839 resultados para Data security
Resumo:
Emergency departments (EDs) are often the first point of contact with an abused child. Despite legal mandate, the reporting of definite or suspected abusive injury to child safety authorities by ED clinicians varies due to a number of factors including training, access to child safety professionals, departmental culture and a fear of ‘getting it wrong’. This study examined the quality of documentation and coding of child abuse captured by ED based injury surveillance data and ED medical records in the state of Queensland and the concordance of these data with child welfare records. A retrospective medical record review was used to examine the clinical documentation of almost 1000 injured children included in the Queensland Injury Surveillance Unit database (QISU) from 10 hospitals in urban and rural centres. Independent experts re-coded the records based on their review of the notes. A data linkage methodology was then used to link these records with records in the state government’s child welfare database. Cases were sampled from three sub-groups according to the surveillance intent codes: Maltreatment by parent, Undetermined and Unintentional injury. Only 0.1% of cases coded as unintentional injury were recoded to maltreatment by parent, while 1.2% of cases coded as maltreatment by parent were reclassified as unintentional and 5% of cases where the intent was undetermined by the triage nurse were recoded as maltreatment by parent. Quality of documentation varied across type of hospital (tertiary referral centre, children’s, urban, regional and remote). Concordance of health data with child welfare data varied across patient subgroups. Outcomes from this research will guide initiatives to improve the quality of intentional child injury surveillance systems.
Resumo:
Maintenance activities in a large-scale engineering system are usually scheduled according to the lifetimes of various components in order to ensure the overall reliability of the system. Lifetimes of components can be deduced by the corresponding probability distributions with parameters estimated from past failure data. While failure data of the components is not always readily available, the engineers have to be content with the primitive information from the manufacturers only, such as the mean and standard deviation of lifetime, to plan for the maintenance activities. In this paper, the moment-based piecewise polynomial model (MPPM) are proposed to estimate the parameters of the reliability probability distribution of the products when only the mean and standard deviation of the product lifetime are known. This method employs a group of polynomial functions to estimate the two parameters of the Weibull Distribution according to the mathematical relationship between the shape parameter of two-parameters Weibull Distribution and the ratio of mean and standard deviation. Tests are carried out to evaluate the validity and accuracy of the proposed methods with discussions on its suitability of applications. The proposed method is particularly useful for reliability-critical systems, such as railway and power systems, in which the maintenance activities are scheduled according to the expected lifetimes of the system components.
Resumo:
In this paper, we present a microphone array beamforming approach to blind speech separation. Unlike previous beamforming approaches, our system does not require a-priori knowledge of the microphone placement and speaker location, making the system directly comparable other blind source separation methods which require no prior knowledge of recording conditions. Microphone location is automatically estimated using an assumed noise field model, and speaker locations are estimated using cross correlation based methods. The system is evaluated on the data provided for the PASCAL Speech Separation Challenge 2 (SSC2), achieving a word error rate of 58% on the evaluation set.
Resumo:
This paper describes a number of techniques for GNSS navigation message authentication. A detailed analysis of the security facilitated by navigation message authentication is given. The analysis takes into consideration the risk of critical applications that rely on GPS including transportation, finance and telecommunication networks. We propose a number of cryptographic authentication schemes for navigation data authentication. These authentication schemes provide authenticity and integrity of the navigation data to the receiver. Through software simulation, the performance of the schemes is quantified. The use of software simulation enables the collection of authentication performance data of different data channels, and the impact of various schemes on the infrastructure and receiver. Navigation message authentication schemes have been simulated at the proposed data rates of Galileo and GPS services, for which the resulting performance data is presented. This paper concludes by making recommendations for optimal implementation of navigation message authentication for Galileo and next generation GPS systems.
Resumo:
Tracking/remote monitoring systems using GNSS are a proven method to enhance the safety and security of personnel and vehicles carrying precious or hazardous cargo. While GNSS tracking appears to mitigate some of these threats, if not adequately secured, it can be a double-edged sword allowing adversaries to obtain sensitive shipment and vehicle position data to better coordinate their attacks, and to provide a false sense of security to monitoring centers. Tracking systems must be designed with the ability to perform route-compliance and thwart attacks ranging from low-level attacks such as the cutting of antenna cables to medium and high-level attacks involving radio jamming and signal / data-level simulation, especially where the goods transported have a potentially high value to terrorists. This paper discusses the use of GNSS in critical tracking applications, addressing the mitigation of GNSS security issues, augmentation systems and communication systems in order to provide highly robust and survivable tracking systems.
Resumo:
BACKGROUND: In Bangladesh, poor infant and young child feeding practices are contributing to the burden of infectious diseases and malnutrition. Objective. To estimate the determinants of selected feeding practices and key indicators of breastfeeding and complementary feeding in Bangladesh. METHODS: The sample included 2482 children aged 0 to 23 months from the Bangladesh Demographic and Health Survey of 2004. The World Health Organization (WHO)-recommended infant and young child feeding indicators were estimated, and selected feeding indicators were examined against a set of individual-, household-, and community-level variables using univariate and multivariate analyses. RESULTS: Only 27.5% of mothers initiated breastfeeding within the first hour after birth, 99.9% had ever breastfed their infants, 97.3% were currently breastfeeding, and 22.4% were currently bottle-feeding. Among infants under 6 months of age, 42.5% were exclusively breastfed, and among those aged 6 to 9 months, 62.3% received complementary foods in addition to breastmilk. Among the risk factors for an infant not being exclusively breastfed were higher socioeconomic status, higher maternal education, and living in the Dhaka region. Higher birth order and female sex were associated with increased rates of exclusive breastfeeding of infants under 6 months of age. The risk factors for bottle-feeding were similar and included having a partner with a higher educational level (OR = 2.17), older maternal age (OR for age > or = 35 years = 2.32), and being in the upper wealth quintiles (OR for the richest = 3.43). Urban mothers were at higher risk for not initiating breastfeeding within the first hour after birth (OR = 1.61). Those who made three to six visits to the antenatal clinic were at lower risk for not initiating breastfeeding within the first hour (OR = 0.61). The rate of initiating breastfeeding within the first hour was higher in mothers from richer households (OR = 0.37). CONCLUSIONS: Most breastfeeding indicators in Bangladesh were below acceptable levels. Breastfeeding promotion programs in Bangladesh need nationwide application because of the low rates of appropriate infant feeding indicators, but they should also target women who have the main risk factors, i.e., working mothers living in urban areas (particularly in Dhaka).
Resumo:
The paper describes a number of requirements for enhancing the trust of location acquisition from Satellite Navigation Systems, particularly for those applications where the location is monitored through a remote GNSS receiver. We discuss how the trust of a location acquisition could be propagated to an application through the use of a proposed tamper-resistant GNSS receiver which quantifies the trust of a location solution from the signaling used (ie. P(Y) code, Galileo SOL, PRS, CS) and provides a cryptographic proof of this to a remote application. The tamper-resistance state of the receiver is also included in this cryptographic proof.
Resumo:
Background: Poor feeding practices in early childhood contribute to the burden of childhood malnutrition and morbidity. Objective: To estimate the key indicators of breastfeeding and complementary feeding and the determinants of selected feeding practices in Sri Lanka. Methods: The sample consisted of 1,127 children aged 0 to 23 months from the Sri Lanka Demographic and Health Survey 2000. The key infant feeding indicators were estimated and selected indicators were examined against a set of individual-, household-, and community- level variables using univariate and multivariate analyses. Results: Breastfeeding was initiated within the first hour after birth in 56.3% of infants, 99.7% had ever been breastfed, 85.0% were currently being breastfed, and 27.2% were being bottle-fed. Of infants under 6 months of age, 60.6% were fully breastfed, and of those aged 6 to 9 months, 93.4% received complementary foods. The likelihood of not initiating breastfeeding within the first hour after birth was higher for mothers who underwent cesarean delivery (OR = 3.23) and those who were not visited by a Public Health Midwife at home during pregnancy (OR = 1.81). The rate of full breastfeeding was significantly lower among mothers who did not receive postnatal home visits by a Public Health Midwife. Bottlefeeding rates were higher among infants whose mothers had ever been employed (OR = 1.86), lived in a metropolitan area (OR = 3.99), or lived in the South-Central Hill country (OR = 3.11) and were lower among infants of mothers with secondary education (OR = 0.27). Infants from the urban (OR = 8.06) and tea estate (OR = 12.63) sectors were less likely to receive timely complementary feeding than rural infants. Conclusions: Antenatal and postnatal contacts with Public Health Midwives were associated with improved breastfeeding practices. Breastfeeding promotion strategies should specifically focus on the estate and urban or metropolitan communities.
Resumo:
Background: Childhood undernutrition and mortality are high in Nepal, and therefore interventions on infant and young child feeding practices deserve high priority. Objective. To estimate infant and young child feeding indicators and the determinants of selected feeding practices. Methods: The sample consisted of 1,906 children aged 0 to 23 months from the Demographic and Health Survey 2006. Selected indicators were examined against a set of variables using univariate and multivariate analyses. Results. Breastfeeding was initiated within the first hour after birth in 35.4% of children, 99.5% were ever breastfed, 98.1% were currently breastfed, and 3.5% were bottle-fed. The rate of exclusive breastfeeding among infants under 6 months of age was 53.1%, and the rate of timely complementary feeding among those 6 to 9 months of age was 74.7%. Mothers who made antenatal clinic visits were at a higher risk for no exclusive breastfeeding than those who made no visits. Mothers who lived in the mountains were more likely to initiate breastfeeding within 1 hour after birth and to introduce complementary feeding at 6 to 9 months of age, but less likely to exclusively breastfeed. Cesarean deliveries were associated with delay in timely initiation of breastfeeding. Higher rates of complementary feeding at 6 to 9 months were also associated with mothers with better education and those above 35 years of age. Risk factors for bottle-feeding included living in urban areas and births attended by trained health personnel. Conclusions: Most breastfeeding indicators in Nepal are below the expected levels to achieve a substantial reduction in child mortality. Breastfeeding promotion strategies should specifically target mothers who have more contact with the health care delivery system, while programs targeting the entire community should be continued.
Resumo:
Background: In India, poor feeding practices in early childhood contribute to the burden of malnutrition and infant and child mortality. Objective. To estimate infant and young child feeding indicators and determinants of selected feeding practices in India. Methods: The sample consisted of 20,108 children aged 0 to 23 months from the National Family Health Survey India 2005–06. Selected indicators were examined against a set of variables using univariate and multivariate analyses. Results: Only 23.5% of mothers initiated breastfeeding within the first hour after birth, 99.2% had ever breastfed their infant, 89.8% were currently breastfeeding, and 14.8% were currently bottle-feeding. Among infants under 6 months of age, 46.4% were exclusively breastfed, and 56.7% of those aged 6 to 9 months received complementary foods. The risk factors for not exclusively breastfeeding were higher household wealth index quintiles (OR for richest = 2.03), delivery in a health facility (OR = 1.35), and living in the Northern region. Higher numbers of antenatal care visits were associated with increased rates of exclusive breastfeeding (OR for ≥ 7 antenatal visits = 0.58). The rates of timely initiation of breastfeeding were higher among women who were better educated (OR for secondary education or above = 0.79), were working (OR = 0.79), made more antenatal clinic visits (OR for ≥ 7 antenatal visits = 0.48), and were exposed to the radio (OR = 0.76). The rates were lower in women who were delivered by cesarean section (OR = 2.52). The risk factors for bottle-feeding included cesarean delivery (OR = 1.44), higher household wealth index quintiles (OR = 3.06), working by the mother (OR=1.29), higher maternal education level (OR=1.32), urban residence (OR=1.46), and absence of postnatal examination (OR=1.24). The rates of timely complementary feeding were higher for mothers who had more antenatal visits (OR=0.57), and for those who watched television (OR=0.75). Conclusions: Revitalization of the Baby Friendly Hospital Initiative in health facilities is recommended. Targeted interventions may be necessary to improve infant feeding practices in mothers who reside in urban areas, are more educated, and are from wealthier households.
Resumo:
Continuous biometric authentication schemes (CBAS) are built around the biometrics supplied by user behavioural characteristics and continuously check the identity of the user throughout the session. The current literature for CBAS primarily focuses on the accuracy of the system in order to reduce false alarms. However, these attempts do not consider various issues that might affect practicality in real world applications and continuous authentication scenarios. One of the main issues is that the presented CBAS are based on several samples of training data either of both intruder and valid users or only the valid users' profile. This means that historical profiles for either the legitimate users or possible attackers should be available or collected before prediction time. However, in some cases it is impractical to gain the biometric data of the user in advance (before detection time). Another issue is the variability of the behaviour of the user between the registered profile obtained during enrollment, and the profile from the testing phase. The aim of this paper is to identify the limitations in current CBAS in order to make them more practical for real world applications. Also, the paper discusses a new application for CBAS not requiring any training data either from intruders or from valid users.
Resumo:
Voice recognition is one of the key enablers to reduce driver distraction as in-vehicle systems become more and more complex. With the integration of voice recognition in vehicles, safety and usability are improved as the driver’s eyes and hands are not required to operate system controls. Whilst speaker independent voice recognition is well developed, performance in high noise environments (e.g. vehicles) is still limited. La Trobe University and Queensland University of Technology have developed a low-cost hardware-based speech enhancement system for automotive environments based on spectral subtraction and delay–sum beamforming techniques. The enhancement algorithms have been optimised using authentic Australian English collected under typical driving conditions. Performance tests conducted using speech data collected under variety of vehicle noise conditions demonstrate a word recognition rate improvement in the order of 10% or more under the noisiest conditions. Currently developed to a proof of concept stage there is potential for even greater performance improvement.
Resumo:
The term “cloud computing” has emerged as a major ICT trend and has been acknowledged by respected industry survey organizations as a key technology and market development theme for the industry and ICT users in 2010. However, one of the major challenges that faces the cloud computing concept and its global acceptance is how to secure and protect the data and processes that are the property of the user. The security of the cloud computing environment is a new research area requiring further development by both the academic and industrial research communities. Today, there are many diverse and uncoordinated efforts underway to address security issues in cloud computing and, especially, the identity management issues. This paper introduces an architecture for a new approach to necessary “mutual protection” in the cloud computing environment, based upon a concept of mutual trust and the specification of definable profiles in vector matrix form. The architecture aims to achieve better, more generic and flexible authentication, authorization and control, based on a concept of mutuality, within that cloud computing environment.
Resumo:
Embedded generalized markup, as applied by digital humanists to the recording and studying of our textual cultural heritage, suffers from a number of serious technical drawbacks. As a result of its evolution from early printer control languages, generalized markup can only express a document’s ‘logical’ structure via a repertoire of permissible printed format structures. In addition to the well-researched overlap problem, the embedding of markup codes into texts that never had them when written leads to a number of further difficulties: the inclusion of potentially obsolescent technical and subjective information into texts that are supposed to be archivable for the long term, the manual encoding of information that could be better computed automatically, and the obscuring of the text by highly complex technical data. Many of these problems can be alleviated by asserting a separation between the versions of which many cultural heritage texts are composed, and their content. In this way the complex inter-connections between versions can be handled automatically, leaving only simple markup for individual versions to be handled by the user.
Resumo:
Consumer personal information is now a valuable commodity for most corporations. Concomitant with increased value is the expansion of new legal obligations to protect personal information. Mandatory data breach notification laws are an important new development in this regard. Such laws require a corporation that has suffered a data breach, which involves personal information, such as a computer hacking incident, to notify those persons who may have been affected by the breach. Regulators may also need to be notified. Australia currently does not have a mandatory data breach notification law but this may be about to change. The Australian Law Reform Commission has suggested that a data breach notification scheme be implemented through the Privacy Act 1988 (Cth). However, the notification of data breaches may already be required under the continuous disclosure regime stipulated by the Corporations Act 2001 (Cth) and the Australian Stock Exchange (ASX) Listing Rules. Accordingly, this article examines whether the notification of data breaches is a statutory requirement of the existing continuous disclosure regime and whether the ASX should therefore be notified of such incidents.