843 resultados para Spam email filtering
Resumo:
PySSM is a Python package that has been developed for the analysis of time series using linear Gaussian state space models (SSM). PySSM is easy to use; models can be set up quickly and efficiently and a variety of different settings are available to the user. It also takes advantage of scientific libraries Numpy and Scipy and other high level features of the Python language. PySSM is also used as a platform for interfacing between optimised and parallelised Fortran routines. These Fortran routines heavily utilise Basic Linear Algebra (BLAS) and Linear Algebra Package (LAPACK) functions for maximum performance. PySSM contains classes for filtering, classical smoothing as well as simulation smoothing.
Resumo:
Introduction and Aims: Long-term use of benzodiazepines remains common, and conveys significant risk. Providing psychological intervention in association with gradual dose reduction increases cessation rates above dose reduction alone, but appropriate psychological support is difficult to obtain. This study was undertaken to assess the outcomes of an uncontrolled case series of an internet-based cognitive-behaviour therapy (I-CBT) for benzodiazepine cessation. Design and Method: Users of benzodiazepines for > 3 months who wanted to reduce or cease benzodiazepines participated in the trial. They completed online assessments and accessed 13 newsletters on managing withdrawal symptoms and developing alternate ways to cope with life events. Therapist assistance was provided by email. Follow-up was at 3 and 6 months and feedback was obtained via comments and emails. Results: Program ratings and emailed comments of the program were positive. Thirty-two people registered for the program and 14 (44%) completed a 6-month follow-up. Of these, 8 (57%) reduced weekly intake by at least half, including 5 (36%) who ceased use. Shorter duration of use and birth outside Australia predicted greater percentage reductions at 3 months, while being partnered and in paid employment predicted reductions at 6 months. Discussion and Conclusion: While results were encouraging, controlled research is required to confirm the efficacy of the program, and engagement of both users and prescribers needs further attention.
Resumo:
This paper describes a new system, dubbed Continuous Appearance-based Trajectory Simultaneous Localisation and Mapping (CAT-SLAM), which augments sequential appearance-based place recognition with local metric pose filtering to improve the frequency and reliability of appearance-based loop closure. As in other approaches to appearance-based mapping, loop closure is performed without calculating global feature geometry or performing 3D map construction. Loop-closure filtering uses a probabilistic distribution of possible loop closures along the robot’s previous trajectory, which is represented by a linked list of previously visited locations linked by odometric information. Sequential appearance-based place recognition and local metric pose filtering are evaluated simultaneously using a Rao–Blackwellised particle filter, which weights particles based on appearance matching over sequential frames and the similarity of robot motion along the trajectory. The particle filter explicitly models both the likelihood of revisiting previous locations and exploring new locations. A modified resampling scheme counters particle deprivation and allows loop-closure updates to be performed in constant time for a given environment. We compare the performance of CAT-SLAM with FAB-MAP (a state-of-the-art appearance-only SLAM algorithm) using multiple real-world datasets, demonstrating an increase in the number of correct loop closures detected by CAT-SLAM.
Resumo:
The Toolbox, combined with MATLAB ® and a modern workstation computer, is a useful and convenient environment for investigation of machine vision algorithms. For modest image sizes the processing rate can be sufficiently ``real-time'' to allow for closed-loop control. Focus of attention methods such as dynamic windowing (not provided) can be used to increase the processing rate. With input from a firewire or web camera (support provided) and output to a robot (not provided) it would be possible to implement a visual servo system entirely in MATLAB. Provides many functions that are useful in machine vision and vision-based control. Useful for photometry, photogrammetry, colorimetry. It includes over 100 functions spanning operations such as image file reading and writing, acquisition, display, filtering, blob, point and line feature extraction, mathematical morphology, homographies, visual Jacobians, camera calibration and color space conversion.
Resumo:
Social media networks have emerged as a powerful tool in allowing collaboration and sharing of information during times of crisis (Bruns, The Centre for Creative Industries Blog, comment posted on January 19,2011). The 2011 Queensland floods provided a unique opportunity to explore social media use during an emergency. This paper presents the findings of a pilot study that explored the information experiences of people using social media during the flooding of the Brisbane River. Analysis of data from four interviews supported the emergence of four categories of information experience. Examination of the categories revealed variation between the way in which individuals experienced social media and the point of the flooding at which each category of experience occurred. Information regarding individual’s use of social media has the potential to inform the development of social media platforms that can provide relevant and accessible information for the general public in event of a natural disaster.
Resumo:
This year marks the completion of data collection for year three (Wave 3) of the CAUSEE study. This report uses data from the first three years and focuses on the process of learning and adaptation in the business creation process. Most start-ups need to change their business model, their product, their marketing plan, their market or something else about the business to be successful. PayPal changed their product at least five times, moving from handheld security, to enterprise apps, to consumer apps, to a digital wallet, to payments between handhelds before finally stumbling on the model that made the a multi-billion dollar company revolving around email-based payments. PayPal is not alone and anecdotes abounds of start-ups changing direction: Sysmantec started as an artificial intelligence company, Apple started selling plans to build computers and Microsoft tried to peddle compilers before licensing an operating system out of New Mexico. To what extent do Australian new ventures change and adapt as their ideas and business develop? As a longitudinal study, CAUSEE was designed specifically to observe development in the venture creation process. In this research briefing paper, we compare development over time of randomly sampled Nascent Firms (NF) and Young Firms(YF), concentrating on the surviving cases. We also compare NFs with YFs at each yearly interval. The 'high potential' over sample is not used in this report.
Resumo:
Creativity plays an increasingly important role in our personal, social, educational, and community lives. For adolescents, creativity can enable self-expression, be a means of pushing boundaries, and assist learning, achievement, and completion of everyday tasks. Moreover, adolescents who demonstrate creativity can potentially enhance their capacity to face unknown future challenges, address mounting social and ecological issues in our global society, and improve their career opportunities and contribution to the economy. For these reasons, creativity is an essential capacity for young people in their present and future, and is highlighted as a priority in current educational policy nationally and internationally. Despite growing recognition of creativity’s importance and attention to creativity in research, the creative experience from the perspectives of the creators themselves and the creativity of adolescents are neglected fields of study. Hence, this research investigated adolescents’ self-reported experiences of creativity to improve understandings of their creative processes and manifestations, and how these can be supported or inhibited. Although some aspects of creativity have been extensively researched, there were no comprehensive, multidisciplinary theoretical frameworks of adolescent creativity to provide a foundation for this study. Therefore, a grounded theory methodology was adopted for the purpose of constructing a new theory to describe and explain adolescents’ creativity in a range of domains. The study’s constructivist-interpretivist perspective viewed the data and findings as interpretations of adolescents’ creative experiences, co-constructed by the participants and the researcher. The research was conducted in two academically selective high schools in Australia: one arts school, and one science, mathematics, and technology school. Twenty adolescent participants (10 from each school) were selected using theoretical sampling. Data were collected via focus groups, individual interviews, an online discussion forum, and email communications. Grounded theory methods informed a process of concurrent data collection and analysis; each iteration of analysis informed subsequent data collection. Findings portray creativity as it was perceived and experienced by participants, presented in a Grounded Theory of Adolescent Creativity. The Grounded Theory of Adolescent Creativity comprises a core category, Perceiving and Pursuing Novelty: Not the Norm, which linked all findings in the study. This core category explains how creativity involved adolescents perceiving stimuli and experiences differently, approaching tasks or life unconventionally, and pursuing novel ideas to create outcomes that are not the norm when compared with outcomes by peers. Elaboration of the core category is provided by the major categories of findings. That is, adolescent creativity entailed utilising a network of Sub-Processes of Creativity, using strategies for Managing Constraints and Challenges, and drawing on different Approaches to Creativity – adaptation, transfer, synthesis, and genesis – to apply the sub-processes and produce creative outcomes. Potentially, there were Effects of Creativity on Creators and Audiences, depending on the adolescent and the task. Three Types of Creativity were identified as the manifestations of the creative process: creative personal expression, creative boundary pushing, and creative task achievement. Interactions among adolescents’ dispositions and environments were influential in their creativity. Patterns and variations of these interactions revealed a framework of four Contexts for Creativity that offered different levels of support for creativity: high creative disposition–supportive environment; high creative disposition–inhibiting environment; low creative disposition–supportive environment; and low creative disposition–inhibiting environment. These contexts represent dimensional ranges of how dispositions and environments supported or inhibited creativity, and reveal that the optimal context for creativity differed depending on the adolescent, task, domain, and environment. This study makes four main contributions, which have methodological and theoretical implications for researchers, as well as practical implications for adolescents, parents, teachers, policy and curriculum developers, and other interested stakeholders who aim to foster the creativity of adolescents. First, this study contributes methodologically through its constructivist-interpretivist grounded theory methodology combining the grounded theory approaches of Corbin and Strauss (2008) and Charmaz (2006). Innovative data collection was also demonstrated through integration of data from online and face-to-face interactions with adolescents, within the grounded theory design. These methodological contributions have broad applicability to researchers examining complex constructs and processes, and with populations who integrate multimedia as a natural form of communication. Second, applicable to creativity in diverse domains, the Grounded Theory of Adolescent Creativity supports a hybrid view of creativity as both domain-general and domain-specific. A third major contribution was identification of a new form of creativity, educational creativity (ed-c), which categorises creativity for learning or achievement within the constraints of formal educational contexts. These theoretical contributions inform further research about creativity in different domains or multidisciplinary areas, and with populations engaged in formal education. However, the key contribution of this research is that it presents an original Theory and Model of Adolescent Creativity to explain the complex, multifaceted phenomenon of adolescents’ creative experiences.
Resumo:
This paper presents the flight trials of an electro-optical (EO) sense-and-avoid system onboard a Cessna host aircraft (camera aircraft). We focus on the autonomous collision avoidance capability of the sense-and-avoid system; that is, closed-loop integration with the onboard aircraft autopilot. We also discuss the system’s approach to target detection and avoidance control, as well as the methodology of the flight trials. The results demonstrate the ability of the sense-and-avoid system to automatically detect potential conflicting aircraft and engage the host Cessna autopilot to perform an avoidance manoeuvre, all without any human intervention
Resumo:
Determining entry level competency of new graduates, as they transition from university to practice is not always black and white. Holistic competency emerges as acculturation and experience develops in the workplace. This project, funded by the Dietitians Association Australia (DAA), aimed to develop tools to guide the assessment process. Range variable statements and evidence guides were developed to inform the assessment of DAA Entry Level Competency Standards (ELCS) at university and to define the core fields of study required in Australian university curricula for university accreditation and international benchmarking purposes. Range variables contextualise competency by defining the boundaries for competency and the associated performance criteria. Evidence guides provide the range of contexts and critical aspects of competency which would usually be assessed together. Core fields of study defi ne the underpinning knowledge and skills required in the curriculum to achieve competency. Draft range variable statements and evidence guides were developed against each of the units and elements of the ELCS. Two rounds of consultation occurred with the fourteen Australian universities undertaking dietetic education and the project management committee, via teleconference and email. Core fi elds of study were informed by these consultations, as well as interviews of new graduates about core activities undertaken in their workplace. The final versions of these documents were presented to the project management committee, the Australian Dietetic Council and the DAA Board to be integrated into the DAA Accreditation Manual and website information.
Resumo:
In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistringuishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can be essentially relaxed to indistinguishability against chosen-plaintext attacks (IND-CPA) for ciphertexts once they pass the gateway that acts as an IND-CCA/CPA filter by first checking the validity of an incoming IND-CCA ciphertext, then transforming it (if valid) into an IND-CPA ciphertext, and forwarding the latter to the receipient in the private domain. "Non-trivial filtering" can result in reduced decryption costs on the receivers' side. We identify a class of encryption schemes with publicaly verifiable ciphertexts that admit generic constructions of (non-trivial) IND-CCA/CPA filters. These schemes are characterized by existence of public algorithms that can distinguish between valid and invalid ciphertexts. To this end, we formally define (non-trivial) public verifiability of ciphertexts for general encryption schemes, key encapsulation mechanisms, and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption flavours. We further analyze the security impact of public verifiability and discuss generic transformations and concrete constructions that enjoy this property.
Resumo:
The quality of discovered features in relevance feedback (RF) is the key issue for effective search query. Most existing feedback methods do not carefully address the issue of selecting features for noise reduction. As a result, extracted noisy features can easily contribute to undesirable effectiveness. In this paper, we propose a novel feature extraction method for query formulation. This method first extract term association patterns in RF as knowledge for feature extraction. Negative RF is then used to improve the quality of the discovered knowledge. A novel information filtering (IF) model is developed to evaluate the proposed method. The experimental results conducted on Reuters Corpus Volume 1 and TREC topics confirm that the proposed model achieved encouraging performance compared to state-of-the-art IF models.
Resumo:
Several track-before-detection approaches for image based aircraft detection have recently been examined in an important automated aircraft collision detection application. A particularly popular approach is a two stage processing paradigm which involves: a morphological spatial filter stage (which aims to emphasize the visual characteristics of targets) followed by a temporal or track filter stage (which aims to emphasize the temporal characteristics of targets). In this paper, we proposed new spot detection techniques for this two stage processing paradigm that fuse together raw and morphological images or fuse together various different morphological images (we call these approaches morphological reinforcement). On the basis of flight test data, the proposed morphological reinforcement operations are shown to offer superior signal to-noise characteristics when compared to standard spatial filter options (such as the close-minus-open and adaptive contour morphological operations). However, system operation characterised curves, which examine detection verses false alarm characteristics after both processing stages, illustrate that system performance is very data dependent.
Resumo:
Hybrid system representations have been exploited in a number of challenging modelling situations, including situations where the original nonlinear dynamics are too complex (or too imprecisely known) to be directly filtered. Unfortunately, the question of how to best design suitable hybrid system models has not yet been fully addressed, particularly in the situations involving model uncertainty. This paper proposes a novel joint state-measurement relative entropy rate based approach for design of hybrid system filters in the presence of (parameterised) model uncertainty. We also present a design approach suitable for suboptimal hybrid system filters. The benefits of our proposed approaches are illustrated through design examples and simulation studies.
Resumo:
It is a big challenge to clearly identify the boundary between positive and negative streams. Several attempts have used negative feedback to solve this challenge; however, there are two issues for using negative relevance feedback to improve the effectiveness of information filtering. The first one is how to select constructive negative samples in order to reduce the space of negative documents. The second issue is how to decide noisy extracted features that should be updated based on the selected negative samples. This paper proposes a pattern mining based approach to select some offenders from the negative documents, where an offender can be used to reduce the side effects of noisy features. It also classifies extracted features (i.e., terms) into three categories: positive specific terms, general terms, and negative specific terms. In this way, multiple revising strategies can be used to update extracted features. An iterative learning algorithm is also proposed to implement this approach on RCV1, and substantial experiments show that the proposed approach achieves encouraging performance.
Resumo:
This paper presents a number of characteristics of the Internet that makes it attractive to online groomers. Relevant Internet characteristics include disconnected personal communication, mediating technology, universality, network externalities, distribution channel, time moderator, low‐cost standard, electronic double, electronic double manipulation, information asymmetry, infinite virtual capacity, independence in time and space, cyberspace, and dynamic social network. Potential sex offenders join virtual communities, where they meet other persons who have the same interest. A virtual community provides an online meeting place where people with similar interests can communicate and find useful information. Communication between members may be via email, bulletin boards, online chat, web‐based conferencing or other computer‐based media.