904 resultados para Information Protection (Computing)
Resumo:
La protecció del copyright mitjançant un sistema de marca d'aigua és una de les qüestions que cal solucionar en el món actual, en què la comunicació i l'intercanvi de material per mitjà de la xarxa estan a l'abast de tothom. D?acord amb això, aquest treball fa un estudi dels mètodes possibles per a poder introduir dins una imatge en format BMP un codi que, de manera inequívoca, permeti assegurar que la propietat d'aquella imatge és nostra.
Resumo:
L'objectiu d'aquest TFC és implementar un sistema senzill de protecció del copyright per a imatges de format BMP mitjançant un esquema de marcatge basat en codis duals de Hamming, que permeten recuperar la marca quan la imatge marcada ha estat sotmesa a certs tipus de processament digital i també en el cas de confabulació de dos compradors.
Resumo:
The growth of the Irish economy in recent years is resulting in shortages of skilled employees in some sectors such as information and computing technologies, construction professionals and across a broad range of medical, health and social care professions (including Medical Practitioners, nurses, speech and language therapists, occupational therapists, radiographers, physiotherapists, social workers) Download document here
Resumo:
The Internet is a fundamental part of the daily life of adolescents, they consider it as a safe and confidential source of information on health matters. The aims is to describe the experience of Spanish adolescents searching for health information on the Internet. Methods A cross-sectional study of 811 school-age adolescents in Granada was carried out. An adapted and piloted questionnaire was used which was controlled by trained personnel. Sociodemographic and health variables were included together with those concerning the conditions governing access to and use of information and communication technologies (ICT). Results 811 adolescents were surveyed (99.38% response rate), mean age was 17 years old. Of these, 88% used the Internet; 57.5% used it on a daily or weekly basis and 38.7% used it occasionally. Nearly half the sample group (55.7%) stated that they used the Internet to search for health-related information. The main problems reported in the search for e-health were the ignorance of good web pages (54.8%) and the lack of confidence or search skills (23.2%). Conclusions In conclusion, it seems plausible to claim that websites designed and managed by health services should have a predominant position among interventions specifically addressed to young people.
Resumo:
The Andalusian Public Health System (Sistema Sanitario Público de Andalucía -SSPA) Repository is the open environment where all the scientific output generated by the SSPA professionals, resulting from their medical care, research and administrative activities, is comprehensively collected and managed. This repository possesses special features which determined its development: the SSPA organization and its purpose as a health institution, the specific sets of documents that it generates and the stakeholders involved in it. The repository uses DSpace 1.6.2, to which several changes were implemented in order to achieve the SSPA initial goals and requirements. The main changes were: the addition of specific qualifiers to the Metadata Dublin Core scheme, the modification of the submission form, the integration of the MeSH Thesaurus as controlled vocabulary and the optimization of the advanced search tool. Another key point during the setting up of the repository was the initial batch ingest of the documents.
Resumo:
Tietokonejärjestelmän osien ja ohjelmistojen suorituskykymittauksista saadaan tietoa,jota voidaan käyttää suorituskyvyn parantamiseen ja laitteistohankintojen päätöksen tukena. Tässä työssä tutustutaan suorituskyvyn mittaamiseen ja mittausohjelmiin eli ns. benchmark-ohjelmistoihin. Työssä etsittiin ja arvioitiin eri tyyppisiä vapaasti saatavilla olevia benchmark-ohjelmia, jotka soveltuvat Linux-laskentaklusterin suorituskyvynanalysointiin. Benchmarkit ryhmiteltiin ja arvioitiin testaamalla niiden ominaisuuksia Linux-klusterissa. Työssä käsitellään myös mittausten tekemisen ja rinnakkaislaskennan haasteita. Benchmarkkeja löytyi moneen tarkoitukseen ja ne osoittautuivat laadultaan ja laajuudeltaan vaihteleviksi. Niitä on myös koottu ohjelmistopaketeiksi, jotta laitteiston suorituskyvystä saisi laajemman kuvan kuin mitä yhdellä ohjelmalla on mahdollista saada. Olennaista on ymmärtää nopeus, jolla dataa saadaan siirretyä prosessorille keskusmuistista, levyjärjestelmistä ja toisista laskentasolmuista. Tyypillinen benchmark-ohjelma sisältää paljon laskentaa tarvitsevan matemaattisen algoritmin, jota käytetään tieteellisissä ohjelmistoissa. Benchmarkista riippuen tulosten ymmärtäminen ja hyödyntäminen voi olla haasteellista.
Resumo:
Tässä luomistyössä on esitetty tutkimus informaation suojaamisen menetelmien osalta paikallisissa ja ryhmäkuntaisissa verkoissa. Tutkimukseen kuuluu nykyaikaisten kryptagraafisten järjestelmien, Internetin/Intranetin ohjelmointikeinojen ja pääsyoikeuksien jakelumenetelmien analyysi. Tutkimusten perusteella on laadittu ohjelmiston prototyyppi HTML-tiedostojen suojaamista varten. Ohjelmiston laatimisprosessi on sisältänyt vaatimusten, järjestelmän ja suojelukomponenttien suunnittelun ja protytyypin testauksen. Ohjelmiston realisoinnin jälkeen kirjoitettiin käyttöohjeet. Ohjelmiston prototyyppi suojaa informaatiota HTML-tiedoston koko käytön aikana ja eri yrityksissä voidaan käyttää sitä pienien laajennuksien jälkeen.
Resumo:
The Moreton Bay Waterways and Catchments Partnership, now branded the Healthy Waterways Partnership, has built on the experience of the past 15 years here in South East Queensland (SEQ). It focuses on water quality and the ecosystem health of our freshwater, estuarine and marine systems through the implementation of actions by individual partners and the collective oversight of a regional work program that assists partners to prioritise their investments and address emerging issues. This regional program includes monitoring, reporting, marketing and communication, development of decision support tools, research that is directed to problem solving, and maintaining extensive consultative and engagement arrangements. The Partnership has produced information-based outcomes which have led to significant cost savings in the protection of water quality and ecosystem resources by its stakeholders. This has been achieved by: – providing a clear focus for management actions that has ownership of governments, industry and community; – targeted scientific research to address issues requiring appropriate management actions; – management actions based on a sound understanding of the waterways and rigorous public consultation; and, – development and implementation of a strategy that incorporates commitments from all levels of stakeholders. While focusing on our waterways, the Partnership’s approach includes addressing catchment management issues particularly relating to the management of diffuse pollution sources in both urban and rural landscapes as well as point source loads. We are now working with other stakeholders to develop a framework for integrated water management that will link water quality and water quantity goals and priorities.
Resumo:
This paper reflects upon our attempts to bring a participatory design approach to design research into interfaces that better support dental practice. The project brought together design researchers, general and specialist dental practitioners, the CEO of a dental software company and, to a limited extent, dental patients. We explored the potential for deployment of speech and gesture technologies in the challenging and authentic context of dental practices. The paper describes the various motivations behind the project, the negotiation of access and the development of the participant relationships as seen from the researchers' perspectives. Conducting participatory design sessions with busy professionals demands preparation, improvisation, and clarity of purpose. The paper describes how we identified what went well and when to shift tactics. The contribution of the paper is in its description of what we learned in bringing participatory design principles to a project that spanned technical research interests, commercial objectives and placing demands upon the time of skilled professionals. Copyright © 2010 ACM, Inc
Resumo:
Non-technical losses (NTL) identification and prediction are important tasks for many utilities. Data from customer information system (CIS) can be used for NTL analysis. However, in order to accurately and efficiently perform NTL analysis, the original data from CIS need to be pre-processed before any detailed NTL analysis can be carried out. In this paper, we propose a feature selection based method for CIS data pre-processing in order to extract the most relevant information for further analysis such as clustering and classifications. By removing irrelevant and redundant features, feature selection is an essential step in data mining process in finding optimal subset of features to improve the quality of result by giving faster time processing, higher accuracy and simpler results with fewer features. Detailed feature selection analysis is presented in the paper. Both time-domain and load shape data are compared based on the accuracy, consistency and statistical dependencies between features.
Resumo:
Cet essai est présenté en tant que mémoire de maîtrise dans le cadre du programme de droit des technologies de l’information. Ce mémoire traite de différents modèles d’affaires qui ont pour caractéristique commune de commercialiser les données dans le contexte des technologies de l’information. Les pratiques commerciales observées sont peu connues et l’un des objectifs est d’informer le lecteur quant au fonctionnement de ces pratiques. Dans le but de bien situer les enjeux, cet essai discutera d’abord des concepts théoriques de vie privée et de protection des renseignements personnels. Une fois ce survol tracé, les pratiques de « data brokerage », de « cloud computing » et des solutions « analytics » seront décortiquées. Au cours de cette description, les enjeux juridiques soulevés par chaque aspect de la pratique en question seront étudiés. Enfin, le dernier chapitre de cet essai sera réservé à deux enjeux, soit le rôle du consentement et la sécurité des données, qui ne relèvent pas d’une pratique commerciale spécifique, mais qui sont avant tout des conséquences directes de l’évolution des technologies de l’information.
Resumo:
Cet essai est présenté en tant que mémoire de maîtrise dans le cadre du programme de droit des technologies de l’information. Ce mémoire traite de différents modèles d’affaires qui ont pour caractéristique commune de commercialiser les données dans le contexte des technologies de l’information. Les pratiques commerciales observées sont peu connues et l’un des objectifs est d’informer le lecteur quant au fonctionnement de ces pratiques. Dans le but de bien situer les enjeux, cet essai discutera d’abord des concepts théoriques de vie privée et de protection des renseignements personnels. Une fois ce survol tracé, les pratiques de « data brokerage », de « cloud computing » et des solutions « analytics » seront décortiquées. Au cours de cette description, les enjeux juridiques soulevés par chaque aspect de la pratique en question seront étudiés. Enfin, le dernier chapitre de cet essai sera réservé à deux enjeux, soit le rôle du consentement et la sécurité des données, qui ne relèvent pas d’une pratique commerciale spécifique, mais qui sont avant tout des conséquences directes de l’évolution des technologies de l’information.
Resumo:
Genetic recombination can produce heterogeneous phylogenetic histories within a set of homologous genes. Delineating recombination events is important in the study of molecular evolution, as inference of such events provides a clearer picture of the phylogenetic relationships among different gene sequences or genomes. Nevertheless, detecting recombination events can be a daunting task, as the performance of different recombination-detecting approaches can vary, depending on evolutionary events that take place after recombination. We recently evaluated the effects of post-recombination events on the prediction accuracy of recombination-detecting approaches using simulated nucleotide sequence data. The main conclusion, supported by other studies, is that one should not depend on a single method when searching for recombination events. In this paper, we introduce a two-phase strategy, applying three statistical measures to detect the occurrence of recombination events, and a Bayesian phylogenetic approach in delineating breakpoints of such events in nucleotide sequences. We evaluate the performance of these approaches using simulated data, and demonstrate the applicability of this strategy to empirical data. The two-phase strategy proves to be time-efficient when applied to large datasets, and yields high-confidence results.
Resumo:
Previous work on generating state machines for the purpose of class testing has not been formally based. There has also been work on deriving state machines from formal specifications for testing non-object-oriented software. We build on this work by presenting a method for deriving a state machine for testing purposes from a formal specification of the class under test. We also show how the resulting state machine can be used as the basis for a test suite developed and executed using an existing framework for class testing. To derive the state machine, we identify the states and possible interactions of the operations of the class under test. The Test Template Framework is used to formally derive the states from the Object-Z specification of the class under test. The transitions of the finite state machine are calculated from the derived states and the class's operations. The formally derived finite state machine is transformed to a ClassBench testgraph, which is used as input to the ClassBench framework to test a C++ implementation of the class. The method is illustrated using a simple bounded queue example.