320 resultados para tastiera virtuale Android Arduino Due virtual keyboard

em Queensland University of Technology - ePrints Archive


Relevância:

30.00% 30.00%

Publicador:

Resumo:

An important aspect of designing any product is validation. Virtual design process (VDP) is an alternative to hardware prototyping in which analysis of designs can be done without manufacturing physical samples. In recent years, VDP have been generated either for animation or filming applications. This paper proposes a virtual reality design process model on one of the applications when used as a validation tool. This technique is used to generate a complete design guideline and validation tool of product design. To support the design process of a product, a virtual environment and VDP method were developed that supports validation and an initial design cycle performed by a designer. The product model car carrier is used as illustration for which virtual design was generated. The loading and unloading sequence of the model for the prototype was generated using automated reasoning techniques and was completed by interactively animating the product in the virtual environment before complete design was built. By using the VDP process critical issues like loading, unloading, Australian Design rules (ADR) and clearance analysis were done. The process would save time, money in physical sampling and to large extent in complete math generation. Since only schematic models are required, it saves time in math modelling and handling of bigger size assemblies due to complexity of the models. This extension of VDP process for design evaluation is unique and was developed, implemented successfully. In this paper a Toll logistics and J Smith and Sons car carrier which is developed under author’s responsibility has been used to illustrate our approach of generating design validation via VDP.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Due to the popularity of modern Collaborative Virtual Environments, there has been a related increase in their size and complexity. Developers therefore need visualisations that expose usage patterns from logged data, to understand the structures and dynamics of these complex environments. This chapter presents a new framework for the process of visualising virtual environment usage data. Major components, such as an event model, designer task model and data acquisition infrastructure are described. Interface and implementation factors are also developed, along with example visualisation techniques that make use of the new task and event model. A case study is performed to illustrate a typical scenario for the framework, and its benefits to the environment development team.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The inherent uncertainty and complexity of construction work make construction planning a particularly difficult task for project managers due to the need to anticipate and visualize likely future events. Conventional computer-assisted technology can help but is often limited to the constructability issues involved. Virtual prototyping, however, offers an improved method through the visualization of construction activities by computer simulation — enabling a range of ‘what-if’ questions to be asked and their implications on the total project to be investigated. This paper describes the use of virtual prototyping to optimize construction planning schedules by analyzing resource allocation and planning with integrated construction models, resource models, construction planning schedules and site-layout plans. A real-life case study is presented that demonstrates the use of a virtual prototyping enabled resource analysis to reallocate space, logistic on access road and arrange tower cranes to achieve a 6-day floor construction cycle.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Games and related virtual environments have been a much-hyped area of the entertainment industry. The classic quote is that games are now approaching the size of Hollywood box office sales [1]. Books are now appearing that talk up the influence of games on business [2], and it is one of the key drivers of present hardware development. Some of this 3D technology is now embedded right down at the operating system level via the Windows Presentation Foundations – hit Windows/Tab on your Vista box to find out... In addition to this continued growth in the area of games, there are a number of factors that impact its development in the business community. Firstly, the average age of gamers is approaching the mid thirties. Therefore, a number of people who are in management positions in large enterprises are experienced in using 3D entertainment environments. Secondly, due to the pressure of demand for more computational power in both CPU and Graphical Processing Units (GPUs), your average desktop, any decent laptop, can run a game or virtual environment. In fact, the demonstrations at the end of this paper were developed at the Queensland University of Technology (QUT) on a standard Software Operating Environment, with an Intel Dual Core CPU and basic Intel graphics option. What this means is that the potential exists for the easy uptake of such technology due to 1. a broad range of workers being regularly exposed to 3D virtual environment software via games; 2. present desktop computing power now strong enough to potentially roll out a virtual environment solution across an entire enterprise. We believe such visual simulation environments can have a great impact in the area of business process modeling. Accordingly, in this article we will outline the communication capabilities of such environments, giving fantastic possibilities for business process modeling applications, where enterprises need to create, manage, and improve their business processes, and then communicate their processes to stakeholders, both process and non-process cognizant. The article then concludes with a demonstration of the work we are doing in this area at QUT.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Business Process Modelling is a fast growing field in business and information technology, which uses visual grammars to model and execute the processes within an organisation. However, many analysts present such models in a 2D static and iconic manner that is difficult to understand by many stakeholders. Difficulties in understanding such grammars can impede the improvement of processes within an enterprise due to communication problems. In this chapter we present a novel framework for intuitively visualising animated business process models in interactive Virtual Environments. We also show that virtual environment visualisations can be performed with present 2D business process modelling technology, thus providing a low barrier to entry for business process practitioners. Two case studies are presented from film production and healthcare domains that illustrate the ease with which these visualisations can be created. This approach can be generalised to other executable workflow systems, for any application domain being modelled.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Music making affects relationships with self and others by generating a sense of belonging to a culture or ideology (Bamford, 2006; Barovick, 2001; Dillon & Stewart, 2006; Fiske, 2000; Hallam, 2001). Whilst studies from arts education research present compelling examples of these relationships, others argue that they do not present sufficiently validated evidence of a causal link between music making experiences and cognitive or social change (Winner & Cooper, 2000; Winner & Hetland, 2000a, 2000b, 2001). I have suggested elsewhere that this disconnection between compelling evidence and observations of the effects of music making are in part due to the lack of rigor in research and the incapacity of many methods to capture these experiences in meaningful ways (Dillon, 2006). Part of the answer to these questions about rigor and causality lay in the creative use of new media technologies that capture the results of relationships in music artefacts. Crucially, it is the effective management of these artefacts within computer systems that allows researchers and practitioners to collect, organize, analyse and then theorise such music making experiences.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Purpose: The construction industry is well known for its high accident rate and many practitioners consider a preventative approach to be the most important means of bringing about improvements. This paper addresses previous research and the weaknesses of existing preventative approaches and a new application is described and illustrated involving the use of a multi-dimensional simulation tool - Construction Virtual Prototyping (CVP). Methodology: A literature review was conducted to investigate previous studies of hazard identification and safety management and to develop the new approach. Due to weaknesses in current practice, the research study explored the use of computer simulation techniques to create virtual environments where users can explore and identify construction hazards. Specifically, virtual prototyping technology was deployed to develop typical construction scenarios in which unsafe or hazardous incidents occur. In a case study, the users’ performance was evaluated their responses to incidents within the virtual environment and the effectiveness of the computer simulation system established though interviews with the safety project management team. Findings: The opinions and suggestions provided by the interviewees led to the initial conclusion that the simulation tool was useful in assisting the safety management team’s hazard identification process during the early design stage. Originality: The research introduces an innovative method to support the management teams’ reviews of construction site safety. The system utilises three-dimensional modelling and four-dimensional simulation of worker behaviour, a configuration that has previously not been employed in construction simulations. An illustration of the method’s use is also provided, together with a consideration of its strengths and weaknesses.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Improving energy efficiency has become increasingly important in data centers in recent years to reduce the rapidly growing tremendous amounts of electricity consumption. The power dissipation of the physical servers is the root cause of power usage of other systems, such as cooling systems. Many efforts have been made to make data centers more energy efficient. One of them is to minimize the total power consumption of these servers in a data center through virtual machine consolidation, which is implemented by virtual machine placement. The placement problem is often modeled as a bin packing problem. Due to the NP-hard nature of the problem, heuristic solutions such as First Fit and Best Fit algorithms have been often used and have generally good results. However, their performance leaves room for further improvement. In this paper we propose a Simulated Annealing based algorithm, which aims at further improvement from any feasible placement. This is the first published attempt of using SA to solve the VM placement problem to optimize the power consumption. Experimental results show that this SA algorithm can generate better results, saving up to 25 percentage more energy than First Fit Decreasing in an acceptable time frame.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Smartphones are steadily gaining popularity, creating new application areas as their capabilities increase in terms of computational power, sensors and communication. Emerging new features of mobile devices give opportunity to new threats. Android is one of the newer operating systems targeting smartphones. While being based on a Linux kernel, Android has unique properties and specific limitations due to its mobile nature. This makes it harder to detect and react upon malware attacks if using conventional techniques. In this paper, we propose an Android Application Sandbox (AASandbox) which is able to perform both static and dynamic analysis on Android programs to automatically detect suspicious applications. Static analysis scans the software for malicious patterns without installing it. Dynamic analysis executes the application in a fully isolated environment, i.e. sandbox, which intervenes and logs low-level interactions with the system for further analysis. Both the sandbox and the detection algorithms can be deployed in the cloud, providing a fast and distributed detection of suspicious software in a mobile software store akin to Google's Android Market. Additionally, AASandbox might be used to improve the efficiency of classical anti-virus applications available for the Android operating system.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Aims The Medical Imaging Training Immersive Environment (MITIE) system is a recently developed virtual reality (VR) platform that allows students to practice a range of medical imaging techniques. The aim of this pilot study was to harvest user feedback about the educational value of the application and inform future pedagogical development. This presentation explores the use of this technology for skills training and blurring the boundaries between academic learning and clinical skills training. Background MITIE is a 3D VR environment that allows students to manipulate a patient and radiographic equipment in order to produce a VR-generated image for comparison with a gold standard. As with VR initiatives in other health disciplines (1-6) the software mimics clinical practice as much as possible and uses 3D technology to enhance immersion and realism. The software was developed by the Medical Imaging Course Team at a provider University with funding from a Health Workforce Australia “Simulated Learning Environments” grant. Methods Over 80 students undertaking the Bachelor of Medical Imaging Course were randomised to receive practical experience with either MITIE or radiographic equipment in the medical radiation laboratory. Student feedback about the educational value of the software was collected and performance with an assessed setup was measured for both groups for comparison. Ethical approval for the project was provided by the university ethics panel. Results This presentation provides qualitative analysis of student perceptions relating to satisfaction, usability and educational value as well as comparative quantitative performance data. Students reported high levels of satisfaction and both feedback and assessment results confirmed the application’s significance as a pre-clinical training tool. There was a clear emerging theme that MITIE could be a useful learning tool that students could access to consolidate their clinical learning, either during their academic timetables or their clinical placement. Conclusion Student feedback and performance data indicate that MITIE has a valuable role to play in the clinical skills training for medical imaging students both in the academic and the clinical environment. Future work will establish a framework for an appropriate supporting pedagogy that can cross the boundary between the two environments. This project was possible due to funding made available by Health Workforce Australia.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Objetivo Revisar de forma sistemática y realizar una evaluación critica de las diferentes publicaciones existentes sobre el uso de la realidad virtual como elemento rehabilitador en la mano. Estrategias de búsqueda Se ha realizado una búsqueda en la base de datos Medline completada con búsquedas en Google Schoolar. Se ha limitado la búsqueda a 10 años de extensión, idiomas: inglés y español. Selección de estudios: se ha centrado sobre aquellos artículos relacionados con la realidad virtual y la rehabilitación funcional de la mano en el accidente cerebrovascular. Síntesis de resultados Debido a la falta de homogeneidad, no ha sido posible evaluar metodológicamente mediante instrumento Caspe. Se detectaron 200 artículos de los cuales 12 cumplen los criterios de selección de los mismos. Dichos artículos han sido agrupados en relación con diferentes criterios como son: tipo de estudio, sistema de evaluación utilizado, periféricos usados o resultados obtenidos entre otros. Conclusiones No se ha obtenido una homogeneidad conjunta sobre los artículos, por ello se debe continuar realizando avances en este ámbito. A pesar de ello, los entornos de realidad virtual pueden ser un instrumento válido para la recuperación funcional de la mano en los accidentes cerebrovasculares, no siendo aptos como elemento único rehabilitador. Abstract in English Objective To make a systematic review and critical assessment of the different existing publications on the use of virtual reality as an element in rehabilitation of the hand. Search Method A search was made in the Medline database completed with searches in Google Schoolar. The search was limited to a period of ten years, and English and Spanish languages. Study selection The study was focused on those articles related to virtual reality and the functional rehabilitation of the hand in stroke. Synthesis of results It was not possible to perform a methodological evaluation using the Caspe instrument due to lack of homogeneity. Two hundred 200 articles were found. Of these, 12 met the criteria for their selection. These articles were grouped in relation to different criteria such as: type of study, assessment system used, hardware used or outcomes results obtained, among others. Conclusions Joint homogeneity was not obtained for the articles. Therefore, progress must still be made in this area. In spite of this, virtual reality environments can be a valid tool for functional recovery of the hand in strokes but they are not adequate for use as a single rehabilitative treatment element.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper investigates the effectiveness of virtual product placement as a marketing tool by examining the relationship between brand recall and recognition and virtual product placement. It also aims to address a gap in the existing academic literature by focusing on the impact of product placement on recall and recognition of new brands. The growing importance of product placement is discussed and a review of previous research on product placement and virtual product placement is provided. The research methodology used to study the recall and recognition effects of virtual product placement are described and key findings presented. Finally, implications are discussed and recommendations for future research provided.