978 resultados para LYING ELECTRONIC STATES
Resumo:
We present an approach to automatically de-identify health records. In our approach, personal health information is identified using a Conditional Random Fields machine learning classifier, a large set of linguistic and lexical features, and pattern matching techniques. Identified personal information is then removed from the reports. The de-identification of personal health information is fundamental for the sharing and secondary use of electronic health records, for example for data mining and disease monitoring. The effectiveness of our approach is first evaluated on the 2007 i2b2 Shared Task dataset, a widely adopted dataset for evaluating de-identification techniques. Subsequently, we investigate the robustness of the approach to limited training data; we study its effectiveness on different type and quality of data by evaluating the approach on scanned pathology reports from an Australian institution. This data contains optical character recognition errors, as well as linguistic conventions that differ from those contained in the i2b2 dataset, for example different date formats. The findings suggest that our approach compares to the best approach from the 2007 i2b2 Shared Task; in addition, the approach is found to be robust to variations of training size, data type and quality in presence of sufficient training data.
Resumo:
The central document governing the global organization of Air Navigation Services (ANS) is the Convention on International Civil Aviation, commonly referred to as the “Chicago Convention,” whose original version was signed in that city in 1944. In the Convention, Contracting States agreed to ensure the minimum standards of ANS established by ICAO, a specialized United Nations agency created by the Convention. Emanating from obligations under the Chicago Convention, ANS has traditionally provided by departments of national governments. However, there is a widespread trend toward transferring delivery of ANS services outside of line departments of national governments to independent agencies or corporations. The Civil Air Navigation Services Organisation (CANSO), which is the trade association for independent ANS providers, currently counts approximately 60 members, and is steadily growing. However, whatever delivery mechanisms are chosen, national governments remain ultimately responsible for ensuring that adequate ANS services are available. The provision by governments of ANS reflects the responsibility of the state for safety, international relations, and indirectly, the macroeconomic benefits of ensuring a sound infrastructure for aviation. ANS is a “public good” and an “essential good” provided to all aircraft using a country’s airfields and airspace. However, ANS also represents a service that directly benefits only a limited number of users, notably aircraft owners and operators. The idea that the users of the system, rather than the taxpaying public, should incur the costs associated with ANS provision is inherent in the commercialization process. However, ICAO sets out broad principles for the establishment of user charges, which member states are expected to comply with. ICAO states that only distance flown and aircraft weights are acceptable parameters for use in a charging system. These two factors are considered to be easy to measure, bear a reasonable relationship to the value of service received, and do not discriminate due to factors such as where the flight originated or the nation of aircraft registration.
Resumo:
A new era of cyber warfare has appeared on the horizon with the discovery and detection of Stuxnet. Allegedly planned, designed, and created by the United States and Israel, Stuxnet is considered the first known cyber weapon to attack an adversary state. Stuxnet's discovery put a lot of attention on the outdated and obsolete security of critical infrastructure. It became very apparent that electronic devices that are used to control and operate critical infrastructure like programmable logic controllers (PLCs) or supervisory control and data acquisition (SCADA) systems lack very basic security and protection measures. Part of that is due to the fact that when these devices were designed, the idea of exposing them to the Internet was not in mind. However, now with this exposure, these devices and systems are considered easy prey to adversaries.
Resumo:
The University of Queensland (UQ) has extensive laboratory facilities associated with each course in the undergraduate electrical engineering program. The laboratories include machines and drives, power systems simulation, power electronics and intelligent equipment diagnostics. A number of postgraduate coursework programs are available at UQ and the courses associated with these programs also use laboratories. The machine laboratory is currently being renovated with i-lab style web based experimental facilities, which could be remotely accessed. Senior level courses use independent projects using laboratory facilities and this is found to be very useful to improve students' learning skill. Laboratory experiments are always an integral part of a course. Most of the experiments are conducted in a group of 2-3 students and thesis projects in BE and major projects in ME are always individual works. Assessment is done in-class for the performance and also for the report and analysis.
Resumo:
Neutral and cationic \[C-2,P-2] were investigated by a combination of mass spectrometry and electronic structure calculations. The cationic \[C-2,P-2](.+) potential energy surface including all relevant minima, transition states and fragmentation products was calculated at the B3LYP/6-311G(3df) level of theory. The most stable structures are linear PCCP.+ 1(.+) (E-rel=0 kcal mol(-1)), a three-membered ring with exocyclic phosphorus c-(PCC)-P 2(.+) (E-rel = 40.8 kcal mol(-1)), and the rhombic isomer 3(.+) (E-rel = 24.9 kcal mol(-1)). All fragmentation channels are significantly higher in energy than any of the \[C-2,P-2](.+) isomers. Experimentally, \[C-2,P-2](.+) ions are generated under high vacuum conditions by electron ionization of two different precursors. The fragmentation of \[C-2,P-2](.+) on collisional activation is preceded by rearrangement reactions which obscure the structural connectivity of the ions. The existence and the high stability of neutral \[C-2,P-2] were proved by a neutralization-reionization (NR) experiment. Although an unambiguous structural assignment of the neutral species cannot be drawn, both theory and experiment suggest that the long-sought neutral, linear PCCP 1 is generated using the NR technique.
Resumo:
This paper explores the slippery nature of illness and diagnosis in Lauren Slater’s memoir, Lying: a Metaphorical Memoir (2000). Speaking from the shadowy intersection of childhood and adolescence, Slater’s narrator, Lauren, uses the metaphor of epilepsy to describe her own predilection for exaggeration. In exploiting the fallibility of the first-person narrator, Slater insists on the legitimacy of metaphor in accounts of childhood illness that are more concerned with narrative truth than historical accuracy. The result of this playfulness and general misrule is that Slater writes herself into a double bind: on one side, she is the child narrator who inadvertently misrepresents events and misdirects readers, and on the other side, she is the untrustworthy author who employs metaphor as a licence to lie.
Resumo:
Objective While many jurisdictions internationally now require learner drivers to complete a specified number of hours of supervised driving practice before being able to drive unaccompanied, very few require learner drivers to complete a log book to record this practice and then present it to the licensing authority. Learner drivers in most Australian jurisdictions must complete a log book that records their practice thereby confirming to the licensing authority that they have met the mandated hours of practice requirement. These log books facilitate the management and enforcement of minimum supervised hours of driving requirements. Method Parents of learner drivers in two Australian states, Queensland and New South Wales, completed an online survey assessing a range of factors, including their perceptions of the accuracy of their child’s learner log book and the effectiveness of the log book system. Results The study indicates that the large majority of parents believe that their child’s learner log book is accurate. However, they generally report that the log book system is only moderately effective as a system to measure the number of hours of supervised practice a learner driver has completed. Conclusions The results of this study suggest the presence of a paradox with many parents possibly believing that others are not as diligent in the use of log books as they are or that the system is too open to misuse. Given that many parents report that their child’s log book is accurate, this study has important implications for the development and ongoing monitoring of hours of practice requirements in graduated driver licensing systems.
Resumo:
A key derivation function (KDF) is a function that transforms secret non-uniformly random source material together with some public strings into one or more cryptographic keys. These cryptographic keys are used with a cryptographic algorithm for protecting electronic data during both transmission over insecure channels and storage. In this thesis, we propose a new method for constructing a generic stream cipher based key derivation function. We show that our proposed key derivation function based on stream ciphers is secure if the under-lying stream cipher is secure. We simulate instances of this stream cipher based key derivation function using three eStream nalist: Trivium, Sosemanuk and Rabbit. The simulation results show these stream cipher based key derivation functions offer efficiency advantages over the more commonly used key derivation functions based on block ciphers and hash functions.
Resumo:
Australian law similar to that of United States -- Australian law requires copyright must subsist in plaintiff's material and defendent's work must infringe plaintiff's copyright to find defendent liable for illegal copying -- subsistence -- infringement -- two cases that touch on 'look and feel' issue -- passing-off -- look and feel of computer program deserves protection
Resumo:
Mammographic density (MD) is a strong heritable risk factor for breast cancer, and may decrease with increasing parity. However, the biomolecular basis for MD-associated breast cancer remains unclear, and systemic hormonal effects on MD-associated risk is poorly understood. This study assessed the effect of murine peripartum states on high and low MD tissue maintained in a xenograft model of human MD. Method High and low MD human breast tissues were precisely sampled under radiographic guidance from prophylactic mastectomy specimens of women. The high and low MD tissues were maintained in separate vascularised biochambers in nulliparous or pregnant SCID mice for 4 weeks, or mice undergoing postpartum involution or lactation for three additional weeks. High and low MD biochamber material was harvested for histologic and radiographic comparisons during various murine peripartum states. High and low MD biochamber tissues in nulliparous mice were harvested at different timepoints for histologic and radiographic comparisons. Results High MD biochamber tissues had decreased stromal (p = 0.0027), increased adipose (p = 0.0003) and a trend to increased glandular tissue areas (p = 0.076) after murine postpartum involution. Stromal areas decreased (p = 0.042), while glandular (p = 0.001) and adipose areas (p = 0.009) increased in high MD biochamber tissues during lactation. A difference in radiographic density was observed in high (p = 0.0021) or low MD biochamber tissues (p = 0.004) between nulliparous, pregnant and involution groups. No differences in tissue composition were observed in high or low MD biochamber tissues maintained for different durations, although radiographic density increased over time. Conclusion High MD biochamber tissues had measurable histologic changes after postpartum involution or lactation. Alterations in radiographic density occurred in biochamber tissues between different peripartum states and over time. These findings demonstrate the dynamic nature of the human MD xenograft model, providing a platform for studying the biomolecular basis of MD-associated cancer risk. © 2013 Springer Science+Business Media New York.
Resumo:
United States copyright law -- two streams of computer copyright cases form basis for 'look and feel' litigation, literary work stream and audiovisual work stream -- literary work stream focuses on structure -- audiovisual work steam addresses appearance -- case studies
Resumo:
This article presents an overview of two aspects of the role the internet now plays in the court system - first, the extent to which judges, administrators and court officials at the different levels in the court hierarchy are using the internet to deliver enhanced access to the Australian justice system for the community as a whole, and second, how they have embraced that same technology as an aid for accessing information for better judgment delivery and administration.