971 resultados para Electronic equipment
Resumo:
Dye-sensitised solar cells have emerged as an important developing technology for low-cost solar energy conversion and a crucial element of these is the dye, responsible for light harvesting and control of interfacial electron-transfer processes.[1] A number of examples of dye exist in the literature which link a ruthenium polypyridyl complex to another platinum group metal complex such as Ru (II), Os (II), Re (I) or Rh (III) via a bridging ligand.[2-6] These systems are often referred to as heterosupramolecular triads when adsorbed on the surface of TiO2 as the semiconductor becomes an active component in the system. A number of problems can arise with these types of sensitisers, for example if a flexible linker, e.g. bis-pyridylethane, is used to couple the two complexes it can be hard to control the orientation of the whole dye. This may lead to the resultant dye cation hole being closer to the surface than desired, and hence the long-lived charge-separated state is not achieved. In addition the size of these dyes may be much larger than that of a mononuclear complex and can lead to poor pore filling on the TiO2 and lower dye coverage, leading to a lower efficiency cell.[7] Despite these issues, efficient charge-separation has been achieved with polynuclear complexes and a long-lived state on the millisecond timescale has been observed for a trinuclear ruthenium complex.[8]
Resumo:
Intermediaries have introduced electronic services with varying success. One of the problems an intermediary faces is deciding what kind of exchange service it should offer to its customers and suppliers. For example, should it only provide a catalogue or should it also enable customers to order products? Developing the right exchange design is a complex undertaking because of the many design options on the one hand and the interests of multiple actors to be considered on the other. This is far more difficult than simple prescriptions like ‘creating a win-win situation’ suggest. We address this problem by developing design patterns for the exchanges between customers, intermediary, and suppliers related to role, linkage, transparency, and ovelty choices. For developing these design patterns, we studied four distinct electronic intermediaries and dentified exchange design choices that require trade-offs relating to the interests of customers, intermediary, and suppliers. The exchange design patterns contribute to the development of design theory for electronic intermediaries by filling a gap between basic business models and detailed business process designs.
Resumo:
The use of technology for purposes such as communication and document management has become essential to legal practice with practitioners and courts increasingly relying on various forms of technology. Accordingly, legal practitioners need to be able to understand, communicate with, and persuade their audience using this technology. Technology skills are therefore an essential and integral part of undergraduate legal education, and given the widening participation agenda in Australia and consequent increasing diversity of law students, it must also be available to all students. To neglect this most crucial part of modern legal education is to fail in a fundamental aspect of a University’s obligation not just to its students, but ultimately to our students’ potential employers and their future clients. This paper will consider how law schools can facilitate the development of technology skills by using technology to facilitate mooting in settings that replicate legal practice. In order to assess the facilities at the disposal of universities, the authors surveyed the law schools in Australia about their equipment in and use of electronic moot court rooms. The authors also conducted and evaluated an internal mooting competition using Elluminate, an online communication platform available to students through Blackboard. Students were able to participate wherever they were located without the need to attend a moot court room. The results of the survey and evaluation of the Elluminate competition will be discussed. The paper will conclude that while it is essential to teach technology skills as part of legal education, it is important that the benefits and importance of using technology be made clear in order for it to be accepted and embraced by the students. Technology must also be available to all students considering the widening participation in higher education and consequent increasing diversity of law students.
Resumo:
A patient-centric DRM approach is proposed for protecting privacy of health records stored in a cloud storage based on the patient's preferences and without the need to trust the service provider. Contrary to the current server-side access control solutions, this approach protects the privacy of records from the service provider, and also controls the usage of data after it is released to an authorized user.
Resumo:
This edition of the ALAR Action learning action research journal aims to capture some of the current dilemmas, solutions and actions researchers experience in the decolonising space. This collection of papers demonstrates that researchers are not only undertaking action research with and within Indigenous and non-Indigenous contexts, but that they are doing so in exciting and dynamic ways across a diversity of situations. First we will address some of the literature on decolonisation. Then we will explain how this specific edition of the Journal came to fruition and aspects of action research.
Resumo:
In the long term, with development of skill, knowledge, exposure and confidence within the engineering profession, rigorous analysis techniques have the potential to become a reliable and far more comprehensive method for design and verification of the structural adequacy of OPS, write Nimal J Perera, David P Thambiratnam and Brian Clark. This paper explores the potential to enhance operator safety of self-propelled mechanical plant subjected to roll over and impact of falling objects using the non-linear and dynamic response simulation capabilities of analytical processes to supplement quasi-static testing methods prescribed in International and Australian Codes of Practice for bolt on Operator Protection Systems (OPS) that are post fitted. The paper is based on research work carried out by the authors at the Queensland University of Technology (QUT) over a period of three years by instrumentation of prototype tests, scale model tests in the laboratory and rigorous analysis using validated Finite Element (FE) Models. The FE codes used were ABAQUS for implicit analysis and LSDYNA for explicit analysis. The rigorous analysis and dynamic simulation technique described in the paper can be used to investigate the structural response due to accident scenarios such as multiple roll over, impact of multiple objects and combinations of such events and thereby enhance the safety and performance of Roll Over and Falling Object Protection Systems (ROPS and FOPS). The analytical techniques are based on sound engineering principles and well established practice for investigation of dynamic impact on all self propelled vehicles. They are used for many other similar applications where experimental techniques are not feasible.
Resumo:
For more than a decade research in the field of context aware computing has aimed to find ways to exploit situational information that can be detected by mobile computing and sensor technologies. The goal is to provide people with new and improved applications, enhanced functionality and better use experience (Dey, 2001). Early applications focused on representing or computing on physical parameters, such as showing your location and the location of people or things around you. Such applications might show where the next bus is, which of your friends is in the vicinity and so on. With the advent of social networking software and microblogging sites such as Facebook and Twitter, recommender systems and so on context-aware computing is moving towards mining the social web in order to provide better representations and understanding of context, including social context. In this paper we begin by recapping different theoretical framings of context. We then discuss the problem of context- aware computing from a design perspective.
Resumo:
The purpose of this paper is to study the profiling of property, plant and equipment (PPE) contributions in Australia and Malaysia construction companies. A company’s worth is usually based on the listed share price on the stock exchange. In arriving at the net profit, the contribution of PPE in the company’s assets is somehow being neglected. This paper will investigate the followings; firstly the level of PPE contribution in the construction firms by comparing the PPE contributions to the company’s asset as a whole which includes fixed (non-current) assets and current assets. This will determine the true strength of the companies, rather than relying on the share prices alone. Secondly, the paper will determine the trend of company’s asset ownership to show the company’s performance of the PPE ownership during the period of study. The data is based on the selected construction companies listed on the Australian Stock Exchange (ASX) and Malaysian Stock Exchange, known as Bursa Malaysia. The profiling will help to determine the strength of the construction firms based on the PPE holding, and the level of PPE ownerships in the two countries construction firms during the period of study.
Resumo:
In this article we identify how computational automation achieved through programming has enabled a new class of music technologies with generative music capabilities. These generative systems can have a degree of music making autonomy that impacts on our relationships with them; we suggest that this coincides with a shift in the music-equipment relationship from tool use to a partnership. This partnership relationship can occur when we use technologies that display qualities of agency. It raises questions about the kinds of skills and knowledge that are necessary to interact musically in such a partnership. These are qualities of musicianship we call eBility. In this paper we seek to define what eBility might consist of and how consideration of it might effect music education practice. The 'e' in eBility refers not only to the electronic nature of computing systems but also to the ethical, enabling, experiential and educational dimensions of the creative relationship with technologies with agency. We hope to initiate a discussion around differentiating what we term representational technologies from those with agency and begin to uncover the implications of these ideas for music educators in schools and communities. We hope also to elucidate the emergent theory and practice that has enabled the development of strategies for optimising this kind of eBility where the tool becomes partner. The identification of musical technologies with agency adds to the authors’ list of metaphors for technology use in music education that previously included tool, medium and instrument. We illustrate these ideas with examples and with data from our work with the jam2jam interactive music system. In this discussion we will outline our experiences with jam2jam as an example of a technology with agency and describe the aspects of eBility that interaction with it promotes.
Resumo:
Security and privacy in electronic health record systems have been hindering the growth of e-health systems since their emergence. The development of policies that satisfy the security and privacy requirements of different stakeholders in healthcare has proven to be difficult. But, these requirements have to be met if the systems developed are to succeed in achieving their intended goals. Access control is a fundamental security barrier for securing data in healthcare information systems. In this paper we present an access control model for electronic health records. We address patient privacy requirements, confidentiality of private information and the need for flexible access for health professionals for electronic health records. We carefully combine three existing access control models and present a novel access control model for EHRs which satisfies requirements of electronic health records.
Resumo:
Melodic alarms proposed in the IEC 60601-1-8 standard for medical electrical equipment were tested for learnability and discriminability. Thirty-three non-anaesthetist participants learned the alarms over two sessions of practice, with or without mnemonics suggested in the standard. Fewer than 30% of participants could identify the alarms with 100% accuracy at the end of practice. Confusions persisted between pairs of alarms, especially if mnemonics were used during learning (p = 0.011). Participants responded faster (p < 0.00001) and more accurately (p = 0.002) to medium priority alarms than to high priority alarms, even though they rated the high priority alarms as sounding more urgent (p < 0.00001). Participants with at least 1 year of formal musical training identified the alarms more accurately (p = 0.0002) than musically untrained participants, and found the task easier overall (p < 0.00001). More intensive studies of the IEC 60601-1-8 alarms are needed for their effectiveness to be determined.