306 resultados para hardware implementation
Resumo:
The car has arguably had more influence on our lifestyle and urban environment than any other consumer product; allowing unprecedented freedom for living, working and recreation where and when we choose. However, problems of pollution, congestion, road trauma, inefficient land use and social inequality are associated with car use. Despite 100 years of design and technology refinements, the aforementioned problems are significant and persistent: many argue that resolving these problems requires a fundamental redesign of the car. Redesigned vehicles have been proposed such as the MIT CityCar and others such as the Renault Twizy, commercialized. None however have successfully brought about significant change and the study of disruptive innovation offers an explanation for this. Disruptive innovation, by definition, disrupts a market. It also disrupts the product ecosystem. The existing product ecosystem has co-evolved to support the conventional car and is not optimized for the new design: which will require a redesigned ecosystem to support it. A literature review identifies a lack of methodology for identifying the components of product ecosystems and the changes required for disruptive innovation implementation. This paper proposes such a methodology based on Design Thinking, Actor Network Theory, Disruptive Innovation and the CityCar scenarios.
Resumo:
Because of their limited number of senior positions and fewer alternative career paths, small businesses have a more difficult time attracting and retaining skilled information systems (IS) staff and are thus dependent upon external expertise. Small businesses are particularly dependent on outside expertise when first computerizing. Because small businesses suffer from severe financial constraints. it is often difficult to justify the cost of custom software. Hence. for many small businesses, engaging a consultant to help with identifying suitable packaged software and related hardware, is their first critical step toward computerization. This study explores the importance of proactive client involvement when engaging a consultant to assist with computer system selection in small businesses. Client involvement throughout consultant engagement is found to be integral to project success and frequently lacking due to misconceptions of small businesses regarding their role. Small businesses often overestimate the impact of consultant and vendor support in achieving successful computer system selection and implementation. For consultant engagement to be successful, the process must be viewed as being directed toward the achievement of specific organizational results where the client accepts responsibility for direction of the process.
Resumo:
The use of the Sengstaken–Blakemore tube as a life-saving treatment for bleeding oesophageal varices is slowly becoming the least preferred method possibly due to the potential complications associated with its placement. Nursing practice pertaining to the care of this patient group appears ad hoc and reliant on local knowledge and experience as opposed to recognised evidence of best practice. Therefore, this paper focuses on the application of Lewin's transitional change theory used to introduce a change in nursing practice with the application of a guideline to enhance the care of patients with a Sengstaken–Blakemore tube in situ within a general intensive care unit. This method identified some of the complexities surrounding the change process including the driving and restraining forces that must be harnessed and minimised in order for the adoption of change to be successful.
Resumo:
Change is something that both pre-service and practising teachers face regularly throughout their professional lives. Curriculum change and consequential implementation is a case in point. This paper investigates the perspectives of a number of school-based stakeholders in regard to the implementation of the C2C materials in Queensland schools and how this has potential consequences for teacher education programs. It shows that often contradictory spaces emerge in regard to curriculum enactment and argues that a ‘one size fits all’ approach is not the most effective way to implement new curriculum. A transformative third space is offered whereby teachers are accorded with a voice in the way in which implementation occurs; ultimately allowing pre-service teachers to learn important skills required to be effective teachers.
Resumo:
This paper makes a formal security analysis of the current Australian e-passport implementation using model checking tools CASPER/CSP/FDR. We highlight security issues in the current implementation and identify new threats when an e-passport system is integrated with an automated processing system like SmartGate. The paper also provides a security analysis of the European Union (EU) proposal for Extended Access Control (EAC) that is intended to provide improved security in protecting biometric information of the e-passport bearer. The current e-passport specification fails to provide a list of adequate security goals that could be used for security evaluation. We fill this gap; we present a collection of security goals for evaluation of e-passport protocols. Our analysis confirms existing security weaknesses that were previously identified and shows that both the Australian e-passport implementation and the EU proposal fail to address many security and privacy aspects that are paramount in implementing a secure border control mechanism. ACM Classification C.2.2 (Communication/Networking and Information Technology – Network Protocols – Model Checking), D.2.4 (Software Engineering – Software/Program Verification – Formal Methods), D.4.6 (Operating Systems – Security and Privacy Protection – Authentication)
Resumo:
The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and authentication of a security endpoint have raised numerous privacy and security concerns. HSMs have the ability to tie a system or an object, along with its users to the physical world. However, this enables tracking of the user and/or an object associated with the HSM. Current systems do not adequately address the privacy needs and as such are susceptible to various attacks. In this work, we analyse various security and privacy concerns that arise when deploying such hardware security modules and propose a system that allow users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Along with the standard notion of protecting privacy of an user, the proposed system offers colligation between seemingly independent pseudonyms. This new property when combined with HSMs that store the master secret key is extremely beneficial to a user, as it offers a convenient way to generate a large number of pseudonyms using relatively small storage requirements.
Resumo:
Information and Communication Technology (ICT) has been embraced with hope and optimism in both developing and developed countries. While in the developed countries most citizens have access to one or many of the devices which utilize this technology (e.g. desktop, laptop, tablet, mobile phone), in developing countries this “luxury” can only be afforded by a privileged few. The use of these technologies in primary schools in developing countries is low. This is due to the fact that there are other bigger issues that some of these countries have to grapple with such as meeting the basic health and education needs of its citizens. Quality primary education and global development partnerships are two of the eight Millennium Development Goals of the United Nations (UNDP, 2012). Many Governments, NGO’s, service organizations, and individuals in developing countries are always looking at ways in which the disparity (not just in terms of ICT) can be narrowed. There has to be a greater collaboration between stakeholders in developing and developed countries (Mutonyi & Norton, 2007). How do stakeholders from developed countries engage with partners in developing countries to deliver meaningful and relevant outcomes for primary school students using ICT? As a first step getting the key stakeholders on side is critical. In the Fijian context, schools are managed and run by committees who are members of the community. Therefore, getting the committee on side together with the head-teachers and teachers is critical. Conversations about teaching and learning with technology can then follow with greater ease. The sustainability of any innovative approaches is also an essential element of this equation. Through this lens, this chapter investigates how ICT can be implemented in primary schools in Fiji. It proposes a three-layered approach which focuses on: (1) the community, school leadership, and teachers; (2) content, pedagogy, and technology, and (3) sustainability.
Resumo:
This study was a step forward in modeling, simulation and microcontroller implementation of a high performance control algorithm for the motor of a blood pump. The rotor angle is sensed using three Hall effect sensors and an algorithm is developed to obtain better angular resolution from the three signals for better discrete-time updates of the controller. The performance of the system was evaluated in terms of actual and reference speeds, stator currents and power consumption over a range of reference speeds up to 4000 revolutions per minute. The use of fewer low cost Hall effect sensors compared to expensive high resolution sensors could reduce the cost of blood pumps for total artificial hearts.
Resumo:
This paper provides a detailed description of the current Australian e-passport implementation and makes a formal verification using model checking tools CASPER/CSP/FDR. We highlight security issues present in the current e-passport implementation and identify new threats when an e-passport system is integrated with an automated processing systems like SmartGate. Because the current e-passport specification does not provide adequate security goals, to perform a rational security analysis we identify and describe a set of security goals for evaluation of e-passport protocols. Our analysis confirms existing security issues that were previously informally identified and presents weaknesses that exists in the current e-passport implementation.
Resumo:
Introduction Guidelines existed at the Royal Children’s Hospital (RCH) to direct preoperative/pre-procedural fasting in day patients undergoing general anaesthetic. However audit, risk analyses and a recent research project at the RCH identified prolonged pre-procedural fasting times in children undergoing day surgical and gastroenterology procedures. Aims 1. Reduce median fasting time to <8 hrs for children admitted for a day procedure under general anaesthetic; 2. Identify children at risk of perioperative hypoglycaemia. Methods The study was conducted in 4 phases: 1) revision and implementation of evidence-based perioperative fasting guidelines with staff education relating to these guidelines; 2) cross-sectional descriptive study with day surgical patients (n = 377) requiring preoperative fasting. ‘Normal risk’ and ‘High risk’ groups were identified for fasting hypoglycaemia using an ‘at risk’ checklist. Venous blood glucose (BGL) testing was performed at a) anaesthetic induction; b) prior to first caloric food/fluid postoperatively; 3) chart audit to evaluate efficacy of guidelines and parent information; 4) development of recommendations for clinical practice. Results The median fasting time for children having morning surgery (14 hrs, IQ range 5–22 hrs) was twice as long compared to afternoon lists (7 hrs, IQ range 6–22 hrs) (p < 0.001). Median fasting times were not significantly different between ‘at risk’ and control groups (p = 0.496). However the proportion of children who experienced hypoglycaemia (BGL <3 mmol/L) was greater in the ‘at risk’ group (5, 8%) compared to the control group (18, 4.3%). Although not statistically significant (x2 = 2.254, p = 0.133), ‘at risk’ children appear more likely to experience hypoglycaemia as children in the control group, constituting a clinically significant finding. Conclusion Appropriate identification and management of ‘high risk’ children, will reduce the risk of deleterious sequelae in children undergoing surgical or investigative procedures requiring general anaesthesia.
Resumo:
Improved public awareness of the environment and available technologies will continue to highlight the importance of sustainable housing in the coming years. Despite this potential, the majority of new housing development in Australia is still “project homes” with few tangible sustainability measures. Stakeholders tend to have different perceptions and priorities on sustainability. To promote the uptake of sustainable housing products, a study of the critical issues affecting the implementation of sustainable housing is necessary. This research investigates multiple factors that may influence key stakeholders’ decision-making towards sustainable housing adoption. Drawing insights from combined questionnaire and interview studies, 12 critical factors and their interrelationships are identified based on professional views in the Australian housing industry. The mutual influences, or driving force and dependency, of these factors are further investigated via Interpretive Structural Modelling (ISM) to distinguish those requiring prominent and immediate attention. A hierarchical model is developed to help key stakeholders prioritise actions when implementing sustainable housing.
Resumo:
As part of the introduction of a broader dance medicine and science related health and wellbeing program, a 9 week mindfulness-meditation ACT-based program was delivered to all students undertaking full-time University dance training (N = 106). The aim of the program was to assist students in the further development of performance psychology skills that could be applied in both performance and non-performance settings. Participant groups were comprised of both male (N = 12) and female (N = 94) students from across all three year levels of two undergraduate dance courses, divided into three groups by mixed year levels due to timetable scheduling requirements. Pre- and post-testing was undertaken utilising the Mindful Attention Awareness Scale (MAAS-15), a uni-dimensional measure of mindfulness, in addition to qualitative questions checking the current level of awareness and understanding of mindfulness practice and its application. Weekly sessions were conducted by qualified sport and exercise psychologists and covered key practices such as: Mindfulness of Body, Mindfulness of Breathing, Mindfulness of Sounds, ACT-based and general Imagery exercises, Developing Open Awareness, Mindfulness of Emotions, and Developing Inner Stillness. Students were required to maintain a reflective journal that was utilised at the end of each weekly session, in addition to completion of a mid-Semester reflective debrief. Teaching staff additionally attended the weekly sessions and linked the mindfulness practice learnings into the student’s practical dance and academic classes where appropriate. Anecdotal feedback indicates that participation in the mindfulness-meditation sessions and the development of these mental skills has resulted in positive performance and personal outcomes. Observations collated from staff and students, results from the data collection phases and recommendations regarding future applications within dance training settings will be discussed within the presentation.
Resumo:
The ineffectiveness of current design processes has been well studied and has resulted in widespread calls for the evolution and development of new management processes. Even following the advent of BIM, we continue to move from one stage to another without necessarily having resolved all the issues. CAD design technology, if well handled, could have significantly raised the level of quality and efficiency of current processes, but in practice this was not fully realized. Therefore, technology alone can´t solve all the problems and the advent of BIM could result in a similar bottleneck. For a precise definition of the problem to be solved we should start by understanding what are the main current bottlenecks that have yet to be overcome by either new technologies or management processes, and the impact of human behaviour-related issues which impact the adoption and utilization of new technologies. The fragmented and dispersed nature of the AEC sector, and the huge number of small organizations that comprise it, are a major limiting factor. Several authors have addressed this issue and more recently IDDS has been defined as the highest level of achievement. However, what is written on IDDS shows an extremely ideal situation on a state to be achieved; it shows a holistic utopian proposition with the intent to create the research agenda to move towards that state. Key to IDDS is the framing of a new management model which should address the problems associated with key aspects: technology, processes, policies and people. One of the primary areas to be further studied is the process of collaborative work and understanding, together with the development of proposals to overcome the many cultural barriers that currently exist and impede the advance of new management methods. The purpose of this paper is to define and delimit problems to be solved so that it is possible to implement a new management model for a collaborative design process.
Resumo:
Despite significant investment in school one-to-one device programs, little is known about which aspects of program implementation work and why. Through a comparison of two implementation models, adopter-diffusion and saturation, and using existing data from the One Laptop per Child Australia laptop program, we explored how factors of implementation may affect device diffusion, learning and educational outcomes, and program sustainability in schools. In this article we argue that more focused research into implementation of one-to-one device programs, moving beyond comparisons of “devices versus without devices,” is needed to provide reliable data to inform future program funding and advance this area of research.
Resumo:
Electronic Medical Record (EMR) systems are being implemented increasingly worldwide. Saudi Arabia is one of the developing countries that commenced implementing such systems in 1988. Whilst EMR uptake has been low in Saudi Arabia until now, a number of hospitals have implemented EMR systems successfully. This paper analyses available studies (n = 28) in the literature regarding EMR implementation in Saudi Arabia to identify the progress of EMR implementation to date and to identify the facilitators and barriers to implementation.