987 resultados para Multimedia Approach
Resumo:
This study attempts to provide a criteria-based approach that can be used to evaluate the potential for technology transfer and commercialisation of a new technology from university research. More specifically, this study offers the critical factors for assessing marketability and feasibility of an innovation for the commercialisation and technology transfer process. The Delphi technique has been used to refine and categorise assessment criteria identified from various models and frameworks that emerged from literature. Proposed categories of criteria that are found to be important in the evaluation and assessment of a new technology for the commercialisation purpose include: Technological Readiness; Legal and Regulatory; Social Benefits and Impact; Economic and Market Factors.
Resumo:
Novelty-biased cumulative gain (α-NDCG) has become the de facto measure within the information retrieval (IR) community for evaluating retrieval systems in the context of sub-topic retrieval. Setting the incorrect value of parameter α in α-NDCG prevents the measure from behaving as desired in particular circumstances. In fact, when α is set according to common practice (i.e. α = 0.5), the measure favours systems that promote redundant relevant sub-topics rather than provide novel relevant ones. Recognising this characteristic of the measure is important because it affects the comparison and the ranking of retrieval systems. We propose an approach to overcome this problem by defining a safe threshold for the value of α on a query basis. Moreover, we study its impact on system rankings through a comprehensive simulation.
Resumo:
Relevant to the study of people’s attitudes towards public transport use is the consideration to the role of technology as part of the travel experience. Technologies aim to enhance daily tasks but tend to change the way people interact with products and can be perceived as difficult to use. This is critical in the context of “public use” where products and services are to be used by the population at large: adults, children, elderly, people with disabilities, and tourists. From different perspectives, the topic of users and the use of technologies have been studied in the social sciences and human computer interaction fields; however, earlier approaches fail to address the ways in which experiential knowledge informs people’s interactions with products and technologies, and how such information could guide the design of future technologies. This paper describes a pilot study, part of a larger ongoing exploratory research that investigates people’s experiences with infrastructure, systems, and technologies in the context of public transport. The methodological approach included focus groups, field observations, and retrospective verbal reports. At this stage, the study found that four context led factors were the primary source of reference informing participants’ actions and interactions; they are: (i) context >> experience, (ii) context >> interface, (iii) context >> knowledge, (iv) context >> emotion.
Resumo:
In this paper we describe the approaches adopted to generate the runs submitted to ImageCLEFPhoto 2009 with an aim to promote document diversity in the rankings. Four of our runs are text based approaches that employ textual statistics extracted from the captions of images, i.e. MMR [1] as a state of the art method for result diversification, two approaches that combine relevance information and clustering techniques, and an instantiation of Quantum Probability Ranking Principle. The fifth run exploits visual features of the provided images to re-rank the initial results by means of Factor Analysis. The results reveal that our methods based on only text captions consistently improve the performance of the respective baselines, while the approach that combines visual features with textual statistics shows lower levels of improvements.
Resumo:
10,000 Steps Rockhampton is a multi-strategy health promotion program which aims to develop sustainable community-based strategies to increase physical activity.The central coordinating focus of the project is the use of pedometers to raise awareness of and provide motivation for physical activity, around the theme of '10,000 steps/day - Every step counts.' To date, five key strategies have been implemented: (1) a media-based awareness raising campaign; (2) promotion of physical activity by health professionals; (3) improving social support for physical activity through group-based programs; (4) working with local council to improve environmental support for physical activity, and; (5) establishment of a ‘micro-grants’ fund to which community groups could apply for assistance with small, innovative physical activity enhancing projects. Strategies were introduced on a rolling basis beginning in February 2002 with 'layering' of interventions designed to address the multi-level individual social and environmental determinants of physical activity. The project was quasi-experimental in design, involving collection of baseline and two year follow-up data from community based surveys in Rockhampton and in a matched regional Queensland town. In August 2001,the baseline CATI survey (N=1281)found that 47.9% of men and 33.0% of women were meeting the national guidelines for physical activity. In August 2002, a smaller survey (N=400) found an increase in activity levels among women (39.7% active) but not in men (48.5%). Data from the two year follow up survey, to be conducted in August 2003, will be presented, with discussion of the major successes and challenges of this landmark physical activity intervention. Acknowledgement: This project is supported by a grant from Health Promotion Queensland.
Resumo:
10,000 Steps Rockhampton is a multi-strategy health promotion program which aims to develop sustainable community-based strategies to increase physical activity.The central coordinating focus of the project is the use of pedometers to raise awareness of and provide motivation for physical activity, around the theme of '10,000 steps/day - Every step counts.' To date, five key strategies have been implemented: (1) a media-based awareness raising campaign; (2) promotion of physical activity by health professionals; (3) improving social support for physical activity through group-based programs; (4) working with local council to improve environmental support for physical activity, and; (5) establishment of a ‘micro-grants’ fund to which community groups could apply for assistance with small, innovative physical activity enhancing projects. Strategies were introduced on a rolling basis beginning in February 2002 with 'layering' of interventions designed to address the multi-level individual social and environmental determinants of physical activity. The project was quasi-experimental in design, involving collection of baseline and two year follow-up data from community based surveys in Rockhampton and in a matched regional Queensland town. In August 2001,the baseline CATI survey (N=1281)found that 47.9% of men and 33.0% of women were meeting the national guidelines for physical activity. In August 2002, a smaller survey (N=400) found an increase in activity levels among women (39.7% active) but not in men (48.5%). Data from the two year follow up survey, to be conducted in August 2003, will be presented, with discussion of the major successes and challenges of this landmark physical activity intervention. Acknowledgement: This project is supported by a grant from Health Promotion Queensland
Resumo:
A commitment in 2010 by the Australian Federal Government to spend $466.7 million dollars on the implementation of personally controlled electronic health records (PCEHR) heralded a shift to a more effective and safer patient centric eHealth system. However, deployment of the PCEHR has met with much criticism, emphasised by poor adoption rates over the first 12 months of operation. An indifferent response by the public and healthcare providers largely sceptical of its utility and safety speaks to the complex sociotechnical drivers and obstacles inherent in the embedding of large (national) scale eHealth projects. With government efforts to inflate consumer and practitioner engagement numbers giving rise to further consumer disillusionment, broader utilitarian opportunities available with the PCEHR are at risk. This paper discusses the implications of establishing the PCEHR as the cornerstone of a holistic eHealth strategy for the aggregation of longitudinal patient information. A viewpoint is offered that the real value in patient data lies not just in the collection of data but in the integration of this information into clinical processes within the framework of a commoditised data-driven approach. Consideration is given to the eHealth-as-a-Service (eHaaS) construct as a disruptive next step for co-ordinated individualised healthcare in the Australian context.
Resumo:
Recognising that charitable behaviour can be motivated by public recognition and emotional satisfaction, not-for-profit organisations have developed strategies that leverage self-interest over altruism by facilitating individuals to donate conspicuously. Initially developed as novel marketing programs to increase donation income, such conspicuous tokens of recognition are being recognised as important value propositions to nurture donor relationships. Despite this, there is little empirical evidence that identifies when donations can be increased through conspicuous recognition. Furthermore, social media’s growing popularity for self-expression, as well as the increasing use of technology in donor relationship management strategies, makes an examination of virtual conspicuous tokens of recognition in relation to what value donors seek particularly insightful. Therefore, this research examined the impact of experiential donor value and virtual conspicuous tokens of recognition on blood donor intentions. Using online survey data from 186 Australian blood donors, results show that in fact emotional value is a stronger predictor of intentions to donate blood than altruistic value, while social value is the strongest predictor of intentions if provided with recognition. Clear linkages between dimensions of donor value (altruistic, emotional and social) and conspicuous donation behaviour (CDB) were identified. The findings provide valuable insights into the use of conspicuous donation tokens of recognition on social media, and contribute to our understanding into the under-researched areas of donor value and CDB.
Resumo:
Despite the fact that customer retention is crucial for providers of cloud enterprise systems, only little attention has been directed towards investigating the antecedents of subscription renewal in an organizational context. This is even more surprising, as cloud services are usually offered as subscription-based pricing models with the (theoretical) possibility of immediate service cancellation, strongly opposing classical long-term IT-Outsourcing contracts or license-based payment plans of on premise enterprise systems. To close this research gap an empirical study was undertaken. Firstly, a conceptual model was drawn from theories of social psychology, organizational system continuance and IS success. The model was subsequently tested using survey responses of senior management within companies which adopted cloud enterprise systems. Gathered data was then analysed using PLS. The results indicate that subscription renewal intention is influenced by both – social-related and technology-specific factors – which are able to explain 50.4% of the variance in the dependent variable. Beneath the cloud enterprise systems specific contributions, the work advances knowledge in the area of organizational system continuance, as well as IS success.
Resumo:
The location of previously unseen and unregistered individuals in complex camera networks from semantic descriptions is a time consuming and often inaccurate process carried out by human operators, or security staff on the ground. To promote the development and evaluation of automated semantic description based localisation systems, we present a new, publicly available, unconstrained 110 sequence database, collected from 6 stationary cameras. Each sequence contains detailed semantic information for a single search subject who appears in the clip (gender, age, height, build, hair and skin colour, clothing type, texture and colour), and between 21 and 290 frames for each clip are annotated with the target subject location (over 11,000 frames are annotated in total). A novel approach for localising a person given a semantic query is also proposed and demonstrated on this database. The proposed approach incorporates clothing colour and type (for clothing worn below the waist), as well as height and build to detect people. A method to assess the quality of candidate regions, as well as a symmetry driven approach to aid in modelling clothing on the lower half of the body, is proposed within this approach. An evaluation on the proposed dataset shows that a relative improvement in localisation accuracy of up to 21 is achieved over the baseline technique.
Resumo:
Time series classification has been extensively explored in many fields of study. Most methods are based on the historical or current information extracted from data. However, if interest is in a specific future time period, methods that directly relate to forecasts of time series are much more appropriate. An approach to time series classification is proposed based on a polarization measure of forecast densities of time series. By fitting autoregressive models, forecast replicates of each time series are obtained via the bias-corrected bootstrap, and a stationarity correction is considered when necessary. Kernel estimators are then employed to approximate forecast densities, and discrepancies of forecast densities of pairs of time series are estimated by a polarization measure, which evaluates the extent to which two densities overlap. Following the distributional properties of the polarization measure, a discriminant rule and a clustering method are proposed to conduct the supervised and unsupervised classification, respectively. The proposed methodology is applied to both simulated and real data sets, and the results show desirable properties.
Resumo:
A set system (X, F ) with X= {x 1,...,x m}) and F = {B1...,B n }, where B i ⊆ X, is called an (n, m) cover-free set system (or CF set system) if for any 1 ≤ i, j, k ≤ n and j ≠ k, |B i >2 |B j ∩ B k | +1. In this paper, we show that CF set systems can be used to construct anonymous membership broadcast schemes (or AMB schemes), allowing a center to broadcast a secret identity among a set of users in a such way that the users can verify whether or not the broadcast message contains their valid identity. Our goal is to construct (n, m) CF set systems in which for given m the value n is as large as possible. We give two constructions for CF set systems, the first one from error-correcting codes and the other from combinatorial designs. We link CF set systems to the concept of cover-free family studied by Erdös et al in early 80’s to derive bounds on parameters of CF set systems. We also discuss some possible extensions of the current work, motivated by different application.
Resumo:
Contextual factors for sustainable development such as population growth, energy, and resource availability and consumption levels, food production yield, and growth in pollution, provide numerous complex and rapidly changing education and training requirements for a variety of professions including engineering. Furthermore, these requirements may not be clearly understood or expressed by designers, governments, professional bodies or the industry. Within this context, this paper focuses on one priority area for greening the economy through sustainable development—improving energy efficiency—and discusses the complexity of capacity building needs for professionals. The paper begins by acknowledging the historical evolution of sustainability considerations, and the complexity embedded in built environment solutions. The authors propose a dual-track approach to building capacity building, with a short-term focus on improvement (i.e., making peaking challenges a priority for postgraduate education), and a long-term focus on transformational innovation (i.e., making tailing challenges a priority for undergraduate education). A case study is provided, of Australian experiences over the last decade with regard to the topic area of energy efficiency. The authors conclude with reflections on implications for the approach.
Resumo:
This article elucidates and analyzes the fundamental underlying structure of the renormalization group (RG) approach as it applies to the solution of any differential equation involving multiple scales. The amplitude equation derived through the elimination of secular terms arising from a naive perturbation expansion of the solution to these equations by the RG approach is reduced to an algebraic equation which is expressed in terms of the Thiele semi-invariants or cumulants of the eliminant sequence { Zi } i=1 . Its use is illustrated through the solution of both linear and nonlinear perturbation problems and certain results from the literature are recovered as special cases. The fundamental structure that emerges from the application of the RG approach is not the amplitude equation but the aforementioned algebraic equation. © 2008 The American Physical Society.
Resumo:
We study the multicast stream authentication problem when an opponent can drop, reorder and inject data packets into the communication channel. In this context, bandwidth limitation and fast authentication are the core concerns. Therefore any authentication scheme is to reduce as much as possible the packet overhead and the time spent at the receiver to check the authenticity of collected elements. Recently, Tartary and Wang developed a provably secure protocol with small packet overhead and a reduced number of signature verifications to be performed at the receiver. In this paper, we propose an hybrid scheme based on Tartary and Wang’s approach and Merkle hash trees. Our construction will exhibit a smaller overhead and a much faster processing at the receiver making it even more suitable for multicast than the earlier approach. As Tartary and Wang’s protocol, our construction is provably secure and allows the total recovery of the data stream despite erasures and injections occurred during transmission.