961 resultados para Database application
Resumo:
A dual-scale model of the torrefaction of wood was developed and used to study industrial configurations. At the local scale, the computational code solves the coupled heat and mass transfer and the thermal degradation mechanisms of the wood components. At the global scale, the two-way coupling between the boards and the stack channels is treated as an integral component of the process. This model is used to investigate the effect of the stack configuration on the heat treatment of the boards. The simulations highlight that the exothermic reactions occurring in each single board can be accumulated along the stack. This phenomenon may result in a dramatic eterogeneity of the process and poses a serious risk of thermal runaway, which is often observed in industrial plants. The model is used to explain how thermal runaway can be lowered by increasing the airflow velocity, the sticker thickness or by gas flow reversal.
Resumo:
Robust hashing is an emerging field that can be used to hash certain data types in applications unsuitable for traditional cryptographic hashing methods. Traditional hashing functions have been used extensively for data/message integrity, data/message authentication, efficient file identification and password verification. These applications are possible because the hashing process is compressive, allowing for efficient comparisons in the hash domain but non-invertible meaning hashes can be used without revealing the original data. These techniques were developed with deterministic (non-changing) inputs such as files and passwords. For such data types a 1-bit or one character change can be significant, as a result the hashing process is sensitive to any change in the input. Unfortunately, there are certain applications where input data are not perfectly deterministic and minor changes cannot be avoided. Digital images and biometric features are two types of data where such changes exist but do not alter the meaning or appearance of the input. For such data types cryptographic hash functions cannot be usefully applied. In light of this, robust hashing has been developed as an alternative to cryptographic hashing and is designed to be robust to minor changes in the input. Although similar in name, robust hashing is fundamentally different from cryptographic hashing. Current robust hashing techniques are not based on cryptographic methods, but instead on pattern recognition techniques. Modern robust hashing algorithms consist of feature extraction followed by a randomization stage that introduces non-invertibility and compression, followed by quantization and binary encoding to produce a binary hash output. In order to preserve robustness of the extracted features, most randomization methods are linear and this is detrimental to the security aspects required of hash functions. Furthermore, the quantization and encoding stages used to binarize real-valued features requires the learning of appropriate quantization thresholds. How these thresholds are learnt has an important effect on hashing accuracy and the mere presence of such thresholds are a source of information leakage that can reduce hashing security. This dissertation outlines a systematic investigation of the quantization and encoding stages of robust hash functions. While existing literature has focused on the importance of quantization scheme, this research is the first to emphasise the importance of the quantizer training on both hashing accuracy and hashing security. The quantizer training process is presented in a statistical framework which allows a theoretical analysis of the effects of quantizer training on hashing performance. This is experimentally verified using a number of baseline robust image hashing algorithms over a large database of real world images. This dissertation also proposes a new randomization method for robust image hashing based on Higher Order Spectra (HOS) and Radon projections. The method is non-linear and this is an essential requirement for non-invertibility. The method is also designed to produce features more suited for quantization and encoding. The system can operate without the need for quantizer training, is more easily encoded and displays improved hashing performance when compared to existing robust image hashing algorithms. The dissertation also shows how the HOS method can be adapted to work with biometric features obtained from 2D and 3D face images.
Resumo:
Focuses on the various aspects of advances in future information communication technology and its applications Presents the latest issues and progress in the area of future information communication technology Applicable to both researchers and professionals These proceedings are based on the 2013 International Conference on Future Information & Communication Engineering (ICFICE 2013), which will be held at Shenyang in China from June 24-26, 2013. The conference is open to all over the world, and participation from Asia-Pacific region is particularly encouraged. The focus of this conference is on all technical aspects of electronics, information, and communications ICFICE-13 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of FICE. In addition, the conference will publish high quality papers which are closely related to the various theories and practical applications in FICE. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject. "This work was supported by the NIPA (National IT Industry Promotion Agency) of Korea Grant funded by the Korean Government (Ministry of Science, ICT & Future Planning)."
Resumo:
The latest paradigm shift in government, termed Transformational Government, puts the citizen in the centre of attention. Including citizens in the design of online one-stop portals can help governmental organisations to become more customer focussed. This study describes the initial efforts of an Australian state government to develop an information architecture to structure the content of their future one-stop portal. Hereby, card sorting exercises have been conducted and analysed, utilising contemporary approaches found in academic and non-scientific literature. This paper describes the findings of the card sorting exercises in this particular case and discusses the suitability of the applied approaches in general. These are distinguished into non-statistical, statistical, and hybrid approaches. Thus, on the one hand, this paper contributes to academia by describing the application of different card sorting approaches and discussing their strengths and weaknesses. On the other hand, this paper contributes to practice by explaining the approach that has been taken by the authors’ research partner in order to develop a customer-focussed governmental one-stop portal. Thus, they provide decision support for practitioners with regard to different analysis methods that can be used to complement recent approaches in Transformational Government.
Resumo:
- The RAH was activated over 2500 trauma calls in 2009. This figure is over twice the number of calls put out by similar services. - Many trauma calls (in particular L2 trauma calls) from the existing system do not warrant activation of the trauma team - Sometimes trauma calls are activated for nontrauma reasons (eg rapid access to radiology, departmental pressures etc) - The excess of trauma calls has several deleterious effects particularly on time management for the trauma service staff: ward rounds/tertiary survey rounds, education, quality improvement, research
Resumo:
Facial landmarks play an important role in face recognition. They serve different steps of the recognition such as pose estimation, face alignment, and local feature extraction. Recently, cascaded shape regression has been proposed to accurately locate facial landmarks. A large number of weak regressors are cascaded in a sequence to fit face shapes to the correct landmark locations. In this paper, we propose to improve the method by applying gradual training. With this training, the regressors are not directly aimed to the true locations. The sequence instead is divided into successive parts each of which is aimed to intermediate targets between the initial and the true locations. We also investigate the incorporation of pose information in the cascaded model. The aim is to find out whether the model can be directly used to estimate head pose. Experiments on the Annotated Facial Landmarks in the Wild database have shown that the proposed method is able to improve the localization and give accurate estimates of pose.
Resumo:
The development of user expertise is a strategic imperative for organizations in hyper-competitive markets. This paper conceptualizes opreationalises and validates user expertise in contemporary Information Systems (IS) as a formative, multidimensional index. Such a validated and widely accepted index would facilitate progression of past research on user competence and efficacy of IS to complex contemporary IS, while at the same time providing a benchmark for organizations to track their user expertise. The validation involved three separate studies, including exploratory and confirmatory phases, using data from 244 respondents.
Resumo:
The first objective of this project is to develop new efficient numerical methods and supporting error and convergence analysis for solving fractional partial differential equations to study anomalous diffusion in biological tissue such as the human brain. The second objective is to develop a new efficient fractional differential-based approach for texture enhancement in image processing. The results of the thesis highlight that the fractional order analysis captured important features of nuclear magnetic resonance (NMR) relaxation and can be used to improve the quality of medical imaging.
Resumo:
Establishing age-at-death for skeletal remains is a vital component of forensic anthropology. The Suchey-Brooks (S-B) method of age estimation has been widely utilised since 1986 and relies on a visual assessment of the pubic symphyseal surface in comparison to a series of casts. Inter-population studies (Kimmerle et al., 2005; Djuric et al., 2007; Sakaue, 2006) demonstrate limitations of the S-B method, however, no assessment of this technique specific to Australian populations has been published. Aim: This investigation assessed the accuracy and applicability of the S-B method to an adult Australian Caucasian population by highlighting error rates associated with this technique. Methods: Computed tomography (CT) and contact scans of the S-B casts were performed; each geometrically modelled surface was extracted and quantified for reference purposes. A Queensland skeletal database for Caucasian remains aged 15 – 70 years was initiated at the Queensland Health Forensic and Scientific Services – Forensic Pathology Mortuary (n=350). Three-dimensional reconstruction of the bone surface using innovative volume visualisation protocols in Amira® and Rapidform® platforms was performed. Samples were allocated into 11 sub-sets of 5-year age intervals and changes associated with the surface geometry were quantified in relation to age, gender and asymmetry. Results: Preliminary results indicate that computational analysis was successfully applied to model morphological surface changes. Significant differences in observed versus actual ages were noted. Furthermore, initial morphological assessment demonstrates significant bilateral asymmetry of the pubic symphysis, which is unaccounted for in the S-B method. These results propose refinements to the S-B method, when applied to Australian casework. Conclusion: This investigation promises to transform anthropological analysis to be more quantitative and less invasive using CT imaging. The overarching goal contributes to improving skeletal identification and medico-legal death investigation in the coronial process by narrowing the range of age-at-death estimation in a biological profile.
Resumo:
The Queensland University of Technology (QUT) Library bas recently commenced teaching higher degree students to search online systems such as BRS, ORBIT and STN. The emphasis is on education rather than training. with students being required to familiarise themselves with system commands and database structures whilst receiving necessarily limited tutorial help. The teaching strategies used and problems encountered in the program are outlined. Student responses to the experience of learning to online search are discussed.
Resumo:
A method for the rapid and simultaneous determination of 6,7-dimethylesculetin (CAS 120-08-1) and geniposide (CAS 24512-63-8) in rat plasma has been developed, using validated high performance liquid chromatography (HPLC) with solid phase extraction (SPE). The HPLC analysis was performed on a commercially available column (200 mm x 4.6 mm, 5 microm) with acetonitrile-methanol-0.1% aqueous formic acid as mobile phase and the UV detection at 343 nm and 238 nm for 6,7-dimethylesculetin and geniposide, respectively. The calibration curves for 6,7-dimethylesculetin and geniposide were linear over the range 0.4-25.6 microg/mL and 1.12-71.68 microg/mL, respectively. The lower limits of quantitation were 0.40 microg/ mL and 1.12 microg/mL, and the lower limits of detection were 0.06 microg/mL and 0.09 microg/ mL, respectively. The intra-day and inter-day precision for 6,7-dimethylesculetin and geniposide were < 5%, whereas the absolute recovery percentages were > 74%. A successful application of the developed HPLC analysis was demonstrated for the pharmacokinetic study of a Traditional Chinese Medicine formula of Yin Chen Hao Tang preparation.
Resumo:
Big Data is a rising IT trend similar to cloud computing, social networking or ubiquitous computing. Big Data can offer beneficial scenarios in the e-health arena. However, one of the scenarios can be that Big Data needs to be kept secured for a long period of time in order to gain its benefits such as finding cures for infectious diseases and protecting patient privacy. From this connection, it is beneficial to analyse Big Data to make meaningful information while the data is stored securely. Therefore, the analysis of various database encryption techniques is essential. In this study, we simulated 3 types of technical environments, namely, Plain-text, Microsoft Built-in Encryption, and custom Advanced Encryption Standard, using Bucket Index in Data-as-a-Service. The results showed that custom AES-DaaS has a faster range query response time than MS built-in encryption. Furthermore, while carrying out the scalability test, we acknowledged that there are performance thresholds depending on physical IT resources. Therefore, for the purpose of efficient Big Data management in eHealth it is noteworthy to examine their scalability limits as well even if it is under a cloud computing environment. In addition, when designing an e-health database, both patient privacy and system performance needs to be dealt as top priorities.
Resumo:
Driving can be dangerous, especially for young and inexperienced drivers. To help address the issue of inexperience a gamified logbook application was developed for Learner drivers. The application aims to encourage learners to undertake a wider range of practice, while also making it easier to record their mandatory practice sessions. This paper reports on the design of this application, focusing on the effect that adding gamification can have on the usability and user experience of the application and the importance of playability testing for gamified systems. Two versions of the application were developed, one with game elements and one without game elements. This paper presents findings from a study that compares the user experience of these two versions of the application with twelve recent Learner drivers. Overall, participants reported that the gamified version was more engaging and motivating than the non-gamified version, however neither versions were preferred over the other. We theorise that this may have occurred due to a number of usability issues that arose, including an increased difficulty in learnability due to the added game elements. These design issues are important to address in future gamified system designs.
Resumo:
The process of building safer roads and roadsides needs to be managed to minimise risks to both the road using public and roadworkers. However, detailed and accurate data on fatalities and injuries at roadworks across Australia are not available. The lack of reliable safety records and consequent poor understanding of the hazards at roadworks motivated this research to examine the common trends in incidents and to understand workers' perceptions of the causes of incidents at roadworks. To achieve these aims, 66 roadworks personnel were interviewed in Queensland including road construction workers, traffic controllers, engineers, and managers. Qualitative analyses identified several major issues and themes. Vehicles driving into work areas, traffic controllers hit by vehicles, rear end crashes at roadwork approaches, and reversing incidents involving work vehicles and machinery were the most common types of incidents. Roadworkers perceived driver errors, such as violation of speed limits, distracted driving, and ignoring signage and traffic controllers' instructions as the main causes of the incidents.
Resumo:
The existing literature shows driving speed significantly affects levels of safety, emissions, and stress in driving. In addition, drivers who feel tense when driving have been found to drive more slowly than others. These findings were mostly obtained from crash data analyses or field studies, and less is known regarding driver perceptions of the extent to which reducing their driving speed would improve road safety, reduce their car’s emissions, and reduce stress and road rage. This paper uses ordered probit regression models to analyse responses from 3538 Queensland drivers who completed an online RACQ survey. Drivers most strongly agreed that reducing their driving speed would improve road safety, less strongly agreed that reducing their driving speed would reduce their car’s emissions and least strongly agreed that reducing their driving speed would reduce stress and road rage. Younger drivers less strongly agreed that these benefits would occur than older drivers. Drivers of automatic cars and those who are bicycle commuters agreed more to these benefits than other drivers. Female drivers agreed more strongly than males on improving safety and reducing stress and road rage. Type of fuel used, engine size, driving experience, and distance driven per week were also found to be associated with driver perceptions, although these were not found to be significant in all of the regression models. The findings from this study may help in developing targeted training or educational measures to improve drivers’ willingness to reduce their driving speed.