964 resultados para overlapping community detection
Resumo:
This article presents a novel approach to confidentiality violation detection based on taint marking. Information flows are dynamically tracked between applications and objects of the operating system such as files, processes and sockets. A confidentiality policy is defined by labelling sensitive information and defining which information may leave the local system through network exchanges. Furthermore, per application profiles can be defined to restrict the sets of information each application may access and/or send through the network. In previous works, we focused on the use of mandatory access control mechanisms for information flow tracking. In this current work, we have extended the previous information flow model to track network exchanges, and we are able to define a policy attached to network sockets. We show an example application of this extension in the context of a compromised web browser: our implementation detects a confidentiality violation when the browser attempts to leak private information to a remote host over the network.
Resumo:
Objective The current study evaluated part of the Multifactorial Model of Driving Safety to elucidate the relative importance of cognitive function and a limited range of standard measures of visual function in relation to the Capacity to Drive Safely. Capacity to Drive Safely was operationalized using three validated screening measures for older drivers. These included an adaptation of the well validated Useful Field of View (UFOV) and two newer measures, namely a Hazard Perception Test (HPT), and a Hazard Change Detection Task (HCDT). Method Community dwelling drivers (n = 297) aged 65–96 were assessed using a battery of measures of cognitive and visual function. Results Factor analysis of these predictor variables yielded factors including Executive/Speed, Vision (measured by visual acuity and contrast sensitivity), Spatial, Visual Closure, and Working Memory. Cognitive and Vision factors explained 83–95% of age-related variance in the Capacity to Drive Safely. Spatial and Working Memory were associated with UFOV, HPT and HCDT, Executive/Speed was associated with UFOV and HCDT and Vision was associated with HPT. Conclusion The Capacity to Drive Safely declines with chronological age, and this decline is associated with age-related declines in several higher order cognitive abilities involving manipulation and storage of visuospatial information under speeded conditions. There are also age-independent effects of cognitive function and vision that determine driving safety.
Resumo:
Video surveillance systems using Closed Circuit Television (CCTV) cameras, is one of the fastest growing areas in the field of security technologies. However, the existing video surveillance systems are still not at a stage where they can be used for crime prevention. The systems rely heavily on human observers and are therefore limited by factors such as fatigue and monitoring capabilities over long periods of time. This work attempts to address these problems by proposing an automatic suspicious behaviour detection which utilises contextual information. The utilisation of contextual information is done via three main components: a context space model, a data stream clustering algorithm, and an inference algorithm. The utilisation of contextual information is still limited in the domain of suspicious behaviour detection. Furthermore, it is nearly impossible to correctly understand human behaviour without considering the context where it is observed. This work presents experiments using video feeds taken from CAVIAR dataset and a camera mounted on one of the buildings Z-Block) at the Queensland University of Technology, Australia. From these experiments, it is shown that by exploiting contextual information, the proposed system is able to make more accurate detections, especially of those behaviours which are only suspicious in some contexts while being normal in the others. Moreover, this information gives critical feedback to the system designers to refine the system.
Resumo:
In late 2007, Gold Coast City Council libraries embarked on an online library project, designed to ramp up libraries’ online services to customers. As part of this project, the Young People’s team identified a need to connect with youth aged 12 to 16 in the online environment, in order to create a direct channel of communication with this market segment and encourage them to engage with the library. Blogging was identified as an appropriate means of communicating with both current and potential library customers from this age group. The Young People’s team consequently prepared a concept plan for a youth blog for launch in Children’s Book Week 2008 and are working towards development of management and administrative models and documentation and implementation of the blog itself. While many libraries have been quick to take up Web 2.0-style services, there has been little formal publication about the successes (or failures) of this type of project. Likewise, few libraries have published about the planning, management, and administration of such services. The youth blog currently in development at Gold Coast City Council libraries will be supported by a robust planning phase and will be rigorously evaluated as part of the project. This paper will report on the project (its aims, objectives and outputs), the planning process, and the evaluation activities and outcomes.
Resumo:
The use of grant contracts to deliver community services is now a significant feature of all Australian government administrations. These contracts are the primary instrument governing the provision of such services to citizens and are largely outside the usual parliamentary review mechanisms and constraints. This article examines the extent of the erosion of fundamental constitutional principles facilitated by the use of private contracts, by applying the principles used in scrutiny of delegated legislation to standard form federal and State community service contracts. It reveals extensive executive power which, if the relationship were founded in legislative instruments rather than in private contract, would have to be justified to Parliament at least and possibly not tolerated.
Resumo:
Automatic species recognition plays an important role in assisting ecologists to monitor the environment. One critical issue in this research area is that software developers need prior knowledge of specific targets people are interested in to build templates for these targets. This paper proposes a novel approach for automatic species recognition based on generic knowledge about acoustic events to detect species. Acoustic component detection is the most critical and fundamental part of this proposed approach. This paper gives clear definitions of acoustic components and presents three clustering algorithms for detecting four acoustic components in sound recordings; whistles, clicks, slurs, and blocks. The experiment result demonstrates that these acoustic component recognisers have achieved high precision and recall rate.
Resumo:
This key planning textbook on designing healthy and sustainable communities informs planners about community life and the processes of planning and equips them with the essential knowledge and skills they need to organise change and improve the quality of urban living. The author examines the impacts of social and economic change on community life and organization and explores ways in which these changes can be planned and managed. Community planning is presented as a means to balance and integrate beneficial change with the maintenance of valued cultural traditions and life styles. This involves bringing together fields of study and practice including urban and regional planning, design, communication, housing, community organization, employment, transport, and governance. Links drawn between personal values, human activities, physical spaces and societal governance assist this process of synthesis. Establishing a common vocabulary to discuss planning - for urban and regional planners, including health planners; and open space planners - enables both students and practitioners to work with each other and with those for whom they provide services to create stronger, healthier and more sustainable communities. The aims and roles of community planning are explored and the key planning operations are explained, including the phases and applications of community planning method; the planning and location of community facilities; the roles of design in shaping responsive community spaces; and the capacity of different types of community governance to improve the relations between citizens and societies. The book is organized into two main parts: after the first three chapters have established the interests and scope of community planning, the next six each moves from an account of issues and theoretical concerns, through a review of case studies, to summaries of leading practice. This positive approach is intended to encourage readers to develop their own capacities for effective participation and action. The concluding chapter draws together the contributions of preceding ones to demonstrate the integrity of the community planning process
Resumo:
The automated extraction of roads from aerial imagery can be of value for tasks including mapping, surveillance and change detection. Unfortunately, there are no public databases or standard evaluation protocols for evaluating these techniques. Many techniques are further hindered by a reliance on manual initialisation, making large scale application of the techniques impractical. In this paper, we present a public database and evaluation protocol for the evaluation of road extraction algorithms, and propose an improved automatic seed finding technique to initialise road extraction, based on a combination of geometric and colour features.
Resumo:
This paper presents a novel technique for performing SLAM along a continuous trajectory of appearance. Derived from components of FastSLAM and FAB-MAP, the new system dubbed Continuous Appearance-based Trajectory SLAM (CAT-SLAM) augments appearancebased place recognition with particle-filter based ‘pose filtering’ within a probabilistic framework, without calculating global feature geometry or performing 3D map construction. For loop closure detection CAT-SLAM updates in constant time regardless of map size. We evaluate the effectiveness of CAT-SLAM on a 16km outdoor road network and determine its loop closure performance relative to FAB-MAP. CAT-SLAM recognizes 3 times the number of loop closures for the case where no false positives occur, demonstrating its potential use for robust loop closure detection in large environments.
Resumo:
While it is generally accepted in the learning and teaching literature that assessment is the single biggest influence on how students approach their learning, assessment methods within higher education are generally conservative and inflexible. Constrained by policy and accreditation requirements and the need for the explicit articulation of assessment standards for public accountability purposes, assessment tasks can fail to engage students or reflect the tasks students will face in the world of practice. Innovative assessment design can simultaneously deliver program objectives and active learning through a knowledge transfer process which increases student participation. This social constructivist view highlights that acquiring an understanding of assessment processes, criteria and standards needs active student participation. Within this context, a peer-assessed, weekly, assessment task was introduced in the first “serious” accounting subject offered as part of an undergraduate degree. The positive outcomes of this assessment innovation was that student failure rates declined 15%, tutorial participation increased fourfold, tutorial engagement increased six-fold and there was a 100% approval rating for the retention of the assessment task. In contributing to the core conference theme of “seismic” shifts within higher education, in stark contrast to the positive student response, staff-related issues of assessment conservatism and the necessity of meeting increasing research commitments, threatened the assessment task’s survival. These opposing forces to change have the potential to weaken the ability of higher education assessment arrangements to adequately serve either a new generation of students or the sector's community stakeholders.
Resumo:
Pedestrians’ use of mp3 players or mobile phones can pose the risk of being hit by motor vehicles. We present an approach for detecting a crash risk level using the computing power and the microphone of mobile devices that can be used to alert the user in advance of an approaching vehicle so as to avoid a crash. A single feature extractor classifier is not usually able to deal with the diversity of risky acoustic scenarios. In this paper, we address the problem of detection of vehicles approaching a pedestrian by a novel, simple, non resource intensive acoustic method. The method uses a set of existing statistical tools to mine signal features. Audio features are adaptively thresholded for relevance and classified with a three component heuristic. The resulting Acoustic Hazard Detection (AHD) system has a very low false positive detection rate. The results of this study could help mobile device manufacturers to embed the presented features into future potable devices and contribute to road safety.
Resumo:
While it is generally accepted in the learning and teaching literature that assessment is the single biggest influence on how students approach their learning, assessment methods within higher education are generally conservative and inflexible. Constrained by policy and accreditation requirements and the need for the explicit articulation of assessment standards for public accountability purposes, assessment tasks can fail to engage students or reflect the tasks students will face in the world of practice. Innovative assessment design can simultaneously deliver program objectives and active learning through a knowledge transfer process which increases student participation. This social constructivist view highlights that acquiring an understanding of assessment processes, criteria and standards needs active student participation. Within this context, a peer-assessed, weekly, assessment task was introduced in the first “serious” accounting subject offered as part of an undergraduate degree. The positive outcomes of this assessment innovation was that student failure rates declined 15%, tutorial participation increased fourfold, tutorial engagement increased six-fold and there was a 100% approval rating for the retention of the assessment task. In contributing to the core conference theme of “seismic” shifts within higher education, in stark contrast to the positive student response, staff-related issues of assessment conservatism and the necessity of meeting increasing research commitments, threatened the assessment task’s survival. These opposing forces to change have the potential to weaken the ability of higher education assessment arrangements to adequately serve either a new generation of students or the sector's community stakeholders.
Resumo:
Community beliefs related to intentional injury inflicted by others were examined in a population-based telephone survey (n= 1032) in Queensland, Australia. Young adults 18-24 years were nominated as the most likely to be intentionally injured. 89.1% of respondents nominating this group believed that the injury incidents occur in alcohol environments. Though respondents from this age group also identified 18-24 yo as most likely to be intentionally injured, this was at a significantly lower level than did parents or 25-64 yo respondents. Responsibility for preventing injuries was placed on proprietors of licensed premises, schools and parents/family of the victim for alcohol, school and home environments respectively. Beliefs were aligned with prevalence data on intentional injury demonstrating a high level of awareness in the community about likely victims and situations where intentional injuries occur. Interventions could target families of young adults to capitalize on high levels of awareness about young adult vulnerability.