963 resultados para Engineering, Industrial|Engineering, System Science|Operations Research


Relevância:

100.00% 100.00%

Publicador:

Resumo:

We present a novel method for improving hierarchical speaker clustering in the tasks of speaker diarization and speaker linking. In hierarchical clustering, a tree can be formed that demonstrates various levels of clustering. We propose a ratio that expresses the impact of each cluster on the formation of this tree and use this to rescale cluster scores. This provides score normalisation based on the impact of each cluster. We use a state-of-the-art speaker diarization and linking system across the SAIVT-BNEWS corpus to show that our proposed impact ratio can provide a relative improvement of 16% in diarization error rate (DER).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We do not commonly associate software engineering with philosophical debate. Indeed, software engineers ought to be concerned with building software systems and not settling philosophical questions. I attempt to show that software engineers do, in fact, take philosophical sides when designing software applications. In particular, I look at how the problem of vagueness arises in software engineering and argue that when software engineers solve it, they commit to philosophical views that they are seldom aware of. In the second part of the paper, I suggest a way of dealing with vague predicates without having to confront the problem of vagueness itself. The purpose of my paper is to highlight the currently prevalent disconnect between philosophy and software engineering. I claim that a better knowledge of the philosophical debate is important as it can have ramifications for crucial software design decisions. Better awareness of philosophical issues not only produces better software engineers, it also produces better engineered products.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cubit is a public installation developed for QUT's Cube. It allows QUT staff and students to upload and exhibit media content on the Cube's display surfaces. Interact with the work of QUT's Science, Technology, Engineering and Mathematics (STEM) research projects with CubIT, a unique system at the Cube that allows the general public to collaborate with and access research content shared by QUT's students and academics. QUT students and staff can easily present and share their work at The Cube on a set of large multi-touch displays. To access The Cube, all they need to do is swipe their staff or student card at the CubIT system. They will then be able to instantly upload presentations, videos or visualisation of their work. CubIT boasts a host of collaborative features that allows users to share content across user accounts, annotate content and create shared presentations. Interactive features allow the public to engage and collaborate with content hands-on. In addition to being accessible through The Cube, CubIT allows users to interact with their work through alternative mediums and devices, including mobile phones, tablets and Dropbox. Please note you must be on the QUT network to access CubIT. CubIT can be booked to appear on the Cube Level 5 at specfic times for student and staff purposes. Please email booking requests

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Secure protocols for password-based user authentication are well-studied in the cryptographic literature but have failed to see wide-spread adoption on the Internet; most proposals to date require extensive modifications to the Transport Layer Security (TLS) protocol, making deployment challenging. Recently, a few modular designs have been proposed in which a cryptographically secure password-based mutual authentication protocol is run inside a confidential (but not necessarily authenticated) channel such as TLS; the password protocol is bound to the established channel to prevent active attacks. Such protocols are useful in practice for a variety of reasons: security no longer relies on users' ability to validate server certificates and can potentially be implemented with no modifications to the secure channel protocol library. We provide a systematic study of such authentication protocols. Building on recent advances in modelling TLS, we give a formal definition of the intended security goal, which we call password-authenticated and confidential channel establishment (PACCE). We show generically that combining a secure channel protocol, such as TLS, with a password authentication protocol, where the two protocols are bound together using either the transcript of the secure channel's handshake or the server's certificate, results in a secure PACCE protocol. Our prototype based on TLS is available as a cross-platform client-side Firefox browser extension and a server-side web application which can easily be installed on deployed web browsers and servers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Integrating Science, Technology, and Engineering in Mathematics authors share ideas and activities that stimulate student interest in the integrated fields of science, technology, engineering, and mathematics (STEM) in K–grade 6 classrooms. This article describes an activity that introduced fourth-grade students to the work of aerospace engineers and to the science, technology, and mathematics principles associated with flight.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Reputation systems are employed to provide users with advice on the quality of items on the Web, based on the aggregated value of user-based ratings. Recommender systems are used online to suggest items to users according to the users, expressed preferences. Yet, recommender systems will endorse an item regardless of its reputation value. In this paper, we report the incorporation of reputation models into recommender systems to enhance the accuracy of recommendations. The proposed method separates the implementation of recommender and reputation systems for generality. Our experiment showed that the proposed method could enhance the accuracy of existing recommender systems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Building information models are increasingly being utilised for facility management of large facilities such as critical infrastructures. In such environments, it is valuable to utilise the vast amount of data contained within the building information models to improve access control administration. The use of building information models in access control scenarios can provide 3D visualisation of buildings as well as many other advantages such as automation of essential tasks including path finding, consistency detection, and accessibility verification. However, there is no mathematical model for building information models that can be used to describe and compute these functions. In this paper, we show how graph theory can be utilised as a representation language of building information models and the proposed security related functions. This graph-theoretic representation allows for mathematically representing building information models and performing computations using these functions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Recent modelling of socio-economic costs by the Australian railway industry in 2010 has estimated the cost of level crossing accidents to exceed AU$116 million annually. To better understand the causal factors of these accidents, a video analytics application is being developed to automatically detect near-miss incidents using forward facing videos from trains. As near-miss events occur more frequently than collisions, by detecting these occurrences there will be more safety data available for analysis. The application that is being developed will improve the objectivity of near-miss reporting by providing quantitative data about the position of vehicles at level crossings through the automatic analysis of video footage. In this paper we present a novel method for detecting near-miss occurrences at railway level crossings from video data of trains. Our system detects and localizes vehicles at railway level crossings. It also detects the position of railways to calculate the distance of the detected vehicles to the railway centerline. The system logs the information about the position of the vehicles and railway centerline into a database for further analysis by the safety data recording and analysis system, to determine whether or not the event is a near-miss. We present preliminary results of our system on a dataset of videos taken from a train that passed through 14 railway level crossings. We demonstrate the robustness of our system by showing the results of our system on day and night videos.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Due to significant increase in vehicular accident and traffic congestions, vehicle to vehicle (V2V) communication based on the intelligent transport system (ITS) was introduced. However, to carry out efficient design and implementation of a reliable vehicular communication systems,a deep knowledge of the propagation channel characteristics in different environments is crucial, in particular the Doppler and pathloss parameters. Therefore, this paper presents an empirical V2V channel characterization and measurement performed under realistic urban, suburban and highway driving conditions in Brisbane, Australia. Based on Lin Cheng statistical Doppler Model (LCDM), values for the RMS Doppler spread and coherence time due to time selective nature of V2V channels were presented. Also, based on Log-distance power law model, values for the mean pathloss exponent and the standard deviation of shadowing were reported for urban, suburban and highway environments. The V2V channel parameters can be useful to system designers for the purpose of evaluating, simulating and developing new protocols and systems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The growing number of potential applications of Unmanned Aircraft Systems (UAS) in civilian operations and national security is putting pressure of National Airworthiness Authorities to provide a path for certification and allow UAS integration into the national airspace. The success of this integration depends not only on developments in improved UAS reliability and safety, but also on regulations for certification, and methodologies for operational performance and safety assessment. This paper focuses on the latter and describes progress in relation to a previously proposed framework for evaluating robust autonomy of UAS. The paper draws parallels between the proposed evaluation framework and the evaluation of pilots during the licensing process. It discusses how the data from the proposed evaluation can be used as an aid for decision making in certification and UAS designs. Finally, it discusses challenges associated with the evaluation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper proposes new techniques for aircraft shape estimation, passive ranging, and shape-adaptive hidden Markov model filtering which are suitable for a monocular vision-based non-cooperative collision avoidance system. Vision-based passive ranging is an important missing technology that could play a significant role in resolving the sense-and-avoid problem in un-manned aerial vehicles (UAVs); a barrier hindering the wider adoption of UAVs for civilian applications. The feasibility of the pro- posed shape estimation, passive ranging and shape-adaptive filtering techniques is evaluated on flight test data.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The development of offshore oil and gas fields require the placement of different equipment on the sea floor. This is done by deploying the equipment from vessels operating in dynamic positioning on the surface. The deployment operation has different phases, and in higher sea states, it may require wave-load synchronization, when the load is going through the splash zone, and heave compensation when the load is close to the sea floor. In this paper, we analyse the performance of a particular type of hardware operating in a heave compensation mode. We derive a comprehensive model, analyse limits of performance and evaluate a control strategy.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Health Information Exchange (HIE) is an interesting phenomenon. It is a patient centric health and/or medical information management scenario enhanced by integration of Information and Communication Technologies (ICT). While health information systems are repositioning complex system directives, in the wake of the ‘big data’ paradigm, extracting quality information is challenging. It is anticipated that in this talk, ICT enabled healthcare scenarios with big data analytics will be shared. In addition, research and development regarding big data analytics, such as current trends of using these technologies for health care services and critical research challenges when extracting quality of information to improve quality of life will be discussed.