection has minimal effect on the subsequent FE predictions for a clinical loadcase.
Resumo:
In earlier cultures and societies, hazards and risks to human health were dealt with by methods derived from myth, metaphor and ritual. In modem society however, notions of hazard and risk have been transformed from the level of a folk discourse to that of an expert centred concept (Plough & Krimsky, 1987). With the professionalization of risk and hazard analysis came a preferred framework for decision making based on a range of 'technical' methodologies (Giere, 1991 ). This is especially true for decision processes relating to risk assessment and management, and impact assessment. Such approaches however, often entail narrow technical-based theoretical assumptions about human behaviour and the natural world, and the· methods used. They therefore carry 'in-built' error factors that contribute considerable uncertainty to the results.