991 resultados para DL-PCBs
Resumo:
This paper describes an interactive installation work set in a large dome space. The installation is an audio and physical re-rendition of an interactive writing work. In the original work, the user interacted via keyboard and screen while online. This rendition of the work retains the online interaction, but also places the interaction within a physical space, where the main 'conversation' takes place by the participant-audience speaking through microphones and listening through headphones. The work now also includes voice and SMS input, using speech-to-text and text-to-speech conversion technologies, and audio and displayed text for output. These additions allow the participant-audience to co-author the work while they participate in audible conversation with keyword-triggering characters (bots). Communication in the space can be person-to-computer via microphone, keyboard, and phone; person-to-person via machine and within the physical space; computer-to- computer; and computer-to-person via audio and projected text.
Resumo:
This undergraduate student paper explores usage of mixed reality techniques as support tools for conceptual design. A proof-of-concept was developed to illustrate this principle. Using this as an example, a small group of designers was interviewed to determine their views on the use of this technology. These interviews are the main contribution of this paper. Several interesting applications were determined, suggesting possible usage in a wide range of domains. Paper-based sketching, mixed reality and sketch augmentation techniques complement each other, and the combination results in a highly intuitive interface.
Resumo:
This paper examines the role of visual information in a remote help-giving situation involving the collaborative physical task of designing a prototype remote control. We analyze a set of video recordings captured within an experimental setting. Our analysis shows that using gestures and relevant artefacts and by projecting activities on the camera, participants were able to discuss several design-related issues. The results indicate that with a limited camera view (mainly faces and shoulders), participants' conversations were centered at the physical prototype that they were designing. The socially organized use of our experimental setting provides some key implications for designing future remote collaborative systems.
Resumo:
Persistent organic pollutants (POPs) such as dioxins, PCBs, persistent organochlorine pesticides (OCPs) and polybrominated diphenyl ethers (PBDEs) as well as perfluorinated compounds (PFCs) and triclosan are ubiquitous in the human population. In Australia, we have pooled and subsequently analysed over 10 000 human serum samples for the determination of these chemicals by age group (0–0.5; 0.6–1; 1.1–1.5; 1.6–2; 2.1–2.5; 2.6–3; 3.1–3.5; 3.6–4; 4.1–6; 6.1–9; 9.1–12; 12.1–15; 16–30; 31–45; 46–60 and >60 years) and gender. The results of this analysis were then used to assess the trends of these different chemicals as a function of age, gender and to a lesser extent region. Our data demonstrate clear chemical specific age trends. In particular we demonstrate that for the traditional POPs there is an increase in body burden with age whereas the opposite is true for chemicals such as PBDEs. For PFCs we find chemical specific age trends that vary from compound to compound. For triclosan we show that no apparent age trend is observable. The results of the study and its implications to the collection and archiving of samples for retrospective analysis are discussed.
Resumo:
In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.
Resumo:
In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.
Resumo:
Early works on Private Information Retrieval (PIR) focused on minimizing the necessary communication overhead. They seemed to achieve this goal but at the expense of query response time. To mitigate this weakness, protocols with secure coprocessors were introduced. They achieve optimal communication complexity and better online processing complexity. Unfortunately, all secure coprocessor-based PIR protocols require heavy periodical preprocessing. In this paper, we propose a new protocol, which is free from the periodical preprocessing while offering the optimal communication complexity and almost optimal online processing complexity. The proposed protocol is proven to be secure.
Resumo:
Database watermarking has received significant research attention in the current decade. Although, almost all watermarking models have been either irreversible (the original relation cannot be restored from the watermarked relation) and/or non-blind (requiring original relation to detect the watermark in watermarked relation). This model has several disadvantages over reversible and blind watermarking (requiring only watermarked relation and secret key from which the watermark is detected and original relation is restored) including inability to identify rightful owner in case of successful secondary watermarking, inability to revert the relation to original data set (required in high precision industries) and requirement to store unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store original database at a secure secondary storage.
Resumo:
In this paper we describe the design of DNA Jewellery, which is a wearable tangible data representation of personal DNA profile data. An iterative design process was followed to develop a 3D form-language that could be mapped to standard DNA profile data, with the aim of retaining readability of data while also producing an aesthetically pleasing and unique result in the area of personalized design. The work explores design issues with the production of data tangibles, contributes to a growing body of research exploring tangible representations of data and highlights the importance of approaches that move between technology, art and design.
Resumo:
In many cities around the world, surveillance by a pervasive net of CCTV cameras is a common phenomenon in an attempt to uphold safety and security across the urban environment. Video footage is being recorded and stored, sometimes live feeds are being watched in control rooms hidden from public access and view. In this study, we were inspired by Steve Mann’s original work on sousveillance (surveillance from below) to examine how a network of camera equipped urban screens could allow the residents of Oulu in Finland to collaborate on the safekeeping of their city. An agile, rapid prototyping process led to the design, implementation and ‘in the wild’ deployment of the UbiOpticon screen application. Live video streams captured by web cams integrated at the top of 12 distributed urban screens were broadcast and displayed in a matrix arrangement on all screens. The matrix also included live video streams of two roaming mobile phone cameras. In our field study we explored the reactions of passers-by and users of this screen application that seeks to inverse Bentham’s original panopticon by allowing the watched to be watchers at the same time. In addition to the original goal of participatory sousveillance, the system’s live video feature sparked fun and novel user-led apprlopriations.
Resumo:
Falling prices have led to an ongoing spread of public displays in urban areas. Still, they mostly show passive content such as commercials and digital signage. At the same time, technological advances have enabled the creation of interactive displays potentially increasing their attractiveness for the audience, e.g. through providing a platform for civic discourse. This poses considerable challenges, since displays need to communicate the opportunity to engage, motivate the audience to do so, and be easy to use. In this paper we present Vote With Your Feet, a hyperlocal public polling tool for urban screens allowing users to express their opinions. Similar to vox populi interviews on TV or polls on news websites, the tool is meant to reflect the mindset of the community on topics such as current affairs, cultural identity and local matters. It is novel in that it focuses on a situated civic discourse and provides a tangible user interface, tackling the mentioned challenges. It shows one Yes/No question at a time and enables users to vote by stepping on one of two tangible buttons on the ground. This user interface was introduced to attract people’s attention and to lower participation barriers. Our field study showed that Vote With Your Feet is perceived as inviting and that it can spark discussions among co-located people.
Resumo:
In this paper we describe the use and evaluation of CubIT, a multi-user, very large-scale presentation and collaboration framework. CubIT is installed at the Queensland University of Technology’s (QUT) Cube facility. The “Cube” is an interactive visualisation facility made up of five very large-scale interactive multi-panel wall displays, each consisting of up to twelve 55-inch multi-touch screens (48 screens in total) and massive projected display screens situated above the display panels. The paper outlines the unique design challenges, features, use and evaluation of CubIT. The system was built to make the Cube facility accessible to QUT’s academic and student population. CubIT enables users to easily upload and share their own media content, and allows multiple users to simultaneously interact with the Cube’s wall displays. The features of CubIT are implemented via three user interfaces, a multi-touch interface working on the wall displays, a mobile phone and tablet application and a web-based content management system. The evaluation reveals issues around the public use and functional scope of the system.
Resumo:
Changes in the construction sector are creating opportunities in research to maximise the benefits of those changes and to continue the exciting developments in improved people skills, new processes and developing technologies. Many research centres around the world are investigating aspects of the current changes to drive their particular expertise forward. However, the CIB Integrated Design and Delivery Solutions (IDDS) priority research theme takes a higher-level view of the changes and then focuses down on a prioritised set of research targets. These targets have been investigated, re-focussed and validated over a period of four years through many workshops, conferences and meetings by a wide ranging group of representatives from approximately 90 industry and research organisations. The outcomes of such research, once put into practice should be significantly shortened timespans from conception of need to occupation of new or revised structures. As time is money, the owners will get their investments into productive use sooner, which means a shorter payback time. In addition, there will inevitably be a reduction in construction costs as productivity increases. The improvements in reliable delivery and improved quality currently being seen in relatively simplistic use of Building information Modelling (BIM) (compared to full IDDS) will inevitably continue its on-going trajectory of improvement. We should also consider the wider economic contribution to society that will stem from such improvements and, finally, and by no means unimportantly, the reliable modelling and delivery of sustainability at both the building and estate/ area scale will significantly improve carbon footprints and other sustainable outcomes. Whilst there are huge opportunities for early adopters, the primary risk will be the expansion of the gap between those working in this way and those who are not so advanced or who even refuse to progress . The opportunities to address the significant and widely varying wastes within the structure of the construction sector and within and across projects are huge and timely and industry is encouraged to become involved.
Resumo:
Changes in the construction sector are creating opportunities in research to maximise the benefits of those changes and to continue the exciting developments in improved people skills, new processes and developing technologies. There are many research centres around the world investigating aspects of the current changes to drive their particular expertise forward. However, the CIB Integrated Design and Delivery Solutions (IDDS) priority research theme takes a higher-level view of the changes and then focuses down on a prioritised set of research targets. These targets have been investigated, re-focussed and validated over a period of four years through many workshops, conferences and meetings by a wide ranging group of representatives from approximately 90 industry and research organisations. This roadmap prioritises and details the research to be performed, why and by whom. In particular, some 25 CIB Working Commissions and Task Groups are explained as having potential roles in the delivery of this research theme. We are extremely privileged to have been urged on by such distinguished construction professionals in their forewords and the case for research. The outcomes of such research, once put into practice should be significantly shortened timespans from conception of need to occupation of new or revised structures. As time is money, the owners will get their investments into productive use sooner, which means a shorter payback time. In addition, there will inevitably be a reduction in construction costs as productivity increases. The improvements in reliable delivery and improved quality currently being seen in relatively simplistic use of Building information Modelling (BIM) (compared to full IDDS) will inevitably continue its on-going trajectory of improvement. We should also consider the wider economic contribution to society that will stem from such improvements and, finally, and by no means unimportantly, the reliable modelling and delivery of sustainability at both the building and estate/ area scale will significantly improve carbon footprints and other sustainable outcomes. Whilst there are huge opportunities for early adopters, the primary risk will be the expansion of the gap between those working in this way and those who are not so advanced or who even refuse to progress1. However, a similar issue arises between industry, clients, educators and trainers; the latter have particular challenges, having existed for many years in a sector that has had relatively few technological changes. However, the opportunities to address the significant and widely varying wastes within the structure of the construction sector and within and across projects are huge and timely. Whilst this Roadmap is specifically targeted at the Standing Commissions and Task Groups of the CIB, it is hoped that there are elements for research and applied research across academia and industry.
Resumo:
Social media tools are starting to become mainstream and those working in the software development industry are often ahead of the game in terms of using current technological innovations to improve their work. With the advent of outsourcing and distributed teams the software industry is ideally placed to take advantage of social media technologies, tools and environments. This paper looks at how social media is being used by early adopters within the software development industry. Current tools and trends in social media tool use are described and critiqued: what works and what doesn't. We use industrial case studies from platform development, commercial application development and government contexts which provide a clear picture of the emergent state of the art. These real world experiences are then used to show how working collaboratively in geographically dispersed teams, enabled by social media, can enhance and improve the development experience.