284 resultados para permissions


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Item folksonomy or tag information is popularly available on the web now. However, since tags are arbitrary words given by users, they contain a lot of noise such as tag synonyms, semantic ambiguities and personal tags. Such noise brings difficulties to improve the accuracy of item recommendations. In this paper, we propose to combine item taxonomy and folksonomy to reduce the noise of tags and make personalized item recommendations. The experiments conducted on the dataset collected from Amazon.com demonstrated the effectiveness of the proposed approaches. The results suggested that the recommendation accuracy can be further improved if we consider the viewpoints and the vocabularies of both experts and users.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Overweight and obesity are a significant cause of poor health worldwide, particularly in conjunction with low levels of physical activity (PA). PA is health-protective and essential for the physical growth and development of children, promoting physical and psychological health while simultaneously increasing the probability of remaining active as an adult. However, many obese children and adolescents have a unique set of physiological, biomechanical, and neuromuscular barriers to PA that they must overcome. It is essential to understand the influence of these barriers on an obese child's motivation in order to exercise and tailor exercise programs to the special needs of this population. Chapter Outline • Introduction • Defining Physical Activity, Exercise, and Physical Fitness • Physical Activity, Physical Fitness, And Motor Competence In Obese Children • Physical Activity and Obesity in Children • Physical Fitness in Obese Children • Balance and Gait in Obese Children • Motor Competence in Obese Children • Physical Activity Guidelines for Obese Children • Clinical Assessment of the Obese Child • Physical Activity Characteristics: Mode • Physical Activity Characteristics: Intensity • Physical Activity Characteristics: Frequency • Physical Activity Characteristics: Duration • Conclusion

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In Australia, young children who lack decision-making capacity can have regenerative tissue removed to treat another person suffering from a severe or life-threatening disease. While great good can potentially result from this as the recipient’s life may be saved, ethical unease remains over the ‘use’ of young children in this way. This paper examines the ethical approaches that have featured in the debate over the acceptability and limits of this practice, and how these are reflected in Australia’s legal regime governing removal of tissue from young children. This analysis demonstrates a troubling dichotomy within the Australia’s laws that requires decision-makers to adopt inconsistent ethical approaches depending on where a donor child is situated. It is argued that this inconsistency in approach warrants legal reform of this ethically sensitive issue.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In dynamic and uncertain environments such as healthcare, where the needs of security and information availability are difficult to balance, an access control approach based on a static policy will be suboptimal regardless of how comprehensive it is. The uncertainty stems from the unpredictability of users’ operational needs as well as their private incentives to misuse permissions. In Role Based Access Control (RBAC), a user’s legitimate access request may be denied because its need has not been anticipated by the security administrator. Alternatively, even when the policy is correctly specified an authorised user may accidentally or intentionally misuse the granted permission. This paper introduces a novel approach to access control under uncertainty and presents it in the context of RBAC. By taking insights from the field of economics, in particular the insurance literature, we propose a formal model where the value of resources are explicitly defined and an RBAC policy (entailing those predictable access needs) is only used as a reference point to determine the price each user has to pay for access, as opposed to representing hard and fast rules that are always rigidly applied.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper considers the changing relationship between economic prosperity and Australian suburbs, noting that what has been termed “the first suburban nation” in experiencing an intensification of suburban growth in the 2000s, in the context of economic globalization. The paper reports on a three-year Australian Research Council funded project into “Creative Suburbia”, identifying the significant percentage of the creative industries workforce who live in suburban areas. Drawing on case studies from suburbs in the Australian cities of Brisbane and Melbourne, it notes the contrasts between the experience of these workers, who are generally positive towards suburban life, and the underlying assumptions of “creative cities” policy discourse that such workers prefer to be concentrated in high density inner urban creative clusters.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study presents the importance of a mentor’s (experienced teacher’s) personal attributes and pedagogical knowledge for developing a mentee’s (preservice teacher’s) teaching practices. Specifically, preservice teachers can have difficulties with behaviour management and must learn management strategies that help them to teach more effectively. This paper investigates how mentoring may facilitate the development of a mentee’s behaviour management strategies, in particular what personal attributes and pedagogical knowledge are used in this process.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: This study aimed to determine whether subjective dimensions of recovery such as empowerment are associated with self-report of more objective indicators such as level of participation in the community and income from employment. A secondary aim was to investigate the extent to which diagnosis or other consumer characteristics mediated any relationship between these variables. Methods: The Community Integration Measure, the Empowerment Scale, the Recovery Assessment Scale, and the Camberwell Assessment of Needs Short Appraisal Schedule were administered to a convenience sample of 161 consumers with severe mental illness. Results: The majority of participants had a primary diagnosis of schizophreniform, anxiety/depression or bipolar affective disorder. The Empowerment Scale was quite strongly correlated with the Recovery Assessment Scale and the Community Integration Measure. Participants with a diagnosis of bipolar affective disorder had signifi cantly higher recovery and empowerment scores than participants with schizophrenia or depression. Both empowerment and recovery scores were significantly higher for people engaged in paid employment than for those receiving social security benefits. Conclusions: The measurement of subjective dimensions of recovery such as empowerment has validity in evaluation of global recovery for people with severe mental illness. A diagnosis of bipolar disorder is associated with higher scores on subjective and objective indicators of recovery.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We propose an approach to employ eigen light-fields for face recognition across pose on video. Faces of a subject are collected from video frames and combined based on the pose to obtain a set of probe light-fields. These probe data are then projected to the principal subspace of the eigen light-fields within which the classification takes place. We modify the original light-field projection and found that it is more robust in the proposed system. Evaluation on VidTIMIT dataset has demonstrated that the eigen light-fields method is able to take advantage of multiple observations contained in the video.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The design of artificial intelligence in computer games is an important component of a player's game play experience. As games are becoming more life-like and interactive, the need for more realistic game AI will increase. This is particularly the case with respect to AI that simulates how human players act, behave and make decisions. The purpose of this research is to establish a model of player-like behavior that may be effectively used to inform the design of artificial intelligence to more accurately mimic a player's decision making process. The research uses a qualitative analysis of player opinions and reactions while playing a first person shooter video game, with recordings of their in game actions, speech and facial characteristics. The initial studies provide player data that has been used to design a model of how a player behaves.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

For people with intellectual disabilities there are significant barriers to inclusion in socially cooperative endeavours. This paper investigates the effectiveness of Stomp, a tangible user interface (TUI) designed to provide new participatory experiences for people with intellectual disability. Results from an observational study reveal the extent to which the Stomp system supports social and physical interaction. The tangible, spatial and embodied qualities of Stomp result in an experience that does not rely on the acquisition of specific competencies before interaction and engagement can occur.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The existing Collaborative Filtering (CF) technique that has been widely applied by e-commerce sites requires a large amount of ratings data to make meaningful recommendations. It is not directly applicable for recommending products that are not frequently purchased by users, such as cars and houses, as it is difficult to collect rating data for such products from the users. Many of the e-commerce sites for infrequently purchased products are still using basic search-based techniques whereby the products that match with the attributes given in the target user's query are retrieved and recommended to the user. However, search-based recommenders cannot provide personalized recommendations. For different users, the recommendations will be the same if they provide the same query regardless of any difference in their online navigation behaviour. This paper proposes to integrate collaborative filtering and search-based techniques to provide personalized recommendations for infrequently purchased products. Two different techniques are proposed, namely CFRRobin and CFAg Query. Instead of using the target user's query to search for products as normal search based systems do, the CFRRobin technique uses the products in which the target user's neighbours have shown interest as queries to retrieve relevant products, and then recommends to the target user a list of products by merging and ranking the returned products using the Round Robin method. The CFAg Query technique uses the products that the user's neighbours have shown interest in to derive an aggregated query, which is then used to retrieve products to recommend to the target user. Experiments conducted on a real e-commerce dataset show that both the proposed techniques CFRRobin and CFAg Query perform better than the standard Collaborative Filtering (CF) and the Basic Search (BS) approaches, which are widely applied by the current e-commerce applications. The CFRRobin and CFAg Query approaches also outperform the e- isting query expansion (QE) technique that was proposed for recommending infrequently purchased products.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The International Classification of Diseases (ICD) is used to categorise diseases, injuries and external causes, and is a key epidemiological tool enabling the storage and retrieval of data from health and vital records to produce core international mortality and morbidity statistics. The ICD is updated periodically to ensure the classification remains current and work is now underway to develop the next revision, ICD-11. There have been almost 20 years since the last ICD edition was published and over 60 years since the last substantial structural revision of the external causes chapter. Revision of such a critical tool requires transparency and documentation to ensure that changes made to the classification system are recorded comprehensively for future reference. In this paper, the authors provide a history of external causes classification development and outline the external cause structure. Approaches to manage ICD-10 deficiencies are discussed and the ICD-11 revision approach regarding the development of, rationale for and implications of proposed changes to the chapter are outlined. Through improved capture of external cause concepts in ICD-11, a stronger evidence base will be available to inform injury prevention, treatment, rehabilitation and policy initiatives to ultimately contribute to a reduction in injury morbidity and mortality.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

On 20 September 2001, the former US President, George W. Bush, declared what is now widely, and arguably infamously, known as a ‘war on terror’. In response to the fatal 9/11 attacks in New York and Washington, DC, President Bush identified the US military response as having far-reaching and long-lasting consequences. It was, he argued, ‘our war on terror’ that began ‘with al Qaeda, but … it will not end until every terrorist group of global reach has been found, stopped and defeated’ (CNN 2001). This was to be a war that would, in the words of former British Prime Minister, Tony Blair, seek to eliminate a threat that was ‘aimed at the whole democratic world’ (Blair 2001). Blair claimed that this threat is of such magnitude that unprecedented measures would need to be taken to uphold freedom and security. Blair would later admit that it was a war that ‘divided the country’ and was based on evidence ‘about Saddam having actual biological and chemical weapons, as opposed to the capability to develop them, has turned out to be wrong’ (Blair 2004). The failures of intelligence ushered in new political rhetoric in the form of ‘trust me’ because ‘instinct is no science’ (Blair 2004). The war on terror has been one of the most significant international events in the past three decades, alongside the collapse of the former Soviet Union, the end of apartheid in South Africa, the unification of Europe and the marketization of the People's Republic of China. Yet, unlike the other events, it will not be remembered for advancing democracy or sovereignty, but for the conviction politics of particular politicians who chose to dispense with international law and custom in pursuit of personal instincts that proved fatal. Since the invasions of Afghanistan in October 2001 and …

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The rapid growth in the number of users using social networks and the information that a social network requires about their users make the traditional matching systems insufficiently adept at matching users within social networks. This paper introduces the use of clustering to form communities of users and, then, uses these communities to generate matches. Forming communities within a social network helps to reduce the number of users that the matching system needs to consider, and helps to overcome other problems from which social networks suffer, such as the absence of user activities' information about a new user. The proposed system has been evaluated on a dataset obtained from an online dating website. Empirical analysis shows that accuracy of the matching process is increased using the community information.