320 resultados para Ptolemy, 2nd cent.
Resumo:
In this paper, we describe on-going work on mobile banking customization, particularly in the Australian context. The use of user-defined tags to facilitate personalized interactions in the mobile context is explored. The aim of this research is to find ways to improve mobile banking interaction. Customization is more significant in the mobile context than online due to factors such as smaller screen sizes and limited software and hardware capabilities, placing an increased emphasis on usability. This paper explains how user-defined tags can aid different types of customization at the interaction level. A preliminary prototype has been developed to demonstrate the mechanics of the proposed approach. Potential implications, design decisions and limitations are discussed with an outline of future work.
Resumo:
The pervasiveness of technology in the 21st Century has meant that adults and children live in a society where digital devices are integral to their everyday lives and participation in society. How we communicate, learn, work, entertain ourselves, and even shop is influenced by technology. Therefore, before children begin school they are potentially exposed to a range of learning opportunities mediated by digital devices. These devices include microwaves, mobile phones, computers, and console games such as Playstations® and iPods®. In Queensland preparatory classrooms and in the homes of these children, teachers and parents support and scaffold young children’s experiences, providing them with access to a range of tools that promote learning and provide entertainment. This paper examines teachers’ and parents’ perspectives and considers whether they are techno-optimists who advocate for and promote the inclusion of digital technology, or whether they are they techno-pessimists, who prefer to exclude digital devices from young children’s everyday experiences. An exploratory, single case study design was utilised to gather data from three teachers and ten parents of children in the preparatory year. Teacher data was collected through interviews and email correspondence. Parent data was collected from questionnaires and focus groups. All parents who responded to the research invitation were mothers. The results of data analysis identified a misalignment among adults’ perspectives. Teachers were identified as techno-optimists and parents were identified as techno-pessimists with further emergent themes particular to each category being established. This is concerning because both teachers and mothers influence young children’s experiences and numeracy knowledge, thus, a shared understanding and a common commitment to supporting young children’s use of technology would be beneficial. Further research must investigate fathers’ perspectives of digital devices and the beneficial and detrimental roles that a range of digital devices, tools, and entertainment gadgets play in 21st Century children’s lives.
Resumo:
In this study, we consider how Fractional Differential Equations (FDEs) can be used to study the travelling wave phenomena in parabolic equations. As our method is conducted under intracellular environments that are highly crowded, it was discovered that there is a simple relationship between the travelling wave speed and obstacle density.
Resumo:
Background: A key element of graduated driver licensing systems is the level of support provided by parents. In mid-2007 changes were made to Queensland’s graduated driver licensing system, including amendments to the learner licence with one of the more significant changes requiring learners to record 100 hours of supervised driving practice in a logbook. Prior to mid-2007, there was no minimum supervision requirement. Aims: The aim of this study was to document the experiences of the supervisors of Queensland learner drivers after the changes made to the graduated driver licensing system in mid-2007. Methods: The sample of 552 supervisors of learner drivers was recruited using a combination of convenience and snowball sampling techniques. The internet survey was open for completion between July 2009 and May 2010 and took approximately 15 to 20 minutes for participants to complete. Results: For 59.7 per cent of the participants, this was the first time that they had supervised a learner driver. For 63.2 per cent, they classified themselves as the main supervisor for the learner driver. Participants provided an average of 79.62 hours of supervision (sd = 92.38), while other private supervisors provided 34.89 hours of supervision (sd = 41.74) to the same learner and professional driving instructors 18.55 hours of supervision (sd = 27.54). The vast majority of supervisors recorded all or most of the practice that they provided their learner driver in their log book with most supervisors indicating that they believed that the hours recorded in the learner’s logbook were either accurate or very accurate. While many supervisors stated that they did not receive any advice regarding the supervision of learner drivers, some had received advice from others such as friends or through discussions with a professional driving instructor. Discussion and conclusions: While graduated driver licensing systems implicitly encourage the involvement of parents and other private supervisors, these people tend not to be systematically involved. As demonstrated in this study, private supervisors provide a significant amount of supervised practice and seek to record this practice accurately and honestly in the learner’s logbook. However, even though a significant number of participants reported that this was the first time that they had supervised a learner driver, they accessed little support or guidance for their role. This suggests a need to more overtly encourage and support the role of private supervisors for learner drivers.
Resumo:
The increasing capability of mobile devices and social networks to gather contextual and social data has led to increased interest in context-aware computing for mobile applications. This paper explores ways of reconciling two different viewpoints of context, representational and interactional, that have arisen respectively from technical and social science perspectives on context-aware computing. Through a case study in agile ridesharing, the importance of dynamic context control, historical context and broader context is discussed. We build upon earlier work that has sought to address the divide by further explicating the problem in the mobile context and expanding on the design approaches.
Resumo:
Defence organisations perform information security evaluations to confirm that electronic communications devices are safe to use in security-critical situations. Such evaluations include tracing all possible dataflow paths through the device, but this process is tedious and error-prone, so automated reachability analysis tools are needed to make security evaluations faster and more accurate. Previous research has produced a tool, SIFA, for dataflow analysis of basic digital circuitry, but it cannot analyse dataflow through microprocessors embedded within the circuit since this depends on the software they run. We have developed a static analysis tool that produces SIFA compatible dataflow graphs from embedded microcontroller programs written in C. In this paper we present a case study which shows how this new capability supports combined hardware and software dataflow analyses of a security critical communications device.
Resumo:
Data flow analysis techniques can be used to help assess threats to data confidentiality and integrity in security critical program code. However, a fundamental weakness of static analysis techniques is that they overestimate the ways in which data may propagate at run time. Discounting large numbers of these false-positive data flow paths wastes an information security evaluator's time and effort. Here we show how to automatically eliminate some false-positive data flow paths by precisely modelling how classified data is blocked by certain expressions in embedded C code. We present a library of detailed data flow models of individual expression elements and an algorithm for introducing these components into conventional data flow graphs. The resulting models can be used to accurately trace byte-level or even bit-level data flow through expressions that are normally treated as atomic. This allows us to identify expressions that safely downgrade their classified inputs and thereby eliminate false-positive data flow paths from the security evaluation process. To validate the approach we have implemented and tested it in an existing data flow analysis toolkit.
Resumo:
On the road, near collision events (also close calls or near-miss incidents) largely outnumber actual crashes, yet most of them can never be recorded by current traffic data collection technologies or crashes analysis tools. The analysis of near collisions data is an important step in the process of reducing the crash rate. There have been several studies that have investigated near collisions; to our knowledge, this is the first study that uses the functionalities provided by cooperative vehicles to collect near misses information. We use the VISSIM traffic simulator and a custom C++ engine to simulate cooperative vehicles and their ability to detect near collision events. Our results showed that, within a simple simulated environment, adequate information on near collision events can be collected using the functionalities of cooperative perception systems. The relationship between the ratio of detected events and the ratio of equipped vehicle was shown to closely follow a squared law, and the largest source of nondetection was packet loss instead of packet delays and GPS imprecision.
Resumo:
This paper investigates how fashion circulates globally and is adapted and localised by consumers. The rise of fashion blogs, social networking, on-line retail and on-line streaming of fashion shows has exponentially increased the availability of fashion images globally, enabling a further multiplication of styles and looks. The geographical dispersion of production systems in third world countries, and the concentration of management and finance in first world countries are increasingly acknowledged as having an uneven social and economic effect. However, processes of hibridisation and creolisation give rise to new cultural forms where the local and the foreign are mixed in interesting ways. I argue that the current circulation of fashion must be understood as adaptation in which “outside aesthetic influence is integrated into and becomes part of an existing style tradition” (Lynch and Strauss, 2007, p. 154). This emergence of new local and eclectic styles denies assumptions in which consumers are disengaged while duped by a system of commodification. The paper argues that, through a process of “deterritorialisation”, “displacement” and “repatriation” (Appadurai 1996, p. 32), creative ordinary consumers are able to engage with fashion, reinventing it in the context of their local cultures.
Resumo:
With the growth of the Web, E-commerce activities are also becoming popular. Product recommendation is an effective way of marketing a product to potential customers. Based on a user’s previous searches, most recommendation methods employ two dimensional models to find relevant items. Such items are then recommended to a user. Further too many irrelevant recommendations worsen the information overload problem for a user. This happens because such models based on vectors and matrices are unable to find the latent relationships that exist between users and searches. Identifying user behaviour is a complex process, and usually involves comparing searches made by him. In most of the cases traditional vector and matrix based methods are used to find prominent features as searched by a user. In this research we employ tensors to find relevant features as searched by users. Such relevant features are then used for making recommendations. Evaluation on real datasets show the effectiveness of such recommendations over vector and matrix based methods.
Resumo:
- identify the terms policy, public policy and health policy, the stages of policy development and the role that values and politics play in policymaking - recognise contemporary international developments in public health and their impact on national policymaking and the health of Australians - describe the basic structure and financing of Australia’s health system and the role of public health within it - identify Australia’s national public health priorities, and be able to critique the development of the National Chronic Disease Strategy, as an example.
Resumo:
• recognise that “ethics” is often defined and approached in different ways • describe the foundations and development of public health ethics • summarise some key ethical systems and their relevance to public health practice • outline and critique some codes of ethics, and discuss their application to public health practice • recognise, evaluate and communicate ethical concerns regarding public health, and apply ethical principles in your practice.
Resumo:
- identify the importance of planning and evaluation in public health practice - recognise the links between planning and evaluation through the presentation of relevant models - identify the core concepts of needs assessment in public health - describe the evaluation cycle and the importance of an evaluation plan - understand evaluation designs and their application in practice.
Resumo:
- describe what is meant by socioeconomic differences in health, and the social and emotional determinants of health - understand how health inequalities are affected by the social and economic circumstances that people experience throughout their lives - discuss how factors such as living and working conditions, income, place and education can impact on health - identify actions for public health policy-makers that have the potential to make a difference in improving health outcomes within populations - appreciate the concept of social cohesion and social capital, and their role as potential protective factors in health - understand conceptual models that can assist in analysing these issues.