953 resultados para computer forensics tools


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the legal domain, it is rare to find solutions to problems by simply applying algorithms or invoking deductive rules in some knowledge‐based program. Instead, expert practitioners often supplement domain‐specific knowledge with field experience. This type of expertise is often applied in the form of an analogy. This research proposes to combine both reasoning with precedents and reasoning with statutes and regulations in a way that will enhance the statutory interpretation task. This is being attempted through the integration of database and expert system technologies. Case‐based reasoning is being used to model legal precedents while rule‐based reasoning modules are being used to model the legislation and other types of causal knowledge. It is hoped to generalise these findings and to develop a formal methodology for integrating case‐based databases with rule‐based expert systems in the legal domain.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

United States copyright law -- two streams of computer copyright cases form basis for 'look and feel' litigation, literary work stream and audiovisual work stream -- literary work stream focuses on structure -- audiovisual work steam addresses appearance -- case studies

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In order to deal with human biological problems, life scientists have started investigating artificial ways of generating tissues and growing cells ? leading to the evolution of tissue engineering. In this paper we explore visualization practices of life scientists working within the domain of tissue engineering. We carried out a small scale ethnographic exploration with 8 scientists and explored that the real value of scientists' experiments (and simulations), reasoning and collaborative processes go beyond their end results. We observed that these scientists' three-dimensional reasoning, corporeal knowledge and intimacy with biological objects and tools play a vital role in overall success.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study was a step forward to improve the performance for discovering useful knowledge – especially, association rules in this study – in databases. The thesis proposed an approach to use granules instead of patterns to represent knowledge implicitly contained in relational databases; and multi-tier structure to interpret association rules in terms of granules. Association mappings were proposed for the construction of multi-tier structure. With these tools, association rules can be quickly assessed and meaningless association rules can be justified according to the association mappings. The experimental results indicated that the proposed approach is promising.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper presents a participatory design research framework as a primary method for structuring youth engagement, participation and contribution to the design, development and usability evaluation of three evidencebased e-tools for wellbeing, which include smart phone mobile apps as well as e-health websites. The three projects are part of a series of six e-tools part of Safe and Supportive program under Young and Well CRC. The participatory design method, developed by Zelenko (2012) for application in design of online health promoting technologies, was further piloted in partnership with Inspire USA for specific application within the CRC, deploying a combination of creative design workshops and speculative design activities in developing e-tool prototypes with young people. This paper presents the resulting participatory research framework as it was implemented across the e-tool projects to facilitate active youth participation in co-designing the e-tools and ensuring the final designs are relevant to young people and deliver health messages in engaging ways. The principles of Participatory Design (PD) that inform the new framework include a high degree of participant agency in creative decisionmaking and a commitment to the process of co-designing, with young people working alongside designers and developers. The paper will showcase how the PD framework was applied across three projects to increase young people’s contribution to final design outcome.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose The purpose of this study was to evaluate the validity of the CSA activity monitor as a measure of children's physical activity using energy expenditure (EE) as a criterion measure. Methods Thirty subjects aged 10 to 14 performed three 5-min treadmill bouts at 3, 4, and 6 mph, respectively. While on the treadmill, subjects wore CSA (WAM 7164) activity monitors on the right and left hips. (V) over dot O-2 was monitored continuously by an automated system. EE was determined by multiplying the average (V) over dot O-2 by the caloric equivalent of the mean respiratory exchange ratio. Results Repeated measures ANOVA indicated that both CSA monitors were sensitive to changes in treadmill speed. Mean activity counts from each CSA unit were not significantly different and the intraclass reliability coefficient for the two CSA units across all speeds was 0.87. Activity counts from both CSA units were strongly correlated with EE (r = 0.86 and 0.87, P < 0.001). An EE prediction equation was developed from 20 randomly selected subjects and cross-validated on the remaining 10. The equation predicted mean EE within 0.01 kcal.min(-1). The correlation between actual and predicted values was 0.93 (P < 0.01) and the SEE was 0.93 kcal.min(-1). Conclusion These data indicate that the CSA monitor is a valid and reliable tool for quantifying treadmill walking and running in children.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background While adverse events primarily affect the patient, surgeons involved can also experience considerable distress. Aims The aim of the survey was to assess the impact of complications on the day-to-day life, work and health of Australian and New Zealand obstetricians and gynaecologists and to evaluate existing support systems and coping strategies. Methods A 43-question survey on self-assessment, quality assurance (QA) tools, impact of complications on individuals’ health and relationships, and support available was emailed to fellows, trainees, subspecialists and subspecialty trainees of the Royal Australian and New Zealand College of Obstetrics and Gynaecology (RANZCOG). We collected 606 responses from a target population of 2296 (response rate 26.3%). Results When complications occur, sleep was affected of 80%, family and social relationships of 55% and physical health of 48% of respondents. The major sources of support were from colleagues (83%), family (82%) and medical defence organisations (73%), with professional bodies perceived as providing least support. Nearly 80% of respondents felt the need to talk to someone they trust during times of complications. Overall, 100% of respondents used at least one QA tool (62% used two, 26% three and 9% four QA strategies). There were significant differences between respondent groups in use of the QA tools. Conclusions Surgical complications have a significant impact on the well-being of Australian and New Zealand obstetricians and gynaecologists. Existing support comes from colleagues and family, but structured, unbiased support for surgeons from a professional source is urgently warranted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security protocols are designed in order to provide security properties (goals). They achieve their goals using cryptographic primitives such as key agreement or hash functions. Security analysis tools are used in order to verify whether a security protocol achieves its goals or not. The analysed property by specific purpose tools are predefined properties such as secrecy (confidentiality), authentication or non-repudiation. There are security goals that are defined by the user in systems with security requirements. Analysis of these properties is possible with general purpose analysis tools such as coloured petri nets (CPN). This research analyses two security properties that are defined in a protocol that is based on trusted platform module (TPM). The analysed protocol is proposed by Delaune to use TPM capabilities and secrets in order to open only one secret from two submitted secrets to a recipient

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The continuum model is a key paradigm describing the behavior of electromechanical transients in power systems. In the past two decades, much research work has been done on applying the continuum model to analyze the electromechanical wave in power systems. In this work, the uniform and non-uniform continuum models are first briefly described, and some explanations borrowing concepts and tools from other fields are given. Then, the existing approaches of investigating the resulting wave equations are summarized. An application named the zero reflection controller based on the idea of the wave equations is next presented.