684 resultados para Cyber-rencontre


Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND Experimental learning, traditionally conducted in on-campus laboratory venues, is the cornerstone of science and engineering education. In order to ensure that engineering graduates are exposed to ‘real-world’ situations and attain the necessary professional skill-sets, as mandated by course accreditation bodies such as Engineers Australia, face-to-face laboratory experimentation with real equipment has been an integral component of traditional engineering education. The online delivery of engineering coursework endeavours to mimic this with remote and simulated laboratory experimentation. To satisfy student and accreditation requirements, the common practice has been to offer equivalent remote and/or simulated laboratory experiments in lieu of the ones delivered, face-to face, on campus. The current implementations of both remote and simulated laboratories tend to be specified with a focus on technical characteristics, instead of pedagogical requirements. This work attempts to redress this situation by developing a framework for the investigation of the suitability of different experimental educational environments to deliver quality teaching and learning. PURPOSE For the tertiary education sector involved with technical or scientific training, a research framework capable of assessing the affordances of laboratory venues is an important aid during the planning, designing and evaluating stages of face-to-face and online (or cyber) environments that facilitate student experimentation. Providing quality experimental learning venues has been identified as one of the distance-education providers’ greatest challenges. DESIGN/METHOD The investigation draws on the expertise of staff at three Australian universities: Swinburne University of Technology (SUT), Curtin University (Curtin) and Queensland University of Technology (QUT). The aim was to analyse video recorded data, in order to identify the occurrences of kikan-shido (a Japanese term meaning ‘between desks instruction’ and over-the-shoulder learning and teaching (OTST/L) events, thereby ascertaining the pedagogical affordances in face-to-face laboratories. RESULTS These will be disseminated at a Master Class presentation at this conference. DISCUSSION Kikan-shido occurrences did reflect on the affordances of the venue. Unlike with other data collection methods, video recorded data and its analysis is repeatable. Participant bias is minimised or even eradicated and researcher bias tempered by enabling re-coding by others. CONCLUSIONS Framework facilitates the identification of experiential face-to-face learning venue affordances. Investigation will continue with on-line venues.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Gene expression is arguably the most important indicator of biological function. Thus identifying differentially expressed genes is one of the main aims of high throughout studies that use microarray and RNAseq platforms to study deregulated cellular pathways. There are many tools for analysing differentia gene expression from transciptomic datasets. The major challenge of this topic is to estimate gene expression variance due to the high amount of ‘background noise’ that is generated from biological equipment and the lack of biological replicates. Bayesian inference has been widely used in the bioinformatics field. In this work, we reveal that the prior knowledge employed in the Bayesian framework also helps to improve the accuracy of differential gene expression analysis when using a small number of replicates. We have developed a differential analysis tool that uses Bayesian estimation of the variance of gene expression for use with small numbers of biological replicates. Our method is more consistent when compared to the widely used cyber-t tool that successfully introduced the Bayesian framework to differential analysis. We also provide a user-friendly web based Graphic User Interface for biologists to use with microarray and RNAseq data. Bayesian inference can compensate for the instability of variance caused when using a small number of biological replicates by using pseudo replicates as prior knowledge. We also show that our new strategy to select pseudo replicates will improve the performance of the analysis. - See more at: http://www.eurekaselect.com/node/138761/article#sthash.VeK9xl5k.dpuf

Relevância:

10.00% 10.00%

Publicador:

Resumo:

New Video Gamer: Africa Needs More Technology (CNN 12/12/2011) In December 2011 CNN news service online edition (Sutter, 2011) posted a short item about Cwi Nqane, a Khoisan man who entered Samsung’s Namibian World Cyber Games (WCG) heats held at the 2011 the annual Windhoek Show. Cwi Nqane won a place on the Namibian WCG team playing a smartphone game called Asphalt 6: Adrena-line (Gameloft, 2011). Cwi was presented with a ‘top of the line’ Samsung Galaxy tablet and subsequently sent to compete in Korea. Later, other news and game news websites re-reported the incident, which inspired a variety of enthusiastic comment about tech-nology and ‘new knowledge’. Then Kotaku news service picked up the item (Narcisse, 2011) and took a very different slant. Kotaku proposed that Samsung was exploiting Cwi and had assumed the role of a Techno-Tarzan: “striding into Nqane’s homeland and swinging him off into the wonders of the modern world where they can trot him out as a curiosity”. These two perspectives on the story of Cwi’s WCG entry expose two dominant views on Indigenous knowledges and technologies: ICTs as progress for in-digenous peoples and ICTs as disruptive and exploitative. Neither position, however, allows for the claiming of digital technology by indigenous communities, indeed both views position indigenous cultures as being outsiders.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Despite decades of research, bullying in all its forms is still a significant problem within schools in Australia, as it is internationally. Anti-bullying policies and guidelines are thought to be one strategy as part of a whole school approach to reduce bullying. However, although Australian schools are required to have these policies, their effectiveness is not clear. As policies and guidelines about bullying and cyberbullying are developed within education departments, this paper explores the perspectives of those who are involved in their construction. Purpose This study examined the perspectives of professionals involved in policy construction, across three different Australian states. The aim was to determine how their relative jurisdictions define bullying and cyberbullying, the processes for developing policy, the bullying prevention and intervention recommendations given to schools and the content considered essential in current policies. Sample Eleven key stakeholders from three Australian states with similar education systems were invited to participate. The sample selection criteria included professionals with experience and training in education, cyber-safety and the responsibility to contribute to or make decisions which inform policy in this area for schools in their state. Design and methods Participants were interviewed about the definitions of bullying they used in their state policy frameworks; the extent to which cyberbullying was included; and the content they considered essential for schools to include in anti-bullying policies. Data were collected through in-depth, semi-structured interviews and analysed thematically. Findings Seven themes were identified in the data: - (1) Definition of bullying and cyberbullying; - (2) Existence of a policy template; - (3) Policy location; - (4) Adding cyberbullying; - (5) Distinguishing between bullying and cyberbullying; - (6) Effective policy, and; - (7) Policy as a prevention or intervention tool. The results were similar both across state boundaries and also across different disciplines. Conclusion Analysis of the data suggested that, across the themes, there was some lack of information about bullying and cyberbullying. This limitation could affect the subsequent development, dissemination and sustainability of school anti-bullying policies, which have implications for the translation of research to inform better student outcomes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Microvolunteering is bite-size volunteering with no commitment to repeat and minimum formality, involving short and specific actions. Online microvolunteering occurs through an internet-connected device. University students' online microvolunteering decisions were investigated using an extended theory of planned behavior (TPB) comprising attitudes and normative and control perceptions, with the additional variables of moral norm and group norm. Participants (N = 303) completed the main TPB questionnaire and 1-month follow-up survey (N = 171) assessing engagement in online microvolunteering. Results generally supported standard and additional TPB constructs predicting intention. Intention predicted behavior. The findings suggest an important role for attitudes and moral considerations in understanding what influences this increasingly popular form of online activity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Rencontre entre le Sud et le Nord Depuis des siècles, les pays méditerranéens ont entretenu des relations actives avec le Nord de l’Europe. Les regions du Nord ont été conquises et converties, manipulées et colonisées, mais aussi intégrées dans les réseaux commerciaux, scientifi ques, culturels et touristiques. Les voyageurs du Sud de l’Europe ont peu à peu découvert les regions plurielles du Nord de la Finlande, de la Suède, de la Norvège et de la presqu’île de Kola. L’attraction focntionnait aussi dans l’autre sens. Pour les gens du Nord, scientifi ques ou artistes, le Sud de l’Europe constituait une destination aussi exotique aue la Laponie pour ceux du Sud. Dans ce recueil, nous proposons dix points de vue sur ces échanges et réseaux entre la Sud et le Nord. Le premier chapitre présente Tornio, connue très tôt comme la porte de la Laponie, les premières relations scientifi ques entre le Nord et le Sud, ainsi que les exhibitions de Samis dans les métropoles européennes. Le deuxième chapitre propose une analyse des experiences et des impressions de voyageurs italiens, espagnols et français. Le dernier chapitre est consacré aux voyages d’artistes et écrivains fi nlandais en France, principalement à Paris. Ces rencontres entre le Sud et le Nord qui participèrent à la remise en cause, la relativisation et la construction des identities nationals et ethniques, permirent aussi de créer une conscience européenne commune.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The unique characteristics of marketspace in combination with the fast growing number of consumers interested in e-commerce have created new research areas of interest to both marketing and consumer behaviour researchers. Consumer behaviour researchers interested in the decision making processes of consumers have two new sets of questions to answer. The first set of questions is related to how useful theories developed for a marketplace are in a marketspace context. Cyber auctions, Internet communities and the possibilities for consumers to establish dialogues not only with companies but also with other consumers make marketspace unique. The effects of these distinctive characteristics on the behaviour of consumers have not been systematically analysed and therefore constitute the second set of questions which have to be studied. Most companies feel that they have to be online even though the effects of being on the Net are not unambiguously positive. The relevance of the relationship marketing paradigm in a marketspace context have to be studied. The relationship enhancement effects of websites from the customers’ point of view are therefore emphasized in this research paper. Representatives of the Net-generation were analysed and the results show that companies should develop marketspace strategies while Net presence has a value-added effect on consumers. The results indicate that the decision making processes of the consumers are also changing as a result of the progress of marketspace

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Network Intrusion Detection Systems (NIDS) intercept the traffic at an organization's network periphery to thwart intrusion attempts. Signature-based NIDS compares the intercepted packets against its database of known vulnerabilities and malware signatures to detect such cyber attacks. These signatures are represented using Regular Expressions (REs) and strings. Regular Expressions, because of their higher expressive power, are preferred over simple strings to write these signatures. We present Cascaded Automata Architecture to perform memory efficient Regular Expression pattern matching using existing string matching solutions. The proposed architecture performs two stage Regular Expression pattern matching. We replace the substring and character class components of the Regular Expression with new symbols. We address the challenges involved in this approach. We augment the Word-based Automata, obtained from the re-written Regular Expressions, with counter-based states and length bound transitions to perform Regular Expression pattern matching. We evaluated our architecture on Regular Expressions taken from Snort rulesets. We were able to reduce the number of automata states between 50% to 85%. Additionally, we could reduce the number of transitions by a factor of 3 leading to further reduction in the memory requirements.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In a cyber physical system like vehicles number of signals to be communicated in a network system has an increasing trend. More and more mechanical and hydraulic parts are replaced by electronic control units and infotainment and multimedia applications has increased in vehicles. Safety critical hard real time messages and aperiodic messages communicated between electronic control units have been increased in recent times. Flexray is a high bandwidth protocol consisting of static segment for supporting hard real time messages and a dynamic segment for transmitting soft and non real time messages. In this paper, a method to obtain the stability region for the random arrival of messages in each electronic control units which is scheduled in the dynamic segment of Flexray protocol is presented. Number of mini slots available in the dynamic segment of Flexray restricts the arrival rate of tasks to the micro controllers or the number of micro controllers connected to the Flexray bus. Stability region of mathematical model of the system is compared with the Flexray protocol simulation results.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Gene microarray technology is highly effective in screening for differential gene expression and has hence become a popular tool in the molecular investigation of cancer. When applied to tumours, molecular characteristics may be correlated with clinical features such as response to chemotherapy. Exploitation of the huge amount of data generated by microarrays is difficult, however, and constitutes a major challenge in the advancement of this methodology. Independent component analysis (ICA), a modern statistical method, allows us to better understand data in such complex and noisy measurement environments. The technique has the potential to significantly increase the quality of the resulting data and improve the biological validity of subsequent analysis. We performed microarray experiments on 31 postmenopausal endometrial biopsies, comprising 11 benign and 20 malignant samples. We compared ICA to the established methods of principal component analysis (PCA), Cyber-T, and SAM. We show that ICA generated patterns that clearly characterized the malignant samples studied, in contrast to PCA. Moreover, ICA improved the biological validity of the genes identified as differentially expressed in endometrial carcinoma, compared to those found by Cyber-T and SAM. In particular, several genes involved in lipid metabolism that are differentially expressed in endometrial carcinoma were only found using this method. This report highlights the potential of ICA in the analysis of microarray data.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is an increasing number of Ambient Intelligence (AmI) systems that are time-sensitive and resource-aware. From healthcare to building and even home/office automation, it is now common to find systems combining interactive and sensing multimedia traffic with relatively simple sensors and actuators (door locks, presence detectors, RFIDs, HVAC, information panels, etc.). Many of these are today known as Cyber-Physical Systems (CPS). Quite frequently, these systems must be capable of (1) prioritizing different traffic flows (process data, alarms, non-critical data, etc.), (2) synchronizing actions in several distributed devices and, to certain degree, (3) easing resource management (e.g., detecting faulty nodes, managing battery levels, handling overloads, etc.). This work presents FTT-MA, a high-level middleware architecture aimed at easing the design, deployment and operation of such AmI systems. FTT-MA ensures that both functional and non-functional aspects of the applications are met even during reconfiguration stages. The paper also proposes a methodology, together with a design tool, to create this kind of systems. Finally, a sample case study is presented that illustrates the use of the middleware and the methodology proposed in the paper.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cyber-physical systems integrate computation, networking, and physical processes. Substantial research challenges exist in the design and verification of such large-scale, distributed sensing, ac- tuation, and control systems. Rapidly improving technology and recent advances in control theory, networked systems, and computer science give us the opportunity to drastically improve our approach to integrated flow of information and cooperative behavior. Current systems rely on text-based spec- ifications and manual design. Using new technology advances, we can create easier, more efficient, and cheaper ways of developing these control systems. This thesis will focus on design considera- tions for system topologies, ways to formally and automatically specify requirements, and methods to synthesize reactive control protocols, all within the context of an aircraft electric power system as a representative application area.

This thesis consists of three complementary parts: synthesis, specification, and design. The first section focuses on the synthesis of central and distributed reactive controllers for an aircraft elec- tric power system. This approach incorporates methodologies from computer science and control. The resulting controllers are correct by construction with respect to system requirements, which are formulated using the specification language of linear temporal logic (LTL). The second section addresses how to formally specify requirements and introduces a domain-specific language for electric power systems. A software tool automatically converts high-level requirements into LTL and synthesizes a controller.

The final sections focus on design space exploration. A design methodology is proposed that uses mixed-integer linear programming to obtain candidate topologies, which are then used to synthesize controllers. The discrete-time control logic is then verified in real-time by two methods: hardware and simulation. Finally, the problem of partial observability and dynamic state estimation is ex- plored. Given a set placement of sensors on an electric power system, measurements from these sensors can be used in conjunction with control logic to infer the state of the system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Esta dissertação se insere nos estudos de Linguística e é vinculada à Análise Crítica do Discurso (FAIRCLOUGH, 1989, 2003) e à Linguística Sistêmico-Funcional (HALLIDAY, 1970, 1973), investigando o que é a qualidade literária para os internautas que interagem em fóruns de discussão do Orkut, à luz da Teoria da Valoração (MARTIN ; WHITE, 2005). De acordo com as categorias que abrangem o subsistema da Atitude da Teoria da Valoração (MARTIN ; WHITE, 2005), analisa-se como os leitores internautas se posicionam sobre a questão da qualidade literária e a ideologia que perpassa seus discursos. O conceito de ideologia adotado é o proposto por Thompson (2009), para quem o conceito deve ser compreendido a partir da noção de hegemonia e poder, ou seja, a ideologia necessariamente estabelece e sustenta relações de dominação, reproduzindo a ordem social que favorece indivíduos e grupos dominantes.O corpus desta pesquisa é composto de três amostras colhidas entre 15/07/2009 e 05/01/2010 correspondentes a uma discussão iniciada em comunidade relacionada a assuntos literários. A AMOSTRA 1 refere-se ao tópico Leitura difícil é sinal de qualidade?, da comunidade Literatura; a AMOSTRA 2, se refere ao tópico Qualidade do texto literário, da comunidade Discutindo... literatura e, por fim, a AMOSTRA 3 representa o tópico O que é um bom texto literário para você, também da comunidade Literatura. Cada discussão possui congruências e divergências quanto às representações sobre literatura e essas foram também analisadas. Não obstante, o que nos interessa é perceber como as ideologias perpassam seus discursos de acordo com os valores que os internautas atribuem a aspectos do texto literário. Foram escolhidos fóruns de discussão online do Orkut porque as interações em redes sociais constituem elemento novo das práticas sociais e, portanto, relevantes pontos de apoio para a investigação da criação de sentidos sobre o conceito de boa literatura. Investigar como a literatura, objeto de estudo acadêmico, é analisada em tais espaços cibernéticos é instigante, por não ser usual. Os resultados obtidos nessa pesquisa sugerem que o internauta reproduz o discurso acadêmico hegemônico acerca da qualidade literária ao debater a qualidade intrínseca do texto literário com a ressalva de manifestar seu contentamento ou descontentamento acerca de determinados textos literários e escritores, dado novo que revela uma característica deste espaço não institucional de discussão, em que os internautas se sentem à vontade para manifestar sua opinião

Relevância:

10.00% 10.00%

Publicador:

Resumo:

[ES]Los sistemas Ciber-Físicos (Cyber-Physical Systems – CPS) son dispositivos que integran computación, control y comunicaciones. Actualmente se puede encontrar este tipo de sistemas en áreas tan diversas como la industria aeroespacial, automotriz, procesos químicos, infraestructura civil, etc. Entre las arquitecturas de comunicación empleadas en estos dispositivos, OPC UA se consolida como la más adecuada. OPC Unified Architecture es la nueva generación de tecnología propuesta por OPC Foundation para transmitir datos en bruto e información pre procesada entre los niveles de producción y los sistemas de planificación de producto de la empresa. Mediante OPC UA se puede disponer de toda la información deseada para cualquier aplicación y usuario autorizados, en cualquier instante y en cualquier lugar. En este proyecto se pretende desarrollar una arquitectura basada en OPC UA sobre CPSs para el acceso a datos de producción. Para ello se partirá de arquitecturas basadas en PC empotrados y redes de comunicación industriales.