385 resultados para PP-MA
em Queensland University of Technology - ePrints Archive
Resumo:
As a Lecturer of Animation History and 3D Computer Animator, I received a copy of Moving Innovation: A History of Computer Animation by Tom Sito with an element of anticipation in the hope that this text would clarify the complex evolution of Computer Graphics (CG). Tom Sito did not disappoint, as this text weaves together the multiple development streams and convergent technologies and techniques throughout history that would ultimately result in modern CG. Universities now have students who have never known a world without computer animation and many students are younger than the first 3D CG animated feature film, Toy Story (1996); this text is ideal for teaching computer animation history and, as I would argue, it also provides a model for engaging young students in the study of animation history in general. This is because Sito places the development of computer animation within the context of its pre-digital ancestry and throughout the text he continues to link the discussion to the broader history of animation, its pioneers, technologies and techniques...
Resumo:
The mixed double-decker Eu\[Pc(15C5)4](TPP) (1) was obtained by base-catalysed tetramerisation of 4,5-dicyanobenzo-15-crown-5 using the half-sandwich complex Eu(TPP)(acac) (acac = acetylacetonate), generated in situ, as the template. For comparative studies, the mixed triple-decker complexes Eu2\[Pc(15C5)4](TPP)2 (2) and Eu2\[Pc(15C5)4]2(TPP) (3) were also synthesised by the raise-by-one-story method. These mixed ring sandwich complexes were characterised by various spectroscopic methods. Up to four one-electron oxidations and two one-electron reductions were revealed by cyclic voltammetry (CV) and differential pulse voltammetry (DPV). As shown by electronic absorption and infrared spectroscopy, supramolecular dimers (SM1 and SM3) were formed from the corresponding double-decker 1 and triple-decker 3 in the presence of potassium ions in MeOH/CHCl3.
Resumo:
The electrochemical characteristics of a series of heteroleptic tris(phthalocyaninato) complexes with identical rare earths or mixed rare earths (Pc)M(OOPc)M(OOPc) [M = Eu...Lu, Y; H2Pc = unsubstituted phthalocyanine, H2(OOPc) = 3,4,12,13,21,22,30,31-octakis(octyloxy)phthalocyanine] and (Pc)Eu(OOPc)Er(OOPc) have been recorded and studied comparatively by cyclic voltammetry (CV) and differential pulse voltammetry (DPV) in CH2Cl2 containing 0.1 M tetrabutylammonium perchlorate (TBAP). Up to five quasi-reversible one-electron oxidations and four one-electron reductions have been revealed. The half-wave potentials of the first, second and fifth oxidations depend on the size of the metal center, but the fifth changes in the opposite direction to that of the first two. Moreover, the difference in redox potentials of the first oxidation and first reduction for (Pc)M(OOPc)M(OOPc), 0.85−0.98 V, also decreases linearly along with decreasing rare earth ion radius, clearly showing the rare earth ion size effect and indicating enhanced π−π interactions in the triple-deckers connected by smaller lanthanides. This order follows the red-shift seen in the lowest energy band of triple-decker compounds. The electronic differences between the lanthanides and yttrium are more apparent for triple-decker sandwich complexes than for the analogous double-deckers. By comparing triple-decker, double-decker and mononuclear [ZnII] complexes containing the OOPc ligand, the HOMO−LUMO gap has been shown to contract approximately linearly with the number of stacked phthalocyanine ligands.
Resumo:
The time for conducting Preventive Maintenance (PM) on an asset is often determined using a predefined alarm limit based on trends of a hazard function. In this paper, the authors propose using both hazard and reliability functions to improve the accuracy of the prediction particularly when the failure characteristic of the asset whole life is modelled using different failure distributions for the different stages of the life of the asset. The proposed method is validated using simulations and case studies.
Resumo:
The infrared (IR) spectroscopic data for a series of eleven heteroleptic bis(phthalocyaninato) rare earth complexes MIII(Pc)[Pc(α-OC5H11)4] (M = Sm–Lu, Y) [H2Pc = unsubstituted phthalocyanine, H2Pc(α-OC5H11)4 = 1,8,15,22-tetrakis(3-pentyloxy)phthalocyanine] have been collected with 2 cm−1 resolution. Raman spectroscopic properties in the range of 500–1800 cm−1 for these double-decker molecules have also been comparatively studied using laser excitation sources emitting at 632.8 and 785 nm. Both the IR and Raman spectra for M(Pc)[Pc(α-OC5H11)4] are more complicated than those of homoleptic bis(phthalocyaninato) rare earth analogues due to the decreased molecular symmetry of these double-decker compounds, namely C4. For this series, the IR Pc√− marker band appears as an intense absorption at 1309–1317 cm−1, attributed to the pyrrole stretching. With laser excitation at 632.8 nm, Raman vibrations derived from isoindole ring and aza stretchings in the range of 1300–1600 cm−1 are selectively intensified. In contrast, when excited with laser radiation of 785 nm, the ring radial vibrations of isoindole moieties and dihedral plane deformations between 500 and 1000 cm−1 for M(Pc)[Pc(α-OC5H11)4] intensify to become the strongest scatterings. Both techniques reveal that the frequencies of pyrrole stretching, isoindole breathing, isoindole stretchings, aza stretchings and coupling of pyrrole and aza stretchings depend on the rare earth ionic size, shifting to higher energy along with the lanthanide contraction due to the increased ring-ring interaction across the series. The assignments of the vibrational bands for these compounds have been made and discussed in relation to other unsubstituted and substituted bis(phthalocyaninato) rare earth analogues, such as M(Pc)2 and M(OOPc)2 [H2OOPc = 2,3,9,10,16,17,23,24-octakis(octyloxy)phthalocyanine].
Resumo:
We present the first detailed application of Meadows’s cost-based modelling framework to the analysis of JFK, an Internet key agreement protocol. The analysis identifies two denial of service attacks against the protocol that are possible when an attacker is willing to reveal the source IP address. The first attack was identified through direct application of a cost-based modelling framework, while the second was only identified after considering coordinated attackers. Finally, we demonstrate how the inclusion of client puzzles in the protocol can improve denial of service resistance against both identified attacks.
Resumo:
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and network card addresses, and rely on loosely coupled state machines. Even the new WLAN security standard - IEEE 802.11i does not address these issues. In our previous work, we proposed two new techniques for improving detection of session hijacking attacks that are passive, computationally inexpensive, reliable, and have minimal impact on network performance. These techniques utilise unspoofable characteristics from the MAC protocol and the physical layer to enhance confidence in the intrusion detection process. This paper extends our earlier work and explores usability, robustness and accuracy of these intrusion detection techniques by applying them to eight distinct test scenarios. A correlation engine has also been introduced to maintain the false positives and false negatives at a manageable level. We also explore the process of selecting optimum thresholds for both detection techniques. For the purposes of our experiments, Snort-Wireless open source wireless intrusion detection system was extended to implement these new techniques and the correlation engine. Absence of any false negatives and low number of false positives in all eight test scenarios successfully demonstrated the effectiveness of the correlation engine and the accuracy of the detection techniques.
Resumo:
Supervisory Control And Data Acquisition (SCADA) systems are widely used in the management of critical infrastructure such as electricity and water distrubution systems. Currently there is little understanding of how to best protect SCADA systems from malicious attacks. We review the constraints and requirements for SCADA security and propose a suitable architecture (SKMA) for secure SCADA communications. The architecture includes a proposed key management protocol (SKMP). We compare the architecture with a previous proposal from Sandia Labs.
Resumo:
five:fashion musings is an upcoming 2009 publicaton to celebrate the fashion discipline's five-year milestone at the Queensland Unviesity of Technology. it represents a body of work by fashion practitioners, aceademic and educators commissioned to explore their research in fashion theory, practice and pedogogy through five key themes.
Resumo:
In studies of media industries, too much attention has been paid to providers and firms, too little to consumers and markets. But with user-created content, the question first posed more than a generation ago by the uses & gratifications method and taken up by semiotics and the active audience tradition (‘what do audiences do with media?’), has resurfaced with renewed force. What’s new is that where this question (of what the media industries and audiences did with each other) used to be individualist and functionalist, now, with the advent of social networks using Web 2.0 affordances, it can be re-posed at the level of systems and populations as well.
Resumo:
Designers and artists have integrated recent advances in interactive, tangible and ubiquitous computing technologies to create new forms of interactive environments in the domains of work, recreation, culture and leisure. Many designs of technology systems begin with the workplace in mind, and with function, ease of use, and efficiency high on the list of priorities. [1] These priorities do not fit well with works designed for an interactive art environment, where the aims are many, and where the focus on utility and functionality is to support a playful, ambiguous or even experimental experience for the participants. To evaluate such works requires an integration of art-criticism techniques with more recent Human Computer Interaction (HCI) methods, and an understanding of the different nature of engagement in these environments. This paper begins a process of mapping a set of priorities for amplifying engagement in interactive art installations. I first define the concept of ludic engagement and its usefulness as a lens for both design and evaluation in these settings. I then detail two fieldwork evaluations I conducted within two exhibitions of interactive artworks, and discuss their outcomes and the future directions of this research.
Resumo:
This chapter revisits the concept of the ‘bardic function’ (Fiske & Hartley 1978), using historical analysis of the oral bardic institutions to re-theorise it for the era of interactive media and digital storytelling. It shows how ‘representative’ storytelling has transformed into self-representation, and proposes that the ‘bardic function’ can be divided into three types: representative (the ‘Taliesin function’); pedagogic (the ‘Gandalf function’); and self-organised (the ‘eisteddfod function’).