216 resultados para Assurance automobile


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The development of the Learning and Teaching Academic Standards Statement for Architecture (the Statement) centred on requirements for the Master of Architecture and proceeded alongside similar developments in the building and construction discipline under the guidance and support of the Australian Deans of Built Environment and Design (ADBED). Through their representation of Australian architecture programs, ADBED have provided high-level leadership for the Learning and Teaching Academic Standards Project in Architecture (LTAS Architecture). The threshold learning outcomes (TLOs), the description of the nature and extent of the discipline, and accompanying notes were developed through wide consultation with the discipline and profession nationally. They have been considered and debated by ADBED on a number of occasions and have, in their fi nal form, been strongly endorsed by the Deans. ADBED formed the core of the Architecture Reference Group (chaired by an ADBED member) that drew together representatives of every peak organisation for the profession and discipline in Australia. The views of the architectural education community and profession have been provided both through individual submissions and the voices of a number of peak bodies. Over two hundred individuals from the practising profession, the academic workforce and the student cohort have worked together to build consensus about the capabilities expected of a graduate of an Australian Master of Architecture degree. It was critical from the outset that the Statement should embrace the wisdom of the greater ‘tribe’, should ensure that graduates of the Australian Master of Architecture were eligible for professional registration and, at the same time, should allow for scope and diversity in the shape of Australian architectural education. A consultation strategy adopted by the Discipline Scholar involved meetings and workshops in Perth, Melbourne, Sydney, Canberra and Brisbane. Stakeholders from all jurisdictions and most universities participated in the early phases of consultation through a series of workshops that concluded late in October 2010. The Draft Architecture Standards Statement was formed from these early meetings and consultation in respect of that document continued through early 2011. This publication represents the outcomes of work to establish an agreed standards statement for the Master of Architecture. Significant further work remains to ensure the alignment of professional accreditation and recognition procedures with emerging regulatory frameworks cascading from the establishment of the Tertiary Education Quality and Standards Agency (TEQSA). The Australian architecture community hopes that mechanisms can be found to integrate TEQSA’s quality assurance purpose with well-established and understood systems of professional accreditation to ensure the good standing of Australian architectural education into the future. The work to build renewed and integrated quality assurance processes and to foster the interests of this project will continue, for at least the next eighteen months, under the auspices of Australian Learning and Teaching Council (ALTC)-funded Architecture Discipline Network (ADN), led by ADBED and Queensland University of Technology. The Discipline Scholar gratefully acknowledges the generous contributions given by those in stakeholder communities to the formulation of the Statement. Professional and academic colleagues have travelled and gathered to shape the Standards Statement. Debate has been vigorous and spirited and the Statement is rich with the purpose, critical thinking and good judgement of the Australian architectural education community. The commitments made to the processes that have produced this Statement reflect a deep and abiding interest by the constituency in architectural education. This commitment bodes well for the vibrancy and productivity of the emergent Architecture Discipline Network (ADN). Endorsement, in writing, was received from the Australian Institute of Architects National Education Committee (AIA NEC): The National Education Committee (NEC) of the Australian Institute of Architects thank you for your work thus far in developing the Learning and Teaching Academic Standards for Architecture In particular, we acknowledge your close consultation with the NEC on the project along with a comprehensive cross-section of the professional and academic communities in architecture. The TLOs with the nuanced levels of capacities – to identify, develop, explain, demonstrate etc – are described at an appropriate level to be understood as minimum expectations for a Master of Architecture graduate. The Architects Accreditation Council of Australia (AACA) has noted: There is a clear correlation between the current processes for accreditation and what may be the procedures in the future following the current review. The requirement of the outcomes as outlined in the draft paper to demonstrate capability is an appropriate way of expressing the measure of whether the learning outcomes have been achieved. The measure of capability as described in the outcome statements is enhanced with explanatory descriptions in the accompanying notes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Assurance of learning (AoL) is a predominant feature in both quality assurance and quality enhancement in higher education. The process may be used for program development, and to inform external accreditation and evaluation bodies. However, there is an obvious challenge in trying to get academic staff to buy into the benefits of the AoL process. This project conducted an audit across 25 Australian Business Schools. The majority of those interviewed stated that academic staff considered AoL to be extra work and viewed the process as a box ticking exercise for external bodies rather than sound educational practice. A change management process is required to promote the necessary cultural change to embed AoL into practice. This paper showcases some of the educational leadership strategies that have been successfully implemented across Australia to foster staff engagement in the AoL process. These include: strong senior management commitment and leadership demonstrating a constant and high level drive for staff engagement until AoL becomes an institutional norm; developing leadership and champions among unit and program level staff, to share practices and promote the benefits that come from engaging in the process; providing professional development opportunities to discuss and resolve difficulties and tensions around AoL; demonstrating success and effectiveness by selling staff on the evidence that AoL makes a difference; and making the process inclusive with academics collaborating in the development and implementation of the process.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We investigate existing cloud storage schemes and identify limitations in each one based on the security services that they provide. We then propose a new cloud storage architecture that extends CloudProof of Popa et al. to provide availability assurance. This is accomplished by incorporating a proof of storage protocol. As a result, we obtain the first secure storage cloud computing scheme that furnishes all three properties of availability, fairness and freshness.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cloud computing has emerged as a major ICT trend and has been acknowledged as a key theme of industry by prominent ICT organisations. However, one of the major challenges that face the cloud computing concept and its global acceptance is how to secure and protect the data that is the property of the user. The geographic location of cloud data storage centres is an important issue for many organisations and individuals due to the regulations and laws that require data and operations to reside in specific geographic locations. Thus, data owners may need to ensure that their cloud providers do not compromise the SLA contract and move their data into another geographic location. This paper introduces an architecture for a new approach for geographic location assurance, which combines the proof of storage protocol (POS) and the distance-bounding protocol. This allows the client to check where their stored data is located, without relying on the word of the cloud provider. This architecture aims to achieve better security and more flexible geographic assurance within the environment of cloud computing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Research has demonstrated the benefits that clothing incorporating retroreflective markers can provide in significantly improving visibility and reducing accidents, especially at night. Adding biomotion markings to standard vests can enhance the night-time conspicuity of roadway workers by capitalizing on perceptual capabilities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper considers the conditions that are necessary at system and local levels for teacher assessment to be valid, reliable and rigorous. With sustainable assessment cultures as a goal, the paper examines how education systems can support local level efforts for quality learning and dependable teacher assessment. This is achieved through discussion of relevant research and consideration of a case study involving an evaluation of a cross-sectoral approach to promoting confidence in school-based assessment in Queensland, Australia. Building on the reported case study, essential characteristics for developing sustainable assessment cultures are presented, including: leadership in learning; alignment of curriculum, pedagogy and assessment; the design of quality assessment tasks and accompanying standards, and evidence-based judgement and moderation. Taken together, these elements constitute a new framework for building assessment capabilities and promoting quality assurance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents an approach to derive requirements for an avionics architecture that provides onboard sense-and-avoid and autonomous emergency forced landing capabilities to a UAS. The approach is based on two design paradigms that (1) derive requirements analyzing the common functionality between these two functions to then derive requirements for sensors, computing capability, interfaces, etc. (2) consider the risk and safety mitigation associated with these functions to derive certification requirements for the system design. We propose to use the Aircraft Certification Matrix (ACM) approach to tailor the system Development Assurance Levels (DAL) and architecture requirements in accordance with acceptable risk criteria. This architecture is developed under the name “Flight Guardian”. Flight Guardian is an avionics architecture that integrates common sensory elements that are essential components of any UAS that is required to be dependable. The Flight Guardian concept is also applicable to conventionally piloted aircraft, where it will serve to reduce cockpit workload.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It is imperative that we consider the use of current and emerging technologies in terms of the nature of our learners, the physical environment of the lecture theatre, and how technology may help to support appropriate pedagogies that facilitate the capturing of student attention in active engaging learning experiences. It is argued that a re-evaluation of pedagogy is required to address the tech-savy traits of the 21st century learner and the extent to which their mobile devices are capable of not only distracting them from learning but also enhancing face-to-face learning experiences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Management scholars and practitioners emphasize the importance of the size and diversity of a knowledge worker's social network. Constraints on knowledge workers’ time and energy suggest that more is not always better. Further, why and how larger networks contribute to valuable outcomes deserves further understanding. In this study, we offer hypotheses to shed insight on the question of the diminishing returns of large networks and the specific form of network diversity that may contribute to innovative performance among knowledge workers. We tested our hypotheses using data collected from 93 R&D engineers in a Sino-German automobile electronics company located in China. Study findings identified an inflection point, confirming our hypothesis that the size of the knowledge worker's egocentric network has an inverted U-shaped effect on job performance. We further demonstrate that network dispersion richness (the number of cohorts that the focal employee has connections to) rather than network dispersion evenness (equal distribution of ties across the cohorts) has more influence on the knowledge worker's job performance. Additionally, we found that the curvilinear effect of network size is fully mediated by network dispersion richness. Implications for future research on social networks in China and Western contexts are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Airports are currently being pressured to operate in a more environmentally-sensitive manner; as a response, airports have integrated environmental policies into their operations. However, environmental concerns regarding automobile traffic and related emissions have yet to be addressed. While the automobile is the dominant air passenger ground transportation mode at US airports, services facilitating automobile usage including public parking and car rentals are a major airport revenue source. Less than 20 US hub airports have direct access to rail-based transportation modes. New rail transportation projects serving additional airports are either being consideration or under construction. Regardless of whether an airport has direct access to rail-based transportation modes, the air passenger ground transportation modal split at US airports remain low in comparison to those in Asia and Europe. The high cost of providing additional US airports with direct rail connections in an era of severe governmental budgetary cutbacks is making the “build it and they will come” mindset untenable. Governmental policies are but one factor determining whether programs increasing transit usage results in automobile traffic reductions and related emissions. This study reveals that a significant percentage of the busiest US airports do not have policies fostering increases in the air passenger ground transportation modal split. A case study of one US airport is presented that has successfully adopted a transit first policy to achieve a high air passenger ground transportation modal split and facilitate the availability of rail-based transportation services.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The use of Trusted Platform Module (TPM) is be- coming increasingly popular in many security sys- tems. To access objects protected by TPM (such as cryptographic keys), several cryptographic proto- cols, such as the Object Specific Authorization Pro- tocol (OSAP), can be used. Given the sensitivity and the importance of those objects protected by TPM, the security of this protocol is vital. Formal meth- ods allow a precise and complete analysis of crypto- graphic protocols such that their security properties can be asserted with high assurance. Unfortunately, formal verification of these protocols are limited, de- spite the abundance of formal tools that one can use. In this paper, we demonstrate the use of Coloured Petri Nets (CPN) - a type of formal technique, to formally model the OSAP. Using this model, we then verify the authentication property of this protocol us- ing the state space analysis technique. The results of analysis demonstrates that as reported by Chen and Ryan the authentication property of OSAP can be violated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes in detail our Security-Critical Program Analyser (SCPA). SCPA is used to assess the security of a given program based on its design or source code with regard to data flow-based metrics. Furthermore, it allows software developers to generate a UML-like class diagram of their program and annotate its confidential classes, methods and attributes. SCPA is also capable of producing Java source code for the generated design of a given program. This source code can then be compiled and the resulting Java bytecode program can be used by the tool to assess the program's overall security based on our security metrics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Refactoring is a common approach to producing better quality software. Its impact on many software quality properties, including reusability, maintainability and performance, has been studied and measured extensively. However, its impact on the information security of programs has received relatively little attention. In this work, we assess the impact of a number of the most common code-level refactoring rules on data security, using security metrics that are capable of measuring security from the viewpoint of potential information flow. The metrics are calculated for a given Java program using a static analysis tool we have developed to automatically analyse compiled Java bytecode. We ran our Java code analyser on various programs which were refactored according to each rule. New values of the metrics for the refactored programs then confirmed that the code changes had a measurable effect on information security.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent advances in the planning and delivery of radiotherapy treatments have resulted in improvements in the accuracy and precision with which therapeutic radiation can be administered. As the complexity of the treatments increases it becomes more difficult to predict the dose distribution in the patient accurately. Monte Carlo methods have the potential to improve the accuracy of the dose calculations and are increasingly being recognised as the “gold standard” for predicting dose deposition in the patient. In this study, software has been developed that enables the transfer of treatment plan information from the treatment planning system to a Monte Carlo dose calculation engine. A database of commissioned linear accelerator models (Elekta Precise and Varian 2100CD at various energies) has been developed using the EGSnrc/BEAMnrc Monte Carlo suite. Planned beam descriptions and CT images can be exported from the treatment planning system using the DICOM framework. The information in these files is combined with an appropriate linear accelerator model to allow the accurate calculation of the radiation field incident on a modelled patient geometry. The Monte Carlo dose calculation results are combined according to the monitor units specified in the exported plan. The result is a 3D dose distribution that could be used to verify treatment planning system calculations. The software, MCDTK (Monte Carlo Dicom ToolKit), has been developed in the Java programming language and produces BEAMnrc and DOSXYZnrc input files, ready for submission on a high-performance computing cluster. The code has been tested with the Eclipse (Varian Medical Systems), Oncentra MasterPlan (Nucletron B.V.) and Pinnacle3 (Philips Medical Systems) planning systems. In this study the software was validated against measurements in homogenous and heterogeneous phantoms. Monte Carlo models are commissioned through comparison with quality assurance measurements made using a large square field incident on a homogenous volume of water. This study aims to provide a valuable confirmation that Monte Carlo calculations match experimental measurements for complex fields and heterogeneous media.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: Although many studies have shown that high temperatures are associated with an increased risk of mortality and morbidity, there has been little research on managing the process of planned adaptation to alleviate the health effects of heat events and climate change. In particular, economic evaluation of public health adaptation strategies has been largely absent from both the scientific literature and public policy discussion. OBJECTIVES: his paper aims to discuss how public health organizations should implement adaptation strategies, and how to improve the evidence base for policies to protect health from heat events and climate change. DISCUSSION: Public health adaptation strategies to cope with heat events and climate change fall into two categories: reducing the heat exposure and managing the health risks. Strategies require a range of actions, including timely public health and medical advice, improvements to housing and urban planning, early warning systems, and the assurance that health care and social systems are ready to act. Some of these actions are costly, and the implementation should be based on the cost-effectiveness analysis given scarce financial resources. Therefore, research is required not only on the temperature-related health costs, but also on the costs and benefits of adaptation options. The scientific community must ensure that the health co-benefits of climate change policies are recognized, understood and quantified. CONCLUSIONS: The integration of climate change adaptation into current public health practice is needed to ensure they increase future resilience. The economic evaluation of temperature-related health costs and public health adaptation strategies are particularly important for policy decisions.