244 resultados para Design and Technology
Resumo:
The Queensland Government released its new Environmental Offset Policy in July 2008. This policy creates a set of overarching principles which are to be incorporated into existing environmental offset policy. This article is the final article in a set of three interrelated articles discussing the operation and implementation of environmental offsets in Queensland. The first article discusses the Environmental Offsets Discussion Paper and the existing environmental offset requirements. No significant changes have been made to these existing offset requirements under the new Environmental Offset Policy. This article also touches briefly on the legal issues associated with design and implementation of environmental offset and trading frameworks. The second article considered the compatibility of different land tenure arrangements in Queensland against the requirements for the creation and trade of environmental offsets. The third article being the present article, discusses the application of the new Environmental Offset Policy while also analysing the legal issues associated with environmental offsets in further detail.
Resumo:
Threats against computer networks evolve very fast and require more and more complex measures. We argue that teams respectively groups with a common purpose for intrusion detection and prevention improve the measures against rapid propagating attacks similar to the concept of teams solving complex tasks known from field of work sociology. Collaboration in this sense is not easy task especially for heterarchical environments. We propose CIMD (collaborative intrusion and malware detection) as a security overlay framework to enable cooperative intrusion detection approaches. Objectives and associated interests are used to create detection groups for exchange of security-related data. In this work, we contribute a tree-oriented data model for device representation in the scope of security. We introduce an algorithm for the formation of detection groups, show realization strategies for the system and conduct vulnerability analysis. We evaluate the benefit of CIMD by simulation and probabilistic analysis.
Resumo:
Secure communications in distributed Wireless Sensor Networks (WSN) operating under adversarial conditions necessitate efficient key management schemes. In the absence of a priori knowledge of post-deployment network configuration and due to limited resources at sensor nodes, key management schemes cannot be based on post-deployment computations. Instead, a list of keys, called a key-chain, is distributed to each sensor node before the deployment. For secure communication, either two nodes should have a key in common in their key-chains, or they should establish a key through a secure-path on which every link is secured with a key. We first provide a comparative survey of well known key management solutions for WSN. Probabilistic, deterministic and hybrid key management solutions are presented, and they are compared based on their security properties and re-source usage. We provide a taxonomy of solutions, and identify trade-offs in them to conclude that there is no one size-fits-all solution. Second, we design and analyze deterministic and hybrid techniques to distribute pair-wise keys to sensor nodes before the deployment. We present novel deterministic and hybrid approaches based on combinatorial design theory and graph theory for deciding how many and which keys to assign to each key-chain before the sensor network deployment. Performance and security of the proposed schemes are studied both analytically and computationally. Third, we address the key establishment problem in WSN which requires key agreement algorithms without authentication are executed over a secure-path. The length of the secure-path impacts the power consumption and the initialization delay for a WSN before it becomes operational. We formulate the key establishment problem as a constrained bi-objective optimization problem, break it into two sub-problems, and show that they are both NP-Hard and MAX-SNP-Hard. Having established inapproximability results, we focus on addressing the authentication problem that prevents key agreement algorithms to be used directly over a wireless link. We present a fully distributed algorithm where each pair of nodes can establish a key with authentication by using their neighbors as the witnesses.
Resumo:
Introduction: Undergraduate students studying the Bachelor of Radiation Therapy at Queensland University of Technology (QUT) attend clinical placements in a number of department sites across Queensland. To ensure that the curriculum prepares students for the most common treatments and current techniques in use in these departments, a curriculum matching exercise was performed. Methods: A cross-sectional census was performed on a pre-determined “Snapshot” date in 2012. This was undertaken by the clinical education staff in each department who used a standardized proforma to count the number of patients as well as prescription, equipment, and technique data for a list of tumour site categories. This information was combined into aggregate anonymized data. Results: All 12 Queensland radiation therapy clinical sites participated in the Snapshot data collection exercise to produce a comprehensive overview of clinical practice on the chosen day. A total of 59 different tumour sites were treated on the chosen day and as expected the most common treatment sites were prostate and breast, comprising 46% of patients treated. Data analysis also indicated that intensity-modulated radiotherapy (IMRT) use is relatively high with 19.6% of patients receiving IMRT treatment on the chosen day. Both IMRT and image-guided radiotherapy (IGRT) indications matched recommendations from the evidence. Conclusion: The Snapshot method proved to be a feasible and efficient method of gathering useful
Resumo:
Kuwait is an oil rich country planning for a future that is not dependent on exploiting natural resources. A major policy initiative has been the introduction of Information Communication and Technology (ICT) to schools. However, contextual issues and teacher capabilities in the use of ICT have limited the success of this initiative. The study examines the leadership strategies of two secondary school principals whose schools have achieved this goal. The case study draws on intensive data collected through interviews of the principals, and teachers supported by document analysis and observations. Analysis was guided by theoretical perspectives drawn from the literature which identified a range of strategies used by the principals to manage change. The principals of Schools A and B employed three key strategies to maximise the impact on the teaching staff incorporating ICT into their teaching and learning practices. These strategies were: (a) encouragement for teaching staff to implement ICT in their teaching; (b) support to meet the material and human needs of teaching staff using ICT; and (c) provision of instructions and guidance for teaching staff in how and why such behaviours and practices should be performed. The outcome of this study proposes an innovative change leadership model that informs emerging countries, which are also undergoing major change related to ICT. However, the study also revealed limitations in the implementation of ICT in the classroom and provides insights into further strategies that principals need to adopt.
Resumo:
The main objective of this paper is to describe the development of a remote sensing airborne air sampling system for Unmanned Aerial Systems (UAS) and provide the capability for the detection of particle and gas concentrations in real time over remote locations. The design of the air sampling methodology started by defining system architecture, and then by selecting and integrating each subsystem. A multifunctional air sampling instrument, with capability for simultaneous measurement of particle and gas concentrations was modified and integrated with ARCAA’s Flamingo UAS platform and communications protocols. As result of the integration process, a system capable of both real time geo-location monitoring and indexed-link sampling was obtained. Wind tunnel tests were conducted in order to evaluate the performance of the air sampling instrument in controlled nonstationary conditions at the typical operational velocities of the UAS platform. Once the remote fully operative air sampling system was obtained, the problem of mission design was analyzed through the simulation of different scenarios. Furthermore, flight tests of the complete air sampling system were then conducted to check the dynamic characteristics of the UAS with the air sampling system and to prove its capability to perform an air sampling mission following a specific flight path.
Resumo:
Cell trajectory data is often reported in the experimental cell biology literature to distinguish between different types of cell migration. Unfortunately, there is no accepted protocol for designing or interpreting such experiments and this makes it difficult to quantitatively compare different published data sets and to understand how changes in experimental design influence our ability to interpret different experiments. Here, we use an individual based mathematical model to simulate the key features of a cell trajectory experiment. This shows that our ability to correctly interpret trajectory data is extremely sensitive to the geometry and timing of the experiment, the degree of motility bias and the number of experimental replicates. We show that cell trajectory experiments produce data that is most reliable when the experiment is performed in a quasi 1D geometry with a large number of identically{prepared experiments conducted over a relatively short time interval rather than few trajectories recorded over particularly long time intervals.
Resumo:
This study was undertaken to examine the influence that a set of Professional Development (PD) initiatives had on faculty use of Moodle, a well known Course Management System. The context of the study was a private language university just outside Tokyo, Japan. Specifically, it aimed to identify the way in which the PD initiatives adhered to professional development best practice criteria; how faculty members perceived the PD initiatives; what impact the PD initiatives had on faculty use of Moodle; and other variables that may have influenced faculty in their use of Moodle. The study utilised a mixed methods approach. Participants in the study were 42 teachers who worked at the university in the academic year 2008/9. The online survey consisted of 115 items, factored into 10 constructs. Data was collected through an online survey, semi-structured face-to-face interviews, post-workshop surveys, and a collection of textual artefacts. The quantitative data were analysed in SPSS, using descriptive statistics, Spearman's Rank Order correlation tests and a Kruskal-Wallis means test. The qualitative data was used to develop and expand findings and ideas. The results indicated that the PD initiatives adhered closely to criteria posited in technology-related professional development best practice criteria. Further, results from the online survey, post workshop surveys, and follow up face-to-face interviews indicated that while the PD initiatives that were implemented were positively perceived by faculty, they did not have the anticipated impact on Moodle use among faculty. Further results indicated that other variables, such as perceptions of Moodle, and institutional issues, had a considerable influence on Moodle use. The findings of the study further strengthened the idea that the five variables Everett Rogers lists in his Diffusion of Innovations model, including perceived attributes of an innovation; type of innovation decision; communication channels; nature of the social system; extent of change agents' promotion efforts, most influence the adoption of an innovation. However, the results also indicated that some of the variables in Rogers' DOI seem to have more of an influence than others, particularly the perceived attributes of an innovation variable. In addition, the findings of the study could serve to inform universities that have Course Management Systems (CMS), such as Moodle, about how to utilise them most efficiently and effectively. The findings could also help to inform universities about how to help faculty members acquire the skills necessary to incorporate CMSs into curricula and teaching practice. A limitation of this study was the use of a non-randomised sample, which could appear to have limited the generalisations of the findings to this particular Japanese context.
Resumo:
Grid connected photovoltaic (PV) inverters fall into three broad categories - central, string and module integrated converters (MICs). MICs offer many advantages in performance and flexibility, but are at a cost disadvantage. Two alternative novel approaches proposed by the author - cascaded dc-dc MICs and bypass dc-dc MICs - integrate a simple non-isolated intelligent dc-dc converter with each PV module to provide the advantages of dc-ac MICs at a lower cost. A suitable universal 150 W 5 A dc-dc converter design is presented based on two interleaved MOSFET half bridges. Testing shows zero voltage switching (ZVS) keeps losses under 1 W for bi-directional power flows up to 15 W between two adjacent 12 V PV modules for the bypass application, and efficiencies over 94% for most of the operational power range for the cascaded converter application. Based on the experimental results, potential optimizations to further reduce losses are discussed.
Resumo:
We examine the role of politico-economic influences on macroeconomic performance within the framework of an endogenous growth model with costly technology adoption and uncertainty. The model is aimed at understanding the diversity in growth and inequality experiences across countries. Agents adopt either of two risky technologies, one of which is only available through financial intermediaries, who are able to alleviate some of this risk. The entry cost of financial intermediation depends on the proportion of government revenue that is allocated towards cost-reducing financial development expenditure, and agents vote on this proportion. The results show that agents at the top and bottom ends of the distribution prefer alternative means of re-distribution, thereby effectively blocking the allocation of resources towards cost-reducing financial development expenditure. Thus political factors have a role in delaying financial and capital deepening and economic development. Furthermore, the model provides a political-economy perspective on the Kuznets curve; uncertainty interacts with the political economy mechanism to produce transitional inequality patterns that, depending on initial conditions, can unearth the Kuznets-curve experience. Finally, the political outcomes are inefficient relative to policies aimed at maximizing the collective welfare of agents in the economy.
Resumo:
This paper describes a generic and integrated solar powered remote Unmanned Air Vehicles (UAV) and Wireless Sensor Network (WSN) gas sensing system. The system uses a generic gas sensing system for CH4 and CO2 concentrations using metal oxide (MoX) and non-dispersive infrared sensors, and a new solar cell encapsulation method to power the UASs as well as a data management platform to store, analyse and share the information with operators and external users. The system was successfully field tested at ground and low altitudes, collecting, storing and transmitting data in real time to a central node for analysis and 3D mapping. The system can be used in a wide range of outdoor applications, especially in agriculture, bushfires, mining studies, opening the way to a ubiquitous low cost environmental monitoring. A video of the bench and flight test performed can be seen in the following link https://www.youtube.com/watch?v=Bwas7stYIxQ.
Resumo:
This paper presents the design of μAV, a palm size open source micro quadrotor constructed on a single Printed Circuit Board. The aim of the micro quadrotor is to provide a lightweight (approximately 86g) and cheap robotic research platform that can be used for a range of robotic applications. One possible application could be a cheap test bed for robotic swarm research. The goal of this paper is to give an overview of the design and capabilities of the micro quadrotor. The micro quadrotor is complete with a 9 Degree of Freedom Inertial Measurement Unit, a Gumstix Overo® Computer-On-Module which can run the widely used Robot Operating System (ROS) for use with other research algorithms.
Resumo:
This chapter presents a case study of Participatory Design as a design framework for developing interactive digital tools for promoting children’s resilience. The author argues for a participatory methodology as an ethical approach that involves children as co-designers in the process from which they are traditionally excluded, namely the creative design process and the process of mental health promotion.