941 resultados para LOW-LEVEL LASER THERAPY
Resumo:
Retrieving information from Twitter is always challenging due to its large volume, inconsistent writing and noise. Most existing information retrieval (IR) and text mining methods focus on term-based approach, but suffers from the problems of terms variation such as polysemy and synonymy. This problem deteriorates when such methods are applied on Twitter due to the length limit. Over the years, people have held the hypothesis that pattern-based methods should perform better than term-based methods as it provides more context, but limited studies have been conducted to support such hypothesis especially in Twitter. This paper presents an innovative framework to address the issue of performing IR in microblog. The proposed framework discover patterns in tweets as higher level feature to assign weight for low-level features (i.e. terms) based on their distributions in higher level features. We present the experiment results based on TREC11 microblog dataset and shows that our proposed approach significantly outperforms term-based methods Okapi BM25, TF-IDF and pattern based methods, using precision, recall and F measures.
Resumo:
This article considers the uncertainty surrounding the scope of the best interests duty which forms part of the Government’s Future of Financial Advice (FOFA) reforms. It is likely to be many years before the courts can interpret and clarify the content of the duty. Under the new regime, the provision of personal financial advice will be made more difficult, complex and costly and these costs will be passed on to consumers. The article also considers whether there will still be scope for delivering standardized, non-tailored advice in the light of the best interests duty. In the pas standardized advice has allowed large amounts of low-level, generic advice to be delivered very efficiently. In order to avoid breaching the best interests duty standardized advice should only be used rarely, and only after a careful assessment has been made to ensure that a standardized approach is appropriate.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
Smartphones are steadily gaining popularity, creating new application areas as their capabilities increase in terms of computational power, sensors and communication. Emerging new features of mobile devices give opportunity to new threats. Android is one of the newer operating systems targeting smartphones. While being based on a Linux kernel, Android has unique properties and specific limitations due to its mobile nature. This makes it harder to detect and react upon malware attacks if using conventional techniques. In this paper, we propose an Android Application Sandbox (AASandbox) which is able to perform both static and dynamic analysis on Android programs to automatically detect suspicious applications. Static analysis scans the software for malicious patterns without installing it. Dynamic analysis executes the application in a fully isolated environment, i.e. sandbox, which intervenes and logs low-level interactions with the system for further analysis. Both the sandbox and the detection algorithms can be deployed in the cloud, providing a fast and distributed detection of suspicious software in a mobile software store akin to Google's Android Market. Additionally, AASandbox might be used to improve the efficiency of classical anti-virus applications available for the Android operating system.
Resumo:
The GameFlow model strives to be a general model of player enjoyment, applicable to all game genres and platforms. Derived from a general set of heuristics for creating enjoyable player experiences, the GameFlow model has been widely used in evaluating many types of games, as well as non-game applications. However, we recognize that more specific, low-level, and implementable criteria are potentially more useful for designing and evaluating video games. Consequently, the research reported in this paper aims to provide detailed heuristics for designing and evaluating one specific game genre, real-time strategy games. In order to develop these heuristics, we conducted a grounded theoretical analysis on a set of professional game reviews and structured the resulting heuristics using the GameFlow model. A selection of the resulting 165 heuristics are presented in this paper and discussed with respect to key evaluations of the GameFlow model.
Resumo:
The GameFlow model strives to be a general model of player enjoyment, applicable to all game genres and platforms. Derived from a general set of heuristics for creating enjoyable player experiences, the GameFlow model has been widely used in evaluating many types of games, as well as non-game applications. However, we recognize that more specific, low-level, and implementable criteria are potentially more useful for designing and evaluating video games. Consequently, the research reported in this paper aims to provide detailed heuristics for designing and evaluating one specific game genre, real-time strategy games. In order to develop these heuristics, we conducted a grounded theoretical analysis on a set of professional game reviews and structured the resulting heuristics using the GameFlow model. The resulting 165 heuristics for designing and evaluating real-time strategy games are presented and discussed in this paper.
Resumo:
Private data stored on smartphones is a precious target for malware attacks. A constantly changing environment, e.g. switching network connections, can cause unpredictable threats, and require an adaptive approach to access control. Context-based access control is using dynamic environmental information, including it into access decisions. We propose an "ecosystem-in-an-ecosystem" which acts as a secure container for trusted software aiming at enterprise scenarios where users are allowed to use private devices. We have implemented a proof-of-concept prototype for an access control framework that processes changes to low-level sensors and semantically enriches them, adapting access control policies to the current context. This allows the user or the administrator to maintain fine-grained control over resource usage by compliant applications. Hence, resources local to the trusted container remain under control of the enterprise policy. Our results show that context-based access control can be done on smartphones without major performance impact.
Resumo:
Efficient state asset management is crucial for government departments that rely on the operations of their state assets in order to fulfil their public functions, which include public service provision and others. These assets may be expensive, extensive and or, complex, and can have a major impact on the ability of governments to perform its function over extended periods. Various governments around the world have increasingly recognised the importance of an efficient state asset management laws, policies, and practices; exemplified by the surge in state asset management reform. This phenomenon is evident in Indonesia, in particular through the establishment of the Directorate General of State Assets in 2006, who was appointed as the ultimate state asset manager (of Republic of Indonesia) and the proprietor of state asset management reform. The Directorate General of State Assets too has pledged its adherence to good governance principles within its state asset management laws and policies reform. However the degree that good governance principles are conceptualised is unknown, resulting in questions of how and to what extent is good governance principles evident within Indonesia's reformed state asset management laws and policies. This study seeks to understand the level of which good governance principles are conceptualised and understood within reformed state asset management policies in Indonesia (as a case study), and identify the variables that play a role in the implementation of said reform. Although good governance improvements has been a central tenet in Indonesian government agenda, and state asset management reform has propelled in priority due to found neglect and unfavourable audit results; there is ambiguity in regards to the extent that good governance is conceptualised within the reform, how and whether this relationship is understood by state asset managers (i.e government officials), and what (and how) other variables play a supporting and/or impeding role in the reform. Using empirical data involving a sample of four Indonesian regional governments and 70 interviews; discrepancy in which good governance principles are conceptualised, the level it is conceptualised, at which stage of state asset management practice it is conceptualised, and the level it is understood by state asset managers (i.e government officials) was found. Human resource capacity and capability, the notion of 'needing more time', low legality, infancy of reform, and dysfunctional sense of stewardship are identified as specific impeding variables to state asset management reform; whilst decentralisation and regional autonomy regime, political history, and culture play a consistent undercurrent key role in good governance related reforms within Indonesia. This study offers insights to Indonesian policy makers interested in ensuring the conceptualisation and full implementation of good governance in all areas of governing, particularly within state asset management practices. Most importantly, this study identifies an asymmetry in good governance understanding, perspective, and assumptions between policy maker (i.e high level government officials) and policy implementers (i.e low level government officials); to be taken into account for future policy evolvements and/or writing. As such, this study suggests the need for a modified perspective and approach to good governance conceptualisation and implementation strategies, one that acknowledges and incorporates a nation's unique characteristics and no longer denies the double-edged sword of simplified assumptions of governance.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.
Resumo:
There has been a low level of interest in peripheral aberrations and corresponding image quality for over 200 years. Most work has been concerned with the second-order aberrations of defocus and astigmatism that can be corrected with conventional lenses. Studies have found high levels of aberration, often amounting to several dioptres, even in eyes with only small central defocus and astigmatism. My investigations have contributed to understanding shape changes in the eye with increases in myopia, changes in eye optics with ageing, and how surgical interventions intended to correct central refractive errors have unintended effects on peripheral optics. My research group has measured peripheral second- and higher-order aberrations over a 42° horizontal × 32° vertical diameter visual field. There is substantial variation in individual aberrations with age and pathology. While the higher-order aberrations in the periphery are usually small compared with second-order aberrations, they can be substantial and change considerably after refractive surgery. The thrust of my research in the next few years is to understand more about the peripheral aberrations of the human eye, to measure visual performance in the periphery and determine whether this can be improved by adaptive optics correction, to use measurements of peripheral aberrations to learn more about the optics of the eye and in particular the gradient index structure of the lens, and to investigate ways of increasing the size of the field of good retinal image quality.
Resumo:
The purpose of this study was to test a model of the relationship between temperament, character and job performance, in order to better understand the cause of stable individual differences in job performance. Personality was conceptualized in terms of Cloninger, Svrakic and Przybeck’s (1993) theoretical framework of personality. It was expected that Self Directedness (character) would mediate Harm Avoidance and Persistence (temperament) in the prediction of job performance. In order to test the hypotheses, a sample of 94 employee/supervisor pairs was recruited from several organizations across Australia. Participants completed a number of questionnaires online, regarding their personality traits (completed by employees) and Job Performance (completed by Supervisors). Consistent with the hypothesis, Self Directedness was found to be a moderate, direct predictor of job performance. Also consistent with the hypothesis, Self Directedness mediated Harm Avoidance in the prediction of job performance. Results show that character (Self Directedness) is important in the prediction of job performance, and also suggests that fearful, avoidant individuals are less likely to perform well in the workplace, based on their low level of character development.
Resumo:
The purpose of this study was to evaluate aspects of participation in a participatory action research project, the Ashgrove Healthy School Environment Project. Participatory action research is a form of research that creates change as an explicit part of the research process and requires the active participation of those by and for whom the research is being conducted. This study arose from concems by this researcher, who is also a co-facilitator of the project, that levels of participation were not as extensive as one might have hoped and that this seemingly low level would have a negative impact on the continuing participation of those already involved. Specifically. this evaluation sought to uncover the reasons that prompted participation, to identify structural barriers to initial involvement and to uncover participants' perceptions of the process, including barriers and opportunities. It also sought to record evidence of any shift in decision making and to draw implications about the findings that could assist the project, the school, other schools and the wider community. This evaluation involved focus group discussions and interviews with participants actively involved in the school project. The purpose was to uncover their views, feelings and perceptions about their participation and the participatory processes in use generally. It also included some examination of school documents and newsletters and as also drawn on the reflections of this 'insider' researcher, based on two years of involvement in facilitating the project. The findings that emerge from this study are heartening. Rather than feeling anxious about the long-term sustainability of the project, this researcher now feels more confident about its achievements, both in terms of the changes that have occurred in the school and about the participatory processes and levels of participation. Whilst the evaluation has identified a number of barriers, both institutional, personal and project related, it has also identified several key factors that serve to promote participation.
Resumo:
Objective: Several new types of contraception became available in Australia over the last twelve years (the implant in 2001, progestogen intra-uterine device (IUD) in 2003, and vaginal contraceptive ring in 2007). Most methods of contraception require access to health services. Permanent sterilisation and the insertion of an implant or IUD involve a surgical procedure. Access to health professionals providing these specialised services may be more difficult in rural areas. This paper examines uptake of permanent or long-acting reversible contraception (LARCs) among Australian women in rural areas compared to women in urban areas. Method: Participants in the Australian Longitudinal Study on Women's Health born in 1973-78 reported on their contraceptive use at three surveys: 2003, 2006 and 2009. Contraceptive methods included permanent sterilisation (tubal ligation, vasectomy), non-daily or LARC methods (implant, IUD, injection, vaginal ring), and other methods including daily, barrier or "natural" methods (oral contraceptive pills, condoms, withdrawal, safe period). Sociodemographic, reproductive history and health service use factors associated with using permanent, LARC or other methods were examined using a multivariable logistic regression analysis. Results: Of 9,081 women aged 25-30 in 2003, 3% used permanent methods and 4% used LARCs. Six years later in 2009, of 8,200 women (aged 31-36), 11% used permanent methods and 9% used LARCs. The fully adjusted parsimonious regression model showed that the likelihood of a woman using LARCs and permanent methods increased with number of children. Women whose youngest child was school-age were more likely to use LARCs (OR=1.83, 95%CI 1.43-2.33) or permanent methods (OR=4.39, 95%CI 3.54-5.46) compared to women with pre-school children. Compared to women living in major cities, women in inner regional areas were more likely to use LARCs (OR=1.26, 95%CI 1.03-1.55) or permanent methods (OR=1.43, 95%CI 1.17-1.76). Women living in outer regional and remote areas were more likely than women living in cities to use LARCs (OR=1.65, 95%CI 1.31-2.08) or permanent methods (OR=1.69, 95%CI 1.43-2.14). Women with poorer access to GPs were more likely to use permanent methods (OR=1.27, 95%CI 1.07-1.52). Conclusions: Location of residence and access to health services are important factors in women's choices about long-acting contraception in addition to the number and age of their children. There is a low level of uptake of non-daily, long-acting methods of contraception among Australian women in their mid-thirties.
Resumo:
Adequate amount of graphene oxide (GO) was firstly prepared by oxidation of graphite and GO/epoxy nanocomposites were subsequently prepared by typical solution mixing technique. X-ray diffraction (XRD) pattern, X-ray photoelectron (XPS), Raman and Fourier transform infrared (FTIR) spectroscopy indicated the successful preparation of GO. Scanning electron microscopy (SEM) and Transmission electron microscopy (TEM) images of the graphite oxide showed that they consist of a large amount of graphene oxide platelets with a curled morphology containing of a thin wrinkled sheet like structure. AFM image of the exfoliated GO signified that the average thickness of GO sheets is ~1.0 nm which is very similar to GO monolayer. Mechanical properties of as prepared GO/epoxy nanocomposites were investigated. Significant improvements in both Young’s modulus and tensile strength were observed for the nanocomposites at very low level of GO loading. The Young’s modulus of the nanocomposites containing 0.5 wt% GO was 1.72 GPa, which was 35 % higher than that of the pure epoxy resin (1.28 GPa). The effective reinforcement of the GO based epoxy nanocomposites can be attributed to the good dispersion and the strong interfacial interactions between the GO sheets and the epoxy resin matrices.
Resumo:
Oceania has a relatively low level of crime prevalence yet in the smaller and under-developed PICs we have shown that transnational crime has become increasingly common. A risk contained but potentially dangerous if state failure or fragility undermines law enforcement capacities. We predict that as the pace of globalization quickens and the demand for raw materials and resources grows some parts of the Pacific will be prone to criminal enterprises run by both indigenous and foreign crime groups. Australia and New Zealand will remain attractors of illicit goods notably ATS but will in turn be source countries for diminishing fish stock such as beche de mere and abalone as well forest timber. Finally the role of states such as Australia and New Zealand in helping to maintain law enforcement capacities throughout the region will be crucial if organized crime in Oceania is to be kept in check while demand for illicit resources grow.