Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2010

Faculty of Informatics - Papers (Archive)

Based

Articles 1 - 8 of 8

Full-Text Articles in Physical Sciences and Mathematics

Estimates Of Probable Dementia Prevalence From Population-Based Surveys Compared With Dementia Prevalence Estimates Based On Meta-Analyses, Kaarin J. Anstey, Richard A. Burns, Carole Birrell, David G. Steel, Kim M. Kiely, Mary A. Luszcz Jan 2010

Estimates Of Probable Dementia Prevalence From Population-Based Surveys Compared With Dementia Prevalence Estimates Based On Meta-Analyses, Kaarin J. Anstey, Richard A. Burns, Carole Birrell, David G. Steel, Kim M. Kiely, Mary A. Luszcz

Faculty of Informatics - Papers (Archive)

Background: National data on dementia prevalence are not always available, yet it may be possible to obtain estimates from large surveys that include dementia screening instruments. In Australia, many of the dementia prevalence estimates are based on European data collected between 15 and 50 years ago. We derived populationbased estimates of probable dementia and possible cognitive impairment in Australian studies using the Mini-Mental State Examination (MMSE), and compared these to estimates of dementia prevalence from meta-analyses of European studies.

Methods: Data sources included a pooled dataset of Australian longitudinal studies (DYNOPTA), and two Australian Bureau of Statistics National …


An Approach To Studying Location-Based Services Regulation In Australia, Roba Abbas Jan 2010

An Approach To Studying Location-Based Services Regulation In Australia, Roba Abbas

Faculty of Informatics - Papers (Archive)

Location-based Services (LBS) afford a means of positioning, tracing and tracking individuals and objects, for purposes such as emergency management, employee monitoring, and consumer convenience. This paper reviews the present LBS setting and expected developments in this space, with a particular focus on the implications for Australian research and regulatory efforts. The origins of LBS in the mobile-commerce field are explored, incorporating an appraisal of the underlying positioning technology, the stakeholders in the LBS value chain, and the regulatory environment in which these services are employed. There is an evident disparity between the implementation of LBS technologies and the introduction …


Action Recognition Based On A Bag Of 3d Points, Wanqing Li, Zhenyu Zhang, Zicheng Liu Jan 2010

Action Recognition Based On A Bag Of 3d Points, Wanqing Li, Zhenyu Zhang, Zicheng Liu

Faculty of Informatics - Papers (Archive)

This paper presents a method to recognize human actions from sequences of depth maps. Specifically, we employ an action graph to model explicitly the dynamics of the actions and a bag of 3D points to characterize a set of salient postures that correspond to the nodes in the action graph. In addition, we propose a simple, but effective projection based sampling scheme to sample the bag of 3D points from the depth maps. Experimental results have shown that over 90% recognition accuracy were achieved by sampling only about 1% 3D points from the depth maps. Compared to the 2D silhouette …


Pbtrust: A Priority-Based Trust Model For Service Selection In General Service-Oriented Environments, Xing Su, Minjie Zhang, Yi Mu, Kwang Mong Sim Jan 2010

Pbtrust: A Priority-Based Trust Model For Service Selection In General Service-Oriented Environments, Xing Su, Minjie Zhang, Yi Mu, Kwang Mong Sim

Faculty of Informatics - Papers (Archive)

How to choose the best service provider (agent), which a service consumer can trust in terms of the quality and success rate of the service in an open and dynamic environment, is a challenging problem in many service-oriented applications such as Internet-based grid systems, e-trading systems, as well as service-oriented computing systems. This paper presents a Priority-Based Trust (PBTrust) model for service selection in general service-oriented environments. The PBTrust is robust and novel from several perspectives. (1) The reputation of a service provider is derived from referees who are third parties and had interactions with the provider in a rich …


A Human Gait Classification Method Based On Radar Doppler Spectrograms, Fok Hing Chi Tivive, Abdesselam Bouzerdoum, Moeness G. Amin Jan 2010

A Human Gait Classification Method Based On Radar Doppler Spectrograms, Fok Hing Chi Tivive, Abdesselam Bouzerdoum, Moeness G. Amin

Faculty of Informatics - Papers (Archive)

An image classification technique, which has recently been introduced for visual pattern recognition, is successfully applied for human gait classification based on radar Doppler signatures depicted in the time-frequency domain. The proposed method has three processing stages. The first two stages are designed to extract Doppler features that can effectively characterize humanmotion based on the nature of arm swings, and the third stage performs classification. Three types of arm motion are considered: free-arm swings, one-arm confined swings, and no-arm swings. The last two arm motions can be indicative of a human carrying objects or a person in stressed situations. The …


Data Security And Information Privacy For Pda Accessible Clinical-Log For Medical Education In Problem-Based Learning (Pbl) Approach, Rattiporn Luanrattana, Khin Than Win, John A. Fulcher Jan 2010

Data Security And Information Privacy For Pda Accessible Clinical-Log For Medical Education In Problem-Based Learning (Pbl) Approach, Rattiporn Luanrattana, Khin Than Win, John A. Fulcher

Faculty of Informatics - Papers (Archive)

Data security and information privacy are the important aspects to consider for the use of mobile technology for recording clinical experience and encounter in medical education. Objective: This study aims to address the qualitative findings of the appropriate data security and information privacy for PDA accessible clinical-log in problem-based learning (PBL) approach in medical education. Method: The semi-structured interviews were conducted with the medical faculty members, honorary clinical academics and medical education technology specialists. Results: Data security and information access plan were determined for managing clinical-log data. The results directed the guideline for the future development and implementation of clinical-log …


Support-Based Distributed Optimisation: An Approach To Radiotherapy Patient Scheduling, Graham Billiau, Chee-Fon Chang, Andrew Alexis Miller, Aditya K. Ghose Jan 2010

Support-Based Distributed Optimisation: An Approach To Radiotherapy Patient Scheduling, Graham Billiau, Chee-Fon Chang, Andrew Alexis Miller, Aditya K. Ghose

Faculty of Informatics - Papers (Archive)

In the health system inefficiency leads to poor use of scarce expensive resources. Lengthy patient treatment waiting time can result from inefficiency in scheduling. The use of state-of-the art multi-agent and distributed computing technologies can provide a solution to address this problem. However, distributed optimisation in such a multi-agent setting poses an important challenge that requires protocols to enable agents to optimise shared objectives without necessarily revealing all of their private constraints. In this study we show that if the problem is expressed as a Dynamic Distributed Constraint Optimisation Problem a powerful algorithm such as SBDO can be deployed to …


The Detection Of Steam Injection Based On Video Surveillance, Yipeng Guo, Shu Wang, Ming Zhu, Jiangtao Xi Jan 2010

The Detection Of Steam Injection Based On Video Surveillance, Yipeng Guo, Shu Wang, Ming Zhu, Jiangtao Xi

Faculty of Informatics - Papers (Archive)

In this paper, we focus on the visual features of steam injection and propose an integrated algorithm to detect it based on video surveillance. The proposed method is depended on three decision rules which are the attribute of gray level and the feature of frequent flicker rate of steam injection, and the similarity structure between background image and current frame. The block-based approach is applied to all three decision rules. The experimental results show that the algorithm provides a reliable detection method which is useful in many cases such as the alarm on the leakage of a heating pipe.