785 resultados para interface engineering
Resumo:
This research explores gestures used in the context of activities in the workplace and in everyday life in order to understand requirements and devise concepts for the design of gestural information applicances. A collaborative method of video interaction analysis devised to suit design explorations, the Video Card Game, was used to capture and analyse how gesture is used in the context of six different domains: the dentist's office; PDA and mobile phone use; the experimental biologist's laboratory; a city ferry service; a video cassette player repair shop; and a factory flowmeter assembly station. Findings are presented in the form of gestural themes, derived from the tradition of qualitative analysis but bearing some similarity to Alexandrian patterns. Implications for the design of gestural devices are discussed.
Resumo:
This article examines the relevance of James Grunig and Todd Hunt’s (1984) theories to public relations practitioners’ roles in south east Queensland schools. It focuses in particular on the two-way symmetric model in this context. The geographical boundaries of the research mean that this article is intended primarily as an exploratory, descriptive analysis of a specific area rather than an exhaustive treatise on the general topic of public relations in Australian schools. However, it is hoped that it will prove useful in identifying bases for further study and discussion.
Resumo:
In this paper we explore what is required of a User Interface (UI) design in order to encourage participation around playing and creating Location-Based Games (LBGs). To base our research in practice, we present Cipher Cities, a web based system. Through the design of this system, we investigate how UI design can provide tools for complex content creation to compliment and encourage the use of mobile phones for designing, distributing, and playing LBGs. Furthermore we discuss how UI design can promote and support socialisation around LBGs through the design of functional interface components and services such as groups, user profiles, and player status listings.
Resumo:
There is a mismatch between the kinds of movements used in gesture interfaces and our existing theoretical understandings of gesture. We need to re-examine the assumptions of gesture research and develop theory more suited to gesture interface design. In addition to improved theory, we need to develop ways for participants in the process of design to adapt, extend and develop theory for their own design contexts. Gesture interface designers should approach theory as a contingent resource for design actions that is responsive to the needs of the design process.
Resumo:
Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.
Resumo:
Providing support for reversible transformations as a basis for round-trip engineering is a significant challenge in model transformation research. While there are a number of current approaches, they require the underlying transformation to exhibit an injective behaviour when reversing changes. This however, does not serve all practical transformations well. In this paper, we present a novel approach to round-trip engineering that does not place restrictions on the nature of the underlying transformation. Based on abductive logic programming, it allows us to compute a set of legitimate source changes that equate to a given change to the target model. Encouraging results are derived from an initial prototype that supports most concepts of the Tefkat transformation language
Resumo:
All relevant international standards for determining if a metallic rod is flammable in oxygen utilize some form of “promoted ignition” test. In this test, for a given pressure, an overwhelming ignition source is coupled to the end of the test sample and the designation flammable or nonflammable is based upon the amount burned, that is, a burn criteria. It is documented that (1) the initial temperature of the test sample affects the burning of the test sample both (a) in regards to the pressure at which the sample will support burning (threshold pressure) and (b) the rate at which the sample is melted (regression rate of the melting interface); and, (2) the igniter used affects the test sample by heating it adjacent to the igniter as ignition occurs. Together, these facts make it necessary to ensure, if a metallic material is to be considered flammable at the conditions tested, that the burn criteria will exclude any region of the test sample that may have undergone preheating during the ignition process. A two-dimensional theoretical model was developed to describe the transient heat transfer occurring and resultant temperatures produced within this system. Several metals (copper, aluminum, iron, and stainless steel) and ignition promoters (magnesium, aluminum, and Pyrofuze®) were evaluated for a range of oxygen pressures between 0.69 MPa (100 psia) and 34.5 MPa (5,000 psia). A MATLAB® program was utilized to solve the developed model that was validated against (1) a published solution for a similar system and (2) against experimental data obtained during actual tests at the National Aeronautics and Space Administration White Sands Test Facility. The validated model successfully predicts temperatures within the test samples with agreement between model and experiment increasing as test pressure increases and/or distance from the promoter increases. Oxygen pressure and test sample thermal diffusivity were shown to have the largest effect on the results. In all cases evaluated, there is no significant preheating (above about 38°C/100°F) occurring at distances greater than 30 mm (1.18 in.) during the time the ignition source is attached to the test sample. This validates a distance of 30 mm (1.18 in.) above the ignition promoter as a burn length upon which a definition of flammable can be based for inclusion in relevant international standards (that is, burning past this length will always be independent of the ignition event for the ignition promoters considered here. KEYWORDS: promoted ignition, metal combustion, heat conduction, thin fin, promoted combustion, burn length, burn criteria, flammability, igniter effects, heat affected zone.
Resumo:
Objectives The objectives of this project were two-fold: • Assess the ease with which current architectural CAD systems supported the use ofparametric descriptions in defining building shape, engineering system performance and cost at the early stages of building design; • Assess the feasibility of implementing a software decision support system that allowed designers to trade-off the characteristics and configuration of various engineering systems to move towards a “global optimum” rather than considering each system in isolation and expecting humans to weigh up all of the costs and benefits. The first stage of the project consisted of using four different CAD systems to define building shells (envelopes) with different usages. These models were then exported into a shared database using the IFC information exchange specifications. The second stage involved the implementation of small computer programs that were able to estimate relevant system parameters based on performance requirements and the constraints imposed by the other systems. These are presented in a unified user interface that extracts the appropriate building shape parameters from the shared database Note that the term parametric in this context refers to the relationships among and between all elements of the building model - not just geometric associations - which will enable the desired coordination.
Resumo:
Properly designed decision support environments encourage proactive and objective decision making. The work presented in this paper inquires into developing a decision support environment and a tool to facilitate objective decision making in dealing with road traffic noise. The decision support methodology incorporates traffic amelioration strategies both within and outside the road reserve. The project is funded by the CRC for Construction Innovation and conducted jointly by the RMIT University and the Queensland Department of Main Roads (MR) in collaboration with the Queensland Department of Public Works, Arup Pty Ltd., and the Queensland University of Technology. In this paper, the proposed decision support framework is presented in the way of a flowchart which enabled the development of the decision support tool (DST). The underpinning concept is to establish and retain an information warehouse for each critical road segment (noise corridor) for a given planning horizon. It is understood that, in current practice, some components of the approach described are already in place but not fully integrated and supported. It provides an integrated user-friendly interface between traffic noise modeling software, noise management criteria and cost databases.
Resumo:
Engineering education is underrepresented in Australia at the primary, middle school and high school levels. Understanding preservice teachers’ preparedness to be involved in engineering will be important for developing an engineering curriculum. This study administered a literature-based survey to 36 preservice teachers, which gathered data about their perceptions of engineering and their predispositions for teaching engineering. Findings indicated that the four constructs associated with the survey had acceptable Cronbach alpha scores (i.e., personal professional attributes .88, student motivation .91, pedagogical knowledge .91, and fused curricula .89). However, there was no “disagree” or “strongly disagree” response greater than 22% for any of the 25 survey items. Generally, these preservice teachers indicated predispositions for teaching engineering in the middle school. Extensive scaffolding and support with education programs will assist preservice teachers to develop confidence in this field. Governments and education departments need to recognise the importance of engineering education, and universities must take a stronger role in developing engineering education curricula.
Resumo:
There has been increased research interest in Co-operative Vehicle Infrastructure Systems (CVIS) from the eld of Intelligent Transport Systems (ITS). However most of the research have focused on the engineering aspects and overlooked their relevance to the drivers' behaviour. This paper argues that the priority for cooperative systems is the need to improve drivers decision making and reduce drivers' crash risk exposure to improve road safety. Therefore any engineering solutions need to be considered in conjuction with traffic psychology theories on driver behaviour. This paper explores the advantages and limitations of existing systems and emphasizes various theoretical issues that arise in articulating cooperative systems' capabilities and drivers' behaviour.
Resumo:
Scanning Tunneling Spectroscopy was performed on a (15,0) single wall carbon nanotube partially wrapped by Poly(3-hexyl-thiophene). On the bare nanotube section, the local density of states is in good agreement with the theoretical model based on local density approximation and remarkably is not perturbed by the polymer wrapping. On the coiled section, a rectifying current-voltage characteristic has been observed along with the charge transfer from the polymer to the nanotube. The electron transfer from Poly(3-hexyl-thiophene) to metallic nanotube was previously theoretically proposed and contributes to the presence of the Schottky barrier at the interface responsible for the rectifying behavior.