388 resultados para lab computers


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Affordance is an important concept in the field of human–computer interaction. There are various interpretations of affordances, often extending the original notion of James J. Gibson. Often the treatment of affordances in the current human–computer interaction literature has been a one-to-one relationship between a user and an artefact. We believe that the social and cultural contexts within which an artefact is situated affect the way in which the artefact is used and the notion of affordance needs to be seen as a dynamic, always emerging relationship between people and their environment. Using a Structuration Theory approach, we conceptualize the notion of affordance at a much broader level, encompassing social and cultural aspects. We suggest that affordances should be seen at three levels: single user, organizational (or work group) and societal. Focusing on the organizational level affordances, we provide details of several important factors that affect the emergence of affordances. - This article provides a new perspective on the discourse of affordance with the use of Structuration Theory. - It shows how affordance can be understood as ‘use’ in situated practices (i.e. ‘technology-in-practice’) - The Structuration Theory approach to affordances is showcased using two case studies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND Chikungunya and dengue infections are spatio-temporally related. The current review aims to determine the geographic limits of chikungunya, dengue and the principal mosquito vectors for both viruses and to synthesise current epidemiological understanding of their co-distribution. METHODS Three biomedical databases (PubMed, Scopus and Web of Science) were searched from their inception until May 2015 for studies that reported concurrent detection of chikungunya and dengue viruses in the same patient. Additionally, data from WHO, CDC and Healthmap alerts were extracted to create up-to-date global distribution maps for both dengue and chikungunya. RESULTS Evidence for chikungunya-dengue co-infection has been found in Angola, Gabon, India, Madagascar, Malaysia, Myanmar, Nigeria, Saint Martin, Singapore, Sri Lanka, Tanzania, Thailand and Yemen; these constitute only 13 out of the 98 countries/territories where both chikungunya and dengue epidemic/endemic transmission have been reported. CONCLUSIONS Understanding the true extent of chikungunya-dengue co-infection is hampered by current diagnosis largely based on their similar symptoms. Heightened awareness of chikungunya among the public and public health practitioners in the advent of the ongoing outbreak in the Americas can be expected to improve diagnostic rigour. Maps generated from the newly compiled lists of the geographic distribution of both pathogens and vectors represent the current geographical limits of chikungunya and dengue, as well as the countries/territories at risk of future incursion by both viruses. These describe regions of co-endemicity in which lab-based diagnosis of suspected cases is of higher priority.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Distributed Collaborative Computing services have taken over centralized computing platforms allowing the development of distributed collaborative user applications. These applications enable people and computers to work together more productively. Multi-Agent System (MAS) has emerged as a distributed collaborative environment which allows a number of agents to cooperate and interact with each other in a complex environment. We want to place our agents in problems whose solutions require the collation and fusion of information, knowledge or data from distributed and autonomous information sources. In this paper we present the design and implementation of an agent based conference planner application that uses collaborative effort of agents which function continuously and autonomously in a particular environment. The application also enables the collaborative use of services deployed geographically wide in different technologies i.e. Software Agents, Grid computing and Web service. The premise of the application is that it allows autonomous agents interacting with web and grid services to plan a conference as a proxy to their owners (humans). © 2005 IEEE.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It is a transforming experience to imagine that in 50 years, our current built environment might look as foreign to our grandchildren as the computers of the 1960s look to us today. We can already see emerging attempts to create cities that are resilient and liveable in the face of physical stresses including population growth, increasing climate variability, resource shortages and pollution. The capacity for transforming every aspect of development towards resilience and liveability goals is profoundly exciting, from heating and cooling through to energy generation, water reticulation, food production, transportation, communication and recreational spaces...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Generating discriminative input features is a key requirement for achieving highly accurate classifiers. The process of generating features from raw data is known as feature engineering and it can take significant manual effort. In this paper we propose automated feature engineering to derive a suite of additional features from a given set of basic features with the aim of both improving classifier accuracy through discriminative features, and to assist data scientists through automation. Our implementation is specific to HTTP computer network traffic. To measure the effectiveness of our proposal, we compare the performance of a supervised machine learning classifier built with automated feature engineering versus one using human-guided features. The classifier addresses a problem in computer network security, namely the detection of HTTP tunnels. We use Bro to process network traffic into base features and then apply automated feature engineering to calculate a larger set of derived features. The derived features are calculated without favour to any base feature and include entropy, length and N-grams for all string features, and counts and averages over time for all numeric features. Feature selection is then used to find the most relevant subset of these features. Testing showed that both classifiers achieved a detection rate above 99.93% at a false positive rate below 0.01%. For our datasets, we conclude that automated feature engineering can provide the advantages of increasing classifier development speed and reducing development technical difficulties through the removal of manual feature engineering. These are achieved while also maintaining classification accuracy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Bhutan has reduced its malaria incidence significantly in the last 5 years, and is aiming for malaria elimination by 2016. To assist with the management of the Bhutanese malaria elimination programme a spatial decision support system (SDSS) was developed. The current study aims to describe SDSS development and evaluate SDSS utility and acceptability through informant interviews. Methods: The SDSS was developed based on the open-source Quantum geographical information system (QGIS) and piloted to support the distribution of long-lasting insecticidal nets (LLINs) and indoor residual spraying (IRS) in the two sub-districts of Samdrup Jongkhar District. It was subsequently used to support reactive case detection (RACD) in the two sub-districts of Samdrup Jongkhar and two additional sub-districts in Sarpang District. Interviews were conducted to ascertain perceptions on utility and acceptability of 11 informants using the SDSS, including programme and district managers, and field workers. Results: A total of 1502 households with a population of 7165 were enumerated in the four sub-districts, and a total of 3491 LLINs were distributed with one LLIN per 1.7 persons. A total of 279 households representing 728 residents were involved with RACD. Informants considered that the SDSS was an improvement on previous methods for organizing LLIN distribution, IRS and RACD, and could be easily integrated into routine malaria and other vector-borne disease surveillance systems. Informants identified some challenges at the programme and field level, including the need for more skilled personnel to manage the SDSS, and more training to improve the effectiveness of SDSS implementation and use of hardware. Conclusions: The SDSS was well accepted and informants expected its use to be extended to other malaria reporting districts and other vector-borne diseases. Challenges associated with efficient SDSS use included adequate skills and knowledge, access to training and support, and availability of hardware including computers and global positioning system receivers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Digital and interactive technologies are becoming increasingly embedded in everyday lives of people around the world. Application of technologies such as real-time, context-aware, and interactive technologies; augmented and immersive realities; social media; and location-based services has been particularly evident in urban environments where technological and sociocultural infrastructures enable easier deployment and adoption as compared to non-urban areas. There has been growing consumer demand for new forms of experiences and services enabled through these emerging technologies. We call this ambient media, as the media is embedded in the natural human living environment. This workshop focuses on ambient media services, applications, and technologies that promote people’s engagement in creating and recreating liveliness in urban environments, particularly through arts, culture, and gastronomic experiences. The RelCi workshop series is organized in cooperation with the Queensland University of Technology (QUT), in particular the Urban Informatics Lab and the Tampere University of Technology (TUT), in particular the Entertainment and Media Management (EMMi) Lab. The workshop runs under the umbrella of the International Ambient Media Association (AMEA) (http://www.ambientmediaassociation.org), which is hosting the international open access journal entitled “International Journal on Information Systems and Management in Creative eMedia”, and the international open access series “International Series on Information Systems and Management in Creative eMedia” (see http://www.tut.fi/emmi/Journal). The RelCi workshop took place for the first time in 2012 in conjunction with ICME 2012 in Melbourne, Autralia; and this year’s edition took place in conjunction with INTERACT 2013 in Cape Town, South Africa. Besides, the International Ambient Media Association (AMEA) organizes the Semantic Ambient Media (SAME) workshop series, which took place in 2008 in conjunction with ACM Multimedia 2008 in Vancouver, Canada; in 2009 in conjunction with AmI 2009 in Salzburg, Austria; in 2010 in conjunction with AmI 2010 in Malaga, Spain; in 2011 in conjunction with Communities and Technologies 2011 in Brisbane, Australia; in 2012 in conjunction with Pervasive 2012 in Newcastle, UK; and in 2013 in conjunction with C&T 2013 in Munich, Germany.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Polydimethylsiloxane (PDMS) is the most commonly used material in the manufacture of customized cell culture devices. While there is concern that uncured PDMS oligomers may leach into culture medium and/or hydrophobic molecules may be absorbed into PDMS structures, there is no consensus on how or if PDMS influences cell behaviour. We observed that human umbilical cord blood (CB)-derived CD34+ cells expanded in standard culture medium on PDMS exhibit reduced CD38 surface expression, relative to cells cultured on tissue culture polystyrene (TCP). All-trans retinoic acid (ATRA) induces CD38 expression, and we reasoned that this hydrophobic molecule might be absorbed by PDMS. Through a series of experiments we demonstrated that ATRA-mediated CD38 expression was attenuated when cultures were maintained on PDMS. Medium pre-incubated on PDMS for extended durations resulted in a time-dependant reduction of ATRA in the medium and increasingly attenuated CD38 expression. This indicated a time-dependent absorption of ATRA into the PDMS. To better understand how PDMS might generally influence cell behaviour, Ingenuity Pathway Analysis (IPA) was used to identify potential upstream regulators. This analysis was performed for differentially expressed genes in primary cells including CD34+ haematopoietic progenitor cells, mesenchymal stromal cells (MSC), and keratinocytes, and cell lines including prostate cancer epithelial cells (LNCaP), breast cancer epithelial cells (MCF-7), and myeloid leukaemia cells (KG1a). IPA predicted that the most likely common upstream regulator of perturbed pathways was ATRA. We demonstrate here that ATRA is absorbed by PDMS in a time-dependent manner and results in the concomitant reduced expression of CD38 on the cell surface of CB-derived CD34+ cells.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Delay Tolerant Network (DTN) is a dynamic, fragmented, and ephemeral network formed by a large number of highly mobile nodes. DTNs are ephemeral networks with highly mobile autonomous nodes. This requires distributed and self-organised approaches to trust management. Revocation and replacement of security credentials under adversarial influence by preserving the trust on the entity is still an open problem. Existing methods are mostly limited to detection and removal of malicious nodes. This paper makes use of the mobility property to provide a distributed, self-organising, and scalable revocation and replacement scheme. The proposed scheme effectively utilises the Leverage of Common Friends (LCF) trust system concepts to revoke compromised security credentials, replace them with new ones, whilst preserving the trust on them. The level of achieved entity confidence is thereby preserved. Security and performance of the proposed scheme is evaluated using an experimental data set in comparison with other schemes based around the LCF concept. Our extensive experimental results show that the proposed scheme distributes replacement credentials up to 35% faster and spreads spoofed credentials of strong collaborating adversaries up to 50% slower without causing any significant increase on the communication and storage overheads, when compared to other LCF based schemes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Deep packet inspection is a technology which enables the examination of the content of information packets being sent over the Internet. The Internet was originally set up using “end-to-end connectivity” as part of its design, allowing nodes of the network to send packets to all other nodes of the network, without requiring intermediate network elements to maintain status information about the transmission. In this way, the Internet was created as a “dumb” network, with “intelligent” devices (such as personal computers) at the end or “last mile” of the network. The dumb network does not interfere with an application's operation, nor is it sensitive to the needs of an application, and as such it treats all information sent over it as (more or less) equal. Yet, deep packet inspection allows the examination of packets at places on the network which are not endpoints, In practice, this permits entities such as Internet service providers (ISPs) or governments to observe the content of the information being sent, and perhaps even manipulate it. Indeed, the existence and implementation of deep packet inspection may challenge profoundly the egalitarian and open character of the Internet. This paper will firstly elaborate on what deep packet inspection is and how it works from a technological perspective, before going on to examine how it is being used in practice by governments and corporations. Legal problems have already been created by the use of deep packet inspection, which involve fundamental rights (especially of Internet users), such as freedom of expression and privacy, as well as more economic concerns, such as competition and copyright. These issues will be considered, and an assessment of the conformity of the use of deep packet inspection with law will be made. There will be a concentration on the use of deep packet inspection in European and North American jurisdictions, where it has already provoked debate, particularly in the context of discussions on net neutrality. This paper will also incorporate a more fundamental assessment of the values that are desirable for the Internet to respect and exhibit (such as openness, equality and neutrality), before concluding with the formulation of a legal and regulatory response to the use of this technology, in accordance with these values.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Previous studies have shown a relationship between the use of communications technology and well-being, particularly mediated through its effect on personal relationships. However, there is some debate over whether this effect is positive or negative. The present study explored this issue further, examining whether the effect varies depending on the type of communications technology, and the nature of the personal relationship. An online survey was conducted with 3,421 participants in three countries (Australia, UK and US). It examined the use of ten communication methods, overall satisfaction with life and satisfaction with four different kinds of relationships (close and extended family, and close and distant friends). Results indicate that richer communication methods, which include non-verbal cues, were positively associated with both overall satisfaction with life and satisfaction with relationships. These methods included face-to-face communication, and phone and video calls. Conversely, more restricted methods, such as text messaging and instant messaging, were negatively associated with both variables. Social networking was negatively associated with overall satisfaction, but not with satisfaction with relationships. The strength of the association between a communications method and satisfaction with a relationship varied depending on the type of relationship, but whether it was positive or negative did not change.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article draws on the design and implementation of three mobile learning projects introduced by Flanagan in 2011, 2012 and 2014 engaging a total of 206 participants. The latest of these projects is highlighted in this article. Two other projects provide additional examples of innovative strategies to engage mobile and cloud systems describing how electronic and mobile technology can help facilitate teaching and learning, assessment for learning and assessment as learning, and support communities of practice. The second section explains the theoretical premise supporting the implementation of technology and promulgates a hermeneutic phenomenological approach. The third section discusses mobility, both in terms of the exploration of wearable technology in the prototypes developed as a result of the projects, and the affordances of mobility within pedagogy. Finally the quantitative and qualitative methods in place to evaluate m-learning are explained.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Australasian Society for Computers in Learning in Tertiary Education (ascilite) has recently completed research to inform development of the ALTC Exchange, a new online service for learning and teaching in Australia. The research investigated resource identification and contribution, engagement with the repository and user community, and associated peer review and commentary processes. This article focuses on the data obtained and recommendations developed for engagement of potential end users. It reports a literature review and findings, including an international perspective on the ALTC Exchange, with specific focus on prospective user needs, contexts of use and policies necessary to facilitate engagement of the higher education sector with the ALTC Exchange