948 resultados para Open-Source


Relevância:

60.00% 60.00%

Publicador:

Resumo:

This paper presents the idea of a compendium of process technologies, i.e., a concise but comprehensive collection of techniques for process model analysis that support research on the design, execution, and evaluation of processes. The idea originated from observations on the evolution of process-related research disciplines. Based on these observations, we derive design goals for a compendium. Then, we present the jBPT library, which addresses these goals by means of an implementation of common analysis techniques in an open source codebase.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Privacy is an important component of freedom and plays a key role in protecting fundamental human rights. It is becoming increasingly difficult to ignore the fact that without appropriate levels of privacy, a person’s rights are diminished. Users want to protect their privacy - particularly in “privacy invasive” areas such as social networks. However, Social Network users seldom know how protect their own privacy through online mechanisms. What is required is an emerging concept that provides users legitimate control over their own personal information, whilst preserving and maintaining the advantages of engaging with online services such as Social Networks. This paper reviews “Privacy by Design (PbD)” and shows how it applies to diverse privacy areas. Such an approach will move towards mitigating many of the privacy issues in online information systems and can be a potential pathway for protecting user’s personal information. The research has posed many questions in need of further investigation for different open source distributed Social Networks. Findings from this research will lead to a novel distributed architecture that provides more transparent and accountable privacy for the users of online information systems.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This paper presents a mapping and navigation system for a mobile robot, which uses vision as its sole sensor modality. The system enables the robot to navigate autonomously, plan paths and avoid obstacles using a vision based topometric map of its environment. The map consists of a globally-consistent pose-graph with a local 3D point cloud attached to each of its nodes. These point clouds are used for direction independent loop closure and to dynamically generate 2D metric maps for locally optimal path planning. Using this locally semi-continuous metric space, the robot performs shortest path planning instead of following the nodes of the graph --- as is done with most other vision-only navigation approaches. The system exploits the local accuracy of visual odometry in creating local metric maps, and uses pose graph SLAM, visual appearance-based place recognition and point clouds registration to create the topometric map. The ability of the framework to sustain vision-only navigation is validated experimentally, and the system is provided as open-source software.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Queensland University of Technology (QUT) Library offers a range of resources and services to researchers as part of their research support portfolio. This poster will present key features of two of the data management services offered by research support staff at QUT Library. The first service is QUT Research Data Finder (RDF), a product of the Australian National Data Service (ANDS) funded Metadata Stores project. RDF is a data registry (metadata repository) that aims to publicise datasets that are research outputs arising from completed QUT research projects. The second is a software and code registry, which is currently under development with the sole purpose of improving discovery of source code and software as QUT research outputs. RESEARCH DATA FINDER As an integrated metadata repository, Research Data Finder aligns with institutional sources of truth, such as QUT’s research administration system, ResearchMaster, as well as QUT’s Academic Profiles system to provide high quality data descriptions that increase awareness of, and access to, shareable research data. The repository and its workflows are designed to foster better data management practices, enhance opportunities for collaboration and research, promote cross-disciplinary research and maximise the impact of existing research data sets. SOFTWARE AND CODE REGISTRY The QUT Library software and code registry project stems from concerns amongst researchers with regards to development activities, storage, accessibility, discoverability and impact, sharing, copyright and IP ownership of software and code. As a result, the Library is developing a registry for code and software research outputs, which will use existing Research Data Finder architecture. The underpinning software for both registries is VIVO, open source software developed by Cornell University. The registry will use the Research Data Finder service instance of VIVO and will include a searchable interface, links to code/software locations and metadata feeds to Research Data Australia. Key benefits of the project include:improving the discoverability and reuse of QUT researchers’ code and software amongst QUT and the QUT research community; increasing the profile of QUT research outputs on a national level by providing a metadata feed to Research Data Australia, and; improving the metrics for access and reuse of code and software in the repository.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Organisations are constantly seeking efficiency gains for their business processes in terms of time and cost. Management accounting enables detailed cost reporting of business operations for decision making purposes, although significant effort is required to gather accurate operational data. Process mining, on the other hand, may provide valuable insight into processes through analysis of events recorded in logs by IT systems, but its primary focus is not on cost implications. In this paper, a framework is proposed which aims to exploit the strengths of both fields in order to better support management decisions on cost control. This is achieved by automatically merging cost data with historical data from event logs for the purposes of monitoring, predicting, and reporting process-related costs. The on-demand generation of accurate, relevant and timely cost reports, in a style akin to reports in the area of management accounting, will also be illustrated. This is achieved through extending the open-source process mining framework ProM.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In recent times, technology has advanced in such a manner that the world can now communicate in means previously never thought possible. Transnational organised crime groups, who have exploited these new technologies as basis for their criminal success, however, have not overlooked this development, growth and globalisation. Law enforcement agencies have been confronted with an unremitting challenge as they endeavour to intercept, monitor and analyse these communications as a means of disrupting the activities of criminal enterprises. The challenge lies in the ability to recognise and change tactics to match an increasingly sophisticated adversary. The use of communication interception technology, such as phone taps or email interception, is a tactic that when used appropriately has the potential to cause serious disruption to criminal enterprises. Despite the research that exists on CIT and TOC, these two bodies of knowledge rarely intersect. This paper builds on current literature, drawing them together to provide a clearer picture of the use of CIT in an enforcement and intelligence capacity. It provides a review of the literature pertaining to TOC, the structure of criminal enterprises and the vulnerability of communication used by these crime groups. Identifying the current contemporary models of policing it reviews intelligence-led policing as the emerging framework for modern policing. Finally, it assesses the literature concerning CIT, its uses within Australia and the limitations and arguments that exist. In doing so, this paper provides practitioners with a clearer picture of the use, barriers and benefits of using CIT in the fight against TOC. It helps to bridge the current gaps in modern policing theory and offers a perspective that can help drive future research.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In order to increase the accuracy of patient positioning for complex radiotherapy treatments various 3D imaging techniques have been developed. MegaVoltage Cone Beam CT (MVCBCT) can utilise existing hardware to implement a 3D imaging modality to aid patient positioning. MVCBCT has been investigated using an unmodified Elekta Precise linac and 15 iView amorphous silicon electronic portal imaging device (EPID). Two methods of delivery and acquisition have been investigated for imaging an anthropomorphic head phantom and quality assurance phantom. Phantom projections were successfully acquired and CT datasets reconstructed using both acquisition methods. Bone, tissue and air were 20 clearly resolvable in both phantoms even with low dose (22 MU) scans. The feasibility of MegaVoltage Cone beam CT was investigated using a standard linac, amorphous silicon EPID and a combination of a free open source reconstruction toolkit as well as custom in-house software written in Matlab. The resultant image quality has 25 been assessed and presented. Although bone, tissue and air were resolvable 2 in all scans, artifacts are present and scan doses are increased when compared with standard portal imaging. The feasibility of MVCBCT with unmodified Elekta Precise linac and EPID has been considered as well as the identification of possible areas for future development in artifact correction techniques to 30 further improve image quality.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

BACKGROUND There is a growing volume of open source ‘education material’ on energy efficiency now available however the Australian government has identified a need to increase the use of such materials in undergraduate engineering education. Furthermore, there is a reported need to rapidly equip engineering graduates with the capabilities in conducting energy efficiency assessments, to improve energy performance across major sectors of the economy. In January 2013, building on several years of preparatory action-research initiatives, the former Department of Industry, Innovation, Climate Change, Science, Research and Tertiary Education (DIICCSRTE) offered $600,000 to develop resources for energy efficiency related graduate attributes, targeting Engineers Australia college disciplines, accreditation requirements and opportunities to address such requirements. PURPOSE This paper discusses a $430,000 successful bid by a university consortium led by QUT and including RMIT, UA, UOW, and VU, to design and pilot several innovative, targeted open-source resources for curriculum renewal related to energy efficiency assessments, in Australian engineering programs (2013-2014), including ‘flat-pack’, ‘media-bites’, ‘virtual reality’ and ‘deep dive’ case study initiatives. DESIGN/ METHOD The paper draws on literature review and lessons learned by the consortium partners in resource development over the last several years to discuss methods for selecting key graduate attributes and providing targeted resources, supporting materials, and innovative delivery options to assist universities deliver knowledge and skills to develop such attributes. This includes strategic industry and key stakeholders engagement. The paper also discusses processes for piloting, validating, peer reviewing, and refining these resources using a rigorous and repeatable approach to engaging with academic and industry colleagues. RESULTS The paper provides an example of innovation in resource development through an engagement strategy that takes advantage of existing networks, initiatives, and funding arrangements, while informing program accreditation requirements, to produce a cost-effective plan for rapid integration of energy efficiency within education. By the conference, stakeholder workshops will be complete. Resources will be in the process of being drafted, building on findings from the stakeholder engagement workshops. Reporting on this project “in progress” provides a significant opportunity to share lessons learned and take on board feedback and input. CONCLUSIONS This paper provides a useful reference document for others considering significant resource development in a consortium approach, summarising benefits and challenges. The paper also provides a basis for documenting the second half of the project, which comprises piloting resources and producing a ‘good practice guide’ for energy efficiency related curriculum renewal.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This research has established a new privacy framework, privacy model, and privacy architecture to create more transparent privacy for social networking users. The architecture is designed into three levels: Business, Data, and Technology, which is based on The Open Group Architecture Framework (TOGAF®). This framework and architecture provides a novel platform for investigating privacy in Social Networks (SNs). This approach mitigates many current SN privacy issues, and leads to a more controlled form of privacy assessment. Ultimately, more privacy will encourage more connections between people across SN services.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Multi-touch interfaces across a wide range of hardware platforms are becoming pervasive. This is due to the adoption of smart phones and tablets in both the consumer and corporate market place. This paper proposes a human-machine interface to interact with unmanned aerial systems based on the philosophy of multi-touch hardware-independent high-level interaction with multiple systems simultaneously. Our approach incorporates emerging development methods for multi-touch interfaces on mobile platforms. A framework is defined for supporting multiple protocols. An open source solution is presented that demonstrates: architecture supporting different communications hardware; an extensible approach for supporting multiple protocols; and the ability to monitor and interact with multiple UAVs from multiple clients simultaneously. Validation tests were conducted to assess the performance, scalability and impact on packet latency under different client configurations.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

QUT Software Finder is a searchable repository of metadata describing software and source code, which has been created as a result of QUT research activities. It was launched in December 2013. https://researchdatafinder.qut.edu.au/scf The registry was designed to aid the discovery and visibility of QUT research outputs and encourage sharing and re-use of code and software throughout the research community, both nationally and internationally. The repository platform used is VIVO (an open source product initially developed at Cornell University). QUT Software Finder records that describe software or code are connected to information about researchers involved, the research groups, related publications and related projects. Links to where the software or code can be accessed from are also provided alongside licencing and re-use information.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Computer modelling has been used extensively in some processes in the sugar industry to achieve significant gains. This paper reviews the investigations carried out over approximately the last twenty five years,including the successes but also areas where problems and delays have been encountered. In that time the capability of both hardware and software have increased dramatically. For some processes such as cane cleaning, cane billet preparation, and sugar drying, the application of computer modelling towards improved equipment design and operation has been quite limited. A particular problem has been the large number of particles and particle interactions in these applications, which, if modelled individually, is computationally very intensive. Despite the problems, some attempts have already been made and knowledge gained on tackling these issues. Even if the detailed modelling is wanting, a model can provide some useful insights into the processes. Some options to attack these more intensive problems include the use of commercial software packages, which are usually very robust and allow the addition of user-supplied subroutines to adapt the software to particular problems. Suppliers of such software usually charge a fee per CPU licence, which is often problematic for large problems that require the use of many CPUs. Another option to consider is using open source software that has been developed with the capability to access large parallel resources. Such software has the added advantage of access to the full internal coding. This paper identifies and discusses the detail of software options with the potential capability to achieve improvements in the sugar industry.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The mining industry faces three long term strategic risks in relation to its water and energy use: 1) securing enough water and energy to meet increased production; 2) reducing water use, energy consumption and emissions due to social, environmental and economic pressures; and 3) understanding the links between water and energy, so that an improvement in one area does not create an adverse effect in another. This project helps the industry analyse these risks by creating a hierarchical systems model (HSM) that represents the water and energy interactions on a sub-site, site and regional scales; which is coupled with a flexible risk framework. The HSM consists of: components that represent sources of water and energy; activities that use water and energy and off-site destinations of water and produced emissions. It can also represent more complex components on a site, with inbuilt examples including tailings dams and water treatment plants. The HSM also allows multiple sites and other infrastructure to be connected together to explore regional water and energy interactions. By representing water and energy as a single interconnected system the HSM can explore tradeoffs and synergies. For example, on a synthetic case study, which represents a typical site, simulations suggested that while a synergy in terms of water use and energy use could be made when chemical additives were used to enhance dust suppression, there were trade-offs when either thickened tailings or dry processing were used. On a regional scale, the HSM was used to simulate various scenarios, including: mines only withdrawing water when needed; achieving economics-of-scale through use of a single centralised treatment plant rather than smaller decentralised treatment plants; and capturing of fugitive emissions for energy generation. The HSM also includes an integrated risk framework for interpreting model output, so that onsite and off-site impacts of various water and energy management strategies can be compared in a managerial context. The case studies in this report explored company, social and environmental risks for scenarios of regional water scarcity, unregulated saline discharge, and the use of plantation forestry to offset carbon emissions. The HSM was able to represent the non-linear causal relationship at the regional scale, such as the forestry scheme offsetting a small percentage of carbon emissions but causing severe regional water shortages. The HSM software developed in this project will be released as an open source tool to allow industry personnel to easily and inexpensively quantify and explore the links between water use, energy use, and carbon emissions. The tool can be easily adapted to represent specific sites or regions. Case studies conducted in this project highlighted the potential complexity of these links between water, energy, and carbon emissions, as well as the significance of the cumulative effects of these links over time. A deeper understanding of these links is vital for the mining industry in order to progress to more sustainable operations, and the HSM provides an accessible, robust framework for investigating these links.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This paper evaluates the performance of different text recognition techniques for a mobile robot in an indoor (university campus) environment. We compared four different methods: our own approach using existing text detection methods (Minimally Stable Extremal Regions detector and Stroke Width Transform) combined with a convolutional neural network, two modes of the open source program Tesseract, and the experimental mobile app Google Goggles. The results show that a convolutional neural network combined with the Stroke Width Transform gives the best performance in correctly matched text on images with single characters whereas Google Goggles gives the best performance on images with multiple words. The dataset used for this work is released as well.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

We used our TopSig open-source indexing and retrieval tool to produce runs for the ShARe/CLEF eHealth 2013 track. TopSig was used to produce runs using the query fields and provided discharge summaries, where appropriate. Although the improvement was not great TopSig was able to gain some benefit from utilising the discharge summaries, although the software needed to be modified to support this. This was part of a larger experiment involving determining the applicability and limits to signature-based approaches.