262 resultados para enhancement technologies
em Queensland University of Technology - ePrints Archive
Resumo:
Cosmetic enhancement technologies have been subject to extended discussion in sociological literature. Botox, however, seems to have been mostly sidelined in this discussion in favour of more ‘extreme’ forms of cosmetic enhancement, such as those performed under general anaesthetic. In this paper, we suggest the need to further examine Botox as a sociological issue. We do this by highlighting some of the disparities and parallels that Botox shares with the existing literature on cosmetic enhancement technologies.
Resumo:
Choi et al. recently proposed an efficient RFID authentication protocol for a ubiquitous computing environment, OHLCAP(One-Way Hash based Low-Cost Authentication Protocol). However, this paper reveals that the protocol has several security weaknesses : 1) traceability based on the leakage of counter information, 2) vulnerability to an impersonation attack by maliciously updating a random number, and 3) traceability based on a physically-attacked tag. Finally, a security enhanced group-based authentication protocol is presented.
Resumo:
This paper presents an analysis of the studio as the signature pedagogy of design education. A number of theoretical models of learning, pedagogy, and education are used to interrogate the studio for its advantages and shortcomings, and to identify opportunities for the integration of new technologies and to explore the affordances that they might offer. In particular the theoretical ideas of signature pedagogies, conversational frameworks, and pedagogical patterns are used to justify the ‘unique’ status of the studio as a dominant learning environment and mode of delivery within design education. Such analysis identifies the opportunities for technological intervention and enhancement of the design studio through a re-examining of its fundamental pedagogical signature. This paper maps the dimensions and qualities that define the signature pedagogy against a range of delivery modes and technological media forms. Through such investigation it seeks to identify appropriate opportunities for technology; in essence offering a structure or framework for the analysis of future enquiry and experimentation.
Resumo:
The digital divide is the disparancy in access to information, in the ability to communicate, and in the capacity to make information and communication serve full participation in the information society. Indeed, the conversation about the digital divide has developed over the last decade from a focus on connectivity and access to information and communication technologies, to a conversation that encompasses the ability to use them and to the utility that usage provides (Wei et al., 2011). However, this conversation, while transitioning from technology to the skills of the people that use them and to the fruits of their use is limited in its ability to take into account the social role of information and communication technologies (ICTs). One successful attempt in conceptualizing the social impact of the differences in access to and utilization of digital communication technologies, was developed by van Dijk (2005) whose sequential model for analyzing the divide states that: 1. Categorical inequalities in society produce an unequal distribution of resources; 2. An unequal distribution of resources causes unequal access to digital technologies; 3. Unequal access to digital technologies also depends on the characteristics of these technologies; 4. Unequal access to digital technologies brings about unequal participation in society; 5. Unequal participation in society reinforces categorical inequalities and unequal distributions of resources.” (p. 15) As van Dijk’s model demonstrates, the divide’s impact is the exclusion of individuals from participation. Still left to be defined are the “categorical inequalities,” the “resources,” the “characteristics of digital technologies,” and the different levels of “access” that result in differentiated levels of participation, as these change over time due to the evolving nature of technology and the dynamics of society. And most importantly, the meaning of “participation” in contemporary society needs to be determined as it is differentiated levels of participation that are the result of the divide and the engine of the ever-growing disparities. Our argument is structured in the following manner: We first claim that contemporary digital media differ from the previous generation of ICTs along four dimensions: They offer an abundance of information resources and communication channels when compared to the relative paucity of both in the past; they offer mobility as opposed to the stationary nature of their predecessors; they are interactive in that they provide users with the capability to design their own media environments in contrast to the dictated environs of previous architectures; and, they allow users to communicate utilizing multi forms of mediation, unlike the uniformity of sound or word that limited users in the past. We then submit that involvement in the information society calls for egalitarian access to all four dimensions of the user experience that make contemporary media different from their predecessors and that the ability to experience all four affects the levels in which humans partake in the shaping of society. The model being cyclical, we then discuss how lower levels of participation contribute to the enhancement of social inequalities. Finally, we discuss why participation is needed in order to achieve full membership in the information society and what political philosophy should govern policy solutions targeting the re-inclusion of those digitally excluded.
Resumo:
Regardless of your industry, the marketplace is continually evolving. The reason, increasingly, is the evolution of disruptive technology. Disruptive technologies are enhanced or new technological innovations that essentially displace conventional and established technology, rendering it obsolete. They can create opportunities for new products, new markets, and new ways of conducting business. In 2016, business models will again change as businesses adapt. The enhancement of current technology and the development of new technological innovations will undeniably transform how new businesses are established, and how existing businesses compete. For small and medium-sized firms, technology will also enable significant leaps forward in terms of innovation, efficiency and competitiveness. Adapting quickly will be essential, so here’s the top six we think you should be prepared for.
Resumo:
Intrusion (unauthorized stepping-into/staying-in a hazardous area), as a common type of near-miss, is the prime cause of the majority of incidents on construction sites including fall from heights, and striking against or being struck by moving objects. Accidents often occur because workers take shortcuts moving about the site without fully perceiving the potential dangers. A number of researches have been devoted to developing methods to prevent such behaviors mainly based on the theory of Behavior-Based Safety (BBS), which aims to cultivate safety behaviors among workers in accordance with safety regulations. In current BBS practice, trained observers and safety supervisors are responsible for safety behavior inspections following safety plans and operation regulations. The observation process is time-consuming and its effectiveness depends largely on the observer’s safety knowledge and experience, which often results in omissions or bias. This paper presents a reformed safety behavior modification approach by integrating a location-based technology with BBS. Firstly, a detailed background is provided, covering current intrusion problems on site, existing use of BBS for behavior improvement, difficulties in achieving widespread adoption and potential technologies for location tracking and in-time feedback. Then, a conceptual framework of positioning technology-enhanced BBS is developed, followed by details of the corresponding on-line supporting system, Real Time Location System (RTLS) and Virtual Construction System (VCS). The application of the system is then demonstrated and tested in a construction site in Hong Kong. Final comments are made concerning further research direction and prospects for wider adoption.