709 resultados para Adaptive game technology


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Availability has become a primary goal of information security and is as significant as other goals, in particular, confidentiality and integrity. Maintaining availability of essential services on the public Internet is an increasingly difficult task in the presence of sophisticated attackers. Attackers may abuse limited computational resources of a service provider and thus managing computational costs is a key strategy for achieving the goal of availability. In this thesis we focus on cryptographic approaches for managing computational costs, in particular computational effort. We focus on two cryptographic techniques: computational puzzles in cryptographic protocols and secure outsourcing of cryptographic computations. This thesis contributes to the area of cryptographic protocols in the following ways. First we propose the most efficient puzzle scheme based on modular exponentiations which, unlike previous schemes of the same type, involves only a few modular multiplications for solution verification; our scheme is provably secure. We then introduce a new efficient gradual authentication protocol by integrating a puzzle into a specific signature scheme. Our software implementation results for the new authentication protocol show that our approach is more efficient and effective than the traditional RSA signature-based one and improves the DoSresilience of Secure Socket Layer (SSL) protocol, the most widely used security protocol on the Internet. Our next contributions are related to capturing a specific property that enables secure outsourcing of cryptographic tasks in partial-decryption. We formally define the property of (non-trivial) public verifiability for general encryption schemes, key encapsulation mechanisms (KEMs), and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption avors. We show that some generic transformations and concrete constructions enjoy this property and then present a new public-key encryption (PKE) scheme having this property and proof of security under the standard assumptions. Finally, we combine puzzles with PKE schemes for enabling delayed decryption in applications such as e-auctions and e-voting. For this we first introduce the notion of effort-release PKE (ER-PKE), encompassing the well-known timedrelease encryption and encapsulated key escrow techniques. We then present a security model for ER-PKE and a generic construction of ER-PKE complying with our security notion.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

How and why football referees made decisions was investigated. A constructivist grounded theory methodology was undertaken to tap into the experiential knowledge of referees. The participant cohort comprised 7 A-League referees (aged 23 to 35) and 8 local Brisbane league referees (aged 20 to 50), spanning the lowest to highest levels of competition in men’s football in Australia. Results found that referees used ‘four pillars’ to underpin their judgments, these were conceptual notions of: safety, fairness, accuracy and entertainment. A fifth pillar ‘consistency’ referred to the referee’s ‘contextual sensitivity’. Results were explained using an ecological dynamics framework that emphasises the individual-environment scale of analysis. It was concluded that interacting constraints shape emergent decision-making in referees which are nested in task goals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Robust hashing is an emerging field that can be used to hash certain data types in applications unsuitable for traditional cryptographic hashing methods. Traditional hashing functions have been used extensively for data/message integrity, data/message authentication, efficient file identification and password verification. These applications are possible because the hashing process is compressive, allowing for efficient comparisons in the hash domain but non-invertible meaning hashes can be used without revealing the original data. These techniques were developed with deterministic (non-changing) inputs such as files and passwords. For such data types a 1-bit or one character change can be significant, as a result the hashing process is sensitive to any change in the input. Unfortunately, there are certain applications where input data are not perfectly deterministic and minor changes cannot be avoided. Digital images and biometric features are two types of data where such changes exist but do not alter the meaning or appearance of the input. For such data types cryptographic hash functions cannot be usefully applied. In light of this, robust hashing has been developed as an alternative to cryptographic hashing and is designed to be robust to minor changes in the input. Although similar in name, robust hashing is fundamentally different from cryptographic hashing. Current robust hashing techniques are not based on cryptographic methods, but instead on pattern recognition techniques. Modern robust hashing algorithms consist of feature extraction followed by a randomization stage that introduces non-invertibility and compression, followed by quantization and binary encoding to produce a binary hash output. In order to preserve robustness of the extracted features, most randomization methods are linear and this is detrimental to the security aspects required of hash functions. Furthermore, the quantization and encoding stages used to binarize real-valued features requires the learning of appropriate quantization thresholds. How these thresholds are learnt has an important effect on hashing accuracy and the mere presence of such thresholds are a source of information leakage that can reduce hashing security. This dissertation outlines a systematic investigation of the quantization and encoding stages of robust hash functions. While existing literature has focused on the importance of quantization scheme, this research is the first to emphasise the importance of the quantizer training on both hashing accuracy and hashing security. The quantizer training process is presented in a statistical framework which allows a theoretical analysis of the effects of quantizer training on hashing performance. This is experimentally verified using a number of baseline robust image hashing algorithms over a large database of real world images. This dissertation also proposes a new randomization method for robust image hashing based on Higher Order Spectra (HOS) and Radon projections. The method is non-linear and this is an essential requirement for non-invertibility. The method is also designed to produce features more suited for quantization and encoding. The system can operate without the need for quantizer training, is more easily encoded and displays improved hashing performance when compared to existing robust image hashing algorithms. The dissertation also shows how the HOS method can be adapted to work with biometric features obtained from 2D and 3D face images.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Focuses on the various aspects of advances in future information communication technology and its applications Presents the latest issues and progress in the area of future information communication technology Applicable to both researchers and professionals These proceedings are based on the 2013 International Conference on Future Information & Communication Engineering (ICFICE 2013), which will be held at Shenyang in China from June 24-26, 2013. The conference is open to all over the world, and participation from Asia-Pacific region is particularly encouraged. The focus of this conference is on all technical aspects of electronics, information, and communications ICFICE-13 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of FICE. In addition, the conference will publish high quality papers which are closely related to the various theories and practical applications in FICE. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject. "This work was supported by the NIPA (National IT Industry Promotion Agency) of Korea Grant funded by the Korean Government (Ministry of Science, ICT & Future Planning)."

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The principal focus of this thesis is the representation of a significant creative practice in relation to the design and installation of the Location-Based Game, SCOOT. This project demonstrates new understandings relating to the contingencies and potentials for transferring positive aspects of digital gameplay to everyday physical environments in an effort to reveal hidden histories and revitalise peoples’ interactions with their local urban spaces.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Knowledge Integration (KI) is one of the major aspects driving innovation within an organisation. In this paper, we attempt to develop a better understanding of the challenges of knowledge integration within the innovation process in technology-based firms. Using four technology-based Australian firms, we investigated how knowledge integration may be managed within the context of innovation in technology firms. The literature highlights the role of four KI tasks that affect the innovation capability within technology-oriented firms, namely team building capability, capturing tacit knowledge, role of KM systems and technological systemic integration. Our findings indicate that in addition to the four tasks, a strategic approach to integrating knowledge for innovation as well as leadership and management are essential to achieving effective KI across multiple levels of engagement. Our findings also offer practical insights of how knowledge can be integrated within innovation process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Climate change is predicted to increase the frequency and severity of extreme weather events which pose significant challenges to the ability of government and other relief agencies to plan for, cope with and respond to disasters. Consequently, it is important that communities in climate sensitive and potential disaster prone areas strengthen their resilience to natural disasters in order to expeditiously recover from potential disruptions and damage caused by disasters. Building self reliance and, particularly in the immediate aftermath of a disaster, can facilitate short-term and long-term community recovery. To build stronger and more resilient communities, it is essential to have a better understanding of their current resilience capabilities by assessing areas of strength, risks and vulnerabilities so that their strengths can be enhanced and the risks and vulnerability can be appropriately addressed and mitigated through capacity building programs. While a number of conceptual frameworks currently exist to assess the resilience level of communities to disasters, they have tended to differ on their emphasis, scope and definition of what constitutes community resilience and how community resilience can be most effectively and accurately assessed. These limitations are attributed to the common approach of viewing community resilience through a mono-disciplinary lens. To overcome this, this paper proposes an integrated conceptual framework that takes into account the complex interplay of environmental, social, governance, infrastructure and economic attributes associated with community resilience. The framework can be operationalised using a range of resilience indicators to suit the nature of a disaster and the specific characteristics of a study region.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Social media tools are often the result of innovations in Information Technology and developed by IT professionals and innovators. Nevertheless, IT professionals, many of whom are responsible for designing and building social media technologies, have not been investigated on how they themselves use or experience social media for professional purposes. This study will use Information Grounds Theory (Pettigrew, 1998) as a framework to study IT professionals’ experience in using social media for professional purposes. Information grounds facilitates the opportunistic discovery of information within social settings created temporarily at a place where people gather for a specific purpose (e.g., doctors’ waiting rooms, office tea rooms etc.), but the social atmosphere stimulates spontaneous sharing of information (Pettigrew, 1999). This study proposes that social media has the qualities that make it a rich information grounds; people participate from separate “places” in cyberspace in a synchronous manner in real-time, making it almost as dynamic and unplanned as physical information grounds. There is limited research on how social media platforms are perceived as a “place,” (a place to go to, a place to gather, or a place to be seen in) that is comparable to physical spaces. There is also no empirical study on how IT professionals use or “experience” social media. The data for this study is being collected through a study of IT professionals who currently use Twitter. A digital ethnography approach is being taken wherein the researcher uses online observations and “follows” the participants online and observes their behaviours and interactions on social media. Next, a sub-set of participants will be interviewed on their experiences with and within social media and how social media compares with traditional methods of information grounds, information communication, and collaborative environments. An Evolved Grounded Theory (Glaser, 1992) approach will be used to analyse tweets data and interviews and to map the findings against the Information Ground Theory. Findings from this study will provide foundational understanding of IT professionals’ experiences within social media, and can help both professionals and researchers understand this fast-evolving method of communications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Chlamydia is responsible for a wide range of diseases with enormous global economic and health burden. As the majority of chlamydial infections are asymptomatic, a vaccine has greatest potential to reduce infection and disease prevalence. Protective immunity against Chlamydia requires the induction of a mucosal immune response, ideally, at the multiple sites in the body where an infection can be established. Mucosal immunity is most effectively stimulated by targeting vaccination to the epithelium, which is best accomplished by direct vaccine application to mucosal surfaces rather than by injection. The efficacy of needle-free vaccines however is reliant on a powerful adjuvant to overcome mucosal tolerance. As very few adjuvants have proven able to elicit mucosal immunity without harmful side effects, there is a need to develop non-toxic adjuvants or safer ways to administered pre-existing toxic adjuvants. In the present study we investigated the novel non-toxic mucosal adjuvant CTA1-DD. The immunogenicity of CTA1-DD was compared to our "gold-standard" mucosal adjuvant combination of cholera toxin (CT) and cytosine-phosphate-guanosine oligodeoxynucleotide (CpG-ODN). We also utilised different needle-free immunisation routes, intranasal (IN), sublingual (SL) and transcutaneous (TC), to stimulate the induction of immunity at multiple mucosal surfaces in the body where Chlamydia are known to infect. Moreover, administering each adjuvant by different routes may also limit the toxicity of the CT/CpG adjuvant, currently restricted from use in humans. Mice were immunised with either adjuvant together with the chlamydial major outer membrane protein (MOMP) to evaluate vaccine safety and quantify the induction of antigen-specific mucosal immune responses. The level of protection against infection and disease was also assessed in vaccinated animals following a live genital or respiratory tract infectious challenge. The non-toxic CTA1-DD was found to be safe and immunogenic when delivered via the IN route in mice, inducing a comparable mucosal response and level of protective immunity against chlamydial challenge to its toxic CT/CpG counterpart administered by the same route. The utilisation of different routes of immunisation strongly influenced the distribution of antigen-specific responses to distant mucosal surfaces and also abrogated the toxicity of CT/CpG. The CT/CpG-adjuvanted vaccine was safe when administered by the SL and TC routes and conferred partial immunity against infection and pathology in both challenge models. This protection was attributed to the induction of antigen-specific pro-inflammatory cellular responses in the lymph nodes regional to the site of infection and rather than in the spleen. Development of non-toxic adjuvants and effective ways to reduce the side effects of toxic adjuvants has profound implications for vaccine development, particularly against mucosal pathogens like Chlamydia. Interestingly, we also identified two contrasting vaccines in both infection models capable of preventing infection or pathology exclusively. This indicated that the development of pathology following an infection of vaccinated animals was independent of bacterial load and was instead the result of immunopathology, potentially driven by the adaptive immune response generated following immunisation. While both vaccines expressed high levels of interleukin (IL)-17 cytokines, the pathology protected group displayed significantly reduced expression of corresponding IL-17 receptors and hence an inhibition of signalling. This indicated that the balance of IL-17-mediated responses defines the degree of protection against infection and tissue damage generated following vaccination. This study has enabled us to better understand the immune basis of pathology and protection, necessary to design more effective vaccines.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article provides a general overview of some of the plant research being conducted by a number of researchers at the Queensland University of Technology (QUT) Brisbane. Details about student projects and research facilities have been limited to those of relevance to plant structure and systematics. Academics, technicians and research students involved in plant research are in the Faculty of Science and Engineering, mainly in the School of Earth, Environment and Biological Sciences (EEBS), with a few exceptions. Our offices and laboratories are housed in a number of different buildings at the Gardens Point campus (e.g., P, Q, R, S, M Blocks) and we have strong collaborative links with Queensland Herbarium (BRI) and Mt Coot-tha Botanic Gardens.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The nature and characteristics of how learners learn today are changing. As technology use in learning and teaching continues to grow, its integration to facilitate deep learning and critical thinking becomes a primary consideration. The implications for learner use, implementation strategies, design of integration frameworks and evaluation of their effectiveness in learning environments cannot be overlooked. This study specifically looked at the impact that technology-enhanced learning environments have on different learners’ critical thinking in relation to eductive ability, technological self-efficacy, and approaches to learning and motivation in collaborative groups. These were explored within an instructional design framework called CoLeCTTE (collaborative learning and critical thinking in technology-enhanced environments) which was proposed, revised and used across three cases. The field of investigation was restricted to three key questions: 1) Do learner skill bases (learning approach and eductive ability) influence critical thinking within the proposed CoLeCTTE framework? If so, how?; 2) Do learning technologies influence the facilitation of deep learning and critical thinking within the proposed CoLeCTTE framework? If so, how?; and 3) How might learning be designed to facilitate the acquisition of deep learning and critical thinking within a technology-enabled collaborative environment? The rationale, assumptions and method of research for using a mixed method and naturalistic case study approach are discussed; and three cases are explored and analysed. The study was conducted at the tertiary level (undergraduate and postgraduate) where participants were engaged in critical technical discourse within their own disciplines. Group behaviour was observed and coded, attributes or skill bases were measured, and participants interviewed to acquire deeper insights into their experiences. A progressive case study approach was used, allowing case investigation to be implemented in a "ladder-like" manner. Cases 1 and 2 used the proposed CoLeCTTE framework with more in-depth analysis conducted for Case 2 resulting in a revision of the CoLeCTTE framework. Case 3 used the revised CoLeCTTE framework and in-depth analysis was conducted. The findings led to the final version of the framework. In Cases 1, 2 and 3, content analysis of group work was conducted to determine critical thinking performance. Thus, the researcher used three small groups where learner skill bases of eductive ability, technological self-efficacy, and approaches to learning and motivation were measured. Cases 2 and 3 participants were interviewed and observations provided more in-depth analysis. The main outcome of this study is analysis of the nature of critical thinking within collaborative groups and technology-enhanced environments positioned in a theoretical instructional design framework called CoLeCTTE. The findings of the study revealed the importance of the Achieving Motive dimension of a student’s learning approach and how direct intervention and strategies can positively influence critical thinking performance. The findings also identified factors that can adversely affect critical thinking performance and include poor learning skills, frustration, stress and poor self-confidence, prioritisations over learning; and inadequate appropriation of group role and tasks. These findings are set out as instructional design guidelines for the judicious integration of learning technologies into learning and teaching practice for higher education that will support deep learning and critical thinking in collaborative groups. These guidelines are presented in two key areas: technology and tools; and activity design, monitoring, control and feedback.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: In sub-tropical and tropical Queensland, a legacy of poor housing design,minimal building regulations with few compliance measures, an absence of post-construction performance evaluation and various social and market factors has led to a high and growing penetration of, and reliance on, air conditioners to provide thermal comfort for occupants. The pervasive reliance on air conditioners has arguably impacted on building forms, changed cultural expectations of comfort and social practices for achieving comfort, and may have resulted in a loss of skills in designing and constructing high performance building envelopes. Aim: The aim of this paper is to report on initial outcomes of a project that sought to determine how the predicted building thermal performance of twenty-five houses in subtropical and tropical Queensland compared with objective performance measures and comfort performance as perceived by occupants. The purpose of the project was to shed light on the role of various supply chain agents in the realisation of thermal performance outcomes. Methodology: The case study methodology embraced a socio-technical approach incorporating building science and sociology. Building simulation was used to model thermal performance under controlled comfort assumptions and adaptive comfort conditions. Actual indoor climate conditions were measured by temperature and relative humidity sensors placed throughout each house, whilst occupants’ expectations of thermal comfort and their self-reported behaviours were gathered through semi-structured interviews and periodic comfort surveys. Thermal imaging and air infiltration tests, along with building design documents, were analysed to evaluate the influence of various supply chain agents on the actual performance outcomes. Results: The results clearly show that in the housing supply chain – from designer to constructor to occupant – there is limited understanding from each agent of their role in contributing to, or inhibiting, occupants’ comfort.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis examines how the initial institutional and technological aspects of the economy and the reforms that alter these aspects influence long run growth and development. These issues are addressed in the framework of stochastic endogenous growth models and an empirical framework. The thesis is able to explain why developing nations exhibit diverse growth and inequality patterns. Consequently, the thesis raises a number of policy implications regarding how these nations can improve their economic outcomes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis examined the determinants of consumers’ use of emerging mental health services delivered via mobile phone technology, which promise to provide cost-effective psychotherapeutic support where and when needed. It builds on the Model of Goal-Directed Behaviour by recognising the role that competition between behavioural alternatives plays in influencing consumers’ decision to use these services. The research employed a three-study, mixed-methodological approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents research findings and design strategies that illustrate how digital technology can be applied as a tool for hybrid placemaking in ways that would not be possible in purely digital or physical space. Digital technology has revolutionised the way people learn and gather new information. This trend has challenged the role of the library as a physical place, as well as the interplay of digital and physical aspects of the library. The paper provides an overview of how the penetration of digital technology into everyday life has affected the library as a place, both as designed by place makers, and, as perceived by library users. It then identifies a gap in current library research about the use of digital technology as a tool for placemaking, and reports results from a study of Gelatine – a custom built user check-in system that displays real-time user information on a set of public screens. Gelatine and its evaluation at The Edge, at State Library of Queensland illustrates how combining affordances of social, spatial and digital space can improve the connected learning experience among on-site visitors. Future design strategies involving gamifying the user experience in libraries are described based on Gelatine’s infrastructure. The presented design ideas and concepts are relevant for managers and designers of libraries as well as other informal, social learning environments.