839 resultados para new technologies in teaching


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents for the first time the concept of measurement assisted assembly (MAA) and outlines the research priorities of the realisation of this concept in the industry. MAA denotes a paradigm shift in assembly for high value and complex products and encompasses the development and use of novel metrology processes for the holistic integration and capability enhancement of key assembly and ancillary processes. A complete framework for MAA is detailed showing how this can facilitate a step change in assembly process capability and efficiency for large and complex products, such as airframes, where traditional assembly processes exhibit the requirement for rectification and rework, use inflexible tooling and are largely manual, resulting in cost and cycle time pressures. The concept of MAA encompasses a range of innovativemeasurement- assisted processes which enable rapid partto- part assembly, increased use of flexible automation, traceable quality assurance and control, reduced structure weight and improved levels of precision across the dimensional scales. A full scale industrial trial of MAA technologies has been carried out on an experimental aircraft wing demonstrating the viability of the approach while studies within 140 smaller companies have highlighted the need for better adoption of existing process capability and quality control standards. The identified research priorities for MAA include the development of both frameless and tooling embedded automated metrology networks. Other research priorities relate to the development of integrated dimensional variation management, thermal compensation algorithms as well as measurement planning and inspection of algorithms linking design to measurement and process planning. © Springer-Verlag London 2013.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article briefly reviews the software developments for digital presentation and preservation of Bulgarian folklore treasure created within the project “Knowledge Technologies for Creation of Digital Presentation and Significant Repositories of Folklore Heritage” by teams of the Institute of Mathematics and Informatics.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Energy-efficient computing remains a critical challenge across the wide range of future data-processing engines — from ultra-low-power embedded systems to servers, mainframes, and supercomputers. In addition, the advent of cloud and mobile computing as well as the explosion of IoT technologies have created new research challenges in the already complex, multidimensional space of modern and future computer systems. These new research challenges led to the establishment of the IEEE Rebooting Computing Initiative, which specifically addresses novel low-power solutions and technologies as one of the main areas of concern.With this in mind, we thought it timely to survey the state of the art of energy-efficient computing.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Rotational moulding is a unique manufacturing technique for the production of hollow plastic parts manufacturing. Moulds for rotational moulding are generally not standardized, such as for injection moulding, so each new mould must be completely manufactured except for a few ancillary parts like screws or clamps. The aim of this work has been to adapt and apply the advantages of rapid prototyping and electroforming technologies to try to achieve an innovative mould design for rotational moulding. The new innovative design integrates an electroformed shell, manufactured starting from a rapid prototyping mandrel, with different designed standard aluminium tools. The shell holder enables mould assembly with high precision a shell in a few minutes with the advantage of changing different geometries of the electroformed shells in the same tool. The overall mould cost is significantly decreased because it is only necessary to manufacture one or two shells each time, however the rest of the elements of the mould are standard and usable for an infinite number of shells, depending on size. The rapid prototyping of the mandrel enables a significant decrease the global cost of mould manufacturing as well. © 2008 Taylor & Francis Group.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This chapter presents a comprehensive view of the main activities and findings of a research project entitled TRACER-Portuguese Public Higher Education Use of Communication Technologies, which focused on how the information about the use of Communication Technologies in Higher Education Institutions  can be collected, systematized, processed, and deployed to stakeholders. The project was carried out between 2011 and 2014 and its main results are a consolidated proposal of an analysis model to address the use of Communication Technologies in Higher Education institutions, as well as the U-TRACER® tool. This Web-based tool provides support to the process of collecting, processing, and deployment of data related with the use of Communication Technologies in a specific Higher Education or in a group of institutions, based on institutional or geographical criteria.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Secure transmission of bulk data is of interest to many content providers. A commercially-viable distribution of content requires technology to prevent unauthorised access. Encryption tools are powerful, but have a performance cost. Without encryption, intercepted data may be illicitly duplicated and re-sold, or its commercial value diminished because its secrecy is lost. Two technical solutions make it possible to perform bulk transmissions while retaining security without too high a performance overhead. These are: 1. a) hierarchical encryption - the stronger the encryption, the harder it is to break but also the more computationally expensive it is. A hierarchical approach to key exchange means that simple and relatively weak encryption and keys are used to encrypt small chunks of data, for example 10 seconds of video. Each chunk has its own key. New keys for this bottom-level encryption are exchanged using a slightly stronger encryption, for example a whole-video key could govern the exchange of the 10-second chunk keys. At a higher level again, there could be daily or weekly keys, securing the exchange of whole-video keys, and at a yet higher level, a subscriber key could govern the exchange of weekly keys. At higher levels, the encryption becomes stronger but is used less frequently, so that the overall computational cost is minimal. The main observation is that the value of each encrypted item determines the strength of the key used to secure it. 2. b) non-symbolic fragmentation with signal diversity - communications are usually assumed to be sent over a single communications medium, and the data to have been encrypted and/or partitioned in whole-symbol packets. Network and path diversity break up a file or data stream into fragments which are then sent over many different channels, either in the same network or different networks. For example, a message could be transmitted partly over the phone network and partly via satellite. While TCP/IP does a similar thing in sending different packets over different paths, this is done for load-balancing purposes and is invisible to the end application. Network and path diversity deliberately introduce the same principle as a secure communications mechanism - an eavesdropper would need to intercept not just one transmission path but all paths used. Non-symbolic fragmentation of data is also introduced to further confuse any intercepted stream of data. This involves breaking up data into bit strings which are subsequently disordered prior to transmission. Even if all transmissions were intercepted, the cryptanalyst still needs to determine fragment boundaries and correctly order them. These two solutions depart from the usual idea of data encryption. Hierarchical encryption is an extension of the combined encryption of systems such as PGP but with the distinction that the strength of encryption at each level is determined by the "value" of the data being transmitted. Non- symbolic fragmentation suppresses or destroys bit patterns in the transmitted data in what is essentially a bit-level transposition cipher but with unpredictable irregularly-sized fragments. Both technologies have applications outside the commercial and can be used in conjunction with other forms of encryption, being functionally orthogonal.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Though the castrato has been absent from the operatic stage since the nineteenth century, this voice is often described as the mysterious link in understanding the vocal techniques attributed to bel canto. The mystery lies in the fact that the voice of the operatic castrato cannot be heard by modern ears; and yet its legacy can be seen in the vocal tuition of several successful opera singers at the turn of the nineteenth century. What is unusual about this period is that some of the most successful singers of the day, including Nancy Storace, John Braham and Elizabeth Billington were British and shared the same vocal teacher. The castrato Venanzio Rauzzini (1746-1810) began his career as a primo uomo on the continent and while he established himself in various areas of musical activity, his main contribution and legacy was as a vocal teacher. During his residency in Britain from 1774 until his death, he trained several leading British professional singers who were the stars of opera in London and on the continent. They each demonstrated a use of techniques associated with the castrato vocal aesthetic and popularised a new vocal style, which can be traced to Rauzzini. Through this thesis, I will draw attention to the importance of Rauzzini’s impact on vocal teaching practice in Britain and his wider influence on the development of vocal style. I will demonstrate that Rauzzini should be considered part of the vocal teaching canon to which Pier Francesco Tosi (c.1653-1732), Nicola Porpora (1686-1768) and Manual García II (1805-1906), three other foreign vocal teachers, who were resident in Britain, already belong. By examining exactly what the expected vocal aesthetics were for all singers, castrato, non-castrated male and female during the period in which Rauzzini was active, I will demystify the castrato technique and provide a more tangible understanding of what this encompassed, demonstrating that many of these techniques were learned, performed and popularised by other voice types such as the female soprano and the male tenor.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

International audience

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper analyzes the implementation of new technologies in network industries through the development of a suitable regulatory scheme. The analysis focuses on Smart Grid (SG) technologies which, among others benefits, could save operational costs and reduce the need for further conventional investments in the grid. In spite of the benefits that may result from their implementation, the adoption of SGs by network operators can be hampered by the uncertainties surrounding actual performances. A decision model has been developed to assess the firms' incentives to invest in "smart" technologies under different regulatory schemes. The model also enables testing the impact of uncertainties on the reduction of operational costs, and of conventional investments. Under certain circumstances, it may be justified to support the development and early deployment of emerging innovations that have a high potential to ameliorate the efficiency of the electricity system, but whose adoption faces many uncertainties.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Axle bearing damage with possible catastrophic failures can cause severe disruptions or even dangerous derailments, potentially causing loss of human life and leading to significant costs for railway infrastructure managers and rolling stock operators. Consequently the axle bearing damage process has safety and economic implications on the exploitation of railways systems. Therefore it has been the object of intense attention by railway authorities as proved by the selection of this topic by the European Commission in calls for research proposals. The MAXBE Project (http://www.maxbeproject.eu/), an EU-funded project, appears in this context and its main goal is to develop and to demonstrate innovative and efficient technologies which can be used for the onboard and wayside condition monitoring of axle bearings. The MAXBE (interoperable monitoring, diagnosis and maintenance strategies for axle bearings) project focuses on detecting axle bearing failure modes at an early stage by combining new and existing monitoring techniques and on characterizing the axle bearing degradation process. The consortium for the MAXBE project comprises 18 partners from 8 member states, representing operators, railway administrations, axle bearing manufactures, key players in the railway community and experts in the field of monitoring, maintenance and rolling stock. The University of Porto is coordinating this research project that kicked-off in November 2012 and it is completed on October 2015. Both on-board and wayside systems are explored in the project since there is a need for defining the requirement for the onboard equipment and the range of working temperatures of the axle bearing for the wayside systems. The developed monitoring systems consider strain gauges, high frequency accelerometers, temperature sensors and acoustic emission. To get a robust technology to support the decision making of the responsible stakeholders synchronized measurements from onboard and wayside monitoring systems are integrated into a platform. Also extensive laboratory tests were performed to correlate the in situ measurements to the status of the axle bearing life. With the MAXBE project concept it will be possible: to contribute to detect at an early stage axle bearing failures; to create conditions for the operational and technical integration of axle bearing monitoring and maintenance in different European railway networks; to contribute to the standardization of the requirements for the axle bearing monitoring, diagnosis and maintenance. Demonstration of the developed condition monitoring systems was performed in Portugal in the Northern Railway Line with freight and passenger traffic with a maximum speed of 220 km/h, in Belgium in a tram line and in the UK. Still within the project, a tool for optimal maintenance scheduling and a smart diagnostic tool were developed. This paper presents a synthesis of the most relevant results attained in the project. The successful of the project and the developed solutions have positive impact on the reliability, availability, maintainability and safety of rolling stock and infrastructure with main focus on the axle bearing health.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Teachers' failure to utilise MBL activities more widely may be due to not recognising their capacity to transform the nature of laboratory activities to be more consistent with contemporary constructivist theories of learning. This research aimed to increase understanding of how MBL activities specifically designed to be consistent with a constructivist theory of learning support or constrain student construction of understanding. The first author conducted the research with his Year 11 physics class of 29 students. Dyads completed nine tasks relating to kinematics using a Predict-Observe-Explain format. Data sources included video and audio recordings of students and teacher during four 70-minute sessions, students' display graphs and written notes, semi-structured student interviews, and the teacher's journal. The study identifies the actors and describes the patterns of interactions in the MBL. Analysis of students' discourse and actions identified many instances where students' initial understanding of kinematics were mediated in multiple ways. Students invented numerous techniques for manipulating data in the service of their emerging understanding. The findings are presented as eight assertions. Recommendations are made for developing pedagogical strategies incorporating MBL activities which will likely catalyse student construction of understanding.