395 resultados para computer technology


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper explores how people communicate in reference to local interests and suggests information and communication technology (ICT) design for enhancement of local community networks. Qualitative data was gathered from participant observations of local community collective action and open interviews with active community members. Data analysis revealed concepts, leading to categories in relation to local interactions and interests. Design suggestions consider introducing people to local community private-strategic activity via public displays that indicate simple entry points to active participation, and creating information collections according to local community perspectives for long-term reference.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we present interim results from the Communities and Place project, which is exploring methods for understanding communities in a variety of contexts, and how to inform the design of technology to support them. We report on our experience with adapting an existing game-based approach for working with video as a resource in participatory design processes. Our adaptations allow the approach to be used with diverse data arising out of the different communities we are engaged with, and different design traditions we approach the problem from, leading to the formation of common design themes to inform our future work on this project.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper focuses on the development and delivery of a core construction management (CM) unit, which forms the capstone of a four-unit CM stream in an undergraduate programme in the Faculty of Built Environment and Engineering at the Queensland University of Technology. UDB410 (Construction Management) is a final year unit that consolidates skills students have learned throughout their degree, hopefully graduating them as work-ready construction managers. It was developed in consultation with the Queensland Chapter of the Australian Institute of Building (AIB) and is a final year unit in the undergraduate Bachelor of Urban Development (CM) course. The unit uses various tools such as the OSIRIS business database (Bureau van Dijk Electronic Publishing, 2009), the AROUSAL (UK Version) construction business simulation (Lansley, 2009) and the Denison Organisational Culture Survey (Denison, 2000) to facilitate the development of skills in managing a construction company. The objectives of the paper are: • To track the rationale and development of the UDB410 unit sand describe the way in which this final year unit integrates learning from other parts of the course within which it is located as well as capping-off the CM stream of core units; • To highlight the difficulties of blending a balance of technology and management in a single unit; and • To explain how partnering with the construction industry benefited the learning quality of the unit.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is a mismatch between the kinds of movements used in gesture interfaces and our existing theoretical understandings of gesture. We need to re-examine the assumptions of gesture research and develop theory more suited to gesture interface design. In addition to improved theory, we need to develop ways for participants in the process of design to adapt, extend and develop theory for their own design contexts. Gesture interface designers should approach theory as a contingent resource for design actions that is responsive to the needs of the design process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this study is to demonstrate the appropriateness of “Japanese Manufacturing Management” (JMM) strategies in the Asian, ASEAN and Australasian automotive sectors. Secondly, the study assessed JMM as a prompt, effective and efficient global manufacturing management practice for automotive manufacturing companies to learn; benchmark for best practice; acquire product and process innovation, and enhance their capabilities and capacities. In this study, the philosophies, systems and tools that have been adopted in various automotive manufacturing assembly plants and their tier 1 suppliers in the three Regions were examined. A number of top to middle managers in these companies were located in Thailand, Indonesia, Malaysia, Singapore, Philippines, Viet Nam, and Australia and were interviewed by using a qualitative methodology. The results confirmed that the six pillars of JMM (culture change, quality at shop floor, consensus, incremental continual improvement, benchmarking, and backward-forward integration) are key enablers to success in adopting JMM in both automotive and other manufacturing sectors in the three Regions. The analysis and on-site interviews identified a number of recommendations that were validated by the automotive manufacturing company’s managers as the most functional JMM strategies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We treat the security of group key exchange (GKE) in the universal composability (UC) framework. Analyzing GKE protocols in the UC framework naturally addresses attacks by malicious insiders. We define an ideal functionality for GKE that captures contributiveness in addition to other desired security goals. We show that an efficient two-round protocol securely realizes the proposed functionality in the random oracle model. As a result, we obtain the most efficient UC-secure contributory GKE protocol known.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The process-centered design of organizations and information systems is globally seen as an appropriate response to the increased economic pressure on organizations. At the methodological core of process-centered management is process modeling. However, business process modeling in large initiatives can be a time-consuming and costly exercise, making it potentially difficult to convince executive management of its benefits. To date, and despite substantial interest and research in the area of process modeling, the understanding of the actual benefits of process modeling in academia and practice is limited. To address this gap, this paper explores the perception of benefits derived from process modeling initiatives, as reported through a global Delphi study. The study incorporates the views of three groups of stakeholders – academics, practitioners and vendors. Our findings lead to the first identification and ranking of 19 unique benefits associated with process modeling. The study in particular found that process modeling benefits vary significantly between practitioners and academics. We argue that these variations may point to a dangerous disconnect between research projects and practical demands.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The security of strong designated verifier (SDV) signature schemes has thus far been analyzed only in a two-user setting. We observe that security in a two-user setting does not necessarily imply the same in a multi-user setting for SDV signatures. Moreover, we show that existing security notions do not adequately model the security of SDV signatures even in a two-user setting. We then propose revised notions of security in a multi-user setting and show that no existing scheme satisfies these notions. A new SDV signature scheme is then presented and proven secure under the revised notions in the standard model. For the purpose of constructing the SDV signature scheme, we propose a one-pass key establishment protocol in the standard model, which is of independent interest in itself.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For robots to operate in human environments they must be able to make their own maps because it is unrealistic to expect a user to enter a map into the robot’s memory; existing floorplans are often incorrect; and human environments tend to change. Traditionally robots have used sonar, infra-red or laser range finders to perform the mapping task. Digital cameras have become very cheap in recent years and they have opened up new possibilities as a sensor for robot perception. Any robot that must interact with humans can reasonably be expected to have a camera for tasks such as face recognition, so it makes sense to also use the camera for navigation. Cameras have advantages over other sensors such as colour information (not available with any other sensor), better immunity to noise (compared to sonar), and not being restricted to operating in a plane (like laser range finders). However, there are disadvantages too, with the principal one being the effect of perspective. This research investigated ways to use a single colour camera as a range sensor to guide an autonomous robot and allow it to build a map of its environment, a process referred to as Simultaneous Localization and Mapping (SLAM). An experimental system was built using a robot controlled via a wireless network connection. Using the on-board camera as the only sensor, the robot successfully explored and mapped indoor office environments. The quality of the resulting maps is comparable to those that have been reported in the literature for sonar or infra-red sensors. Although the maps are not as accurate as ones created with a laser range finder, the solution using a camera is significantly cheaper and is more appropriate for toys and early domestic robots.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In truck manufacturing, the exhaust and air inlet pipes are specialized equipment that requires highly skilled, heavy machinery and small batch production methods. This paper describes a project to develop the computer numerically controlled (CNC) pipe bending process for a truck component manufacturer. The company supplies a huge range of heavy duty truck parts to the domestic market and is a significant supplier in Australia. The company has been using traditional methods of machine assisted manual pipe bending techniques. In a drive of continuous improvement, the company has acquired a pre-owned CNC bending machine capable of bending pipes automatically up to 25 bends. However, due to process mismatch, this machine is only used for single bending operation. The researchers studied the bending system and changed the manufacturing process. Using an example exhaust pipe as the benchmark, a significant drop of manufacturing lead time from 70 minutes to 40 minutes for each pipe was demonstrated. There was also a decrease of material cost due to the multiple bends part in one piece without cutting excessive materials for each single bend like it used to be.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Health Information Systems (HIS) make extensive use of Information and Communication Technologies (ICT). The use of ICT aids in improving the quality and efficiency of healthcare services by making healthcare information available at the point of care (Goldstein, Groen, Ponkshe, and Wine, 2007). The increasing availability of healthcare data presents security and privacy issues which have not yet been fully addressed (Liu, Caelli, May, and Croll, 2008a). Healthcare organisations have to comply with the security and privacy requirements stated in laws, regulations and ethical standards, while managing healthcare information. Protecting the security and privacy of healthcare information is a very complex task (Liu, May, Caelli and Croll, 2008b). In order to simplify the complexity of providing security and privacy in HIS, appropriate information security services and mechanisms have to be implemented. Solutions at the application layer have already been implemented in HIS such as those existing in healthcare web services (Weaver et al., 2003). In addition, Discretionary Access Control (DAC) is the most commonly implemented access control model to restrict access to resources at the OS layer (Liu, Caelli, May, Croll and Henricksen, 2007a). Nevertheless, the combination of application security mechanisms and DAC at the OS layer has been stated to be insufficient in satisfying security requirements in computer systems (Loscocco et al., 1998). This thesis investigates the feasibility of implementing Security Enhanced Linux (SELinux) to enforce a Role-Based Access Control (RBAC) policy to help protect resources at the Operating System (OS) layer. SELinux provides Mandatory Access Control (MAC) mechanisms at the OS layer. These mechanisms can contain the damage from compromised applications and restrict access to resources according to the security policy implemented. The main contribution of this research is to provide a modern framework to implement and manage SELinux in HIS. The proposed framework introduces SELinux Profiles to restrict access permissions over the system resources to authorised users. The feasibility of using SELinux profiles in HIS was demonstrated through the creation of a prototype, which was submitted to various attack scenarios. The prototype was also subjected to testing during emergency scenarios, where changes to the security policies had to be made on the spot. Attack scenarios were based on vulnerabilities common at the application layer. SELinux demonstrated that it could effectively contain attacks at the application layer and provide adequate flexibility during emergency situations. However, even with the use of current tools, the development of SELinux policies can be very complex. Further research has to be made in order to simplify the management of SELinux policies and access permissions. In addition, SELinux related technologies, such as the Policy Management Server by Tresys Technologies, need to be researched in order to provide solutions at different layers of protection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents research findings about the use of remote desktop applications to teach music sequencing software. It highlights the successes, shortcomings and interactive issues encountered during a pilot project with a theoretical focus on a specific interactive bottleneck. The paper proposes a new delivery and partnership model to widen this bottleneck, which currently hinders interactions between the technical support, education and professional development communities in music technology.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Providing support for reversible transformations as a basis for round-trip engineering is a significant challenge in model transformation research. While there are a number of current approaches, they require the underlying transformation to exhibit an injective behaviour when reversing changes. This however, does not serve all practical transformations well. In this paper, we present a novel approach to round-trip engineering that does not place restrictions on the nature of the underlying transformation. Based on abductive logic programming, it allows us to compute a set of legitimate source changes that equate to a given change to the target model. Encouraging results are derived from an initial prototype that supports most concepts of the Tefkat transformation language