486 resultados para Computer Literacy
Resumo:
Computer vision is much more than a technique to sense and recover environmental information from an UAV. It should play a main role regarding UAVs’ functionality because of the big amount of information that can be extracted, its possible uses and applications, and its natural connection to human driven tasks, taking into account that vision is our main interface to world understanding. Our current research’s focus lays on the development of techniques that allow UAVs to maneuver in spaces using visual information as their main input source. This task involves the creation of techniques that allow an UAV to maneuver towards features of interest whenever a GPS signal is not reliable or sufficient, e.g. when signal dropouts occur (which usually happens in urban areas, when flying through terrestrial urban canyons or when operating on remote planetary bodies), or when tracking or inspecting visual targets—including moving ones—without knowing their exact UMT coordinates. This paper also investigates visual serving control techniques that use velocity and position of suitable image features to compute the references for flight control. This paper aims to give a global view of the main aspects related to the research field of computer vision for UAVs, clustered in four main active research lines: visual serving and control, stereo-based visual navigation, image processing algorithms for detection and tracking, and visual SLAM. Finally, the results of applying these techniques in several applications are presented and discussed: this study will encompass power line inspection, mobile target tracking, stereo distance estimation, mapping and positioning.
Resumo:
Given identified synergies between information use and health status greater understanding is needed about how people use information to learn about their health. This article presents the findings of preliminary research into health information literacy which sought to explore how this is phenomenon is experienced among ageing Australians. Analysis of data from semi-structured interviews has revealed six different ways ageing Australians experience using information to learn about their health within one aspect of community life. Health information literacy is a new terrain for information literacy research endeavours and one which warrants further attention by the profession to foster and promote within the community.
Resumo:
Computer forensics is the process of gathering and analysing evidence from computer systems to aid in the investigation of a crime. Typically, such investigations are undertaken by human forensic examiners using purpose-built software to discover evidence from a computer disk. This process is a manual one, and the time it takes for a forensic examiner to conduct such an investigation is proportional to the storage capacity of the computer's disk drives. The heterogeneity and complexity of various data formats stored on modern computer systems compounds the problems posed by the sheer volume of data. The decision to undertake a computer forensic examination of a computer system is a decision to commit significant quantities of a human examiner's time. Where there is no prior knowledge of the information contained on a computer system, this commitment of time and energy occurs with little idea of the potential benefit to the investigation. The key contribution of this research is the design and development of an automated process to describe a computer system and its activity for the purposes of a computer forensic investigation. The term proposed for this process is computer profiling. A model of a computer system and its activity has been developed over the course of this research. Using this model a computer system, which is the subj ect of investigation, can be automatically described in terms useful to a forensic investigator. The computer profiling process IS resilient to attempts to disguise malicious computer activity. This resilience is achieved by detecting inconsistencies in the information used to infer the apparent activity of the computer. The practicality of the computer profiling process has been demonstrated by a proof-of concept software implementation. The model and the prototype implementation utilising the model were tested with data from real computer systems. The resilience of the process to attempts to disguise malicious activity has also been demonstrated with practical experiments conducted with the same prototype software implementation.
Resumo:
Digital forensics investigations aim to find evidence that helps confirm or disprove a hypothesis about an alleged computer-based crime. However, the ease with which computer-literate criminals can falsify computer event logs makes the prosecutor's job highly challenging. Given a log which is suspected to have been falsified or tampered with, a prosecutor is obliged to provide a convincing explanation for how the log may have been created. Here we focus on showing how a suspect computer event log can be transformed into a hypothesised actual sequence of events, consistent with independent, trusted sources of event orderings. We present two algorithms which allow the effort involved in falsifying logs to be quantified, as a function of the number of `moves' required to transform the suspect log into the hypothesised one, thus allowing a prosecutor to assess the likelihood of a particular falsification scenario. The first algorithm always produces an optimal solution but, for reasons of efficiency, is suitable for short event logs only. To deal with the massive amount of data typically found in computer event logs, we also present a second heuristic algorithm which is considerably more efficient but may not always generate an optimal outcome.
Resumo:
Traditional media are under assault from digital technologies. Online advertising is eroding the financial basis of newspapers and television, demarcations between different forms of media are fading, and audiences are fragmenting. We can podcast our favourite radio show, data accompanies television programs, and we catch up with newspaper stories on our laptops. Yet mainstream media remain enormously powerful. The Media and Communications in Australia offers a systematic introduction to this dynamic field. Fully updated and revised to take account of recent developments, this third edition outlines the key media industries and explains how communications technologies are impacting on them. It provides a thorough overview of the main approaches taken in studying the media, and includes new chapters on social media, gaming, telecommunications, sport and cultural diversity. With contributions from some of Australia's best researchers and teachers in the field, The Media and Communications in Australia is the most comprehensive and reliable introduction to media and communications available. It is an ideal student text, and a reference for teachers of media and anyone interested in this influential industry.
Resumo:
This paper discusses the use of models in automatic computer forensic analysis, and proposes and elaborates on a novel model for use in computer profiling, the computer profiling object model. The computer profiling object model is an information model which models a computer as objects with various attributes and inter-relationships. These together provide the information necessary for a human investigator or an automated reasoning engine to make judgements as to the probable usage and evidentiary value of a computer system. The computer profiling object model can be implemented so as to support automated analysis to provide an investigator with the information needed to decide whether manual analysis is required.
Resumo:
This review chapter provides an overview of English language literacy education in the contexts of cultural and economic globalisation. Drawing case study examples of India and China, the authors outline three complementary models: the development paradigm, the hegemony paradigm and the new literacies paradigm. The analysis focuses on effects of the spread of English on vernacular languages and the non-synchronous issues raised by digital production cultures. Noting the difficulties of education systems in contending with new literacies - it argues for the reframing of transnational relations, global material conditions and new communications technologies as the objects of critical literacy education.
Resumo:
This article has been edited from a transcript of the keynote address to the combined ALEA/MTE National Conference, Hobart, Tasmania, August 2001. In this talk Allan reflects on some of the difficulties facing makers of literacy policy in 'New Times'. His reflections are informed by some important research that is having an impact· on literacy teaching in Australia and he raises various issues, ranging from what he sees as a 'dumbing down' of curriculum, to addressing the needs of'at risk' students, to issues of lifelong education in a rapidly changing world.
Resumo:
An interview on literacy at McGill University, 2003.
Resumo:
Understanding the future development of interaction design as it applies to learning and training scenarios is crucial to effective development of curriculum and appropriate application of social and mobile communication technologies. As Attewell & Saville-Smith have recognised (2004), the use of mobile communication devices for improved literacy and numeracy is a desirable prospect among young people who represent the average age of undergraduate students. Further, with the growing penetration of broadband internet access, the ubiquity of wireless access in educational locations, the rise of ultra-mobile portable computers and the proliferation of social software applications in educational contexts, there are a growing number of channels for facilitation of learning. Nevertheless, there has been insufficient consideration of the interaction design issues that affect the effective facilitation of such learning. This paper contends that there is a clear need to design mobile and social learning to accommodate the benefits of these diverse channels for interaction. Additionally, there is a need to implement suitable testing processes to ensure participants in mobile and social learning are contributing effectively and maximising their learning. Through the presentation of case studies in mobile and social learning, the paper attempts to demonstrate how considered interaction design techniques can improve the effectiveness of new learning channels.