91 resultados para Positional number systems


Relevância:

30.00% 30.00%

Publicador:

Resumo:

For a decade, embedded driving assistance systems were mainly dedicated to the management of short time events (lane departure, collision avoidance, collision mitigation). Recently a great number of projects have been focused on cooperative embedded devices in order to extend environment perception. Handling an extended perception range is important in order to provide enough information for both path planning and co-pilot algorithms which need to anticipate events. To carry out such applications, simulation has been widely used. Simulation is efficient to estimate the benefits of Cooperative Systems (CS) based on Inter-Vehicular Communications (IVC). This paper presents a new and modular architecture built with the SiVIC simulator and the RTMaps™ multi-sensors prototyping platform. A set of improvements, implemented in SiVIC, are introduced in order to take into account IVC modelling and vehicles’ control. These 2 aspects have been tuned with on-road measurements to improve the realism of the scenarios. The results obtained from a freeway emergency braking scenario are discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this survey, we review a number of the many “expressive” encryption systems that have recently appeared from lattices, and explore the innovative techniques that underpin them.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An increasing number of countries are faced with an aging population increasingly needing healthcare services. For any e-health information system, the need for increased trust by such clients with potentially little knowledge of any security scheme involved is paramount. In addition notable scalability of any system has become a critical aspect of system design, development and ongoing management. Meanwhile cryptographic systems provide the security provisions needed for confidentiality, authentication, integrity and non-repudiation. Cryptographic key management, however, must be secure, yet efficient and effective in developing an attitude of trust in system users. Digital certificate-based Public Key Infrastructure has long been the technology of choice or availability for information security/assurance; however, there appears to be a notable lack of successful implementations and deployments globally. Moreover, recent issues with associated Certificate Authority security have damaged trust in these schemes. This paper proposes the adoption of a centralised public key registry structure, a non-certificate based scheme, for large scale e-health information systems. The proposed structure removes complex certificate management, revocation and a complex certificate validation structure while maintaining overall system security. Moreover, the registry concept may be easier for both healthcare professionals and patients to understand and trust.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis opens up the design space for awareness research in CSCW and HCI. By challenging the prevalent understanding of roles in awareness processes and exploring different mechanisms for actively engaging users in the awareness process, this thesis provides a better understanding of the complexity of these processes and suggests practical solutions for designing and implementing systems that support active awareness. Mutual awareness, a prominent research topic in the fields of Computer-Supported Cooperative Work (CSCW) and Human-Computer Interaction (HCI) refers to a fundamental aspect of a person’s work: their ability to gain a better understanding of a situation by perceiving and interpreting their co-workers actions. Technologically-mediated awareness, used to support co-workers across distributed settings, distinguishes between the roles of the actor, whose actions are often limited to being the target of an automated data gathering processes, and the receiver, who wants to be made aware of the actors’ actions. This receiver-centric view of awareness, focusing on helping receivers to deal with complex sets of awareness information, stands in stark contrast to our understanding of awareness as social process involving complex interactions between both actors and receivers. It fails to take into account an actors’ intimate understanding of their own activities and the contribution that this subjective understanding could make in providing richer awareness information. In this thesis I challenge the prevalent receiver-centric notion of awareness, and explore the conceptual foundations, design, implementation and evaluation of an alternative active awareness approach by making the following five contributions. Firstly, I identify the limitations of existing awareness research and solicit further evidence to support the notion of active awareness. I analyse ethnographic workplace studies that demonstrate how actors engage in an intricate interplay involving the monitoring of their co-workers progress and displaying aspects of their activities that may be of relevance to others. The examination of a large body of awareness research reveals that while disclosing information is a common practice in face-to-face collaborative settings it has been neglected in implementations of technically mediated awareness. Based on these considerations, I introduce the notion of intentional disclosure to describe the action of users actively and deliberately contributing awareness information. I consider challenges and potential solutions for the design of active awareness. I compare a range of systems, each allowing users to share information about their activities at various levels of detail. I discuss one of the main challenges to active awareness: that disclosing information about activities requires some degree of effort. I discuss various representations of effort in collaborative work. These considerations reveal that there is a trade-off between the richness of awareness information and the effort required to provide this information. I propose a framework for active awareness, aimed to help designers to understand the scope and limitations of different types of intentional disclosure. I draw on the identified richness/effort trade-off to develop two types of intentional disclosure, both of which aim to facilitate the disclosure of information while reducing the effort required to do so. For both of these approaches, direct and indirect disclosure, I delineate how they differ from related approaches and define a set of design criteria that is intended to guide their implementation. I demonstrate how the framework of active awareness can be practically applied by building two proof-of-concept prototypes that implement direct and indirect disclosure respectively. AnyBiff, implementing direct disclosure, allows users to create, share and use shared representations of activities in order to express their current actions and intentions. SphereX, implementing indirect disclosure, represents shared areas of interests or working context, and links sets of activities to these representations. Lastly, I present the results of the qualitative evaluation of the two prototypes and analyse the results with regard to the extent to which they implemented their respective disclosure mechanisms and supported active awareness. Both systems were deployed and tested in real world environments. The results for AnyBiff showed that users developed a wide range of activity representations, some unanticipated, and actively used the system to disclose information. The results further highlighted a number of design considerations relating to the relationship between awareness and communication, and the role of ambiguity. The evaluation of SphereX validated the feasibility of the indirect disclosure approach. However, the study highlighted the challenges of implementing cross-application awareness support and translating the concept to users. The study resulted in design recommendations aimed to improve the implementation of future systems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This special issue of Networking Science focuses on Next Generation Network (NGN) that enables the deployment of access independent services over converged fixed and mobile networks. NGN is a packet-based network and uses the Internet protocol (IP) to transport the various types of traffic (voice, video, data and signalling). NGN facilitates easy adoption of distributed computing applications by providing high speed connectivity in a converged networked environment. It also makes end user devices and applications highly intelligent and efficient by empowering them with programmability and remote configuration options. However, there are a number of important challenges in provisioning next generation network technologies in a converged communication environment. Some preliminary challenges include those that relate to QoS, switching and routing, management and control, and security which must be addressed on an urgent or emergency basis. The consideration of architectural issues in the design and pro- vision of secure services for NGN deserves special attention and hence is the main theme of this special issue.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper we discuss the strengths and weaknesses of a range of artificial intelligence approaches used in legal domains. Symbolic reasoning systems which rely on deductive, inductive and analogical reasoning are described and reviewed. The role of statistical reasoning in law is examined, and the use of neural networks analysed. There is discussion of architectures for, and examples of, systems which combine a number of these reasoning strategies. We conclude that to build intelligent legal decision support systems requires a range of reasoning strategies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper we provide an overview of a number of fundamental reasoning formalisms in artificial intelligence which can and have been used in modelling legal reasoning. We describe deduction, induction and analogical reasoning formalisms, and show how they can be used separately to model legal reasoning. We argue that these formalisms can be used together to model legal reasoning more accurately, and describe a number of attempts to integrate the approaches.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Brisbane City Hall (BCH) is arguably one of Brisbane’s most notable and iconic buildings. Serving as the public’s central civic and municipal building since 1930, the importance of this heritage listed building to cultural significance and identity is unquestionable. This attribute is reflected within the local government, with a simplified image of the halls main portico entrance supplying Brisbane City Council with its insignia and trademark signifier. Regardless of these qualities, this building has been neglected in a number of ways, primarily in the physical sense with built materials, but also, and just as importantly, through inaccurate and undocumented works. Numerous restoration and renovation works have been undertaken throughout BCH’s lifetime, however the records of these amendments are far and few between. Between 2010 and 2013, BCH underwent major restoration works, the largest production project undertaken on the building since its initial construction. Just prior to this conservation process, the full extent of the buildings deterioration was identified, much of which there was little to no original documentation of. This has led to a number of issues pertaining to what investigators expected to find within the building, versus what was uncovered (the unexpected), which have resulted directly from this lack of data. This absence of record keeping is the key factor that has contributed to the decay and unknown deficiencies that had amassed within BCH. Accordingly, this raises a debate about the methods of record keeping, and the need for a more advanced process that is able to be integrated within architectural and engineering programs, whilst still maintaining the ability to act as a standalone database. The immediate objective of this research is to investigate the restoration process of BCH, with focus on the auditorium, to evaluate possible strategies to record and manage data connected to building pathology so that a framework can be developed for a digital heritage management system. The framework produced for this digital tool will enable dynamic uses of a centralised database and aims to reduce the significant data loss. Following an in-depth analysis of this framework, it can be concluded that the implementation of the suggested digital tool would directly benefit BCH, and could ultimately be incorporated into a number of heritage related built form.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Several recently proposed ciphers, for example Rijndael and Serpent, are built with layers of small S-boxes interconnected by linear key-dependent layers. Their security relies on the fact, that the classical methods of cryptanalysis (e.g. linear or differential attacks) are based on probabilistic characteristics, which makes their security grow exponentially with the number of rounds N r r. In this paper we study the security of such ciphers under an additional hypothesis: the S-box can be described by an overdefined system of algebraic equations (true with probability 1). We show that this is true for both Serpent (due to a small size of S-boxes) and Rijndael (due to unexpected algebraic properties). We study general methods known for solving overdefined systems of equations, such as XL from Eurocrypt’00, and show their inefficiency. Then we introduce a new method called XSL that uses the sparsity of the equations and their specific structure. The XSL attack uses only relations true with probability 1, and thus the security does not have to grow exponentially in the number of rounds. XSL has a parameter P, and from our estimations is seems that P should be a constant or grow very slowly with the number of rounds. The XSL attack would then be polynomial (or subexponential) in N r> , with a huge constant that is double-exponential in the size of the S-box. The exact complexity of such attacks is not known due to the redundant equations. Though the presented version of the XSL attack always gives always more than the exhaustive search for Rijndael, it seems to (marginally) break 256-bit Serpent. We suggest a new criterion for design of S-boxes in block ciphers: they should not be describable by a system of polynomial equations that is too small or too overdefined.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Passively protected railway crossings are a major rail safety issue in Australia. Such crossings cannot be upgraded as such crossings are too numerous and the cost involved is prohibitive. Advanced Driver Assistance Systems (ADAS) have been shown to improve road safety and are widely used. These systems could be a solution to improve safety of passively protected crossings at a lower cost. Such complementary ADAS could result in driver’s over-trust due to the absence of Humane Machine Interface reflecting the quality of the information or the state of the ADAS (failure status). This paper demonstrates that driver’s exposure to crossing exhibiting fail-safe and non-fail safe properties could result in improperly allocating trust between technologies. We conducted a driving simulator study where participants (N=58) were exposed to three types of level crossing warning system on passive and active crossings. The results show that a significant proportion of participants over-trust the ADAS. Such drivers exhibit the same driving performance with the ADAS as when exposed to infrastructure based active crossing protection. They do not take the necessary safety precautions as they have a faster speed approach, reduced number of gaze toward the rail tracks and fail to stop at the crossing.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The control of the generation and assembly of the electronegative plasma-grown particles is discussed. Due to the large number of elementary processes of particle creation and loss, electronegative complex plasmas should be treated as open systems where the stationary states are sustained by various particle creation and loss processes in the plasma bulk, on the walls, and on the dust grain surfaces. To be physically self-consistent, ionization, diffusion, electron attachment, recombination, dust charge variation, and dissipation due to electron and ion elastic collisions with neutrals and fine particles, as well as charging collisions with the dust, must be accounted for.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Safety at railway level crossings (RLX) is one part of a wider picture of safety within the whole transport system. Governments, the rail industry and road organisations have used a variety of countermeasures for many years to improve RLX safety. New types of interventions are required in order to reduce the number of crashes and associated social costs at railway crossings. This paper presents the results of a large research program which aimed to assess the effectiveness of emerging Intelligent Transport Systems (ITS) interventions, both on-road and in-vehicle based, to improve the safety of car drivers at RLXs in Australia. The three most promising technologies selected from the literature review and focus groups were tested in an advanced driving simulator to provide a detailed assessment of their effects on driver behaviour. The three interventions were: (i) in-vehicle visual warning using a GPS/smartphone navigation-like system, (ii) in-vehicle audio warning and; (iii) on-road intervention known as valet system (warning lights on the road surface activated as a train approaches). The effects of these technologies on 57 participants were assessed in a systematic approach focusing on the safety of the intervention, effects on the road traffic around the crossings and driver’s acceptance of the technology. Given that the ITS interventions were likely to provide a benefit by improving the driver’s awareness of the crossing status in low visibility conditions, such conditions were investigated through curves in the track before arriving at the crossing. ITS interventions were also expected to improve driver behaviour at crossings with high traffic (blocking back issue), which were also investigated at active crossings. The key findings are: (i) interventions at passive crossings are likely to provide safety benefits; (ii) the benefits of ITS interventions on driver behaviour at active crossings are limited; (iii) the trialled ITS interventions did not show any issues in terms of driver distraction, driver acceptance or traffic delays; (iv) these interventions are easy to use, do not increase driver workload substantially; (v) participants’ intention to use the technology is high and; (vi) participants saw most value in succinct messages about approaching trains as opposed to knowing the RLX locations or the imminence of a collision with a train.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Agriculture is responsible for a significant proportion of total anthropogenic greenhouse gas emissions (perhaps 18% globally), and therefore has the potential to contribute to efforts to reduce emissions as a means of minimising the risk of dangerous climate change. The largest contributions to emissions are attributed to ruminant methane production and nitrous oxide from animal waste and fertilised soils. Further, livestock, including ruminants, are an important component of global and Australian food production and there is a growing demand for animal protein sources. At the same time as governments and the community strengthen objectives to reduce greenhouse gas emissions, there are growing concerns about global food security. This paper provides an overview of a number of options for reducing methane and nitrous oxide emissions from ruminant production systems in Australia, while maintaining productivity to contribute to both objectives. Options include strategies for feed modification, animal breeding and herd management, rumen manipulation and animal waste and fertiliser management. Using currently available strategies, some reductions in emissions can be achieved, but practical commercially available techniques for significant reductions in methane emissions, particularly from extensive livestock production systems, will require greater time and resource investment. Decreases in the levels of emissions from these ruminant systems (i.e., the amount of emissions per unit of product such as meat) have already been achieved. However, the technology has not yet been developed for eliminating production of methane from the rumen of cattle and sheep digesting the cellulose and lignin-rich grasses that make up a large part of the diet of animals grazing natural pastures, particularly in arid and semi-arid grazing lands. Nevertheless, the abatement that can be achieved will contribute significantly towards reaching greenhouse gas emissions reduction targets and research will achieve further advances.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The one-step preparation of highly anisotropic polymer semiconductor thin films directly from solution is demonstrated. The conjugated polymer poly(3-hexylthiophene) (P3HT) as well as P3HT:fullerene bulk-heterojunction blends can be spin-coated from a mixture of the crystallizable solvent 1,3,5-trichlorobenzene (TCB) and a second carrier solvent such as chlorobenzene. Solidification is initiated by growth of macroscopic TCB spherulites followed by epitaxial crystallization of P3HT on TCB crystals. Subsequent sublimation of TCB leaves behind a replica of the original TCB spherulites. Thus, highly ordered thin films are obtained, which feature square-centimeter-sized domains that are composed of one spherulite-like structure each. A combination of optical microscopy and polarized photoluminescence spectroscopy reveals radial alignment of the polymer backbone in case of P3HT, whereas P3HT:fullerene blends display a tangential orientation with respect to the center of spherulite-like structures. Moreover, grazing-incidence wide-angle X-ray scattering reveals an increased relative degree of crystallinity and predominantly flat-on conformation of P3HT crystallites in the blend. The use of other processing methods such as dip-coating is also feasible and offers uniaxial orientation of the macromolecule. Finally, the applicability of this method to a variety of other semi-crystalline conjugated polymer systems is established. Those include other poly(3-alkylthiophene)s, two polyfluorenes, the low band-gap polymer PCPDTBT, a diketopyrrolopyrrole (DPP) small molecule as well as a number of polymer:fullerene and polymer:polymer blends. Macroscopic spherulite-like structures of the conjugated polymer poly(3-hexylthiophene) (P3HT) grow directly during spin-coating. This is achieved by processing P3HT or P3HT:fullerene bulk heterojunction blends from a mixture of the crystallizable solvent 1,3,5-trichlorobenzene and a second carrier solvent such as chlorobenzene. Epitaxial growth of the polymer on solidified solvent crystals gives rise to circular-symmetric, spherulite-like structures that feature a high degree of anisotropy.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

"The 3rd edition of this classic book offers practitioners, researchers and students a comprehensive introduction to, and overview of, career theory; introduces the Systems Theory Framework of career development; and demonstrates its considerable contemporary and innovative application to practice. A number of authors have identified the framework as one of a small number of significant innovations in the career development literature. The Systems Theory Framework of career development was developed to provide coherence to the career development field by providing a comprehensive conceptualisation of the many existing theories and concepts relevant to understanding career development. It is not designed to be a theory of career development; rather systems theory is introduced as the basis for an overarching, or metatheoretical, framework within which all concepts of career development, described in the plethora of career theories, can be usefully positioned and utilised in both theory and practice. It has been applied to the career development of children, adolescents and women. Since its first publication, the Systems Theory Framework has been the basis of numerous publications focusing on theoretical application and integration, practice and research, with a growing number of these by authors other than the framework developers. Its application across cultures also has been emphasised. The theoretical and practical unity of the Systems Theory Framework makes this book a worthy addition to the professional libraries of practitioners, researchers and students, new to, or experienced in, the field of career development."--PUBLISHER WEBSITE