96 resultados para CFP
Resumo:
Personalised social matching systems can be seen as recommender systems that recommend people to others in the social networks. However, with the rapid growth of users in social networks and the information that a social matching system requires about the users, recommender system techniques have become insufficiently adept at matching users in social networks. This paper presents a hybrid social matching system that takes advantage of both collaborative and content-based concepts of recommendation. The clustering technique is used to reduce the number of users that the matching system needs to consider and to overcome other problems from which social matching systems suffer, such as cold start problem due to the absence of implicit information about a new user. The proposed system has been evaluated on a dataset obtained from an online dating website. Empirical analysis shows that accuracy of the matching process is increased, using both user information (explicit data) and user behavior (implicit data).
Resumo:
This full day workshop invites participants to consider the nexus where the interests of game design, the expectations of play and HCI meet: the game interface. Game interfaces seem different to the interface to other software and there have been a number of observations. Shneiderman famously noticed that while most software designers are intent on following the tenets of the “invisible computer” and making access easy for the user, games inter-faces are made for players: they embed challenge. Schell discusses a “strange” relationship between the player and the game enabled by the interface and user interface designers frequently opine that much can be learned from the design of game interfaces. So where does the game interface actually sit? Even more interesting is the question as to whether the history of the relationship and sub-sequent expectations are now limiting the potential of game design as an expressive form. Recent innovations in I/O design such as Nintendo’s Wii, Sony’s Move and Microsoft's Kinect seem to usher in an age of physical player-enabled interaction, experience and embodied, engaged design. This workshop intends to cast light on this often mentioned and sporadically examined area and to establish a platform for new and innovative design in the field.
Resumo:
Continuous user authentication with keystroke dynamics uses characters sequences as features. Since users can type characters in any order, it is imperative to find character sequences (n-graphs) that are representative of user typing behavior. The contemporary feature selection approaches do not guarantee selecting frequently-typed features which may cause less accurate statistical user-representation. Furthermore, the selected features do not inherently reflect user typing behavior. We propose four statistical based feature selection techniques that mitigate limitations of existing approaches. The first technique selects the most frequently occurring features. The other three consider different user typing behaviors by selecting: n-graphs that are typed quickly; n-graphs that are typed with consistent time; and n-graphs that have large time variance among users. We use Gunetti’s keystroke dataset and k-means clustering algorithm for our experiments. The results show that among the proposed techniques, the most-frequent feature selection technique can effectively find user representative features. We further substantiate our results by comparing the most-frequent feature selection technique with three existing approaches (popular Italian words, common n-graphs, and least frequent ngraphs). We find that it performs better than the existing approaches after selecting a certain number of most-frequent n-graphs.
Resumo:
The growing importance and need of data processing for information extraction is vital for Web databases. Due to the sheer size and volume of databases, retrieval of relevant information as needed by users has become a cumbersome process. Information seekers are faced by information overloading - too many result sets are returned for their queries. Moreover, too few or no results are returned if a specific query is asked. This paper proposes a ranking algorithm that gives higher preference to a user’s current search and also utilizes profile information in order to obtain the relevant results for a user’s query.
Resumo:
Confidence in a professional role is a key element in the successful transition to competent practice. New graduate dietitians report that whilst they are confident about their general dietetic ability, they are not as confident when working with clients experiencing depression or anxiety. This study aimed to develop and validate a scale which measured confidence about working with clients with depression/anxiety. The 21-item Dietetic Collaborative Practice Scale was developed using research about dietetic practice in mental health (Dowding et al., 2011), coping self-efficacy literature (Chesney et al., 2006) and collaboration with industry experts. A convenience sample of 189 Australian dietitians completed the questionnaire. Exploratory factor analysis suggests that dietetic confidence is best represented by a two-dimensional solution consisting of (a) Client-focused practice (CFP, 50.8% variance); and (b) Advocacy for self and client care (ASC, 9.7% variance). The alpha coefficient of both dimensions (CFP α=.95, ASC α=.84) demonstrates the internal consistency of components. Combined, these two components account for 60.5% of variance. The scale components were not related to years of practice or working with mental health clients but were significantly related to overall dietetic confidence (ODC). Correlation coefficients between ODC and CFP were .501 (p<.01), ODC and ASC were correlated at .465 (p<.01) and CFP and number of years as a dietitian were weakly correlated at 0.24 (p<.05). Results have implications for dietetic training and professional development. Client focus and advocacy for self and client appear to be important factors in overall confidence as a dietitian.
Resumo:
Confidence in a professional role is a key element in the successful transition to competent practice. New graduate dietitians report that whilst they are confident about their general dietetic ability, they are not as confident when working with clients experiencing depression and anxiety. This study aimed to develop and validate a scale which measured confidence about working with clients with depression/anxiety. The 21-item Dietetics Collaborative Practice Scale was developed using research about dietetic practice in mental health, coping self-efficacy literature and collaboration with industry experts. A convenience sample of 189 Australian dietitians completed the questionnaire. Exploratory factor analysis suggests that dietetic confidence is best represented by a two dimensional solution consisting of (a) Client –focused practice (CFP, 50.8% variance) and (b) Advocacy for self and client care (ASC, 9.7% variance). The alpha coefficient of both dimensions (CFP ɑ=0.95, ASC ɑ=0.84) demonstrated the internal consistency of components. Combined, these two components account for 60.5% of variance. The scale components were not related to years of practice or working with mental health clients but were significantly related to overall dietetic confidence (ODC). Correlation coefficients between ODC and CFP were 0.501 (p<0.01), ODC and ASC were correlated at 0.465 (p<0.01) and CFP and number of years as a dietitian were weakly correlated at 0.24 (p<0.05). Results have implications for dietetic training and professional development. Client focus and advocacy for self and client appear to be important factors in overall confidence as a dietitian.
Resumo:
Due to the increasing recognition of global climate change, the building and construction industry is under pressure to reduce carbon emissions. A central issue in striving towards reduced carbon emissions is the need for a practicable and meaningful yardstick for assessing and communicating greenhouse gas (GHG) results. ISO 14067 was published by the International Organization for Standardization in May 2013. By providing specific requirements in the life cycle assessment (LCA) approach, the standard clarifies the GHG assessment in the aspects of choosing system boundaries and simulating use and end-of-life phases when quantifying carbon footprint of products (CFPs). More importantly, the standard, for the first time, provides step-to-step guidance and standardized template for communicating CFPs in the form of CFP external communication report, CFP performance tracking report, CFP declaration and CFP label. ISO 14067 therefore makes a valuable contribution to GHG quantification and transparent communication and comparison of CFPs. In addition, as cradle-to-grave should be used as the system boundary if use and end-of-life phases can be simulated, ISO 14067 will hopefully promote the development and implementation of simulation technologies, with Building Information Modelling (BIM) in particular, in the building and construction industry.
Resumo:
In this paper, we show implementation results of various algorithms that sort data encrypted with Fully Homomorphic Encryption scheme based on Integers. We analyze the complexities of sorting algorithms over encrypted data by considering Bubble Sort, Insertion Sort, Bitonic Sort and Odd-Even Merge sort. Our complexity analysis together with implementation results show that Odd-Even Merge Sort has better performance than the other sorting techniques. We observe that complexity of sorting in homomorphic domain will always have worst case complexity independent of the nature of input. In addition, we show that combining different sorting algorithms to sort encrypted data does not give any performance gain when compared to the application of sorting algorithms individually.
Resumo:
Ballast fouling is created by the breakdown of aggregates or outside contamination by coal dust from coal trains, or from soil intrusion beneath rail track. Due to ballast fouling, the conditions of rail track can be deteriorated considerably depending on the type of fouling material and the degree of fouling. So far there is no comprehensive guideline available to identify the critical degree of fouling for different types of fouling materials. This paper presents the identification of degree of fouling and types of fouling using non-destructive testing, namely seismic surface-wave and ground penetrating radar (GPR) survey. To understand this, a model rail track with different degree of fouling has been constructed in Civil engineering laboratory, University of Wollongong, Australia. Shear wave velocity obtained from seismic survey has been employed to identify the degree of fouling and types of fouling material. It is found that shear wave velocity of fouled ballast increases initially, reaches optimum fouling point (OFP), and decreases when the fouling increases. The degree of fouling corresponding after which the shear wave velocity of fouled ballast will be smaller than that of clean ballast is called the critical fouling point (CFP). Ground penetrating radar with four different ground coupled antennas (500 MHz, 800 MHz, 1.6 GHz and 2.3 GHz) was also used to identify the ballast fouling condition. It is found that the 800 MHz ground coupled antenna gives a better signal in assessing the ballast fouling condition. Seismic survey is relatively slow when compared to GPR survey however it gives quantifiable results. In contrast, GPR survey is faster and better in estimating the depth of fouling. (C) 2011 Elsevier B.V. All rights reserved.
Resumo:
The efficiency of track foundation material gradually decreases due to insufficient lateral confinement, ballast fouling, and loss of shear strength of the subsurface soil under cyclic loading. This paper presents characterization of rail track subsurface to identify ballast fouling and subsurface layers shear wave velocity using seismic survey. Seismic surface wave method of multi-channel analysis of surface wave (MASW) has been carried out in the model track and field track for finding out shear wave velocity of the clean and fouled ballast and track subsurface. The shear wave velocity (SWV) of fouled ballast increases with increase in fouling percentage, and reaches a maximum value and then decreases. This character is similar to typical compaction curve of soil, which is used to define optimum and critical fouling percentage (OFP and CFP). Critical fouling percentage of 15 % is noticed for Coal fouled ballast and 25 % is noticed for clayey sand fouled ballast. Coal fouled ballast reaches the OFP and CFP before clayey sand fouled ballast. Fouling of ballast reduces voids in ballast and there by decreases the drainage. Combined plot of permeability and SWV with percentage of fouling shows that after critical fouling point drainage condition of fouled ballast goes below acceptable limit. Shear wave velocities are measured in the selected location in the Wollongong field track by carrying out similar seismic survey. In-situ samples were collected and degrees of fouling were measured. Field SWV values are more than that of the model track SWV values for the same degree of fouling, which might be due to sleeper's confinement. This article also highlights the ballast gradation widely followed in different countries and presents the comparison of Indian ballast gradation with international gradation standards. Indian ballast contains a coarser particle size when compared to other countries. The upper limit of Indian gradation curve matches with lower limit of ballast gradation curves of America and Australia. The ballast gradation followed by Indian railways is poorly graded and more favorable for the drainage conditions. Indian ballast engineering needs extensive research to improve presents track conditions.
Resumo:
Mobile ad hoc networks (MANETs) is one of the successful wireless network paradigms which offers unrestricted mobility without depending on any underlying infrastructure. MANETs have become an exciting and im- portant technology in recent years because of the rapid proliferation of variety of wireless devices, and increased use of ad hoc networks in various applications. Like any other networks, MANETs are also prone to variety of attacks majorly in routing side, most of the proposed secured routing solutions based on cryptography and authentication methods have greater overhead, which results in latency problems and resource crunch problems, especially in energy side. The successful working of these mechanisms also depends on secured key management involving a trusted third authority, which is generally difficult to implement in MANET environ-ment due to volatile topology. Designing a secured routing algorithm for MANETs which incorporates the notion of trust without maintaining any trusted third entity is an interesting research problem in recent years. This paper propose a new trust model based on cognitive reasoning,which associates the notion of trust with all the member nodes of MANETs using a novel Behaviors-Observations- Beliefs(BOB) model. These trust values are used for detec- tion and prevention of malicious and dishonest nodes while routing the data. The proposed trust model works with the DTM-DSR protocol, which involves computation of direct trust between any two nodes using cognitive knowledge. We have taken care of trust fading over time, rewards, and penalties while computing the trustworthiness of a node and also route. A simulator is developed for testing the proposed algorithm, the results of experiments shows incorporation of cognitive reasoning for computation of trust in routing effectively detects intrusions in MANET environment, and generates more reliable routes for secured routing of data.
Resumo:
One of the challenges for accurately estimating Worst Case Execu-tion Time(WCET) of executables is to accurately predict their cache behaviour. Various techniques have been developed to predict the cache contents at different program points to estimate the execution time of memory-accessing instructions. One of the most widely used techniques is Abstract Interpretation based Must Analysis, which de-termines the cache blocks guaranteed to be present in the cache, and hence provides safe estimation of cache hits and misses. However,Must Analysis is highly imprecise, and platforms using Must Analysis have been known to produce blown-up WCET estimates. In our work, we propose to use May Analysis to assist the Must Analysis cache up-date and make it more precise. We prove the safety of our approach as well as provide examples where our Improved Must Analysis provides better precision. Further, we also detect a serious flaw in the original Persistence Analysis, and use Must and May Analysis to assist the Persistence Analysis cache update, to make it safe and more precise than the known solutions to the problem.
Resumo:
We previously reported that Rv1860 protein from Mycobacterium tuberculosis stimulated CD4(+) and CD8(+) T cells secreting gamma interferon (IFN-gamma) in healthy purified protein derivative (PPD)-positive individuals and protected guinea pigs immunized with a DNA vaccine and a recombinant poxvirus expressing Rv1860 from a challenge with virulent M. tuberculosis. We now show Rv1860-specific polyfunctional T (PFT) cell responses in the blood of healthy latently M. tuberculosis-infected individuals dominated by CD8(+) T cells, using a panel of 32 overlapping peptides spanning the length of Rv1860. Multiple subsets of CD8(+) PFT cells were significantly more numerous in healthy latently infected volunteers (HV) than in tuberculosis (TB) patients (PAT). The responses of peripheral blood mononuclear cells (PBMC) from PAT to the peptides of Rv1860 were dominated by tumor necrosis factor alpha (TNF-alpha) and interleukin-10 (IL-10) secretions, the former coming predominantly from non-T cell sources. Notably, the pattern of the T cell response to Rv1860 was distinctly different from those of the widely studied M. tuberculosis antigens ESAT-6, CFP-10, Ag85A, and Ag85B, which elicited CD4(+) T cell-dominated responses as previously reported in other cohorts. We further identified a peptide spanning amino acids 21 to 39 of the Rv1860 protein with the potential to distinguish latent TB infection from disease due to its ability to stimulate differential cytokine signatures in HV and PAT. We suggest that a TB vaccine carrying these and other CD8(+) T-cell-stimulating antigens has the potential to prevent progression of latent M. tuberculosis infection to TB disease.
Resumo:
We evaluate the management of the Northern Stock of Hake during 1986-2001. A stochastic bioeconomic model is calibrated to match the main features of this fishing ground. We show how catches, biomass stock and profits would have been if the optimal Common Fisheries Policy (CFP) consistent with the target biomass implied by the Fischler’s Recovery Plan had been implemented. The main finding are: i) an optimal CFP would have generated profits of more than 667 millions euros, ii) if side-payments are allowed (implemented by ITQ’s, for example) these profits increase 26%.