995 resultados para improving convergence
Resumo:
The growing importance and need of data processing for information extraction is vital for Web databases. Due to the sheer size and volume of databases, retrieval of relevant information as needed by users has become a cumbersome process. Information seekers are faced by information overloading - too many result sets are returned for their queries. Moreover, too few or no results are returned if a specific query is asked. This paper proposes a ranking algorithm that gives higher preference to a user’s current search and also utilizes profile information in order to obtain the relevant results for a user’s query.
Resumo:
PURPOSE: The purpose of this study is to identify risk factors for developing complications following treatment of refractory glaucoma with transscleral diode laser cyclophotocoagulation (cyclodiode), to improve the safety profile of this treatment modality. METHOD: A retrospective analysis of 72 eyes from 70 patients who were treated with cyclodiode. RESULTS: The mean pre-treatment IOP was 37.0 mmHg (SD 11.0), with a mean post-treatment reduction in intraocular pressure (IOP) of 19.8 mmHg, and a mean IOP at last follow-up of 17.1 mmHg (SD 9.7). Mean total power delivered during treatment was 156.8 Joules (SD 82.7) over a mean of 1.3 treatments (SD 0.6). Sixteen eyes (22.2% of patients) developed complications from the treatment, with the most common being hypotony, occurring in 6 patients, including 4 with neovascular glaucoma. A higher pre-treatment IOP and higher mean total power delivery also were associated with higher complications. CONCLUSIONS: Cyclodiode is an effective treatment option for glaucoma that is refractory to other treatment options. By identifying risk factors for potential complications, cyclodiode can be modified accordingly for each patient to improve safety and efficacy.
Resumo:
Various time-memory tradeoffs attacks for stream ciphers have been proposed over the years. However, the claimed success of these attacks assumes the initialisation process of the stream cipher is one-to-one. Some stream cipher proposals do not have a one-to-one initialisation process. In this paper, we examine the impact of this on the success of time-memory-data tradeoff attacks. Under the circumstances, some attacks are more successful than previously claimed while others are less. The conditions for both cases are established.
Resumo:
In this paper, we present a new algorithm for boosting visual template recall performance through a process of visual expectation. Visual expectation dynamically modifies the recognition thresholds of learnt visual templates based on recently matched templates, improving the recall of sequences of familiar places while keeping precision high, without any feedback from a mapping backend. We demonstrate the performance benefits of visual expectation using two 17 kilometer datasets gathered in an outdoor environment at two times separated by three weeks. The visual expectation algorithm provides up to a 100% improvement in recall. We also combine the visual expectation algorithm with the RatSLAM SLAM system and show how the algorithm enables successful mapping
Resumo:
As an international norm, the Responsibility to Protect (R2P) has gained substantial influence and institutional presence—and created no small controversy—in the ten years since its first conceptualisation. Conversely, the Protection of Civilians in Armed Conflict (PoC) has a longer pedigree and enjoys a less contested reputation. Yet UN Security Council action in Libya in 2011 has thrown into sharp relief the relationship between the two. UN Security Council Resolutions 1970 and 1973 follow exactly the process envisaged by R2P in response to imminent atrocity crimes, yet the operative paragraphs of the resolutions themselves invoke only PoC. This article argues that, while the agendas of PoC and R2P converge with respect to Security Council action in cases like Libya, outside this narrow context it is important to keep the two norms distinct. Peacekeepers, humanitarian actors, international lawyers, individual states and regional organisations are required to act differently with respect to the separate agendas and contexts covered by R2P and PoC. While overlap between the two does occur in highly visible cases like Libya, neither R2P nor PoC collapses normatively, institutionally or operationally into the other.
Resumo:
In this paper, we examine the use of a Kalman filter to aid in the mission planning process for autonomous gliders. Given a set of waypoints defining the planned mission and a prediction of the ocean currents from a regional ocean model, we present an approach to determine the best, constant, time interval at which the glider should surface to maintain a prescribed tracking error, and minimizing time on the ocean surface. We assume basic parameters for the execution of a given mission, and provide the results of the Kalman filter mission planning approach. These results are compared with previous executions of the given mission scenario.
Resumo:
Sfinks is a shift register based stream cipher designed for hardware implementation. The initialisation state update function is different from the state update function used for keystream generation. We demonstrate state convergence during the initialisation process, even though the individual components used in the initialisation are one-to-one. However, the combination of these components is not one-to-one.
Resumo:
A single subject longevity study is presented as a case study for the Medical Device Partnering Program (MDPP). The MDPP supports the development of cutting-edge medical devices and assistive technologies, through unique collaborations between researchers, industry, clinical end-users and government. The study aimed to identify what effect the innersole has on specific muscles that may influence stability and whether the innersole had any influence on gait. Three tests were conducted; a standard gait test, dynamic balance test and a standing balance test. Results from the kinematic analysis showed reduced variability in post testing results when compared to pre testing results. Reductions in muscle activation levels were also found across all tests. Further testing with a larger sample size is required to determine if these effects are due to the innersole.
Resumo:
Post-deployment maintenance and evolution can account for up to 75% of the cost of developing a software system. Software refactoring can reduce the costs associated with evolution by improving system quality. Although refactoring can yield benefits, the process includes potentially complex, error-prone, tedious and time-consuming tasks. It is these tasks that automated refactoring tools seek to address. However, although the refactoring process is well-defined, current refactoring tools do not support the full process. To develop better automated refactoring support, we have completed a usability study of software refactoring tools. In the study, we analysed the task of software refactoring using the ISO 9241-11 usability standard and Fitts' List of task allocation. Expanding on this analysis, we reviewed 11 collections of usability guidelines and combined these into a single list of 38 guidelines. From this list, we developed 81 usability requirements for refactoring tools. Using these requirements, the software refactoring tools Eclipse 3.2, Condenser 1.05, RefactorIT 2.5.1, and Eclipse 3.2 with the Simian UI 2.2.12 plugin were studied. Based on the analysis, we have selected a subset of the requirements that can be incorporated into a prototype refactoring tool intended to address the full refactoring process.
Resumo:
Until recently, standards to guide nursing education and practice in Vietnam were nonexistent. This paper describes the development and implementation of a clinical teaching capacity building project piloted in Hanoi, Vietnam. The project was part of a multi-component capacity building program designed to improve nurse education in Vietnam. Objectives of the project were to develop a collaborative clinically-based teaching model that encourages evidence-based, student-centred clinical learning. The model incorporated strategies to promote development of nursing practice to meet national competency standards. Thirty nurse teachers from two organisations in Hanoi participated in the program. These participants attended three workshops, and completed applied assessments, where participants implemented concepts from each workshop. The assessment tasks were planning, implementing and evaluating clinical teaching. On completion of the workshops, twenty participants undertook a study tour in Australia to refine the teaching model and develop an action plan for model implementation in both organisations, with an aim to disseminate the model across Vietnam. Significant changes accredited to this project have been noted on an individual and organisational level. Dissemination of this clinical teaching model has commenced in Ho Chi Minh, with further plans for more in-depth dissemination to occur throughout the country.
Resumo:
This article is a response to Kim Dalton's 2011 Henry Mayer Lecture. It focuses on Dalton's discussion of Australian content in the context of the government's ongoing Convergence Review.
Resumo:
Whole body cryotherapy (WBC) involves repeatedly exposing an individual, dressed in minimal clothing, to extremely cold air (–100 to –130°C) for a short period. One specific claim that is often made is that WBC is effective in treating exercise-induced muscle soreness and damage. However, our results suggest that two bouts of WBC were ineffective in improving recovery from eccentric exercise when administered 24 hours after eccentric exercise.
Resumo:
According to a recent report Australian higher education is not in crisis. However, we could be doing it better. The report Mapping Australian Higher Education (Norton, 2012) highlights comparative weaknesses such as levels f student engagement; interactions between students and academic staff; and academic staff preferences for research over teaching. The report points out that despite these concerns most graduates continue to get good, well-paid jobs, student satisfaction is improving, and levels of public confidence in Australian higher education are high. It also stresses that ‘the promise of higher education is that it provides adaptable cognitive skills, not that it always provides the job specific skills graduates will need in their future employment’ (Norton, 2012, p.58). This is worth keeping in mind as we contribute to the significant growth in curriculum initiatives aimed at preparing graduates for the world of work. Work Integrated Learning (WIL) is not a new concept but there is increased pressure on higher education globally to address graduate employability skills. The sector is under pressure in an increasingly competitive environment to demonstrate the relevance of courses, accountability and effective use of public funds (Peach & Gamble, 2011). In the Australian context this also means responding to the skills shortage in areas such as engineering, health, construction and business (DEEWR, 2010). This paper provides a brief overview of collaborative efforts over several years to improve the activity of WIL at the Queensland University of Technology (QUT). These efforts have resulted in changes to curriculum, pedagogy, systems and processes, and the initiation of local, regional, national, and international networks. The willingness of students, staff, and industry partners to ‘get stuck in’ and try new approaches in these different contexts can be understood as a form of boundary spanning. That is, the development of the capability to mediate between different forms of expertise and the demands of different contexts in order to nurture student learning and improve the outcomes of higher education through WIL (Peach, Cates, Ilg, Jones, Lechleiter, 2011).
Resumo:
In the medical and healthcare arena, patients‟ data is not just their own personal history but also a valuable large dataset for finding solutions for diseases. While electronic medical records are becoming popular and are used in healthcare work places like hospitals, as well as insurance companies, and by major stakeholders such as physicians and their patients, the accessibility of such information should be dealt with in a way that preserves privacy and security. Thus, finding the best way to keep the data secure has become an important issue in the area of database security. Sensitive medical data should be encrypted in databases. There are many encryption/ decryption techniques and algorithms with regard to preserving privacy and security. Currently their performance is an important factor while the medical data is being managed in databases. Another important factor is that the stakeholders should decide more cost-effective ways to reduce the total cost of ownership. As an alternative, DAS (Data as Service) is a popular outsourcing model to satisfy the cost-effectiveness but it takes a consideration that the encryption/ decryption modules needs to be handled by trustworthy stakeholders. This research project is focusing on the query response times in a DAS model (AES-DAS) and analyses the comparison between the outsourcing model and the in-house model which incorporates Microsoft built-in encryption scheme in a SQL Server. This research project includes building a prototype of medical database schemas. There are 2 types of simulations to carry out the project. The first stage includes 6 databases in order to carry out simulations to measure the performance between plain-text, Microsoft built-in encryption and AES-DAS (Data as Service). Particularly, the AES-DAS incorporates implementations of symmetric key encryption such as AES (Advanced Encryption Standard) and a Bucket indexing processor using Bloom filter. The results are categorised such as character type, numeric type, range queries, range queries using Bucket Index and aggregate queries. The second stage takes the scalability test from 5K to 2560K records. The main result of these simulations is that particularly as an outsourcing model, AES-DAS using the Bucket index shows around 3.32 times faster than a normal AES-DAS under the 70 partitions and 10K record-sized databases. Retrieving Numeric typed data takes shorter time than Character typed data in AES-DAS. The aggregation query response time in AES-DAS is not as consistent as that in MS built-in encryption scheme. The scalability test shows that the DBMS reaches in a certain threshold; the query response time becomes rapidly slower. However, there is more to investigate in order to bring about other outcomes and to construct a secured EMR (Electronic Medical Record) more efficiently from these simulations.
Resumo:
This paper presents an analysis of the stream cipher Mixer, a bit-based cipher with structural components similar to the well-known Grain cipher and the LILI family of keystream generators. Mixer uses a 128-bit key and 64-bit IV to initialise a 217-bit internal state. The analysis is focused on the initialisation function of Mixer and shows that there exist multiple key-IV pairs which, after initialisation, produce the same initial state, and consequently will generate the same keystream. Furthermore, if the number of iterations of the state update function performed during initialisation is increased, then the number of distinct initial states that can be obtained decreases. It is also shown that there exist some distinct initial states which produce the same keystream, resulting in a further reduction of the effective key space