910 resultados para Multi-modal information processing


Relevância:

100.00% 100.00%

Publicador:

Resumo:

For decades Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) have used computers to monitor and control physical processes in many critical industries, including electricity generation, gas pipelines, water distribution, waste treatment, communications and transportation. Increasingly these systems are interconnected with corporate networks via the Internet, making them vulnerable and exposed to the same risks as those experiencing cyber-attacks on a conventional network. Very often SCADA networks services are viewed as a specialty subject, more relevant to engineers than standard IT personnel. Educators from two Australian universities have recognised these cultural issues and highlighted the gap between specialists with SCADA systems engineering skills and the specialists in network security with IT background. This paper describes a learning approach designed to help students to bridge this gap, gain theoretical knowledge of SCADA systems' vulnerabilities to cyber-attacks via experiential learning and acquire practical skills through actively participating in hands-on exercises.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

BACKGROUND: The intense pain and anxiety triggered by burns and their associated wound care procedures are well established in the literature. Non-pharmacological intervention is a critical component of total pain management protocols and is used as an adjunct to pharmacological analgesia. An example is virtual reality, which has been used effectively to dampen pain intensity and unpleasantness. Possible links or causal relationships between pain/anxiety/stress and burn wound healing have previously not been investigated. The purpose of this study is to investigate these relationships, specifically by determining if a newly developed multi-modal procedural preparation and distraction device (Ditto) used during acute burn wound care procedures will reduce the pain and anxiety of a child and increase the rate of re-epithelialization. METHODS/DESIGN: Children (4 to 12 years) with acute burn injuries presenting for their first dressing change will be randomly assigned to either the (1) Control group (standard distraction) or (2) Ditto intervention group (receiving Ditto, procedural preparation and Ditto distraction). It is intended that a minimum of 29 participants will be recruited for each treatment group. Repeated measures of pain intensity, anxiety, stress and healing will be taken at every dressing change until complete wound re-epithelialization. Further data collection will aid in determining patient satisfaction and cost effectiveness of the Ditto intervention, as well as its effect on speed of wound re-epithelialization. DISCUSSION: Results of this study will provide data on whether the disease process can be altered by reducing stress, pain and anxiety in the context of acute burn wounds. TRIAL REGISTRATION: ACTRN12611000913976.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We propose to use a simple and effective way to achieve secure quantum direct secret sharing. The proposed scheme uses the properties of fountain codes to allow a realization of the physical conditions necessary for the implementation of no-cloning principle for eavesdropping-check and authentication. In our scheme, to achieve a variety of security purposes, nonorthogonal state particles are inserted in the transmitted sequence carrying the secret shares to disorder it. However, the positions of the inserted nonorthogonal state particles are not announced directly, but are obtained by sending degrees and positions of a sequence that are pre-shared between Alice and each Bob. Moreover, they can confirm that whether there exists an eavesdropper without exchanging classical messages. Most importantly, without knowing the positions of the inserted nonorthogonal state particles and the sequence constituted by the first particles from every EPR pair, the proposed scheme is shown to be secure.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Sharing photos through mobile devices has a great potential for creating shared experiences of social events between co-located as well as remote participants. In order to design novel event sharing tools, we need to develop in-depth understanding of current practices surrounding these so called ‘event photos’- photos about and taken during different social events such as weddings picnics, and music concert visits among others. We studied people’s practices related to event photos through in-depth interviews, guided home visits and naturalistic observations. Our results show four major themes describing practices surrounding event photos: 1) representing events, 2) significant moments, 3) situated activities through photos, and 4) collectivism and roles of participants.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Based on longitudinal ethnographic fieldwork in two industrial design departments and two design companies, we explore the role of spatial arrangements for supporting creative design practices within different design studios. From our results, we show that designers explicitly make use of the physical space for: 1) communicating and inspiring design ideas; 2) exploring design solutions, and; 3) managing design projects. We believe that these design practices could bring insightful implications for developing ubiquitous technologies to support the design profession.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we propose a steganalysis method that is able to identify the locations of stego bearing pixels in the binary image. In order to do that, our proposed method will calculate the residual between a given stego image and its estimated cover image. After that, we will compute the local entropy difference between these two versions of images as well. Finally, we will compute the mean of residual and mean of local entropy difference across multiple stego images. From these two means, the locations of stego bearing pixels can be identified. The presented empirical results demonstrate that our proposed method can identify the stego bearing locations of near perfect accuracy when sufficient stego images are supplied. Hence, our proposed method can be used to reveal which pixels in the binary image have been used to carry the secret message.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Designing systems for multiple stakeholders requires frequent collaboration with multiple stakeholders from the start. In many cases at least some stakeholders lack a professional habit of formal modeling. We report observations from student design teams as well as two case studies, respectively of a prototype for supporting creative communication to design objects, and of stakeholder-involvement in early design. In all observations and case studies we found that non-formal techniques supported strong collaboration resulting in deep understanding of early design ideas, of their value and of the feasibility of solutions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A BPMN model is well-structured if splits and joins are always paired into single-entry-single-exit blocks. Well-structuredness is often a desirable property as it promotes readability and makes models easier to analyze. However, many process models found in practice are not well-structured, and it is not always feasible or even desirable to restrict process modelers to produce only well-structured models. Also, not all processes can be captured as well-structured process models. An alternative to forcing modelers to produce well-structured models, is to automatically transform unstructured models into well-structured ones when needed and possible. This talk reviews existing results on automatic transformation of unstructured process models into structured ones.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Process models are usually depicted as directed graphs, with nodes representing activities and directed edges control flow. While structured processes with pre-defined control flow have been studied in detail, flexible processes including ad-hoc activities need further investigation. This paper presents flexible process graph, a novel approach to model processes in the context of dynamic environment and adaptive process participants’ behavior. The approach allows defining execution constraints, which are more restrictive than traditional ad-hoc processes and less restrictive than traditional control flow, thereby balancing structured control flow with unstructured ad-hoc activities. Flexible process graph focuses on what can be done to perform a process. Process participants’ routing decisions are based on the current process state. As a formal grounding, the approach uses hypergraphs, where each edge can associate any number of nodes. Hypergraphs are used to define execution semantics of processes formally. We provide a process scenario to motivate and illustrate the approach.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We present PAC-Bayes-Empirical-Bernstein inequality. The inequality is based on combination of PAC-Bayesian bounding technique with Empirical Bernstein bound. It allows to take advantage of small empirical variance and is especially useful in regression. We show that when the empirical variance is significantly smaller than the empirical loss PAC-Bayes-Empirical-Bernstein inequality is significantly tighter than PAC-Bayes-kl inequality of Seeger (2002) and otherwise it is comparable. PAC-Bayes-Empirical-Bernstein inequality is an interesting example of application of PAC-Bayesian bounding technique to self-bounding functions. We provide empirical comparison of PAC-Bayes-Empirical-Bernstein inequality with PAC-Bayes-kl inequality on a synthetic example and several UCI datasets.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

First Asia Pacific Conference, AP-BPM 2013, Beijing, China, August 29-30, 2013. Selected Papers

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This research investigated the prevalence of vision disorders in Queensland Indigenous primary school children, creating the first comprehensive visual profile of Indigenous children. Findings showed reduced convergence ability and reduced visual information processing skills were more common in Indigenous compared to non-Indigenous children. Reduced visual information processing skills were also associated with reduced reading outcomes in both groups of children. As early detection of visual disorders is important, the research also reviewed the delivery of screening programs across Queensland and proposed a model for improved coordination and service delivery of vision screening to Queensland school children.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Transactive memory system (TMS) theory explains how expertise is recognized and coordinated in teams. Extending current TMS research from a group information-processing perspective, our article presents a theoretical model that considers TMS development from a social identity perspective. We discuss how two features of communication (quantity and quality) important to TMS development are linked to TMS through the group identification mechanism of a shared common team identity. Informed by social identity theory, we also differentiate between intragroup and intergroup contexts and outline how, in multidisciplinary teams, professional identification and perceived equality of status among professional subgroups have a role to play in TMS development. We provide a theoretical discussion of future research directions aimed at testing and extending our model.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Technological maturity and the exponential growth of digital applications are contributing to lifestyle changes worldwide. Consequently, learning and teaching is demanding more effective sociotechnical interactions involving emerging technologies, as opposed to traditional, conventional face-to-face learning and teaching approaches. In this context, usability engineering is making significant contributions for improving computer and distance-based learning, both for learners and instructors, which have often been ignored when designing online learning and teaching applications. Usability testing is a central part of the human centered learning approach for developing sustainable STEM education from the socio-technological perspective. Our experiences with usability engineering and the impact of teaching low-cost rapid usability testing methods on knowledge translation from undergraduate to graduate courses to real-world practice (i.e. getting the methods out there in real use) are diverse and multi-modal. Our sample space has been hundreds of trained students who have learned how to do effective usability engineering in real-world situations at higher levels of realism (i.e. fidelity) and at a much lower cost than using traditional fixed usability labs. Furthermore, this low-cost rapid approach to usability engineering has been adopted by many of our graduates who are now managers, CIOs etc and who are using the methods routinely in their organizations in real world applications and scenarios. This knowledge has been used to improve design and implementation of a wide range of applications, including applications designed for teaching and learning.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper elaborates on the use of future wireless communication networks for autonomous city vehicles. After addressing the state of technology, the paper explains the autonomous vehicle control system architecture and the Cybercars-2 communication framework; it presents experimental tests of communication-based real-time decision making; and discusses potential applications for communication in order to improve the localization and perception abilities of autonomous vehicles in urban environments.