145,313 research outputs found

    A self-learning system for identifying harmful network information

    Full text link
    Network information identification is a &ldquo;hot&rdquo; topic currently. This paper designs a self-learning system using neural network algorithm for identifying the harmful network messages of both Chinese and English languages. The system segments the message into words and creates key word vector which characterizes the harmful network information. The BP algorithm is taken advantage of to train the neural network. The result of training and studying of the neural network can be applied onto many network applications based on message identification. The result of experiments demonstrates that our system has a high degree of accuracy.<br /

    Implementing brief interventions in health care: lessons learned from the Swedish Risk Drinking Project

    Get PDF
    The Risk Drinking Project was a national implementation endeavour in Sweden, carried out from 2004 to 2010, based on a government initiative to give alcohol issues a more prominent place in routine primary, child, maternity and occupational health care. The article describes and analyses the project. Critical factors that were important for the results are identified. The magnitude of the project contributed to its reach and impact in terms of providers’ awareness of the project goals and key messages. The timing of the project was appropriate. The increase in alcohol consumption in Sweden and diminished opportunities for primary prevention strategies since entry to the European Union in 1995 have led to increased expectations for health care providers to become more actively involved in alcohol prevention. This awareness provided favourable conditions for this project. A multifaceted approach was used in the project. Most educational courses were held in workshops and seminars to encourage learning-by-doing. Motivational interviewing was an integral aspect. The concept of risk drinking was promoted in all the activities. Subprojects were tailored to the specific conditions of each respective setting, building on the skills the providers already had to modify existing work practices. Nurses were afforded a key role in the project

    In situ analysis for intelligent control

    Get PDF
    We report a pilot study on in situ analysis of backscatter data for intelligent control of a scientific instrument on an Autonomous Underwater Vehicle (AUV) carried out at the Monterey Bay Aquarium Research Institute (MBARI). The objective of the study is to investigate techniques which use machine intelligence to enable event-response scenarios. Specifically we analyse a set of techniques for automated sample acquisition in the water-column using an electro-mechanical "Gulper", designed at MBARI. This is a syringe-like sampling device, carried onboard an AUV. The techniques we use in this study are clustering algorithms, intended to identify the important distinguishing characteristics of bodies of points within a data sample. We demonstrate that the complementary features of two clustering approaches can offer robust identification of interesting features in the water-column, which, in turn, can support automatic event-response control in the use of the Gulper

    ‘It was almost like the opposite of what I needed’:a qualitative exploration of client experiences of unhelpful therapy

    Get PDF
    Background: The issue of unhelpful and harmful therapy outcome has received an increasing amount of attention within the research literature in recent years. However, little research exists on the client's perspective of what constitutes unhelpful therapy.Aim: The aim of this study was to explore clients’ experiences of unhelpful therapy.Method: Semi-structured interviews were carried out with ten therapists who, as clients, experienced unhelpful therapy. Interview transcripts were analysed using interpretative phenomenological analysis. Findings: Participants recounted therapy episodes characterised by an absence of negotiation, collaboration and care; pivotal moments when they knew that they would not return; and ongoing negative effects.Conclusions: The findings of this study have implications for training and strategies for supporting clients who have been harmed by therapy

    Online network use in schools: Social and educational opportunities

    Get PDF
    Most state governments in Australia have banned popular online networking sites from public schools after these sites were accused of supporting a broad host of threats to young people. This paper questions the effectiveness of these bans in light of recent empirical research that highlights the social and educational benefits that can accrue from young people's online network use. In doing so, this paper argues for a more informed policy debate that considers not only the risks involved in using online networks, but also the opportunities online networks afford and the capabilities young people require to use them effectively

    Enforcement in Dynamic Spectrum Access Systems

    Get PDF
    The spectrum access rights granted by the Federal government to spectrum users come with the expectation of protection from harmful interference. As a consequence of the growth of wireless demand and services of all types, technical progress enabling smart agile radio networks, and on-going spectrum management reform, there is both a need and opportunity to use and share spectrum more intensively and dynamically. A key element of any framework for managing harmful interference is the mechanism for enforcement of those rights. Since the rights to use spectrum and to protection from harmful interference vary by band (licensed/unlicensed, legacy/newly reformed) and type of use/users (primary/secondary, overlay/underlay), it is reasonable to expect that the enforcement mechanisms may need to vary as well.\ud \ud In this paper, we present a taxonomy for evaluating alternative mechanisms for enforcing interference protection for spectrum usage rights, with special attention to the potential changes that may be expected from wider deployment of Dynamic Spectrum Access (DSA) systems. Our exploration of how the design of the enforcement regime interacts with and influences the incentives of radio operators under different rights regimes and market scenarios is intended to assist in refining thinking about appropriate access rights regimes and how best to incentivize investment and growth in more efficient and valuable uses of the radio frequency spectrum
    • 

    corecore