962 resultados para Compromise design
Resumo:
Network Jamming systems provide real-time collaborative performance experiences for novice or inexperienced users. In this paper we will outline the interaction design considerations that have emerged during through evolutionary development cycles of the jam2jam Network Jamming software that employs generative techniques that require particular attention to the human computer relationship. In particular we describe the co-evolution of features and uses, explore the role of agile development methods in supporting this evolution, and show how the provision of a clear core capability can be matched with options for enhanced features support multi-levelled user experience and skill develop.
Resumo:
The importance of student engagement to higher education quality, making deep learning outcomes possible for students, and achieving student retention, is increasingly being understood. The issue of student engagement in the first year of tertiary study is of particular significance. This paper takes the position that the first year curriculum, and the pedagogical principles that inform its design, are critical influencers of student engagement in the first year learning environment. We use an analysis of case studies prepared for Kift’s ALTC Senior Fellowship to demonstrate ways in which student engagement in the first year of tertiary study can be successfully supported through intentional curriculum design that motivates students to learn, provides a positive learning climate, and encourages students to be active in their learning.
Resumo:
Surveillance for invasive non-indigenous species (NIS) is an integral part of a quarantine system. Estimating the efficiency of a surveillance strategy relies on many uncertain parameters estimated by experts, such as the efficiency of its components in face of the specific NIS, the ability of the NIS to inhabit different environments, and so on. Due to the importance of detecting an invasive NIS within a critical period of time, it is crucial that these uncertainties be accounted for in the design of the surveillance system. We formulate a detection model that takes into account, in addition to structured sampling for incursive NIS, incidental detection by untrained workers. We use info-gap theory for satisficing (not minimizing) the probability of detection, while at the same time maximizing the robustness to uncertainty. We demonstrate the trade-off between robustness to uncertainty, and an increase in the required probability of detection. An empirical example based on the detection of Pheidole megacephala on Barrow Island demonstrates the use of info-gap analysis to select a surveillance strategy.
Resumo:
We consider the problem of designing a surveillance system to detect a broad range of invasive species across a heterogeneous sampling frame. We present a model to detect a range of invertebrate invasives whilst addressing the challenges of multiple data sources, stratifying for differential risk, managing labour costs and providing sufficient power of detection.We determine the number of detection devices required and their allocation across the landscape within limiting resource constraints. The resulting plan will lead to reduced financial and ecological costs and an optimal surveillance system.
Resumo:
This research reports on a project concerned with the relationship between the person and the environment in the context of achieving a contemplative or existential state – a state which can be experienced either consciously or subconsciously. The need for such a study originated with the desire to contribute to the design of multicultural spaces which could be used for a range of activities within the public and the personal arena, activities including contemplation, meditation and prayer. The concept of ‘sacred’ is explored in the literature review and in primary interviews with the participants of this study. Given that the word ‘sacred’ is highly value-laden and potentially alienating for some people, it was decided to use the more accessible term ‘contemplative’. The outcomes of the study inform the practice of interior design and architecture which tends currently to neglect the potential for all spaces to be existentially meaningful. Informed by phenomenological methodology, data were collected from a diverse group of people, using photo-elicitation and interviews. The technique of photo-elicitation proved to be highly effective in helping people reveal their everyday lived experience of contemplative spaces. Reflective analysis (Van Manen 2000) was used to explore the data collected. The initial stage of analysis produced three categories of data: varying conceptions of contemplation, aspects of the person involved in the contemplation, and aspects of environment involved in contemplation. From this, it was found that achieving a state of contemplation involves both the person and the environment in a dialectic process of unfolding. The unfolding has various physical, psycho-social, and existential dimensions or qualities which operate sequentially and simultaneously. Two concepts emerged as being central to unfolding: ‘Cleansing’ and ‘Nothingness’. Unfolding is found to comprise the Core; Distinction; Manifestation; Cleansing; Creation; and Sharing. This has a parallel with Mircea Eliade’s (1959) definition of sacred as something that manifests itself as different from the profane. The power of design, re-contextualization through utility and purpose, and the existential engagements between the person and environment are used as a basis for establishing the potential contribution of the study to interior design. In this way, the study makes a contribution to our understanding of how space and its elements inspire, support and sustain person environment interaction – particularly at the existential level – as well as to our understanding of the multi-dimensional and holistic nature of this interaction. In addition, it points to the need for a phenomenological re-conceptualisation of the design/client relationship. In summary, the contributions of this research are: the exploration of contemplative experience as sacred experience; an understanding of the design of space as creating engagement between person and environment; a rationale for the introduction of a phenomenological approach to the relationship between designer and clients; and raising awareness of the spiritual in a holistic approach to design.
Resumo:
As user involvement becomes a necessary part of the product development process, various ways of accessing users' latent needs have been developed and studied. Reviews of literatures in user involvement and product development have revealed that accessing users' latent needs and transferring them into design process could be facilitated by effectively implementing user-designer collaboration during the early stage of the design process. In this paper, various types of user-designer collaboration were observed and then distinct characteristics of user-designer collaboration were classified into three categories. 1) Passive objectivity, 2) workplace democratisation, and 3) shared contexts were observed as strategies for better user-designer collaboration, which have been employed in the area of user-centred design, user participatory design and design for experiencing. Based on the literature review, this paper proposed a basic collaboration mechanism between the users and the designers during the early stage of the design process and then discussed how its mechanism will help to describe the interactions between the users and the designers during the user involvement sessions.
Resumo:
The new cold-formed LiteSteel beam (LSB) sections have found increasing popularity in residential, industrial and commercial buildings due to their lightweight and cost-effectiveness. They have the beneficial characteristics of including torsionally rigid rectangular flanges combined with economical fabrication processes. Currently there is significant interest in using LSB sections as flexural members in floor joist systems. When used as floor joists, the LSB sections require holes in the web to provide access for inspection and various services. But there are no design methods that provide accurate predictions of the moment capacities of LSBs with web holes. In this study, the buckling and ultimate strength behaviour of LSB flexural members with web holes was investigated in detail by using a detailed parametric study based on finite element analyses with an aim to develop appropriate design rules and recommendations for the safe design of LSB floor joists. Moment capacity curves were obtained using finite element analyses including all the significant behavioural effects affecting their ultimate member capacity. The parametric study produced the required moment capacity curves of LSB section with a range of web hole combinations and spans. A suitable design method for predicting the ultimate moment capacity of LSB with web holes was finally developed. This paper presents the details of this investigation and the results
Resumo:
We describe the design and evaluation of a platform for networks of cameras in low-bandwidth, low-power sensor networks. In our work to date we have investigated two different DSP hardware/software platforms for undertaking the tasks of compression and object detection and tracking. We compare the relative merits of each of the hardware and software platforms in terms of both performance and energy consumption. Finally we discuss what we believe are the ongoing research questions for image processing in WSNs.
Resumo:
Dragon is a word-based stream cipher. It was submitted to the eSTREAM project in 2005 and has advanced to Phase 3 of the software profile. This paper discusses the Dragon cipher from three perspectives: design, security analysis and implementation. The design of the cipher incorporates a single word-based non-linear feedback shift register and a non-linear filter function with memory. This state is initialized with 128- or 256-bit key-IV pairs. Each clock of the stream cipher produces 64 bits of keystream, using simple operations on 32-bit words. This provides the cipher with a high degree of efficiency in a wide variety of environments, making it highly competitive relative to other symmetric ciphers. The components of Dragon were designed to resist all known attacks. Although the design has been open to public scrutiny for several years, the only published attacks to date are distinguishing attacks which require keystream lengths greatly exceeding the stated 264 bit maximum permitted keystream length for a single key-IV pair.