822 resultados para location privacy
Resumo:
The process of structural health monitoring (SHM) involves monitoring a structure over a period of time using appropriate sensors, extracting damage sensitive features from the measurements made by the sensors and analysing these features to determine the current state of the structure. Various techniques are available for structural health monitoring of structures and acoustic emission (AE) is one technique that is finding an increasing use. Acoustic emission waves are the stress waves generated by the mechanical deformation of materials. AE waves produced inside a structure can be recorded by means of sensors attached on the surface. Analysis of these recorded signals can locate and assess the extent of damage. This paper describes preliminary studies on the application of AE technique for health monitoring of bridge structures. Crack initiation or structural damage will result in wave propagation in solid and this can take place in various forms. Propagation of these waves is likely to be affected by the dimensions, surface properties and shape of the specimen. This, in turn, will affect source localization. Various laboratory test results will be presented on source localization, using pencil lead break tests. The results from the tests can be expected to aid in enhancement of knowledge of acoustic emission process and development of effective bridge structure diagnostics system.
Resumo:
The Open and Trusted Health Information Systems (OTHIS) Research Group has formed in response to the health sector’s privacy and security requirements for contemporary Health Information Systems (HIS). Due to recent research developments in trusted computing concepts, it is now both timely and desirable to move electronic HIS towards privacy-aware and security-aware applications. We introduce the OTHIS architecture in this paper. This scheme proposes a feasible and sustainable solution to meeting real-world application security demands using commercial off-the-shelf systems and commodity hardware and software products.
Resumo:
Digital rights management allows information owners to control the use and dissemination of electronic documents via a machine-readable licence. This paper describes the design and implementation of a system for creating and enforcing licences containing location constraints that can be used to restrict access to sensitive documents to a defined area. Documents can be loaded onto a portable device and used in the approved areas, but cannot be used if the device moves to another area. Our contribution includes a taxonomy for access control in the presence of requests to perform non-instantaneous controlled actions.
Resumo:
SITDRM 1 is a privacy protection system that protects private data through the enforcement of MPEG REL licenses provided by consumers. Direct issuing of licenses by consumers has several usability problems that will be mentioned in this paper. Further, we will describe how SITDRM incorporates P3P language to provide a consumer-centered privacy protection system.
Resumo:
PURPOSE. This study was conducted to determine the magnitude of pupil center shift between the illumination conditions provided by corneal topography measurement (photopic illuminance) and by Hartmann-Shack aberrometry (mesopic illuminance) and to investigate the importance of this shift when calculating corneal aberrations and for the success of wavefront-guided surgical procedures. METHODS. Sixty-two subjects with emmetropia underwent corneal topography and Hartmann-Shack aberrometry. Corneal limbus and pupil edges were detected, and the differences between their respective centers were determined for both procedures. Corneal aberrations were calculated using the pupil centers for corneal topography and for Hartmann-Shack aberrometry. Bland-Altmann plots and paired t-tests were used to analyze the differences between corneal aberrations referenced to the two pupil centers. RESULTS. The mean magnitude (modulus) of the displacement of the pupil with the change of the illumination conditions was 0.21 ± 0.11 mm. The effect of this pupillary shift was manifest for coma corneal aberrations for 5-mm pupils, but the two sets of aberrations calculated with the two pupil positions were not significantly different. Sixty-eight percent of the population had differences in coma smaller than 0.05 µm, and only 4% had differences larger than 0.1 µm. Pupil displacement was not large enough to significantly affect other higher-order Zernike modes. CONCLUSIONS. Estimated corneal aberrations changed slightly between photopic and mesopic illumination conditions given by corneal topography and Hartmann-Shack aberrometry. However, this systematic pupil shift, according to the published tolerances ranges, is enough to deteriorate the optical quality below the theoretically predicted diffraction limit of wavefront-guided corneal surgery.
Resumo:
Privacy enhancing protocols (PEPs) are a family of protocols that allow secure exchange and management of sensitive user information. They are important in preserving users’ privacy in today’s open environment. Proof of the correctness of PEPs is necessary before they can be deployed. However, the traditional provable security approach, though well established for verifying cryptographic primitives, is not applicable to PEPs. We apply the formal method of Coloured Petri Nets (CPNs) to construct an executable specification of a representative PEP, namely the Private Information Escrow Bound to Multiple Conditions Protocol (PIEMCP). Formal semantics of the CPN specification allow us to reason about various security properties of PIEMCP using state space analysis techniques. This investigation provides us with preliminary insights for modeling and verification of PEPs in general, demonstrating the benefit of applying the CPN-based formal approach to proving the correctness of PEPs.
Leading indigenous education in a remote location : reflections on teaching to be "proud and deadly"
Resumo:
This thesis is a critical reflection of the author’s time as a Principal of an Indigenous state school from 2003-2004. The purpose is to reassess the impact of her principalship in terms of the staff, students and Community change that affected learning outcomes at the school and to reanalyse to what actions and to whom positive changes could be attributed. This thesis reflects and identifies, in light of the literature, strategies which were effective in enhancing student learning outcomes. The focus of this thesis was the Doongal State School*, its students, staff and facilities. The author will attempt to draw out theoretical frameworks in terms of: (1) what changed educationally in Doongal State School, (2) what seemed to be important in the Principal’s role, (3) the processes that took place, and (4) the effect of being non- Indigenous and a female. Overall, the author undertook this critical reflection in order to understand and embrace educational practices that will (a) lessen the gap between the academic outcomes achieved by Indigenous and non-Indigenous students, and (b) enhance life choices for Indigenous children. The findings indicate that principal leadership is critical for success in Indigenous schools and is the centrepiece of the models developed to explain improvement at Doongal State School. School factors, Principal Leadership factors, Change factors and factors relating to being a non-Indigenous female principal, which, when implemented, will lead to improved educational outcomes for Indigenous students, have evolved as a result of this thesis. Principal Leadership factors were found to be the enablers for the effective implementation of the key components for success.
Resumo:
Purpose: There have been few studies of visual temporal processing of myopic eyes. This study investigated the visual performance of emmetropic and myopic eyes using a backward visual masking location task. Methods: Data were collected for 39 subjects (15 emmetropes, 12 stable myopes, 12 progressing myopes). In backward visual masking, a target’s visibility is reduced by a mask presented in quick succession ‘after’ the target. The target and mask stimuli were presented at different interstimulus intervals (from 12 to 300 ms). The task involved locating the position of a target letter with both a higher (seven per cent) and a lower (five per cent) contrast. Results: Emmetropic subjects had significantly better performance for the lower contrast location task than the myopes (F2,36 = 22.88; p < 0.001) but there was no difference between the progressing and stable myopic groups (p = 0.911). There were no differences between the groups for the higher contrast location task (F2,36 = 0.72, p = 0.495). No relationship between task performance and either the magnitude of myopia or axial length was found for either task. Conclusions: A location task deficit was observed in myopes only for lower contrast stimuli. Both emmetropic and myopic groups had better performance for the higher contrast task compared to the lower contrast task, with myopes showing considerable improvement. This suggests that five per cent contrast may be the contrast threshold required to bias the task towards the magnocellular system (where myopes have a temporal processing deficit). Alternatively, the task may be sensitive to the contrast sensitivity of the observer.
Resumo:
Location based games (LBGs) provide an opportunity to look at how new technologies can support a reciprocal relationship between formal classroom learning and learning that can potentially occur in other everyday environments. Fundamentally many games are intensely engaging due to the resulting social interactions and technical challenges they provide to individual and group players. By introducing the use of mobile devices we can transport these characteristics of games into everyday spaces. LBGs are understood as a broad genre incorporating ideas and tools that provide many unique opportunities for us to to reveal, create and even subvert various social, cultural, technical, and scientific interpretations of place, in particular places where learning is sometimes problematic.--------- A team of Queensland game developers have learnt a great deal through designing a range of LBGs such as SCOOT for various user groups and places. While these LBGs were primarily designed as social events, we found that the players recognised and valued the game as an opportunity to learn about their environment, it's history, cultural significance, inhabitants, services etc. Since identifying the strong pedagogical outcomes of LBGs, the team has created a set of authoring tools for people to design and host their own LBGs. A particular version of this is known as MiLK the mobile learning kit for schools.---------- This presentation will include examples of how LBGs have been used to improve the teaching and learning outcomes in various contexts. Participants will be introduced to MiLK and invited to trial it in their own classrooms with students.
Resumo:
Ubiquitous access to patient medical records is an important aspect of caring for patient safety. Unavailability of sufficient medical information at the point-ofcare could possibly lead to a fatality. The U.S. Institute of Medicine has reported that between 44,000 and 98,000 people die each year due to medical errors, such as incorrect medication dosages, due to poor legibility in manual records, or delays in consolidating needed information to discern the proper intervention. In this research we propose employing emergent technologies such as Java SIM Cards (JSC), Smart Phones (SP), Next Generation Networks (NGN), Near Field Communications (NFC), Public Key Infrastructure (PKI), and Biometric Identification to develop a secure framework and related protocols for ubiquitous access to Electronic Health Records (EHR). A partial EHR contained within a JSC can be used at the point-of-care in order to help quick diagnosis of a patient’s problems. The full EHR can be accessed from an Electronic Health Records Centre (EHRC) when time and network availability permit. Moreover, this framework and related protocols enable patients to give their explicit consent to a doctor to access their personal medical data, by using their Smart Phone, when the doctor needs to see or update the patient’s medical information during an examination. Also our proposed solution would give the power to patients to modify the Access Control List (ACL) related to their EHRs and view their EHRs through their Smart Phone. Currently, very limited research has been done on using JSCs and similar technologies as a portable repository of EHRs or on the specific security issues that are likely to arise when JSCs are used with ubiquitous access to EHRs. Previous research is concerned with using Medicare cards, a kind of Smart Card, as a repository of medical information at the patient point-of-care. However, this imposes some limitations on the patient’s emergency medical care, including the inability to detect the patient’s location, to call and send information to an emergency room automatically, and to interact with the patient in order to get consent. The aim of our framework and related protocols is to overcome these limitations by taking advantage of the SIM card and the technologies mentioned above. Briefly, our framework and related protocols will offer the full benefits of accessing an up-to-date, precise, and comprehensive medical history of a patient, whilst its mobility will provide ubiquitous access to medical and patient information everywhere it is needed. The objective of our framework and related protocols is to automate interactions between patients, healthcare providers and insurance organisations, increase patient safety, improve quality of care, and reduce the costs.
Resumo:
Establishing a nationwide Electronic Health Record system has become a primary objective for many countries around the world, including Australia, in order to improve the quality of healthcare while at the same time decreasing its cost. Doing so will require federating the large number of patient data repositories currently in use throughout the country. However, implementation of EHR systems is being hindered by several obstacles, among them concerns about data privacy and trustworthiness. Current IT solutions fail to satisfy patients’ privacy desires and do not provide a trustworthiness measure for medical data. This thesis starts with the observation that existing EHR system proposals suer from six serious shortcomings that aect patients’ privacy and safety, and medical practitioners’ trust in EHR data: accuracy and privacy concerns over linking patients’ existing medical records; the inability of patients to have control over who accesses their private data; the inability to protect against inferences about patients’ sensitive data; the lack of a mechanism for evaluating the trustworthiness of medical data; and the failure of current healthcare workflow processes to capture and enforce patient’s privacy desires. Following an action research method, this thesis addresses the above shortcomings by firstly proposing an architecture for linking electronic medical records in an accurate and private way where patients are given control over what information can be revealed about them. This is accomplished by extending the structure and protocols introduced in federated identity management to link a patient’s EHR to his existing medical records by using pseudonym identifiers. Secondly, a privacy-aware access control model is developed to satisfy patients’ privacy requirements. The model is developed by integrating three standard access control models in a way that gives patients access control over their private data and ensures that legitimate uses of EHRs are not hindered. Thirdly, a probabilistic approach for detecting and restricting inference channels resulting from publicly-available medical data is developed to guard against indirect accesses to a patient’s private data. This approach is based upon a Bayesian network and the causal probabilistic relations that exist between medical data fields. The resulting definitions and algorithms show how an inference channel can be detected and restricted to satisfy patients’ expressed privacy goals. Fourthly, a medical data trustworthiness assessment model is developed to evaluate the quality of medical data by assessing the trustworthiness of its sources (e.g. a healthcare provider or medical practitioner). In this model, Beta and Dirichlet reputation systems are used to collect reputation scores about medical data sources and these are used to compute the trustworthiness of medical data via subjective logic. Finally, an extension is made to healthcare workflow management processes to capture and enforce patients’ privacy policies. This is accomplished by developing a conceptual model that introduces new workflow notions to make the workflow management system aware of a patient’s privacy requirements. These extensions are then implemented in the YAWL workflow management system.