18 resultados para Stadtbibliothek <Hamburg>Stadtbibliothek <Hamburg>
em Queensland University of Technology - ePrints Archive
Resumo:
Relations between brands and their users continue to be affected by a traditional perspective that sees the producers and consumers of goods and services as inherently different animals. In the emerging information and knowledge economy, and especially in online contexts, this model is no longer sustainable. Instead, spearheaded by the Web 2.0 phenomenon, there is a trend towards the fusing of production and usage as a new, hybrid process of produsage. This presentation presents the key characteristics driving produsage processes, and describes four guiding principles for businesses as they share their brand with users: * Be open. * Seed community processes by providing content and tools. * Support community dynamics and devolve responsibilities. * Don't exploit the community and its work.
Resumo:
Angetrieben und unterstützt durch Web-2.0-Technologien, gibt es heute einen Trend zur Verbindung der Nutzung und Produktion von Inhalten als Produtzung (engl. produsage ). Um dabei die Qualität der erstellten Inhalte und eine nachhaltige Teilnahme der Nutzer sicherzustellen, müsen vier grundlegende Prinzipien eingehalten werden: * Größtmögliche Offenheit. * Ankurbeln der Gemeinschaft durch Inhalte und Hilfsmittel. * Unterstützung der Gruppendynamik und Abtretung von Verantwortung. * Keine Ausbeutung der Gemeinschaft und ihrer Arbeit.
Resumo:
This paper argues for a future-oriented, inclusion of Engineering Model Eliciting Activities (EngMEAs) in elementary mathematics curricula. In EngMEAs students work with meaningful engineering problems that capitalise on and extend their existing mathematics and science learning, to develop, revise and document powerful models, while working in groups. The models developed by six groups of 12-year students in solving the Natural Gas activity are presented. Results showed that student models adequately solved the problem, although student models did not take into account all the data provided. Student solutions varied to the extent students employed the engineering context in their models and to their understanding of the mathematical concepts involved in the problem. Finally, recommendations for implementing EngMEAs and for further research are discussed.
Resumo:
In this paper, we are concerned with the practical implementation of time optimal numerical techniques on underwater vehicles. We briefly introduce the model of underwater vehicle we consider and present the parameters for the test bed ODIN (Omni-Directional Intelligent Navigator). Then we explain the numerical method used to obtain time optimal trajectories with a structure suitable for the implementation. We follow this with a discussion on the modifications to be made considering the characteristics of ODIN. Finally, we illustrate our computations with some experimental results.
Resumo:
Technology-oriented young firms play an important role for innovation and commercialisation of new ideas. These firms are often founded by engineers, scientists or academics who posses great scientific/technological knowledge, but limited know-how in other aspects of managing a business including knowledge management. Successful managing and integrating their specialised knowledge is of particular importance when it comes to developing a new product or process. This article therefore focuses on the particularities of the knowledge management process in technopreneurial firms. Using a qualitative investigation from a sample of Australian SMEs, a number of key observations are derived which show the challenges of managing knowledge and how important knowledge management is as a management tool for R&D and innovation process in technology-oriented SMEs. Findings suggest that knowledge management and integration processes in these firms are very much project focused and mainly based on ad hoc and informal processes and not embedded within the overall organisational routines.
Resumo:
If contemporary artworks are often considered to be puzzles or riddles, then Wilkins Hill take this to a new level. Their recent exhibition Windows impersonating other windows, confronts viewers with an extremely ludic configuration: a spa bath full of almonds, towel racks placed before photos of Martin Heidegger distorted in neat grids, a video of a water tower in a Hamburg park, wooden cut-out speech bubbles and monitors that continuously play interviews with the artists themselves. What does it all mean?
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
Adolescent injury remains a significant public health concern and is often the result of at-risk transport related behaviours. When a person is injured actions taken by bystanders are of crucial importance and timely first aid appears to reduce the severity of some injuries (Hussain & Redmond, 1994). Accordingly, researchers have suggested that first aid training should be more widely available as a potential strategy to reduce injury (Lynch et al., 2006). Further research has identified schools as an ideal setting for learning first aid skills as a means of injury prevention (Maitra, 1997). The current research examines the implications of school based first aid training for young adolescents on injury prevention, particularly relating to transport injuries. First aid training was integrated with peer protection and school connectedness within the Skills for Preventing Injury in Youth (SPIY) program (Buckley & Sheehan, 2009) and evaluated to determine if there was a reduction in the likelihood of transport related injuries at six months post-intervention. In Queensland, Australia, 35 high schools were recruited and randomly assigned to intervention and control conditions in early April 2012. A total of 2,000 Year nine students (mean age 13.5 years, 39% male) completed surveys six months post-intervention in November 2012. Analyses will compare the intervention students with control group students who self-reported i) first aid training with a teacher, professional or other adult and ii) no first aid in the preceding six months. Using the Extended Adolescent Injury Checklist (E-AIC) (Chapman, Buckley & Sheehan, 2011) the transport related injury experiences included being injured while “riding as a passenger in a car”, “driving a car off road” and “riding a bicycle”. It is expected that students taught first aid within SPIY will report significantly fewer transport related injuries in the previous three months, compared to the control groups described above. Analyses will be conducted separately for sex and socio-economic class of schools. Findings from this study will provide insight into the value of first aid in adolescent injury prevention and provide evidence as to whether teaching first aid skills within a school based health education curriculum has traffic safety implications.
Resumo:
The objective of this work is to formulate a nonlinear, coupled model of a container ship during parametric roll resonance, and to validate the model using experimental data.
Resumo:
This paper addresses the development of trust in the use of Open Data through incorporation of appropriate authentication and integrity parameters for use by end user Open Data application developers in an architecture for trustworthy Open Data Services. The advantages of this architecture scheme is that it is far more scalable, not another certificate-based hierarchy that has problems with certificate revocation management. With the use of a Public File, if the key is compromised: it is a simple matter of the single responsible entity replacing the key pair with a new one and re-performing the data file signing process. Under this proposed architecture, the the Open Data environment does not interfere with the internal security schemes that might be employed by the entity. However, this architecture incorporates, when needed, parameters from the entity, e.g. person who authorized publishing as Open Data, at the time that datasets are created/added.
Resumo:
Currently, the inspection of sea-going vessels is performed manually. Ship surveyors do a visual inspection; in some cases they also use cameras and non-destructive testing methods. Prior to a ship surveying process a lot of scaffolding has to be provided in order to make every spot accessible for the surveyor. In this work a robotic system is presented, which is able to access many areas of a cargo hold of a ship and perform visual inspection without any scaffolding. The paper also describes how the position of the acquired data is estimated with an optical 3D tracking unit and how critical points on the hull can be marked via a remote controlled marker device. Furthermore first results of onboard tests with the system are provided.
Resumo:
This paper presents a novel vision-based underwater robotic system for the identification and control of Crown-Of-Thorns starfish (COTS) in coral reef environments. COTS have been identified as one of the most significant threats to Australia's Great Barrier Reef. These starfish literally eat coral, impacting large areas of reef and the marine ecosystem that depends on it. Evidence has suggested that land-based nutrient runoff has accelerated recent outbreaks of COTS requiring extensive use of divers to manually inject biological agents into the starfish in an attempt to control population numbers. Facilitating this control program using robotics is the goal of our research. In this paper we introduce a vision-based COTS detection and tracking system based on a Random Forest Classifier (RFC) trained on images from underwater footage. To track COTS with a moving camera, we embed the RFC in a particle filter detector and tracker where the predicted class probability of the RFC is used as an observation probability to weight the particles, and we use a sparse optical flow estimation for the prediction step of the filter. The system is experimentally evaluated in a realistic laboratory setup using a robotic arm that moves a camera at different speeds and heights over a range of real-size images of COTS in a reef environment.
Resumo:
Interest in the area of collaborative Unmanned Aerial Vehicles (UAVs) in a Multi-Agent System is growing to compliment the strengths and weaknesses of the human-machine relationship. To achieve effective management of multiple heterogeneous UAVs, the status model of the agents must be communicated to each other. This paper presents the effects on operator Cognitive Workload (CW), Situation Awareness (SA), trust and performance by increasing the autonomy capability transparency through text-based communication of the UAVs to the human agents. The results revealed a reduction in CW, increase in SA, increase in the Competence, Predictability and Reliability dimensions of trust, and the operator performance.