149 resultados para Computer systems organization: general-emerging technologies


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Music making affects relationships with self and others by generating a sense of belonging to a culture or ideology (Bamford, 2006; Barovick, 2001; Dillon & Stewart, 2006; Fiske, 2000; Hallam, 2001). Whilst studies from arts education research present compelling examples of these relationships, others argue that they do not present sufficiently validated evidence of a causal link between music making experiences and cognitive or social change (Winner & Cooper, 2000; Winner & Hetland, 2000a, 2000b, 2001). I have suggested elsewhere that this disconnection between compelling evidence and observations of the effects of music making are in part due to the lack of rigor in research and the incapacity of many methods to capture these experiences in meaningful ways (Dillon, 2006). Part of the answer to these questions about rigor and causality lay in the creative use of new media technologies that capture the results of relationships in music artefacts. Crucially, it is the effective management of these artefacts within computer systems that allows researchers and practitioners to collect, organize, analyse and then theorise such music making experiences.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Scientists need to transfer semantically similar queries across multiple heterogeneous linked datasets. These queries may require data from different locations and the results are not simple to combine due to differences between datasets. A query model was developed to make it simple to distribute queries across different datasets using RDF as the result format. The query model, based on the concept of publicly recognised namespaces for parts of each scientific dataset, was implemented with a configuration that includes a large number of current biological and chemical datasets. The configuration is flexible, providing the ability to transparently use both private and public datasets in any query. A prototype implementation of the model was used to resolve queries for the Bio2RDF website, including both Bio2RDF datasets and other datasets that do not follow the Bio2RDF URI conventions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Choi et al. recently proposed an efficient RFID authentication protocol for a ubiquitous computing environment, OHLCAP(One-Way Hash based Low-Cost Authentication Protocol). However, this paper reveals that the protocol has several security weaknesses : 1) traceability based on the leakage of counter information, 2) vulnerability to an impersonation attack by maliciously updating a random number, and 3) traceability based on a physically-attacked tag. Finally, a security enhanced group-based authentication protocol is presented.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

YEAR: 2010 ROLE: Artist FORMAT: Miniature 3D Sculpture produced in resin using 3D printing technologies. WITH: International Touring Show ‘Inside Out’ WHAT: A miniature sculpture that contributes towards my ongoing explorations into how our collective ability to sustain (the future) is as much a cultural problematic as it is an economic or technological one. OVERVIEW: The curatorial brief was for each curated artist was to design a piece in CAD suitable for 3D resin printing - The object should be entirely generated through 3D visualisation and modelling tools and should be machined and shipped within the dimensions of 6cm x 6cm x 6cm. My design for this brief was influenced by recent research I had conducted in Mildura in the Sunraysia irrigated region of NW Victoria. Each name set within the work is an Australian soldier/settler – who, on returning from the ‘Great War’ was duly awarded a ‘block’ in Australia’s new inland irrigated settlements - with the explicit task of clearing it to plant and reap. Through their concerted and well-intentioned efforts, these workers began to profoundly re-shape Australia’s marginal country - inadvertently presaging the bleak future faced today by many of Australia’s inland lands and river systems. Furthermore, through that time's predominant colonial conception of ‘terra nullius’ (this land is unoccupied and therefore free to be claimed) they each played a small but formative part in building the profound cultural divide between land and peoples that still haunts Australia today. THE EXHIBITION: Inside Out is a compelling international touring exhibition featuring forty-six miniature sculptures produced in resin using 3D printing technologies. Developments in virtual computer visualisation and integrated digital technologies are giving contemporary makers new insight and opportunities to create objects and forms which were previously impossible to produce or difficult to envisage. The exhibition is the result of collaboration between the Art Technology Coalition, the University of Technology Sydney and RMIT University in Australia along with De Montfort University, Manchester Metropolitan University and Dartington College of Arts at University College Falmouth in the United Kingdom.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

With the identification of common single locus point mutations as risk factors for thrombophilia, many DNA testing methodologies have been described for detecting these variations. Traditionally, functional or immunological testing methods have been used to investigate quantitative anticoagulant deficiencies. However, with the emergence of the genetic variations, factor V Leiden, prothrombin 20210 and, to a lesser extent, the methylene tetrahydrofolate reductase (MTHFR677) and factor V HR2 haplotype, traditional testing methodologies have proved to be less useful and instead DNA technology is more commonly employed in diagnostics. This review considers many of the DNA techniques that have proved to be useful in the detection of common genetic variants that predispose to thrombophilia. Techniques involving gel analysis are used to detect the presence or absence of restriction sites, electrophoretic mobility shifts, as in single strand conformation polymorphism or denaturing gradient gel electrophoresis, and product formation in allele-specific amplification. Such techniques may be sensitive, but are unwielding and often need to be validated objectively. In order to overcome some of the limitations of gel analysis, especially when dealing with larger sample numbers, many alternative detection formats, such as closed tube systems, microplates and microarrays (minisequencing, real-time polymerase chain reaction, and oligonucleotide ligation assays) have been developed. In addition, many of the emerging technologies take advantage of colourimetric or fluorescence detection (including energy transfer) that allows qualitative and quantitative interpretation of results. With the large variety of DNA technologies available, the choice of methodology will depend on several factors including cost and the need for speed, simplicity and robustness. © 2000 Lippincott Williams & Wilkins.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Approximately 20 years have passed now since the NTSB issued its original recommendation to expedite development, certification and production of low-cost proximity warning and conflict detection systems for general aviation [1]. While some systems are in place (TCAS [2]), ¡¨see-and-avoid¡¨ remains the primary means of separation between light aircrafts sharing the national airspace. The requirement for a collision avoidance or sense-and-avoid capability onboard unmanned aircraft has been identified by leading government, industry and regulatory bodies as one of the most significant challenges facing the routine operation of unmanned aerial systems (UAS) in the national airspace system (NAS) [3, 4]. In this thesis, we propose and develop a novel image-based collision avoidance system to detect and avoid an upcoming conflict scenario (with an intruder) without first estimating or filtering range. The proposed collision avoidance system (CAS) uses relative bearing ƒÛ and angular-area subtended ƒê , estimated from an image, to form a test statistic AS C . This test statistic is used in a thresholding technique to decide if a conflict scenario is imminent. If deemed necessary, the system will command the aircraft to perform a manoeuvre based on ƒÛ and constrained by the CAS sensor field-of-view. Through the use of a simulation environment where the UAS is mathematically modelled and a flight controller developed, we show that using Monte Carlo simulations a probability of a Mid Air Collision (MAC) MAC RR or a Near Mid Air Collision (NMAC) RiskRatio can be estimated. We also show the performance gain this system has over a simplified version (bearings-only ƒÛ ). This performance gain is demonstrated in the form of a standard operating characteristic curve. Finally, it is shown that the proposed CAS performs at a level comparable to current manned aviations equivalent level of safety (ELOS) expectations for Class E airspace. In some cases, the CAS may be oversensitive in manoeuvring the owncraft when not necessary, but this constitutes a more conservative and therefore safer, flying procedures in most instances.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Although in the late 1990s there was much discussion as to whether the idea of information literacy was necessary or had longevity, global interest in the phenomenon has increased rather than diminished. In the midst of all this activity, what has happened to the way in which we interpret the idea of information literacy in the last decade or more? The label of information literacy has certainly become widely applied, especially to library based programs and remains more popular in formal learning environments.Ultimately information literacy is about peoples’ experience of using information wherever they happen to be. Information literacy is about people interacting, engaging, working with information in many contexts, either individually or in community. Emerging technologies may transform the kinds of information available and how it is engaged with. Nevertheless, we continue to need to understand the experience of information use in order to support people in their information environments. We continue to need to develop programs which reflect and enhance peoples’ experiences of using information to learn in ever widening and more complex settings (Bruce, 2008; Bruce & Hughes, 2010).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

It is imperative that we consider the use of current and emerging technologies in terms of the nature of our learners, the physical environment of the lecture theatre, and how technology may help to support appropriate pedagogies that facilitate the capturing of student attention in active engaging learning experiences. It is argued that a re-evaluation of pedagogy is required to address the tech-savy traits of the 21st century learner and the extent to which their mobile devices are capable of not only distracting them from learning but also enhancing face-to-face learning experiences.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The deployment of new emerging technologies, such as cooperative systems, allows the traffic community to foresee relevant improvements in terms of traffic safety and efficiency. Vehicles are able to communicate on the local traffic state in real time, which could result in an automatic and therefore better reaction to the mechanism of traffic jam formation. An upstream single hop radio broadcast network can improve the perception of each cooperative driver within radio range and hence the traffic stability. The impact of a cooperative law on traffic congestion appearance is investigated, analytically and through simulation. Ngsim field data is used to calibrate the Optimal Velocity with Relative Velocity (OVRV) car following model and the MOBIL lane-changing model is implemented. Assuming that congestion can be triggered either by a perturbation in the instability domain or by a critical lane changing behavior, the calibrated car following behavior is used to assess the impact of a microscopic cooperative law on abnormal lane changing behavior. The cooperative law helps reduce and delay traffic congestion as it increases traffic flow stability.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper reports the findings from a series of scoping interviews designed to evaluate, ground and refine the initial understandings, assumptions and concepts of a research team in a larger project about the role of social and tangible technologies in maintaining good habits into old age. Participants' understandings of some basic terms used in the research are presented along with a discussion of their current use of new and established information and communications technologies and the existing barriers to ongoing uptake of emerging technologies. The findings suggest that we question common assumptions about both ageing and technology usage by ageing people, demonstrating the contribution such early scoping interviews can make within design research projects.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Several approaches have been introduced in literature for active noise control (ANC) systems. Since FxLMS algorithm appears to be the best choice as a controller filter, researchers tend to improve performance of ANC systems by enhancing and modifying this algorithm. This paper proposes a new version of FxLMS algorithm. In many ANC applications an online secondary path modelling method using a white noise as a training signal is required to ensure convergence of the system. This paper also proposes a new approach for online secondary path modelling in feedfoward ANC systems. The proposed algorithm stops injection of the white noise at the optimum point and reactivate the injection during the operation, if needed, to maintain performance of the system. Benefiting new version of FxLMS algorithm and not continually injection of white noise makes the system more desirable and improves the noise attenuation performance. Comparative simulation results indicate effectiveness of the proposed approach.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper assesses Intelligent Transportation Systems (ITS) to identify safety systems that are most likely to reduce driver errors at railway crossings. ITS technologies have been integrated in order to develop improved evaluation tools to reduce crashes at railway crossings. Although emerging technologies, knowledge, innovative interventions have been introduced to change driver behaviour, there is a lack of research on the impact of integrating ITS technologies and transportation simulation on drivers. The outcomes of ITS technologies for complementing traditional signage were compared with those of current safety systems (passive and active) at railway crossings. Three ITS technologies are compared with current treatments, in terms of compliance rate and vehicle speed profiles. It is found that ITS technologies improve compliance rate by 17~30% and also encourage drivers to slow down earlier compared to current passive and active crossings when there is a train approaching the railway crossings.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

It is apparent that IT resources are important for organisations. It is also clear that organisations unique competencies, their IT-related capabilities, leverage the IT resources uniquely to create and sustain competitive advantage. However, IT resources are dynamic, and evolve at an exponential rate. This means that organisations will need to sustain their competencies to leverage opportunities offered by new IT resources. Research on ways to sustain IT-related capabilities is limited and a deeper understanding of this situation is important. Amongst other factors, a possible reason for this lack of progress in this area could be due to the lack of validated measurement items of the theoretical constructs to conduct such studies. We suggest an environment in which organisations could build new and sustain their existing IT-related capabilities. We then report on the development of valid and reliable measures for this environment. The validated measures would be useful in extending our understanding on how firms could sustain their IT-related capabilities. This effort will provide a deeper understanding of how firms can secure sustainable IT-related business value from their acquired IT resources.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There is no doubt that social engineering plays a vital role in compromising most security defenses, and in attacks on people, organizations, companies, or even governments. It is the art of deceiving and tricking people to reveal critical information or to perform an action that benefits the attacker in some way. Fraudulent and deceptive people have been using social engineering traps and tactics using information technology such as e-mails, social networks, web sites, and applications to trick victims into obeying them, accepting threats, and falling victim to various crimes and attacks such as phishing, sexual abuse, financial abuse, identity theft, impersonation, physical crime, and many other forms of attack. Although organizations, researchers, practitioners, and lawyers recognize the severe risk of social engineering-based threats, there is a severe lack of understanding and controlling of such threats. One side of the problem is perhaps the unclear concept of social engineering as well as the complexity of understand human behaviors in behaving toward, approaching, accepting, and failing to recognize threats or the deception behind them. The aim of this paper is to explain the definition of social engineering based on the related theories of the many related disciplines such as psychology, sociology, information technology, marketing, and behaviourism. We hope, by this work, to help researchers, practitioners, lawyers, and other decision makers to get a fuller picture of social engineering and, therefore, to open new directions of collaboration toward detecting and controlling it.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

CIB is developing a priority theme, now termed Improving Construction and Use through Integrated Design & Delivery Solutions (IDDS). The IDDS working group for this theme adopted the following definition: Integrated Design and Delivery Solutions use collaborative work processes and enhanced skills, with integrated data, information, and knowledge management to minimize structural and process inefficiencies and to enhance the value delivered during design, build, and operation, and across projects. The design, construction, and commissioning sectors have been repeatedly analysed as inefficient and may or may not be quite as bad as portrayed; however, there is unquestionably significant scope for IDDS to improve the delivery of value to clients, stakeholders (including occupants), and society in general, simultaneously driving down cost and time to deliver operational constructed facilities. Although various initiatives developed from computer‐aided design and manufacturing technologies, lean construction, modularization, prefabrication and integrated project delivery are currently being adopted by some sectors and specialisations in construction; IDDS provides the vision for a more holistic future transformation. Successful use of IDDS requires improvements in work processes, technology, and people’s capabilities to span the entire construction lifecycle from conception through design, construction, commissioning, operation, refurbishment/ retrofit and recycling, and considering the building’s interaction with its environment. This vision extends beyond new buildings to encompass modifications and upgrades, particularly those aimed at improved local and area sustainability goals. IDDS will facilitate greater flexibility of design options, work packaging strategies and collaboration with suppliers and trades, which will be essential to meet evolving sustainability targets. As knowledge capture and reuse become prevalent, IDDS best practice should become the norm, rather than the exception.