Proceedings of the Australasian Computer Science Week Multiconference最新文献

筛选
英文 中文
Cardiovascular Risk Prediction Models: A Scoping Review 心血管风险预测模型:范围综述
Proceedings of the Australasian Computer Science Week Multiconference Pub Date : 2019-01-29 DOI: 10.1145/3290688.3290725
Shelda Sajeev, A. Maeder
{"title":"Cardiovascular Risk Prediction Models: A Scoping Review","authors":"Shelda Sajeev, A. Maeder","doi":"10.1145/3290688.3290725","DOIUrl":"https://doi.org/10.1145/3290688.3290725","url":null,"abstract":"Background: The prevention of cardiovascular disease is a public health priority as it is associated with increasing morbidity and mortality worldwide. Objective: A scoping review of the existing cardiovascular risk prediction models, to provide a basis for suggesting future research directions. Methods: PubMed and Scopus were searched from 2008 to 2018 for review papers investigating the formulation and effectiveness of risk prediction models for cardiovascular disease. Results: 229 references were screened of which 4 articles were included in the review, describing development of 436 prediction models. Most of the work reported was from USA and Europe. Conclusions: Availability of larger datasets from Electronic Health Records for more comprehensive and targeted risk prediction, and advancement in data analysis and modeling methods like machine learning to enable cohort directed approaches, has prompted researchers and clinicians to rethink risk modeling.","PeriodicalId":297760,"journal":{"name":"Proceedings of the Australasian Computer Science Week Multiconference","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127277817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Information Associations for Multi-Domain Applications: Addressing Data Utility in Segregated Networks 多域应用的信息关联:在隔离网络中寻址数据效用
Proceedings of the Australasian Computer Science Week Multiconference Pub Date : 2019-01-29 DOI: 10.1145/3290688.3290695
J. Shield, Samuel Chenoweth, P. Prendergast, Mark R. Beaumont, Chris J. North, Bradley D. Hopkins
{"title":"Information Associations for Multi-Domain Applications: Addressing Data Utility in Segregated Networks","authors":"J. Shield, Samuel Chenoweth, P. Prendergast, Mark R. Beaumont, Chris J. North, Bradley D. Hopkins","doi":"10.1145/3290688.3290695","DOIUrl":"https://doi.org/10.1145/3290688.3290695","url":null,"abstract":"Multiple Independent Levels of Security (MILS) architectures provide strong information security through separation and isolation of security domains. This architecture is useful in environments where sensitive information needs to be tightly controlled at varying levels of security, e.g., in miltary environments that support multiple classifications for data. A drawback of MILS architectures is impaired functionality caused by information partitioning resulting in an inability to easily share and aggregate information. Cross domain solutions facilitate data transfer between security domains to overcome these limitations, often at the expense of security and resulting in duplication and/or reclassification of data. We describe an alternate approach to improving functionality in MILS architectures based on Information Associations, these are design patterns that allow information on different security domains to be linked together, without having to transfer data and instead rely on coordination between the separate domains. A military case study is described that uses these design patterns to limit cross domain transfers, whilst increasing overall functionality, and ultimately creating a more secure MILS architecture.","PeriodicalId":297760,"journal":{"name":"Proceedings of the Australasian Computer Science Week Multiconference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116379876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Generating Log Requirements for Checking Conformance against Healthcare Standards using Workflow Modelling 使用工作流建模为根据医疗保健标准检查一致性生成日志需求
Proceedings of the Australasian Computer Science Week Multiconference Pub Date : 2019-01-29 DOI: 10.1145/3290688.3290739
C. Wickramage, C. Fidge, C. Ouyang, T. Sahama
{"title":"Generating Log Requirements for Checking Conformance against Healthcare Standards using Workflow Modelling","authors":"C. Wickramage, C. Fidge, C. Ouyang, T. Sahama","doi":"10.1145/3290688.3290739","DOIUrl":"https://doi.org/10.1145/3290688.3290739","url":null,"abstract":"The healthcare industry establishes policies and standards to improve the quality of health processes and their delivery. Auditing and monitoring can be used to measure the quality of healthcare and check compliance with the health policies. Appropriate logging mechanisms can be considered as a key component to manage compliance initiatives because they can be used to monitor and audit low performance, malfunctions and unauthorised user activities. However, existing Health Information Systems (HISs) inadequately implement logging mechanisms, making it crucial to be improved for policy compliance. Identification of sufficient logging requirements is one of the major challenges faced by HIS developers. We present a step-wise workflow modelling approach to help identify logging requirements that can facilitate proper auditing against established typical patient journeys and documented healthcare policies and standards. As a case study we develop a healthcare event log file containing sufficient log details which has been merged from different hosts in a HIS in order to gather necessary log details to audit for policy compliance.","PeriodicalId":297760,"journal":{"name":"Proceedings of the Australasian Computer Science Week Multiconference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121789816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Solving the Hamiltonian Cycle Problem using a Quantum Computer 用量子计算机求解哈密顿循环问题
Proceedings of the Australasian Computer Science Week Multiconference Pub Date : 2019-01-29 DOI: 10.1145/3290688.3290703
A. Mahasinghe, R. Hua, M. Dinneen, Rajni Goyal
{"title":"Solving the Hamiltonian Cycle Problem using a Quantum Computer","authors":"A. Mahasinghe, R. Hua, M. Dinneen, Rajni Goyal","doi":"10.1145/3290688.3290703","DOIUrl":"https://doi.org/10.1145/3290688.3290703","url":null,"abstract":"We review existing quantum computational methods for solving the Hamiltonian cycle problem in different computational frameworks such as quantum circuits, quantum walks and adiabatic quantum computation. Then we present a QUBO (quadratic unconstrained binary optimization) formulation, which is suitable for the adiabatic quantum computation for a D-Wave architecture. Further, we derive a physical Hamiltonian from the QUBO formulation and discuss its adequateness in the adiabatic framework. Finally, we discuss the complexity of running the Hamiltonian cycle QUBO on a D-Wave quantum computer, and compare it with existing quantum computational methods.","PeriodicalId":297760,"journal":{"name":"Proceedings of the Australasian Computer Science Week Multiconference","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115846886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Reduction of Cognitive Overload in Online Reviews Using Data Visualisation 使用数据可视化减少在线评论中的认知过载
Proceedings of the Australasian Computer Science Week Multiconference Pub Date : 2019-01-29 DOI: 10.1145/3290688.3290708
Jesse Tran, Quang Vinh Nguyen, A. Hol, S. Simoff
{"title":"Reduction of Cognitive Overload in Online Reviews Using Data Visualisation","authors":"Jesse Tran, Quang Vinh Nguyen, A. Hol, S. Simoff","doi":"10.1145/3290688.3290708","DOIUrl":"https://doi.org/10.1145/3290688.3290708","url":null,"abstract":"With the internet taking over many aspects of our lives including the way commercial practices are handled, many business owners are taking what has been posted about them in the forms of online reviews very seriously. While most e-business data visualisation tools focus on website analytics and customer behaviors to determine what customers want and what product or service needs improvement, many dismiss the importance of online reviews, especially the ability to determine if a review should be considered valuable or not. One of the problems of efficiently understanding online reviews is the reader not having enough cognitive strength and working memory to decide if the reviews should be taken seriously or not, and at the same time, understand what the review is about. This paper proposes a novel model to automatically mine online reviews from certain websites, analyses them using decision-tree machine learning and n-grams, and then display a visualisations to highlight how true a review is to be considered. To achieve this, several stages take place in the visualisation system's framework, including retrieving and processing the data, and creating the visualisation. In this study, we focus on reducing cognitive overload by performing some pilot usability studies so that business owners can make better informed decisions.","PeriodicalId":297760,"journal":{"name":"Proceedings of the Australasian Computer Science Week Multiconference","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132300388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Insider Threat Detection with Long Short-Term Memory 内部威胁检测与长短期记忆
Proceedings of the Australasian Computer Science Week Multiconference Pub Date : 2019-01-29 DOI: 10.1145/3290688.3290692
Jiuming Lu, R. Wong
{"title":"Insider Threat Detection with Long Short-Term Memory","authors":"Jiuming Lu, R. Wong","doi":"10.1145/3290688.3290692","DOIUrl":"https://doi.org/10.1145/3290688.3290692","url":null,"abstract":"Most organizations these days are increasingly threatened by malicious insiders. The traditional cybersecurity system uses historical logs to investigate/prevent attacks from outside a company. However, for insider threats, new models and techniques are required to differentiate normal behaviour from malicious acts. This paper proposes a system, called Insider Catcher, that bases on a deep neural network with Long Short-Term Memory (LSTM) to model system logs as a natural structured sequence. Our system captures patterns that indicate users' normal usage behaviour to differentiate normal behaviour from malicious acts. Experiments show the superior performance of the proposed system over the existing log-based anomaly detection strategies. This is particularly for real-time online cases.","PeriodicalId":297760,"journal":{"name":"Proceedings of the Australasian Computer Science Week Multiconference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133888995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Overcoming the Bottlenecks in Next-Generation Heterogeneous Vehicular Networks: Is SDN the Optimal Solution? 克服下一代异构车联网的瓶颈:SDN是最优解决方案吗?
Proceedings of the Australasian Computer Science Week Multiconference Pub Date : 2019-01-29 DOI: 10.1145/3290688.3290701
A. Mahmood, W. Zhang, Quan Z. Sheng
{"title":"Overcoming the Bottlenecks in Next-Generation Heterogeneous Vehicular Networks: Is SDN the Optimal Solution?","authors":"A. Mahmood, W. Zhang, Quan Z. Sheng","doi":"10.1145/3290688.3290701","DOIUrl":"https://doi.org/10.1145/3290688.3290701","url":null,"abstract":"Due to recent technological advancements in the automotive sector and vehicular ad hoc networks, a growing interest in academia and industry could be seen for the next-generation Intelligent Transportation Systems (ITS). Software-Defined Networking (SDN) has the potential to bring considerable advantages to the ITS domain primarily in terms of flexibility, scalability, and programmability in order to meet the performance requirements of diverse vehicular applications and services. It offers an efficient network management via a logically centralized controller possessing a comprehensive overview of the entire network. Nevertheless, SDN has been traditionally conceived for wired networks, and as such, could not be directly adopted for vehicular ad hoc networks due to numerous challenges and bottlenecks primarily owing to the highly dynamic and distributive behavior of vehicles. This paper, therefore, intends to establish that whether SDN can overcome these challenges and bottlenecks pertinent to vehicular ad hoc networks, and how traditional SDN architectures could be exploited in order to overcome these bottlenecks. Open research challenges and future directions have also been deliberated1.","PeriodicalId":297760,"journal":{"name":"Proceedings of the Australasian Computer Science Week Multiconference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130855743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Review of the Definition and Measurement of Engagement in Serious Games 严肃游戏中用户粘性的定义和测量的系统回顾
Proceedings of the Australasian Computer Science Week Multiconference Pub Date : 2019-01-29 DOI: 10.1145/3290688.3290747
Geoffrey Hookham, K. Nesbitt
{"title":"A Systematic Review of the Definition and Measurement of Engagement in Serious Games","authors":"Geoffrey Hookham, K. Nesbitt","doi":"10.1145/3290688.3290747","DOIUrl":"https://doi.org/10.1145/3290688.3290747","url":null,"abstract":"A systematic review was designed to address the question of \"What is engagement and how has the term been used, defined and measured in the context of serious games?\". The goal of the review was to collect, evaluate, and analyse literature related to the definition and measurement of engagement in serious games published between in 1970 to 2015 across a broad range of disciplines. A total of 1390 papers were initially identified from the search criteria. These were reduced to 107 papers that directly assessed engagement in a serious game. These selected papers were then analysed to examine the use of the term 'engagement' in the serious games, the genres of the games studied, the various definitions of engagement and the methods used to measure different aspects of engagement. Three distinct types of engagement, related to behaviour, affect and cognition are found in the studies, along with a broad range of evaluation methods including interviews, questionnaires, physiological approaches, in game metrics, and time and performance on task.","PeriodicalId":297760,"journal":{"name":"Proceedings of the Australasian Computer Science Week Multiconference","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124163437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
A Fitness-Based Evolving Network for Web-APIs Discovery 基于适应度的web - api发现进化网络
Proceedings of the Australasian Computer Science Week Multiconference Pub Date : 2019-01-29 DOI: 10.1145/3290688.3290709
Olayinka Adeleye, Jian Yu, Sira Yongchareon, Quan Z. Sheng, L. Yang
{"title":"A Fitness-Based Evolving Network for Web-APIs Discovery","authors":"Olayinka Adeleye, Jian Yu, Sira Yongchareon, Quan Z. Sheng, L. Yang","doi":"10.1145/3290688.3290709","DOIUrl":"https://doi.org/10.1145/3290688.3290709","url":null,"abstract":"Web-APIs such as Google-Maps, Twilio and Twitter APIs form the building blocks of many mobile and web-based applications. They enable cross-organizational functionality integration and data sharing over the Web. Tens of thousands of these Web-APIs with a wide spectrum of functionalities are currently available on various registries such as ProgrammableWeb.com. However, despite the continuous addition of new Web-APIs of various qualities to these registries, only a few, with certain preferences that do not necessarily define quality, are consistently discovered and used by service consumers. The main reasons for this meagre uptake have been identified as the isolation of web-APIs, poor scaling mechanism and lack of social connection among these APIs. Even though, existing Web-APIs discovery approaches show promising results, this task continues exacerbate service engineers. In this paper, we propose a fitness-based complex network approach for connecting Web-APIs into a global network to facilitate Web-APIs discovery. We construct the network based on the theoretical procedure of Bianconi-Barabási complex network model. The procedure is considered in two phases: First, we estimate Web-APIs' fitness using the Random Walk algorithm and define a strategy for capturing their popularity. Second, we grow the network based on each API's fitness and popularity. Using the popular ProgrammableWeb datasets, we evaluate the APIs network using the universal network metrics and compare our network topology with that of real networks. Finally, we show how our network can be used to facilitate Web-APIs discovery. The results present in this work are expected to serve as practical guide for modelling evolving-network-based Web service solutions, particularly, service discovery and recommendation applications.","PeriodicalId":297760,"journal":{"name":"Proceedings of the Australasian Computer Science Week Multiconference","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123721472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards a Youth Mental Health Screening Analytics Tool 迈向青少年心理健康筛查分析工具
Proceedings of the Australasian Computer Science Week Multiconference Pub Date : 2019-01-29 DOI: 10.1145/3290688.3290717
B. Elliott, J. Warren, M. Darragh, F. Goodyear-Smith
{"title":"Towards a Youth Mental Health Screening Analytics Tool","authors":"B. Elliott, J. Warren, M. Darragh, F. Goodyear-Smith","doi":"10.1145/3290688.3290717","DOIUrl":"https://doi.org/10.1145/3290688.3290717","url":null,"abstract":"Risky health behaviours and mental health problems in adolescents constitute a global concern, and are relatively common in New Zealand. A self-administered screening tool, YouthCHAT, has been developed and validated for general practices and school clinics. As YouthCHAT is more widely deployed, an opportunity emerges to analyse aggregated amassed data to extend epidemiological knowledge of psychosocial issues and facilitate monitoring health of the youth population. The present research designs and prototypes a data analytics portal to facilitate such analysis. The design process is supported by analysis of a dataset generated by a YouthCHAT trial, a scanning study of existing tools that aggregate and analyse health survey data, stakeholder interviews, development of personas and scenarios of use, and creation of a simulated dataset on the scale of an expected future YouthCHAT database. The result is a prototype providing descriptive and inferential analyses and visualisations meeting expected requirements of future users.","PeriodicalId":297760,"journal":{"name":"Proceedings of the Australasian Computer Science Week Multiconference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122001156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信