142 resultados para copying photos


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we illustrate a set of features of the Apromore process model repository for analyzing business process variants. Two types of analysis are provided: one is static and based on differences on the process control flow, the other is dynamic and based on differences in the process behavior between the variants. These features combine techniques for the management of large process model collections with those for mining process knowledge from process execution logs. The tool demonstration will be useful for researchers and practitioners working on large process model collections and process execution logs, and specifically for those with an interest in understanding, managing and consolidating business process variants both within and across organizational boundaries.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Although “refugees” are frequently represented in visual media, it is predominantly as the central subject matter and rarely are they positioned as the photographers of their own journeys. In this article we present photographic images that have been taken by refugee background youth portraying their experiences of the first years of settlement in Australia. We consider how, in our longitudinal research conducted with 120 refugee background youth, visual materials can provide equally important yet different insights in comparison to written or spoken narratives on the experiences of refugee settlement. Through an examination of over 1,000 photos taken by these youth, we explore the ways in which they portrayed their early experiences of external suburban settlement environments and their depictions of interior spaces and home-making practices. We discuss how these visual insights capture an alternative way of seeing the experiences of becoming at home as the youth become emplaced post-resettlement in Australia. We argue that the photographs taken by these refugee background youth illustrate how visual methods and materials can provide equally important but often overlooked insights into early settlement experiences. Importantly, the photographic images offer a way of portraying the people, places and sentiments that are central to the everyday lives of refugee background youths in ways that oral and written narratives can not.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Insights Live screening and playfulness of the interactive space can be effective strategies for attracting the attention of passers-by and turn them into active participants. While urban screen interfaces increase participation by encouraging group interaction, privately-oriented tangible user interfaces give people a longer time to reflect upon their answers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There has been much debate over recent years about whether Australian copyright law should adopt a fair use doctrine. In this chapter we argue by pointing to the historical record that the incorporation of the term 'copyrights' in the Australian Constitution embeds a notion of balance and fair use in Australian law and that this should be taken into account when interpreting the Australian Copyright Act 1968. English case law in the 18th and 19th centuries developed a principle that copyright infringement did not occur where a person had made a fair use of a work. Fair use was generally established where the defendant had made a productive use that did more than alter the original work for the purpose of evading liability, and where the defendant had made an original contribution to the resulting work. Additionally, fairness was shown by a use that did not supersede or prejudice the market for the original work. At the time of including the copyright power in the Constitution, the UK Parliament’s understanding of “copyrights” included the notion of fair use as it had been developed in U.K. precedent. In this chapter we argue that the work “copyrights” in the Australia Constitution takes its definition from copyright in 1900 and as it has evolved since. Importantly, the word “copyrights” is infused with a particular meaning that incorporates the principle of copyright balance. The constitutional notion of copyright, therefore, is not that of an unlimited power to prevent all copying. Rather, copyright distinguishes between infringing copying and non-infringing copying and grants to the copyright owner only the power to control the former. Non-infringing copying includes well-accepted limitations on the copyright owner’s rights, including the copying of ideas, the copying of public domain works and the copying of insubstantial parts of copyrighted works. In this chapter we argue that non-infringing copying also includes copying to make a fair use of a work. The sections that distinguish infringing copying from non-infringing copying in the Copyright Act 1968 are sections 36(1) and 101(1), which define infringement as the doing, without licence, of an “act comprised in the copyright”. An infringing copy is an act comprised the copyright, whereas a non-infringing copy is not. We argue that space for fair uses of copyrighted works is built into the Copyright Act 1968 through these sections, because a fair use will not produce an infringing copy and so is not an act comprised in the copyright.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In political journalism, the battle over agenda-setting between journalists and their sources has been described using many metaphors and concepts. Herbert Gans saw it as a dance where the two parties competed for leadership, arguing that sources usually got the lead. We address the question of how social media, in particular Twitter, contribute to media agenda-building and agenda-setting by looking at how tweets are sourced in election campaign coverage in Australia, Norway and Sweden. Our findings show that the popularity of elite political sources is a common characteristic across all countries and media. Sourcing from Twitter reinforces the power of the political elites to set the agenda of the news media – they are indeed “still leading the dance”. Twitter content travels to the news media as opinions, comments, announcements, factual statements, and photos. Still, there are variations that must be explained both by reference to different political and cultural characteristics of the three countries, as well as by the available resources and journalistic profiles of each media outlet.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An article about the use of photographs as research in the writing of memoir. "I expect many people begin the writing of a memoir by looking through old photos. Pictures, after all, belong in the past, and they hold out the promise of delivering it to us again: everyone is younger, surrounded by yesterday’s world, a moment fixed in time. Even the size of the photo paper and printing tone belong back there, in a printer’s shop that doesn’t exist anymore. And yet, for the purpose of writing a memoir, the most useful pictures also reach beyond the past, and beyond their initial role in verifying your memories, or filling out the details. That is, they are more than an account. Such pictures seem to be asking questions about what happened next, in the moments and years after they were taken..."

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Body Area Network (BAN) is an emerging technology that focuses on monitoring physiological data in, on and around the human body. BAN technology permits wearable and implanted sensors to collect vital data about the human body and transmit it to other nodes via low-energy communication. In this paper, we investigate interactions in terms of data flows between parties involved in BANs under four different scenarios targeting outdoor and indoor medical environments: hospital, home, emergency and open areas. Based on these scenarios, we identify data flow requirements between BAN elements such as sensors and control units (CUs) and parties involved in BANs such as the patient, doctors, nurses and relatives. Identified requirements are used to generate BAN data flow models. Petri Nets (PNs) are used as the formal modelling language. We check the validity of the models and compare them with the existing related work. Finally, using the models, we identify communication and security requirements based on the most common active and passive attack scenarios.