983 resultados para Network representation


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In studies of media industries, too much attention has been paid to providers and firms, too little to consumers and markets. But with user-created content, the question first posed more than a generation ago by the uses & gratifications method and taken up by semiotics and the active audience tradition (‘what do audiences do with media?’), has resurfaced with renewed force. What’s new is that where this question (of what the media industries and audiences did with each other) used to be individualist and functionalist, now, with the advent of social networks using Web 2.0 affordances, it can be re-posed at the level of systems and populations as well.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract - Mobile devices in the near future will need to collaborate to fulfill their function. Collaboration will be done by communication. We use a real world example of robotic soccer to come up with the necessary structures required for robotic communication. A review of related work is done and it is found no examples come close to providing a RANET. The robotic ad hoc network (RANET) we suggest uses existing structures pulled from the areas of wireless networks, peer to peer and software life-cycle management. Gaps are found in the existing structures so we describe how to extend some structures to satisfy the design. The RANET design supports robot cooperation by exchanging messages, discovering needed skills that other robots on the network may possess and the transfer of these skills. The network is built on top of a Bluetooth wireless network and uses JXTA to communicate and transfer skills. OSGi bundles form the skills that can be transferred. To test the nal design a reference implementation is done. Deficiencies in some third party software is found, specifically JXTA and JamVM and GNU Classpath. Lastly we look at how to fix the deciencies by porting the JXTA C implementation to the target robotic platform and potentially eliminating the TCP/IP layer, using UDP instead of TCP or using an adaptive TCP/IP stack. We also propose a future areas of investigation; how to seed the configuration for the Personal area network (PAN) Bluetooth protocol extension so a Bluetooth TCP/IP link is more quickly formed and using the STP to allow multi-hop messaging and transfer of skills.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we explore what is required of a User Interface (UI) design in order to encourage participation around playing and creating Location-Based Games (LBGs). To base our research in practice, we present Cipher Cities, a web based system. Through the design of this system, we investigate how UI design can provide tools for complex content creation to compliment and encourage the use of mobile phones for designing, distributing, and playing LBGs. Furthermore we discuss how UI design can promote and support socialisation around LBGs through the design of functional interface components and services such as groups, user profiles, and player status listings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The capacity of the internet to handle micro-transactions and to cater to niche markets is a boon for some areas of the creative industries, which have always been associated with smallscale micro business activities. This paper looks at the specific case of the specialist Social Networking Site Ravelry: a site for knitters, crocheters, spinners and dyers. It traces the interactions between amateurs and professionals through the emergence of social networking sites. An analytic framework of social network markets (see Potts, Cunningham, Hartley and Omerod, 2008) is employed to allow for the inclusion of amateur, social, semi-professional,professional and institutional actors within a networked sphere of activity, rather than excluding some of these actors as outside of recognised value-production. The reliance on social networks to determine the economic success of design, production and consumption is exemplified in this small scale example. This paper eschews the dichotomy of commercial and non-commercial by bringing to the fore the hybridity of this site where financial and social economies co-exist.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The topic of designers’ knowledge and how they conduct design process has been widely investigated in design research. Understanding theoretical and experiential knowledge in design has involved recognition of the importance of designers’ experience of experiencing, seeing, and absorbing ideas from the world as points of reference (or precedents) that are consulted whenever a design problem arises (Lawson, 2004). Hence, various types of design knowledge have been categorized (Lawson, 2004), and the nature of design knowledge continues to be studied (Cross, 2006); nevertheless, the study of the experiential aspects embedded in design knowledge is a topic not fully addressed. In particular there has been little emphasis on the investigation of the ways in which designers’ individual experience influences different types of design tasks. This research focuses on the investigation of the ways in which designers inform a usability design process. It aims to understand how designers design product usability, what informs their process, and the role their individual experience (and episodic knowledge) plays within the design process. This paper introduces initial outcomes from an empirical study involving observation of a design task that emphasized usability issues. It discusses the experiential knowledge observed in the visual representations (sketches) produced by designers as part of the design tasks. Through the use of visuals as means to represent experiential knowledge, this paper presents initial research outcomes to demonstrate how designers’ individual experience is integrated into design tasks and communicated within the design process. Initial outcomes demonstrate the influence of designers’ experience in the design of product usability. It is expected that outcomes will help identify the causal relationships between experience, context of use, and product usability, which will contribute to enhance our understanding about the design of user-product interactions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

“Hardware in the Loop” (HIL) testing is widely used in the automotive industry. The sophisticated electronic control units used for vehicle control are usually tested and evaluated using HIL-simulations. The HIL increases the degree of realistic testing of any system. Moreover, it helps in designing the structure and control of the system under test so that it works effectively in the situations that will be encountered in the system. Due to the size and the complexity of interaction within a power network, most research is based on pure simulation. To validate the performance of physical generator or protection system, most testing is constrained to very simple power network. This research, however, examines a method to test power system hardware within a complex virtual environment using the concept of the HIL. The HIL testing for electronic control units and power systems protection device can be easily performed at signal level. But performance of power systems equipments, such as distributed generation systems can not be evaluated at signal level using HIL testing. The HIL testing for power systems equipments is termed here as ‘Power Network in the Loop’ (PNIL). PNIL testing can only be performed at power level and requires a power amplifier that can amplify the simulation signal to the power level. A power network is divided in two parts. One part represents the Power Network Under Test (PNUT) and the other part represents the rest of the complex network. The complex network is simulated in real time simulator (RTS) while the PNUT is connected to the Voltage Source Converter (VSC) based power amplifier. Two way interaction between the simulator and amplifier is performed using analog to digital (A/D) and digital to analog (D/A) converters. The power amplifier amplifies the current or voltage signal of simulator to the power level and establishes the power level interaction between RTS and PNUT. In the first part of this thesis, design and control of a VSC based power amplifier that can amplify a broadband voltage signal is presented. A new Hybrid Discontinuous Control method is proposed for the amplifier. This amplifier can be used for several power systems applications. In the first part of the thesis, use of this amplifier in DSTATCOM and UPS applications are presented. In the later part of this thesis the solution of network in the loop testing with the help of this amplifier is reported. The experimental setup for PNIL testing is built in the laboratory of Queensland University of Technology and the feasibility of PNIL testing has been evaluated using the experimental studies. In the last section of this thesis a universal load with power regenerative capability is designed. This universal load is used to test the DG system using PNIL concepts. This thesis is composed of published/submitted papers that form the chapters in this dissertation. Each paper has been published or submitted during the period of candidature. Chapter 1 integrates all the papers to provide a coherent view of wide bandwidth switching amplifier and its used in different power systems applications specially for the solution of power systems testing using PNIL.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter revisits the concept of the ‘bardic function’ (Fiske & Hartley 1978), using historical analysis of the oral bardic institutions to re-theorise it for the era of interactive media and digital storytelling. It shows how ‘representative’ storytelling has transformed into self-representation, and proposes that the ‘bardic function’ can be divided into three types: representative (the ‘Taliesin function’); pedagogic (the ‘Gandalf function’); and self-organised (the ‘eisteddfod function’).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

China has a reputation as an economy based on utility: the large-scale manufacture of low-priced goods. But useful values like functionality, fitness for purpose and efficiency are only part of the story. More important are what Veblen called ‘honorific’ values, arguably the driving force of development, change and value in any economy. To understand the Chinese economy therefore, it is not sufficient to point to its utilitarian aspect. Honorific status-competition is a more fundamental driver than utilitarian cost-competition. We argue that ‘social network markets’ are the expression of these honorific values, relationships and connections that structure and coordinate individual choices. This paper explores how such markets are developing in China in the area of fashion and fashion media. These, we argue, are an expression of ‘risk culture’ for high-end entrepreneurial consumers and producers alike, providing a stimulus to dynamic innovation in the arena of personal taste and comportment, as part of an international cultural system based on constant change. We examine the launch of Vogue China in 2005, and China’s reception as a fashion player among the international editions of Vogue, as an expression of a ‘decisive moment’ in the integration of China into an international social network market based on honorific values.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report presents the results of research projects conducted by The Australian Cooperative Research Centre for Construction Innovation, Queensland University of Technology, RMIT University, Queensland Government Department of Main Roads and Queensland Department of Public Works. The research projects aimed at developing a methodology for assessing variation and risk in investment in road network, including the application of the method in assessing road network performance and maintenance and rehabilitation costs for short- and long-term future investment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Research on social networking sites like Facebook is emerging but sparse. This exploratory study investigates the value users derive from self-described ‘cool’ Facebook applications, and explores the features that either encourage or discourage users to recommend applications to their friends. The concepts of value and cool are explored in a social networking context. Our qualitative data reveals consumers derive a combination of functional value along with either social or emotional value from the applications. Female Facebook users indicate self-expression as important motivators, while males tend to use Facebook applications to socially compete. Three broad categories emerged for application features; symmetrical features can both encourage or discourage recommendation, polar features where different levels of the same feature encourage or discourage, and uni-directional features only encourage or discourage but not both. Recommending or not recommending an application tends to be the result of a combination of features and context, rather than one feature in isolation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study employs BP neural network to simulate the development of Chinese private passenger cars. Considering the uncertain and complex environment for the development of private passenger cars, indicators of economy, population, price, infrastructure, income, energy and some other fields which have major impacts on it are selected at first. The network is proved to be operable to simulate the progress of chinese private passenger cars after modeling, training and generalization test. Based on the BP neural network model, sensitivity analysis of each indicator is carried on and shows that the sensitivity coefficients of fuel price change suddenly. This special phenomenon reveals that the development of Chinese private passenger cars may be seriously affected by the recent high fuel price. This finding is also consistent with facts and figures