407 resultados para 291700 Communications Technologies
Resumo:
Sustainable energy technologies rely heavily on advanced materials and modern engineering controls. These promising new technologies cannot be reliably deployed without ensuring that there is a sufficient “capacity,” i.e., trained technical personnel with the expertise to implement, monitor, and maintain the energy infrastructure. This same capacity is critical to the local development of new technologies, especially those that respond directly to regional priorities, strengths, and needs. One way to build capacity is through targeted programs that integrate the training and development of locals at an advanced technical level. In practical terms, these programs usually produce a small number of highly educated individuals with skills in science and engineering. The goal of Part VI of this book is to highlight contributing factors in successfully operating capacity building programs.
Resumo:
The integration of digital technologies in pedagogy is positioned as an important change in education, but widespread innovative use of digital technologies is yet to be truly realised. The gap between the potential and the reality of digital technology integration is commonly attributed to a range of challenging extrinsic and intrinsic influences. Activity Theory (Engeström, 2009) is used to analyse challenges created by extrinsic influences (Nielsen, Miller, & Hoban, 2012); a complementary theory is needed to conceptualise intrinsic influences. System 1 and System 2 thinking theory (Kahneman, 2011) will be advanced as a conceptual framework for understanding conscious and unconscious aspects of teacher practice, particularly the interaction between innovation and teacher routine, attitudes and beliefs. Transformative Learning Theory (Mezirow, 2009) will be positioned to comprehend the nexus of extrinsic and intrinsic influences. This paper will propose how, when faced with extrinsic and intrinsic influences on innovative practice, educators can use these theories to conceptualise the challenge of integrating digital technologies in pedagogy.
Resumo:
The research offers a deeper understanding of how objects currently facilitate social interaction and physical activity for older adults living independently. It uses this awareness to develop, from a human perspective, considerations for the design of internet connected objects that provide novel ways of maintaining contact with loved ones. The research found that people invest emotional attachment to objects and objects foster emotional responses in people. Objects can facilitate feeling connected to another however the relationship is a result of time and repeated interaction. Recreating this connection/relationship digitally is not as simple as attaching a hyperlink.
Resumo:
Cities and urban spaces around the world are changing rapidly from their origins in the industrialising world to a post-industrial, hard wired landscape. A further embellishment is the advent of mobile media technologies supported by both existing and new communications and computing technology which claim to put the urban dweller at the heart of a new, informed and ‘liberated’ seat of participatory urban governance. This networked, sensor enabled society permits flows of information in a multitude of directions ostensibly empowering the citizenry through ‘smart’ installations such as ‘talking bus stops’ detailing services, delays, transport interconnections and even weather conditions along desired routes. However, while there is considerable potential for creative and transformative kinds of citizen participation, there is also the momentum for ‘function-creep’, whereby vast amounts of data are garnered in a broad application of urban surveillance. This kind of monitoring and capacity for surveillance connects with attempts by civic authorities to regulate, restrict, rebrand and reframe urban public spaces into governable and predictable arenas of consumption. This article considers questions around the possibilities for retaining and revitalising forms of urban citizenship, set in the context of Marshall’s original premise of civil, social and political citizenship(s) in the middle of the last century, following World War Two and the coming of the modern welfare state.
Resumo:
This chapter addresses the areas more commonly found in everyday practice (NB circuit layouts and plant breeder's rights are not covered). Importantly, IP law has become very specialised, and as such one for which practitioners will need expertise or access to relevant experts in order to properly provide advice. The following therefore is an overview only of relevant issues.
Resumo:
Regardless of your industry, the marketplace is continually evolving. The reason, increasingly, is the evolution of disruptive technology. Disruptive technologies are enhanced or new technological innovations that essentially displace conventional and established technology, rendering it obsolete. They can create opportunities for new products, new markets, and new ways of conducting business. In 2016, business models will again change as businesses adapt. The enhancement of current technology and the development of new technological innovations will undeniably transform how new businesses are established, and how existing businesses compete. For small and medium-sized firms, technology will also enable significant leaps forward in terms of innovation, efficiency and competitiveness. Adapting quickly will be essential, so here’s the top six we think you should be prepared for.
Resumo:
This article examines Greek activists’ use of a range of communication technologies, including social media, blogs, citizen journalism sites, Web radio, and anonymous networks. Drawing on Anna Tsing’s theoretical model, the article examines key frictions around digital technologies that emerged within a case study of the antifascist movement in Athens, focusing on the period around the 2013 shutdown of Athens Indymedia. Drawing on interviews with activists and analysis of online communications, including issue networks and social media activity, we find that the antifascist movement itself is created and recreated through a process of productive friction, as different groups and individuals with varying ideologies and experiences work together.
Resumo:
Numerous disruptions and barriers are encountered by persons with mobility-related disabilities in their daily’s experience of going to work and the pressure these exert on gaining and maintaining their employment. The nature and extent of their difficulties to workforce participation entails a requirement for extensive planning and also strategies to address problems of being stranded (for example, when the bus they are waiting for is not accessible). This paper presents the conceptualisation and methods of understanding workforce participation as a journey, and a discussion on the role digital technologies play in helping people with mobility-related disabilities in their journeys to work and mitigating disruptions when these occur. This is presented through an initial case study that helped identify the sequence of supports needed to be in place to make the work journey possible. Importantly, the paper also highlights points of intervention for the use of digital technologies and where design can potentially help to enhance accessibility to work for people with mobility-related impairments by making journeys to work seamless.
Resumo:
In the context of an international economic shift from manufacturing to services and the constant expansion of industries towards online services (Sheth and Sharma, 2008), this study is concerned with the design of self-service technologies (SSTs) for online environments. An industry heavily adopting SSTs across a variety of different services is Health and Wellness, where figures show an ever growing number of health and wellness apps being developed, downloaded and abandoned (Kelley, 2014). Little is known about how to enhance people’s engagement with online wellness SSTs to support self-health management and self-efficacy. This literature review argues that service design of wellness SSTs in online contexts can be improved by developing an enhanced understanding from a people perspective and customer experience point of view. Customer value, quality of service, usability, and self-efficacy all play an important role in understanding how to design SSTs for wellness and keep users engaged. There is a need for further study on how people interact and engage with online services in the context of wellness in order to design engaging wellness services.
Resumo:
As technology continues to become more accessible, miniaturised and diffused into the environment, the potential of wearable technology to impact our lives in significant ways becomes increasingly viable. Wearables afford unique interaction, communication and functional capabilities between users, their environment as well as access to information and digital data. Wearables also demand an inter-disciplinary approach and, depending on the purpose, can be fashioned to transcend cultural, national and spatial boundaries. This paper presents the Cloud Workshop project based on the theme of ‘Wearables and Wellbeing; Enriching connections between citizens in the Asia-Pacific region’, initiated through a cooperative partnership between Queensland University of Technology (QUT), Hong Kong Baptist University (HKBU) and Griffith University (GU). The project was unique due to its inter-disciplinary, inter-cultural and inter-national scope that occurred simultaneously between Australia and Hong Kong.
Resumo:
Training for bodybuilding competition is clearly a serious business that inflicts serious demands on the competitor. Not only did Francis commit time and money to compete, but he also arguably put winning before his physical well-being—enduring pain and suffering from his injury. Bodybuilding may seem like an extreme example, but it is not the only activity in which people suffer in pursuit of their goals. Boxers fight each other in the ring; soccer players risk knee and ankle injuries, sometimes playing despite being hurt; and mountaineers risk their lives in dangerous climbs. In the arts there are many examples of people suffering to achieve their goals: Beethoven kept composing, conducting, and performing despite his hearing loss; van Gogh grappled with depression but kept painting, finding fame only posthumously; and Mozart lived the final years of his life impoverished but still composing. These examples show that many great achievements come at a price: severe suffering...
Resumo:
As one of the most widely used wireless network technologies, IEEE 802.11 wireless local area networks (WLANs) have found a dramatically increasing number of applications in soft real-time networked control systems (NCSs). To fulfill the real-time requirements in such NCSs, most of the bandwidth of the wireless networks need to be allocated to high-priority data for periodic measurements and control with deadline requirements. However, existing QoS-enabled 802.11 medium access control (MAC) protocols do not consider the deadline requirements explicitly, leading to unpredictable deadline performance of NCS networks. Consequentially, the soft real-time requirements of the periodic traffic may not be satisfied, particularly under congested network conditions. This paper makes two main contributions to address this problem in wireless NCSs. Firstly, a deadline-constrained MAC protocol with QoS differentiation is presented for IEEE 802.11 soft real-time NCSs. It handles periodic traffic by developing two specific mechanisms: a contention-sensitive backoff mechanism, and an intra-traffic-class QoS differentiation mechanism. Secondly, a theoretical model is established to describe the deadline-constrained MAC protocol and evaluate its performance of throughput, delay and packet-loss ratio in wireless NCSs. Numerical studies are conducted to validate the accuracy of the theoretical model and to demonstrate the effectiveness of the new MAC protocol.
Resumo:
Health information technology (IT) can have a profound effect on the temporal flow and organisation of work. Yet research into the context, meaning and significance of temporal factors remains limited, most likely because of its complexity. This study outlines the role of communications in the context of the temporal and organizational landscape of seven Australian residential aged care facilities displaying a range of information exchange practices and health IT capacity. The study used qualitative and observational methods to identify temporal factors associated with internal and external modes of communication across the facilities and to explore the use of artifacts. The study concludes with a depiction of the temporal landscape of residential aged care particularly in regards to the way that work is allocated, prioritized, sequenced and coordinated. We argue that the temporal landscape involves key context-sensitive factors that are critical to understanding the way that humans accommodate to, and deal with health technologies, and which are therefore important for the delivery of safe and effective care.
Resumo:
Detection and prevention of global network satellite system (GNSS) “spoofing” attacks, or the broadcast of false global navigation satellite system services, has recently attracted much research interest. This survey aims to fill three gaps in the literature: first, to assess in detail the exact nature of threat scenarios posed by spoofing against the most commonly cited targets; second, to investigate the many practical impediments, often underplayed, to carrying out GNSS spoofing attacks in the field; and third, to survey and assess the effectiveness of a wide range of proposed defences against GNSS spoofing. Our conclusion lists promising areas of future research.
Resumo:
A Delay Tolerant Network (DTN) is a dynamic, fragmented, and ephemeral network formed by a large number of highly mobile nodes. DTNs are ephemeral networks with highly mobile autonomous nodes. This requires distributed and self-organised approaches to trust management. Revocation and replacement of security credentials under adversarial influence by preserving the trust on the entity is still an open problem. Existing methods are mostly limited to detection and removal of malicious nodes. This paper makes use of the mobility property to provide a distributed, self-organising, and scalable revocation and replacement scheme. The proposed scheme effectively utilises the Leverage of Common Friends (LCF) trust system concepts to revoke compromised security credentials, replace them with new ones, whilst preserving the trust on them. The level of achieved entity confidence is thereby preserved. Security and performance of the proposed scheme is evaluated using an experimental data set in comparison with other schemes based around the LCF concept. Our extensive experimental results show that the proposed scheme distributes replacement credentials up to 35% faster and spreads spoofed credentials of strong collaborating adversaries up to 50% slower without causing any significant increase on the communication and storage overheads, when compared to other LCF based schemes.