960 resultados para Web-Access


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Australian masonry standard allows either prism tests or correction factors based on the block height and mortar thickness to evaluate masonry compressive strength. The correction factor helps the taller units with conventional 10 mm mortar being not disadvantaged due to size effect. In recent times, 2-4 mm thick, high-adhesive mortars and H blocks with only the mid-web shell are used in masonry construction. H blocks and thinner and higher adhesive mortars have renewed interest of the compression behaviour of hollow concrete masonry and hence is revisited in this paper. This paper presents an experimental study carried out to examine the effects of the thickness of mortar joints, the type of mortar adhesives and the presence of web shells in the hollow concrete masonry prisms under axial compression. A non-contact digital image correlation technique was used to measure the deformation of the prisms and was found adequate for the determination of strain fi eld of the loaded face shells subjected to axial compression. It is found that the absence of end web shells lowers the compressive strength and stiffness of the prisms and the thinner and higher adhesive mortars increase the compressive strength and stiffness, while lowering the Poisson's ratio. © Institution of Engineers Australia, 2013.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Searching for health advice on the web is becoming increasingly common. Because of the great importance of this activity for patients and clinicians and the effect that incorrect information may have on health outcomes, it is critical to present relevant and valuable information to a searcher. Previous evaluation campaigns on health information retrieval (IR) have provided benchmarks that have been widely used to improve health IR and record these improvements. However, in general these benchmarks have targeted the specialised information needs of physicians and other healthcare workers. In this paper, we describe the development of a new collection for evaluation of effectiveness in IR seeking to satisfy the health information needs of patients. Our methodology features a novel way to create statements of patients’ information needs using realistic short queries associated with patient discharge summaries, which provide details of patient disorders. We adopt a scenario where the patient then creates a query to seek information relating to these disorders. Thus, discharge summaries provide us with a means to create contextually driven search statements, since they may include details on the stage of the disease, family history etc. The collection will be used for the first time as part of the ShARe/-CLEF 2013 eHealth Evaluation Lab, which focuses on natural language processing and IR for clinical care.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents the results of task 3 of the ShARe/CLEF eHealth Evaluation Lab 2013. This evaluation lab focuses on improving access to medical information on the web. The task objective was to investigate the effect of using additional information such as the discharge summaries and external resources such as medical ontologies on the IR effectiveness. The participants were allowed to submit up to seven runs, one mandatory run using no additional information or external resources, and three each using or not using discharge summaries.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study investigates grade eight girls’ use of status updates on Facebook in order to create identities online. Using sociologist Erving Goffman’s theory of self-presentation as a framework, Jones and Pittman’s subsequent strategies of self-presentation are used to discover the ways in which teenage girls use status updates in order to create identities online and manage audience impressions. Using a mixed methods design, the results showed that, while existing self-presentation strategies persist, social networking has created new means of self-presentation. This study adds to a growing pool of research regarding teens’ engagement with social networking websites to form identities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this paper is to describe a new decomposition construction for perfect secret sharing schemes with graph access structures. The previous decomposition construction proposed by Stinson is a recursive method that uses small secret sharing schemes as building blocks in the construction of larger schemes. When the Stinson method is applied to the graph access structures, the number of such “small” schemes is typically exponential in the number of the participants, resulting in an exponential algorithm. Our method has the same flavor as the Stinson decomposition construction; however, the linear programming problem involved in the construction is formulated in such a way that the number of “small” schemes is polynomial in the size of the participants, which in turn gives rise to a polynomial time construction. We also show that if we apply the Stinson construction to the “small” schemes arising from our new construction, both have the same information rate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Australia has been populated for more than 40,000 years with Indigenous Australians joined by European settlers only 230 years ago. The first settlers consisted of convicts from more than 28 countries and members of the British army who arrived in 1788 to establish a British penal colony. Mass migration in the nineteenth century with one and a half million immigrants from Europe, principally from the United Kingdom and Ireland (Haines and Shlomowitz, 1992), established the continent as an Anglo society in the Pacific. In the twentieth century immigrants came from many European countries and in the latter decades from many parts of Asia and the Middle East (Collins, 1991, pp.10-13). In the 21st century Australia has an ethnically and culturally diverse population. The original Indigenous population of Australia accounts for approximately 460,000 or 2.5 per cent of the total population (ABS, 2006a). Estimates are that around 4.5m. persons in the population (close to 20 per cent), were born outside Australia with the majority of these arriving from Europe, principally the United Kingdom, and New Zealand (ABS, 2006b). Like many other countries, Australia has a legacy of discrimination and inequality in employment. Propelled by racist ideologies and the male breadwinner ideology, Indigenous Australians, and non-European immigrants, and women were barred from certain jobs and paid less for their work than any white male counterpart. These conditions were legally sanctioned through the industrial relations system and other laws in the nineteenth and first half of the twentieth century. Since the 1960s a dramatic change has occurred in social policy and national legislation and Australia today has an extensive array of laws which forbid employment discrimination on race, ethnicity, gender and many other characteristics, and other approaches which promote proactive organizational plans and actions to achieve equity in employment. This chapter outlines these developments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Climate change is affecting and will increasingly influence human health and wellbeing. Children are particularly vulnerable to the impact of climate change. An extensive literature review regarding the impact of climate change on children’s health was conducted in April 2012 by searching electronic databases PubMed, Scopus, ProQuest, ScienceDirect, and Web of Science, as well as relevant websites, such as IPCC and WHO. Climate change affects children’s health through increased air pollution, more weather-related disasters, more frequent and intense heat waves, decreased water quality and quantity, food shortage and greater exposure to toxicants. As a result, children experience greater risk of mental disorders, malnutrition, infectious diseases, allergic diseases and respiratory diseases. Mitigation measures like reducing carbon pollution emissions, and adaptation measures such as early warning systems and post-disaster counseling are strongly needed. Future health research directions should focus on: (1) identifying whether climate change impacts on children will be modified by gender, age and socioeconomic status; (2) refining outcome measures of children’s vulnerability to climate change; (3) projecting children’s disease burden under climate change scenarios; (4) exploring children’s disease burden related to climate change in low-income countries, and ; (5) identifying the most cost-effective mitigation and adaptation actions from a children’s health perspective.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Event report on the Open Access and Research 2013 conference which focused on recent developments and the strategic advantages they bring to the research sector.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective To examine the impact of applying for funding on personal workloads, stress and family relationships. Design Qualitative study of researchers preparing grant proposals. Setting Web-based survey on applying for the annual National Health and Medical Research Council (NHMRC) Project Grant scheme. Participants Australian researchers (n=215). Results Almost all agreed that preparing their proposals always took top priority over other work (97%) and personal (87%) commitments. Almost all researchers agreed that they became stressed by the workload (93%) and restricted their holidays during the grant writing season (88%). Most researchers agreed that they submitted proposals because chance is involved in being successful (75%), due to performance requirements at their institution (60%) and pressure from their colleagues to submit proposals (53%). Almost all researchers supported changes to the current processes to submit proposals (95%) and peer review (90%). Most researchers (59%) provided extensive comments on the impact of writing proposals on their work life and home life. Six major work life themes were: (1) top priority; (2) career development; (3) stress at work; (4) benefits at work; (5) time spent at work and (6) pressure from colleagues. Six major home life themes were: (1) restricting family holidays; (2) time spent on work at home; (3) impact on children; (4) stress at home; (5) impact on family and friends and (6) impact on partner. Additional impacts on the mental health and well-being of researchers were identified. Conclusions The process of preparing grant proposals for a single annual deadline is stressful, time consuming and conflicts with family responsibilities. The timing of the funding cycle could be shifted to minimise applicant burden, give Australian researchers more time to work on actual research and to be with their families.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Traditional methods are ill-suited for the synthesis of ortho,ortho-biphenols, a structural motif found in many polyphenolic natural products, as well as synthetically useful compounds such as the chiral ligands binol, vapol, and vanol. The new route consists of a radical-based reaction of an acetal-tethered biphenyl ether substrate and subsequent hydrolytic cleavage of the dibenzo-1,3-dioxepine intermediate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A modular, graphic-oriented Internet browser has been developed to enable non-technical client access to a literal spinning world of information and remotely sensed. The Earth Portal (www.earthportal.net) uses the ManyOne browser (www.manyone.net) to provide engaging point and click views of the Earth fully tessellated with remotely sensed imagery and geospatial data. The ManyOne browser technology use Mozilla with embedded plugins to apply multiple 3-D graphics engines, e.g. ArcGlobe or GeoFusion, that directly link with the open-systems architecture of the geo-spatial infrastructure. This innovation allows for rendering of satellite imagery directly over the Earth's surface and requires no technical training by the web user. Effective use of this global distribution system for the remote sensing community requires a minimal compliance with protocols and standards that have been promoted by NSDI and other open-systems standards organizations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Using Media-Access-Control (MAC) address for data collection and tracking is a capable and cost effective approach as the traditional ways such as surveys and video surveillance have numerous drawbacks and limitations. Positioning cell-phones by Global System for Mobile communication was considered an attack on people's privacy. MAC addresses just keep a unique log of a WiFi or Bluetooth enabled device for connecting to another device that has not potential privacy infringements. This paper presents the use of MAC address data collection approach for analysis of spatio-temporal dynamics of human in terms of shared space utilization. This paper firstly discuses the critical challenges and key benefits of MAC address data as a tracking technology for monitoring human movement. Here, proximity-based MAC address tracking is postulated as an effective methodology for analysing the complex spatio-temporal dynamics of human movements at shared zones such as lounge and office areas. A case study of university staff lounge area is described in detail and results indicates a significant added value of the methodology for human movement tracking. By analysis of MAC address data in the study area, clear statistics such as staff’s utilisation frequency, utilisation peak periods, and staff time spent is obtained. The analyses also reveal staff’s socialising profiles in terms of group and solo gathering. The paper is concluded with a discussion on why MAC address tracking offers significant advantages for tracking human behaviour in terms of shared space utilisation with respect to other and more prominent technologies, and outlines some of its remaining deficiencies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recently, botnet, a network of compromised computers, has been recognized as the biggest threat to the Internet. The bots in a botnet communicate with the botnet owner via a communication channel called Command and Control (C & C) channel. There are three main C & C channels: Internet Relay Chat (IRC), Peer-to-Peer (P2P) and web-based protocols. By exploiting the flexibility of the Web 2.0 technology, the web-based botnet has reached a new level of sophistication. In August 2009, such botnet was found on Twitter, one of the most popular Web 2.0 services. In this paper, we will describe a new type of botnet that uses Web 2.0 service as a C & C channel and a temporary storage for their stolen information. We will then propose a novel approach to thwart this type of attack. Our method applies a unique identifier of the computer, an encryption algorithm with session keys and a CAPTCHA verification.