843 resultados para Spam email filtering
Resumo:
Recent advancements in the capabilities of information and communication technologies (ICT) offer unique avenues to support the delivery of nutrition care. Despite ICTs being widely available, evidence on the practices and attitudes with regard to ICT use among dietitians is limited. A cross-sectional survey of Dietitians Association of Australia members was administered online in August 2011. All dietitians who responded (n=87) had access to a computer at work. Half reported providing non face-to-face consultations, with the telephone and email the most common modes of delivery. The use of smart phones was prevalent for 49% of practitioners, with 30% recommending nutrition-related applications and/or programs to clients. Benefits to technology use in practice most commonly reported included improvements in access to information/resources, time management, and workflow efficiency. Barriers identified related to cost and access to technology, and lack of suitable programs/applications. Technology was viewed as an important tool in practice among 93% of dietitians surveyed, however only 38% were satisfied with their current level of use. The majority (81%) believed more technology should be integrated within dietetics, while 85% indicated that the development of suitable and practical applications andprograms is necessary for future practice. Technology is regarded as an important tool by Australian dietitians, with an expressed need for theirinclusion to further facilitate nutrition care. Regular and ongoing evaluation of technology use among dietitians is vital to ensure thatapplications and use are evidence based and relevant to consumers in the digital world.
Resumo:
This paper proposes a new approach for state estimation of angles and frequencies of equivalent areas in large power systems with synchronized phasor measurement units. Defining coherent generators and their correspondent areas, generators are aggregated and system reduction is performed in each area of inter-connected power systems. The structure of the reduced system is obtained based on the characteristics of the reduced linear model and measurement data to form the non-linear model of the reduced system. Then a Kalman estimator is designed for the reduced system to provide an equivalent dynamic system state estimation using the synchronized phasor measurement data. The method is simulated on two test systems to evaluate the feasibility of the proposed method.
Resumo:
Dutch-born Australian director, Rolf de Heer, is Australia's most successful and unpredictable film-maker, with thirteen feature films of widely varying style and genre to his name. Arising from the author's 2006 - 2009 PhD research at the Queensland University of Technology (which focussed on the psychoanalytic use of sound in his films), and a fixed term Research Fellowship at the National Film and Sound Archive in Canberra, Australia, "Dutch Tilt, Aussie Auteur: The Films of Rolf de Heer" was first published in 2009 by VDM in Saarbrucken, Germany. This second edition addresses de Heer's additional film-making since 2009, and as with the first edition, is an auteur analysis of the thirteen feature films he has directed (and mostly written and produced). The book explores the theoretical instability of the concept of auteurism and concludes that there is a signature world view to be detected in his oeuvre, and that de Heer (quite possibly unconsciously) promotes unlikely protagonists who are non-hyper masculine, child-like and nurturing, as opposed to the typical Hollywood hero who is macho, exploitative and hyper masculine. Rolf de Heer was born in Heemskerk, Holland, in 1951 and migrated to Australia with his family in 1959. He spent seven years working for the ABC before gaining entry to Australia's Film, Television and Radio School, where he studied Producing and Directing. From his debut feature film after graduating, the children's story about the restoration of a Tiger Moth biplane, "Tail of a Tiger" (1984) to his breakout cult sensation "Bad Boy Bubby" (1993) which "tore Venice [Film Festival] apart" to the first Aboriginal Australian language film "Ten Canoes" (2006) which scooped the pool at the Australian Film Institute awards, de Heer has consistently proven himself unpredictable. This analysis of his widely disparate films, however, suggests that Australia's most innovative film-maker has a signature pre-occupation with giving a voice to marginalised, non-hyper masculine protagonists. Demonstrating a propensity to write and direct in a European-like style, his 'Dutch tilt' is very much not Hollywood, but is nevertheless representative of a typically Aussie world-view.
Resumo:
The R statistical environment and language has demonstrated particular strengths for interactive development of statistical algorithms, as well as data modelling and visualisation. Its current implementation has an interpreter at its core which may result in a performance penalty in comparison to directly executing user algorithms in the native machine code of the host CPU. In contrast, the C++ language has no built-in visualisation capabilities, handling of linear algebra or even basic statistical algorithms; however, user programs are converted to high-performance machine code, ahead of execution. A new method avoids possible speed penalties in R by using the Rcpp extension package in conjunction with the Armadillo C++ matrix library. In addition to the inherent performance advantages of compiled code, Armadillo provides an easy-to-use template-based meta-programming framework, allowing the automatic pooling of several linear algebra operations into one, which in turn can lead to further speedups. With the aid of Rcpp and Armadillo, conversion of linear algebra centered algorithms from R to C++ becomes straightforward. The algorithms retains the overall structure as well as readability, all while maintaining a bidirectional link with the host R environment. Empirical timing comparisons of R and C++ implementations of a Kalman filtering algorithm indicate a speedup of several orders of magnitude.
Resumo:
Background subtraction is a fundamental low-level processing task in numerous computer vision applications. The vast majority of algorithms process images on a pixel-by-pixel basis, where an independent decision is made for each pixel. A general limitation of such processing is that rich contextual information is not taken into account. We propose a block-based method capable of dealing with noise, illumination variations, and dynamic backgrounds, while still obtaining smooth contours of foreground objects. Specifically, image sequences are analyzed on an overlapping block-by-block basis. A low-dimensional texture descriptor obtained from each block is passed through an adaptive classifier cascade, where each stage handles a distinct problem. A probabilistic foreground mask generation approach then exploits block overlaps to integrate interim block-level decisions into final pixel-level foreground segmentation. Unlike many pixel-based methods, ad-hoc postprocessing of foreground masks is not required. Experiments on the difficult Wallflower and I2R datasets show that the proposed approach obtains on average better results (both qualitatively and quantitatively) than several prominent methods. We furthermore propose the use of tracking performance as an unbiased approach for assessing the practical usefulness of foreground segmentation methods, and show that the proposed approach leads to considerable improvements in tracking accuracy on the CAVIAR dataset.
Resumo:
Poem.
Resumo:
Topic recommendation can help users deal with the information overload issue in micro-blogging communities. This paper proposes to use the implicit information network formed by the multiple relationships among users, topics and micro-blogs, and the temporal information of micro-blogs to find semantically and temporally relevant topics of each topic, and to profile users' time-drifting topic interests. The Content based, Nearest Neighborhood based and Matrix Factorization models are used to make personalized recommendations. The effectiveness of the proposed approaches is demonstrated in the experiments conducted on a real world dataset that collected from Twitter.com.
Resumo:
Relevance feature and ontology are two core components to learn personalized ontologies for concept-based retrievals. However, how to associate user native information with common knowledge is an urgent issue. This paper proposes a sound solution by matching relevance feature mined from local instances with concepts existing in a global knowledge base. The matched concepts and their relations are used to learn personalized ontologies. The proposed method is evaluated elaborately by comparing it against three benchmark models. The evaluation demonstrates the matching is successful by achieving remarkable improvements in information filtering measurements.
Resumo:
Cyclone Yasi struck the Cassowary Coast of Queensland in the early hours of Feb 3, 2011, destroying many homes sand property, including the destruction of the Cardwell and district historical society’s premises. With their own homes flattened, many were forced to live in mobile accommodation, with extended family, or leave altogether. The historical society members however were more devastated by their flattened foreshore museum and loss of their collection material. A call for assistance was made through the OHAA Qld branch, who along with QUT sponsored a trip to somehow plan how they could start to pick up the pieces to start again. This presentation highlights the need for communities to gather, preserve and present their own stories, in a way that is sustainable and meaningful to them, but that good advice and support along the way is important. Two 2 day workshops were held in March and then September, augmented by plenty of email correspondence and phone calls in between. Participants learnt that if they could conduct quality oral history interviews, they could later use these in many exhibitable ways including: documentary pieces; digital stories; photographic collections; creative short stories; audio segments –while also drawing closely together a suffering community. This story is not only about the people who were interviewed about the night Yasi struck, but the amazing women (all over 50) of the historical society who were willing to try and leap the digital divide that faces older Australians, especially those in rural Australia, so that their older local stories would not be lost and so that new stories could also be remembered.
Resumo:
With the overwhelming increase in the amount of texts on the web, it is almost impossible for people to keep abreast of up-to-date information. Text mining is a process by which interesting information is derived from text through the discovery of patterns and trends. Text mining algorithms are used to guarantee the quality of extracted knowledge. However, the extracted patterns using text or data mining algorithms or methods leads to noisy patterns and inconsistency. Thus, different challenges arise, such as the question of how to understand these patterns, whether the model that has been used is suitable, and if all the patterns that have been extracted are relevant. Furthermore, the research raises the question of how to give a correct weight to the extracted knowledge. To address these issues, this paper presents a text post-processing method, which uses a pattern co-occurrence matrix to find the relation between extracted patterns in order to reduce noisy patterns. The main objective of this paper is not only reducing the number of closed sequential patterns, but also improving the performance of pattern mining as well. The experimental results on Reuters Corpus Volume 1 data collection and TREC filtering topics show that the proposed method is promising.
Resumo:
Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does not require principals to pre-compute key pairs and obtain certificates for their public keys— instead, public keys can be arbitrary identifiers such as email addresses, while private keys are derived at any time by a trusted private key generator upon request by the designated principals. Despite the flurry of recent results on IB encryption and signature, some questions regarding the security and efficiency of practicing IB encryption (IBE) and signature (IBS) as a joint IB signature/encryption (IBSE) scheme with a common set of parameters and keys, remain unanswered. We first propose a stringent security model for IBSE schemes. We require the usual strong security properties of: (for confidentiality) indistinguishability against adaptive chosen-ciphertext attacks, and (for nonrepudiation) existential unforgeability against chosen-message insider attacks. In addition, to ensure as strong as possible ciphertext armoring, we also ask (for anonymity) that authorship not be transmitted in the clear, and (for unlinkability) that it remain unverifiable by anyone except (for authentication) by the legitimate recipient alone. We then present an efficient IBSE construction, based on bilinear pairings, that satisfies all these security requirements, and yet is as compact as pairing-based IBE and IBS in isolation. Our scheme is secure, compact, fast and practical, offers detachable signatures, and supports multirecipient encryption with signature sharing for maximum scalability.
Resumo:
Phishing emails cause enormous losses to both users and organisations. The goal of this study is to determine which individuals are more vulnerable to phishing emails. To gain this information an experiment has been developed which involves sending phishing email to users and collecting information about users. The detection deception model has been applied to identify users’ detection behaviour. We find that users who have less email experience and high levels of submissiveness have increased susceptibility. Among those, users who have high susceptibility levels and high openness and extraversion are more likely to carry on the harmful action embedded in phishing emails.
Resumo:
Aim. This paper is a report of a descriptive study of nurses’ experiences of daily stress and coping. Background. Much of the research on stress in nursing is quantitative and has focused on only work stressors. Moreover, few studies have examined the uplifting side of living and the role it may play in moderating stress. A theoretical framework on stress and coping, ‘hassles’ and ‘uplifts’ was used to examine nurses’ experiences across their personal and professional lives from a qualitative perspective. Methods. A purposive sample of Singaporean hospital nurses (n = 23) identified using a snowball sampling technique, participated in two sets of email interviews in 2009. The qualitative data were analysed using thematic analysis. Results. Three themes were identified as constituting daily hassles: (i) time pressures, (ii) nature of nursing work and (iii) multiple roles. Uplifts were expressed in relation to one main theme of feeling good extending across nurses’ personal and professional lives. Three themes were identified as ways of coping: (i) taking time out, (ii) seeking emotional support and (iii) belief systems. Conclusion. The interaction between personal and professional life plays a major role in Singaporean nurses’ experiences of stress and coping. However, stress may be ameliorated through effective management and strong familial support. Nurses and employers are recommended to use uplifts and identify ways of coping to minimize attrition and contribute to the development of a healthy workforce.
Resumo:
Although advances in technology now enable people to communicate 'anytime, anyplace', it is not clear how citizens can be motivated to actually do so. This paper evaluates the impact of three principles of psychological empowerment, namely perceived self-efficacy, sense of community and causal importance, on public transport passengers' motivation to report issues and complaints while on the move. A week-long study with 65 participants revealed that self-efficacy and causal importance increased participation in short bursts and increased perceptions of service quality over longer periods. Finally, we discuss the implications of these findings for citizen participation projects and reflect on design opportunities for mobile technologies that motivate citizen participation.
Resumo:
We present a tool for automatic analysis of computational indistinguishability between two strings of information. This is designed as a generic tool for proving cryptographic security based on a formalism that provides computational soundness preservation. The tool has been implemented and tested successfully with several cryptographic schemes.