259 resultados para ARCHITECTURE - INVESTIGATIONS
Resumo:
We present a framework and first set of simulations for evolving a language for communicating about space. The framework comprises two components: (1) An established mobile robot platform, RatSLAM, which has a "brain" architecture based on rodent hippocampus with the ability to integrate visual and odometric cues to create internal maps of its environment. (2) A language learning system based on a neural network architecture that has been designed and implemented with the ability to evolve generalizable languages which can be learned by naive learners. A study using visual scenes and internal maps streamed from the simulated world of the robots to evolve languages is presented. This study investigated the structure of the evolved languages showing that with these inputs, expressive languages can effectively categorize the world. Ongoing studies are extending these investigations to evolve languages that use the full power of the robots representations in populations of agents.
Resumo:
This article uses the concept of the architecture of rural life to analyse domestic violence service provision in rural Australia. What is distinctive about this architecture is that it polices the privacy of the rural family. A tight cloak of silence is carved around instances of domestic violence. Imagined threats to rural safety are seen as coming from outsiders (i.e. urban influences or Indigenous), not insiders within rural families. This article draws on key findings from a study conducted in rural New South Wales, Australia. The study interviewed 49 rural service providers working in human services and the criminal justice system. The application of architecture of rural life as a conceptual tool demonstrates challenges with service provision in a rural setting. The main results of this study found that this architecture operates as a silencing form of social control in three distinctive ways. Firstly, shame about being a victim of domestic violence encourages rural women's complicity in remaining silent. Secondly, family privacy maintains a veil of silence that accentuates rural women's social and economic dependency on men. Thirdly, community sanctions act as a deterrent to women seeking help.
Resumo:
This paper describes students’ developing meta-representational competence, drawn from the second phase of a longitudinal study, Transforming Children’s Mathematical and Scientific Development. A group of 21 highly able Grade 1 students was engaged in mathematics/science investigations as part of a data modelling program. A pedagogical approach focused on students’ interpretation of categorical and continuous data was implemented through researcher-directed weekly sessions over a 2-year period. Fine-grained analysis of the developmental features and explanations of their graphs showed that explicit pedagogical attention to conceptual differences between categorical and continuous data was critical to development of inferential reasoning.
Resumo:
The study of data modelling with elementary students involves the analysis of a developmental process beginning with children’s investigations of meaningful contexts: visualising, structuring, and representing data and displaying data in simple graphs (English, 2012; Lehrer & Schauble, 2005; Makar, Bakker, & Ben-Zvi, 2011). A 3-year longitudinal study investigated young children’s data modelling, integrating mathematical and scientific investigations. One aspect of this study involved a researcher-led teaching experiment with 21 mathematically able Grade 1 students. The study aimed to describe explicit developmental features of students’ representations of continuous data...
Resumo:
Aligned with the decline of Marshalian view of industry as constituting homogeneous set of firms, the new perspective is emerging by concentrating more on dynamics of sectors as the building block of industrial changes. Based on new assumptions, much of the action in terms of strategy, technology, and knowledge development does not happen either among firms within a stable industry, or through the growth or decline of certain sectors compared to others. Instead, the action happens in terms of the definition, redefinition, drawing, and redrawing of the very nature of these sectors. Technology does not progress and develop within a sector; rather it shapes (and is shaped by) the encompassing architecture of multiple sectors.
Resumo:
The distinguished Australian architect surveys his career and examines how his architectural theories are expressed in his designs.
Resumo:
"World Architecture records the major architectural contributions made in all regions of the world to the development of human culture. Grouped into 10 geographical regions and representing five twenty-year-periods, the buildings have been selected by approximately 80 eminent international architectural critics. Each volume contains 100 buildings from one particular region, each object accompanied by an analytical text as well as by drawings and photographs. Introduction essays by the general editor, Kenneth Frampton, and the editor(s) of each volume complete the survey. The series comprises 10 volumes. The books are handsome, linen-bound and stitched, generously formatted (21,5 x 28,5 cm/8,4 x 11 inches) and contain approx. 300 pages and 400 colour prints each. This unique project gives the most precise and authoritative description of 1000 of the century's most notable buildings. Countries: Brunei, Burma, Cambodia, Indonesia, Laos, Malaysia, The Philippines, Singapore, Thailand, Vietnam and Australia, New Zealand, Papua New Guinea, and Oceania."
Resumo:
This paper addresses the development of trust in the use of Open Data through incorporation of appropriate authentication and integrity parameters for use by end user Open Data application developers in an architecture for trustworthy Open Data Services. The advantages of this architecture scheme is that it is far more scalable, not another certificate-based hierarchy that has problems with certificate revocation management. With the use of a Public File, if the key is compromised: it is a simple matter of the single responsible entity replacing the key pair with a new one and re-performing the data file signing process. Under this proposed architecture, the the Open Data environment does not interfere with the internal security schemes that might be employed by the entity. However, this architecture incorporates, when needed, parameters from the entity, e.g. person who authorized publishing as Open Data, at the time that datasets are created/added.
Resumo:
This article reviews the 14th Architectural Biennale in Venice.
Resumo:
Investigative journalists who join what theorist Manuel Castells describes as the ‘network society’ can locate potential news sources using various social media platforms and interview them using Web-based communication technologies. The potential for journalistic investigations involving multi-directional conversations with news sources across the globe is beginning to be explored. Potential news sources who are part of the network society have unprecedented access to specialist investigative reporters irrespective of their location and can speak to them more cost effectively than in the past. This paper explores how new journalism technologies are allowing journalists to call powerful individuals and institutions to account, irrespective of national borders; and how previously silenced individuals are being given a voice. To read an example of international investigative journalism facilitated by a combination of social media, Web-based communications, reporter collaboration and news outlet collaborations see http://www.theaustralian.com.au/news/features/churchs-wall-of-silence-on-sexual-abuse/story-e6frg6z6-1226639077238.
Resumo:
This paper describes a software architecture for real-world robotic applications. We discuss issues of software reliability, testing and realistic off-line simulation that allows the majority of the automation system to be tested off-line in the laboratory before deployment in the field. A recent project, the automation of a very large mining machine is used to illustrate the discussion.