622 resultados para pacs: neural computing technologies
Resumo:
In the modern connected world, pervasive computing has become reality. Thanks to the ubiquity of mobile computing devices and emerging cloud-based services, the users permanently stay connected to their data. This introduces a slew of new security challenges, including the problem of multi-device key management and single-sign-on architectures. One solution to this problem is the utilization of secure side-channels for authentication, including the visual channel as vicinity proof. However, existing approaches often assume confidentiality of the visual channel, or provide only insufficient means of mitigating a man-in-the-middle attack. In this work, we introduce QR-Auth, a two-step, 2D barcode based authentication scheme for mobile devices which aims specifically at key management and key sharing across devices in a pervasive environment. It requires minimal user interaction and therefore provides better usability than most existing schemes, without compromising its security. We show how our approach fits in existing authorization delegation and one-time-password generation schemes, and that it is resilient to man-in-the-middle attacks.
Resumo:
University learning increasingly includes online learning experiences embedded within teaching with the dual policy intentions of increasing flexibility and learner engagement. In this research project, three university lecturers from different teaching contexts selected technologies for online learning to enhance learner engagement by encouraging peer learning. A sociocultural view of learning was used to conceptualise the technological and social affordances that might enable student peer participation and engagement. The research explored the question: “What are the benefits and barriers experienced by students engaging in online peer collaboration?” Students reported benefits including a sense of belonging that enhanced motivation, and professional identity. This article also reports on some of the challenges for students and University academics when engaging in online learning communities.
Resumo:
This paper reports on the outcomes of an ICT enabled social sustainability project “Green Lanka1” trialled in the Wilgamuwa village, which is situated in the Dambulla district of Sri Lanka. The main goals of the project were focused towards the provision of information about market prices, transportation options, agricultural decision support and modern agriculture practices of the farmer communities to improve their livelihood with the effective use of technologies. The project used Web and Mobile (SMS) enabled systems. The Green Lanka project was sponsored by the Information Communication Technology Agency (ICTA) of Sri Lanka under the Institutional Capacity Building Programme (ICBP) grant scheme which was sponsored by the World Bank. Six hundred families in Wilgamuwa village participated in the project activities. The project was designed, executed and studied through an Action Research approach. The lessons learned through the project activities provide an important understanding of the complex interaction between different stakeholders in the process of implementation of ICT enabled solutions within digitally divided societies. The paper analyses the processes used to reduce the resistance to change and improved involvement of farmer communities in ICT enabled projects. It also analyses the interaction between stakeholders involved in design and implementation of the project activities to improve the chances of project success.
Resumo:
This paper presents the idea of a compendium of process technologies, i.e., a concise but comprehensive collection of techniques for process model analysis that support research on the design, execution, and evaluation of processes. The idea originated from observations on the evolution of process-related research disciplines. Based on these observations, we derive design goals for a compendium. Then, we present the jBPT library, which addresses these goals by means of an implementation of common analysis techniques in an open source codebase.
Resumo:
A well-engineered scaffold for regenerative medicine, which is suitable to be translated from the bench to the bedside, combines inspired design, technical innovation and precise craftsmanship. Electrospinning and additive manufacturing are separate approaches to manufacturing scaffolds for a variety of tissue engineering applications. A need to accurately control the spatial distribution of pores within scaffolds has recently resulted in combining the two processing methods, to overcome shortfalls in each technology. This review describes where electrospinning and additive manufacturing are used together to generate new porous structures for biological applications.
Resumo:
While substantial research on intelligent transportation systems has focused on the development of novel wireless communication technologies and protocols, relatively little work has sought to fully exploit proximity-based wireless technologies that passengers actually carry with them today. This paper presents the real-world deployment of a system that exploits public transit bus passengers’ Bluetooth-capable devices to capture and reconstruct micro- and macro-passenger behavior. We present supporting evidence that approximately 12% of passengers already carry Bluetooth-enabled devices and that the data collected on these passengers captures with almost 80 % accuracy the daily fluctuation of actual passengers flows. The paper makes three contributions in terms of understanding passenger behavior: We verify that the length of passenger trips is exponentially bounded, the frequency of passenger trips follows a power law distribution, and the microstructure of the network of passenger movements is polycentric.
Resumo:
This study presents research findings to informthe design and development of innovativemobile services aiming to enable collocated people to interact with each other in public urban places. The main goal of this research is to provide applications and deliver guidelines to positively influence the user experience of different public urban places during everyday urban life. This study describes the design and evaluation of mobile content and services enabling mobile mediated interactions in an anonymous way. The research described in this thesis is threefold. First, this study investigates how Information and Communication Technology (ICT) can be utilised in particular urban public places to influence the experience of urban dwellers during everyday life. The research into urban residents and public places guides the design of three different technologies that form case studies to investigate and discover possibilities to digitally augment the public urban space and make the invisible data of our interactions in the urban environment visible. • Capital Music enables urban dwellers to listen to their music on their mobile devices as usual but also visualises the artworks of songs currently being played and listened to by other users in ones’ vicinity. • PlaceTagz uses QR codes printed on stickers that link to a digital message board enabling collocated users to interact with each other over time resulting in a place-based digital memory. • Sapporo World Window, Brisbane Hot Spots, and YourScreen are interactive content applications allowing people to share data with their mobile phones on public urban screens. The applications employ mobile phones to mediate interactions in form of location and video sharing. Second, this study sets out to explore the quality and nature of the experiences created through the developed and deployed case study applications. The development of a user experience framework for evaluating mobile mediated interactions in urban public places is described and applied within each case. Third, drawing on research from urban sociology, psychology, urban design, and the findings from this study, this thesis discusses how such interactions can have an impact on the urban experience.
Resumo:
For any discipline to be regarded as a professional undertaking by which its members may be treated as true “professionals” in a specific area, practitioners must clearly understand that discipline’s history as well as the place and significance of that history in current practice as well as its relevance to available technologies and artefacts at the time. This is common for many professional disciplines such as medicine, pharmacy, engineering, law and so on but not yet, this paper submits, in information technology. Based on twenty five elapsed years of experience in developing and delivering Cybersecurity courses at undergraduate and postgraduate levels, this paper proposes a rationale and set of differing perspectives for the planning and development of curricula relevant to the delivery of appropriate courses in the history of cybersecurity or information assurance to information and communications technology (ICT) students and thus to potential information technology professionals.
Resumo:
Extending recent research on the importance of specific resources and skills for the internationalization of start-ups, this article tests a negative binomial model on a sample of 520 recently created high technology firms from the UK and Germany. The results show that previous international experience of entrepreneurs facilitates the rapid penetration of foreign markets, especially when the company features a clear and deliberate strategic intent of internationalization from the outset. This research provides one of the first empirical studies linking the influence of entrepreneurial teams to a high probability of success in the internationalization of high-technology ventures.
Resumo:
Every day we are confronted with social interactions with other people. Our social life is characterised by norms that manifest as attitudinal and behavioural uniformities among people. With greater awareness about our social context, we can interact more efficiently. Any theory or model of human interaction that fails to include social concepts could be suggested to lack a critical element. This paper identifies the construct of social concepts that need to be supported by future context-aw are systems from an interdisciplinary perspective. It discusses the limitations of existing context-aware systems to support social psychology theories related to the identification and membership of social groups. We argue that social norms are among the core modelling concepts that future context-aware systems need to capture with the view to support and enhance social interactions. A detailed summary of social psychology theory relevant to social computing is given, followed by a formal definition of the process with each such norm advertised and acquired. The social concepts identified in this paper could be used to simulate agent interactions imbued with social norms or use ICT to facilitate, assist, enhance or understand social interactions. They also could be used in virtual communities modelling where the social awareness of a community as well as the process of joining and exiting a community are important.
Resumo:
This paper describes the content and delivery of a software internationalisation subject (ITN677) that was developed for Master of Information Technology (MIT) students in the Faculty of Information Technology at Queensland University of Technology. This elective subject introduces students to the strategies, technologies, techniques and current development associated with this growing 'software development for the world' specialty area. Students learn what is involved in planning and managing a software internationalisation project as well as designing, building and using a software internationalisation application. Students also learn about how a software internationalisation project must fit into an over-all product localisation and globalisation that may include culturalisation, tailored system architectures, and reliance upon industry standards. In addition, students are exposed to the different software development techniques used by organizations in this arena and the perils and pitfalls of managing software internationalisation projects.
Resumo:
The health system is one sector dealing with very large amount of complex data. Many healthcare organisations struggle to utilise these volumes of health data effectively and efficiently. Therefore, there is a need for very effective system to capture, collate and distribute this health data. There are number of technologies have been identified to integrate data from different sources. Data warehousing is one technology can be used to manage clinical data in the healthcare. This paper addresses how data warehousing assist to improve cardiac surgery decision making. This research used the cardiac surgery unit at the Prince Charles Hospital (TPCH) as the case study. In order to deal with other units efficiently, it is important to integrate disparate data to a single point interrogation. We propose implementing a data warehouse for the cardiac surgery unit at TPCH. The data warehouse prototype developed using SAS enterprise data integration studio 4.2 and data was analysed using SAS enterprise edition 4.3. This improves access to integrated clinical and financial data with, improved framing of data to the clinical context, giving potentially better informed decision making for both improved management and patient care.
Resumo:
Radio Frequency Identification is a wireless identification method that utilizes the reception of electromagnetic radio waves. This research has proposed a novel model to allow for an in-depth security analysis of current protocols and developed new flexible protocols that can be adapted to offer either stronger security or better efficiency.
Resumo:
The most powerful known primitive in public-key cryptography is undoubtedly elliptic curve pairings. Upon their introduction just over ten years ago the computation of pairings was far too slow for them to be considered a practical option. This resulted in a vast amount of research from many mathematicians and computer scientists around the globe aiming to improve this computation speed. From the use of modern results in algebraic and arithmetic geometry to the application of foundational number theory that dates back to the days of Gauss and Euler, cryptographic pairings have since experienced a great deal of improvement. As a result, what was an extremely expensive computation that took several minutes is now a high-speed operation that takes less than a millisecond. This thesis presents a range of optimisations to the state-of-the-art in cryptographic pairing computation. Both through extending prior techniques, and introducing several novel ideas of our own, our work has contributed to recordbreaking pairing implementations.