259 resultados para Tutorial on Computing

em Queensland University of Technology - ePrints Archive


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article provides a tutorial introduction to visual servo control of robotic manipulators. Since the topic spans many disciplines our goal is limited to providing a basic conceptual framework. We begin by reviewing the prerequisite topics from robotics and computer vision, including a brief review of coordinate transformations, velocity representation, and a description of the geometric aspects of the image formation process. We then present a taxonomy of visual servo control systems. The two major classes of systems, position-based and image-based systems, are then discussed in detail. Since any visual servo system must be capable of tracking image features in a sequence of images, we also include an overview of feature-based and correlation-based methods for tracking. We conclude the tutorial with a number of observations on the current directions of the research field of visual servo control.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

NK model, proposed by Kauffman (1993), is a strong simulation framework to study competing dynamics. It has been applied in some social science fields, for instance, organization science. However, like many other simulation methods, NK model has not received much attention from Management Information Systems (MIS) discipline. This tutorial, thus, is trying to introduce NK model in a simple way and encourage related studies. To demonstrate how NK model works, this tutorial reproduces several Levinthal’s (1997) experiments. Besides, this tutorial attempts to make clear the relevance between NK model and agent-based modeling (ABM). The relevance can be a theoretical basis to further develop NK model framework for other research scenarios. For example, this tutorial provides an NK model solution to study IT value cocreation process by extending network structure and agent interactions.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

On obstacle-cluttered construction sites, understanding the motion characteristics of objects is important for anticipating collisions and preventing accidents. This study investigates algorithms for object identification applications that can be used by heavy equipment operators to effectively monitor congested local environment. The proposed framework contains algorithms for three-dimensional spatial modeling and image matching that are based on 3D images scanned by a high-frame rate range sensor. The preliminary results show that an occupancy grid spatial modeling algorithm can successfully build the most pertinent spatial information, and that an image matching algorithm is best able to identify which objects are in the scanned scene.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In this work, we examine unbalanced computation between an initiator and a responder that leads to resource exhaustion attacks in key exchange protocols. We construct models for two cryp-tographic protocols; one is the well-known Internet protocol named Secure Socket Layer (SSL) protocol, and the other one is the Host Identity Protocol (HIP) which has built-in DoS-resistant mechanisms. To examine such protocols, we develop a formal framework based on Timed Coloured Petri Nets (Timed CPNs) and use a simulation approach provided in CPN Tools to achieve a formal analysis. By adopting the key idea of Meadows' cost-based framework and re¯ning the de¯nition of operational costs during the protocol execution, our simulation provides an accurate cost estimate of protocol execution compar- ing among principals, as well as the percentage of successful connections from legitimate users, under four di®erent strategies of DoS attack.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Sending data between the construction site and an off-site design office is one of the more problematic areas in information technology for construction automation, particularly for construction defect management. The aim of this research is to investigate how mobile computing and new forms of human-computer interaction can be brought to bear on specific problems in construction management. The construction defect reporting system is one such application. Combining mobile and wireless computing technologies with a digital workbench, we have developed a system to facilitate remote telecollaboration between a construction site and an off-site engineering office. The application reported in this paper demonstrates how construction defect reporting can be streamlined by field collection of construction defect information using a mobile device and visualising the defect in a CAD model on a digital workbench in an engineering office. This paper reports on the design of the system and our tests of sending images from the construction site to the engineer’s office and positional accuracy of GPS for localization of the defect.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

BIM (Building Information Modelling) is an approach that involves applying and maintaining an integral digital representation of all building information for different phases of the project lifecycle. This paper presents an analysis of the current state of BIM in the industry and a re-assessment of its role and potential contribution in the near future, given the apparent slow rate of adoption by the industry. The paper analyses the readiness of the building industry with respect to the product, processes and people to present an argument on where the expectations from BIM and its adoption may have been misplaced. This paper reports on the findings from: (1) a critical review of latest BIM literature and commercial applications, and (2) workshops with focus groups on changing work-practice, role of technology, current perceptions and expectations of BIM.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

There is a need for educational frameworks for computer ethics education. This discussion paper presents an approach to developing students’ moral sensitivity, an awareness of morally relevant issues, in project-based learning (PjBL). The proposed approach is based on a study of IT professionals’ levels of awareness of ethics. These levels are labelled My world, The corporate world, A shared world, The client’s world and The wider world. We give recommendations for how instructors may stimulate students’ thinking with the levels and how the levels may be taken into account in managing a project course and in an IS department. Limitations of the recommendations are assessed and issues for discussion are raised.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A national Discipline-Based Initiative (DBI) project for Information and Communications Technology (ICT), funded by the Australian Learning and Teaching Council, has sought the opinions of recent graduates of ICT in the workplace to help inform the curriculum. An online survey was devised to question graduates on workplace requirements and university preparation for abilities categorized as: personal interpersonal; cognitive; business and technical. The graduates in employment have highlighted broad mismatches between the requirements of their professional work in these categories and the preparation for employment they received from university. A regression analysis was used to determine influences on graduates’ opinions of the preparation they received at university. The quantitative and qualitative results from this survey could have far reaching consequences for ICT education and this initiative will enable the development of curricula that ensures graduates are equipped with the skills required by the ICT industry.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Knowledge is a commodity. It is a by-product of learning that involves the creation, sharing, processing and possible use of information in the mind of an individual. Knowledge management (KM) is, therefore, concerned with the effective implementation of such activities within the organisation. It is simply the process of leveraging organisational knowledge to deliver a long-term competitive advantage. This paper presents the results of an empirical research investigation into the interaction between different KM activities within the context of construction contracting organisations. The different KM activities include: responsiveness to the knowledge of business environment, knowledge acquisition, knowledge dissemination, and knowledge application. A questionnaire survey was administered to investigate the opinions of construction professionals regarding the intensity of activities currently implemented by their organisations to facilitate knowledge capturing, sharing and application. A total of 149 responses were then used to statistically examine the inter-relationships between the different KM activities as practised by contracting organisations in Hong Kong. The paper presents and discusses the survey findings and proposes recommendations for improving the effectiveness of current KM practices.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary structure Δ satisfying the Q 3 property (in which no union of three subsets from Δ covers the whole player set), which is known to be necessary for achieving security in the active setting. Our protocol uses Maurer’s Verifiable Secret Sharing (VSS) but preserves the essential simplicity of the graph-based approach of Desmedt et al, which avoids each shareholder having to rerun the full VSS protocol after each local computation. A corollary of our result is a new active-secure protocol for general multiparty computation of an arbitrary Boolean circuit.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Several researchers have reported that cultural and language differences can affect online interactions and communications between students from different cultural backgrounds. Other researchers have asserted that online learning is a tool that can improve teaching and learning skills, but its effectiveness depends on how the tool is used. To delve into these aspects further, this study set out to investigate the kinds of learning difficulties encountered by the international students and how they actually coped with online learning. The modified Online Learning Environment Survey (OLES) instrument was used to collect data from the sample of 109 international students at a university in Brisbane. A smaller group of 35 domestic students was also included for comparison purposes. Contrary to assumptions from previous research, the findings revealed that there were only few differences between the international Asian and Australian students with regards to their perceptions of online learning. Recommendations based on the findings of this research study were made for Australian universities where Asian international students study online. Specifically the recommendations highlighted the importance of upskilling of lecturers’ ability to structure their teaching online and to apply strong theoretical underpinnings when designing learning activities such as discussion forums, and for the university to establish a degree of consistency with regards to how content is located and displayed in a learning management system like Blackboard.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In Service-oriented Architectures, business processes can be realized by composing loosely coupled services. The problem of QoS-aware service composition is widely recognized in the literature. Existing approaches on computing an optimal solution to this problem tackle structured business processes, i.e., business processes which are composed of XOR-block, AND-block, and repeat loop orchestration components. As of yet, OR-block and unstructured orchestration components have not been sufficiently considered in the context of QoS-aware service composition. The work at hand addresses this shortcoming. An approach for computing an optimal solution to the service composition problem is proposed considering the structured orchestration components, such as AND/XOR/OR-block and repeat loop, as well as unstructured orchestration components.