859 resultados para Embedded Constructions
Resumo:
Embedded generalized markup, as applied by digital humanists to the recording and studying of our textual cultural heritage, suffers from a number of serious technical drawbacks. As a result of its evolution from early printer control languages, generalized markup can only express a document’s ‘logical’ structure via a repertoire of permissible printed format structures. In addition to the well-researched overlap problem, the embedding of markup codes into texts that never had them when written leads to a number of further difficulties: the inclusion of potentially obsolescent technical and subjective information into texts that are supposed to be archivable for the long term, the manual encoding of information that could be better computed automatically, and the obscuring of the text by highly complex technical data. Many of these problems can be alleviated by asserting a separation between the versions of which many cultural heritage texts are composed, and their content. In this way the complex inter-connections between versions can be handled automatically, leaving only simple markup for individual versions to be handled by the user.
Resumo:
Autonomous Underwater Vehicles (AUVs) are revolutionizing oceanography through their versatility, autonomy and endurance. However, they are still an underutilized technology. For coastal operations, the ability to track a certain feature is of interest to ocean scientists. Adaptive and predictive path planning requires frequent communication with significant data transfer. Currently, most AUVs rely on satellite phones as their primary communication. This communication protocol is expensive and slow. To reduce communication costs and provide adequate data transfer rates, we present a hardware modification along with a software system that provides an alternative robust disruption- tolerant communications framework enabling cost-effective glider operation in coastal regions. The framework is specifically designed to address multi-sensor deployments. We provide a system overview and present testing and coverage data for the network. Additionally, we include an application of ocean-model driven trajectory design, which can benefit from the use of this network and communication system. Simulation and implementation results are presented for single and multiple vehicle deployments. The presented combination of infrastructure, software development and deployment experience brings us closer to the goal of providing a reliable and cost-effective data transfer framework to enable real-time, optimal trajectory design, based on ocean model predictions, to gather in situ measurements of interesting and evolving ocean features and phenomena.
Resumo:
One of the major challenges in the design of social technologies is the evaluation of their qualities of use and how they are appropriated over time. While the field of HCI abounds in short-term exploratory design and studies of use, relatively little attention has focused on the continuous development of prototypes longitudinally and studies of their emergent use. We ground the exploration and analysis of use in the everyday world, embracing contingency and open-ended use, through the use of a continuously-available exploratory prototype. Through examining use longitudinally, clearer insight can be gained of realistic, non-novelty usage and appropriation into everyday use. This paper sketches out a framework for design that puts a premium on immediate use and evolving the design in response to use and user feedback. While such design practices with continuously developing systems are common in the design of social technologies, they are little documented. We describe our approach and reflect upon its key characteristics, based on our experiences from two case studies. We also present five major patterns of long-term usage which we found useful for design.
Resumo:
Natural convection flow from an isothermal vertical plate with uniform heat source embedded in a stratified medium has been discussed in this paper. The resulting momentum and energy equations of boundary layer approximation are made non-similar by introducing the usual non-similarity transformations. Numerical solutions of these equations are obtained by an implicit finite difference method for a wide range of the stratification parameter, X. The solutions are also obtained for different values of pertinent parameters, namely, the Prandtl number, Pr and the heat generation or absorption parameter, λ and are expressed in terms of the local skin-friction and local heat transfer, which are shown in the graphical form. Effect of heat generation or absorption on the streamlines and isotherms are also shown graphically for different values of λ.
Resumo:
Defence organisations perform information security evaluations to confirm that electronic communications devices are safe to use in security-critical situations. Such evaluations include tracing all possible dataflow paths through the device, but this process is tedious and error-prone, so automated reachability analysis tools are needed to make security evaluations faster and more accurate. Previous research has produced a tool, SIFA, for dataflow analysis of basic digital circuitry, but it cannot analyse dataflow through microprocessors embedded within the circuit since this depends on the software they run. We have developed a static analysis tool that produces SIFA compatible dataflow graphs from embedded microcontroller programs written in C. In this paper we present a case study which shows how this new capability supports combined hardware and software dataflow analyses of a security critical communications device.
Resumo:
Data flow analysis techniques can be used to help assess threats to data confidentiality and integrity in security critical program code. However, a fundamental weakness of static analysis techniques is that they overestimate the ways in which data may propagate at run time. Discounting large numbers of these false-positive data flow paths wastes an information security evaluator's time and effort. Here we show how to automatically eliminate some false-positive data flow paths by precisely modelling how classified data is blocked by certain expressions in embedded C code. We present a library of detailed data flow models of individual expression elements and an algorithm for introducing these components into conventional data flow graphs. The resulting models can be used to accurately trace byte-level or even bit-level data flow through expressions that are normally treated as atomic. This allows us to identify expressions that safely downgrade their classified inputs and thereby eliminate false-positive data flow paths from the security evaluation process. To validate the approach we have implemented and tested it in an existing data flow analysis toolkit.
Resumo:
This chapter explores the changing intellectual landscapes and market-led research within academic institutions as the rise of 'embedded criminology' and argues for knowledges of resistance.
Resumo:
Construction sites around the world employ large numbers of people from diverse cultural backgrounds. The effective management of this cultural diversity has important implications for the productivity, safety, health and welfare of construction workers and for the performance and reputation of firms which employ them. The findings of a three year, multi-staged study of cultural diversity management practices on construction sites are critiqued using social identity theory. This reveals that so called "best-practice" diversity management strategies may have an opposite effect to that intended. It is concluded that the management of diversity on construction projects would benefit from being informed by social identity research.
Resumo:
This paper presents a new approach for network upgrading to improve the penetration level of Small Scale Generators in residential feeders. In this paper, it is proposed that a common DC link can be added to LV network to alleviate the negative impact of increased export power on AC lines, allowing customers to inject their surplus power with no restrictions to the common DC link. In addition, it is shown that the proposed approach can be a pathway from current AC network to future DC network.
Resumo:
This article explores legal, scholarly and social responses to women identified as sex offenders. While much has been written on the male paedophile, rapist and sex offender, little research has been done on the role of gender and sexuality in sex offending. This article examines the ways in which the female sex offender is currently theorized and the discourses surrounding policy, legislative and media responses to their crimes. We identify contradictory public discourses where perceptions of female child abusers in particular often succumb to moral panic, in spite of many such offenders being given lenient sentences for their crimes. An examination of the discursive construction of female child abusers suggests that these contradictions are informed by underlying assumptions concerning harm and subjectivity in sex crimes. In exploring these contradictions we illustrate the ways in which such discourses are impacted by social moralities, and how social moralities construct offender and victim subjectivities differently, based on differences in gender, age and sexuality.
Resumo:
This paper describes a qualitative study that investigated young adolescents’ self-constructions within the context of online (email) communication. Drawing from dialogical perspectives of self as multiply-situated and complex phenomena, the study focused on the everyday narratives of individual young adolescents interpreted as different “I” voices. With the assumption that computer mediation offers cultural relevance and empowerment to young adolescents, techniques of personal journal writing were used in combination with email as an alternative to face-to-face methods. Twelve participants aged 10 to 14 years were recruited online and by word-of-mouth with an invitation to write freely about their lives over a six month period in a participant-led email journal project. The role of the researcher was to develop a supportive voice of listener/responder that was intended to facilitate the emergence of participants’ own ‘self’ voices within an interactive space for relatively autonomous self-expression. Data as email texts were analysed using a close listening method that synchronised with the theory by revealing multi-layered patterns and shifts of voices in order to give a nuanced understanding of participants’ self and other evaluations. The paper shows that narrative methods used online and in concert with dialogical concepts have potential to heighten self-reflection and strengthen agency as a means to access rich and nuanced data from young adolescent individuals. The study’s findings contribute to a growing interest in the use of dialogical concepts to explore the ways people engage in active meaning-making while embedded in their specific social and cultural environments.
Resumo:
his study presents an improved method of dealing with embedded tax liabilities in portfolio choice. We argue that using a risk-free discount rate is appropriate for calculating the present value of future tax liabilities. Supportive of recent research, our results found a taxation-induced preference of holding equities over bonds, and a location preference of holding equities in the taxable account and bonds in retirement accounts. These important findings contrast with traditional investment advice which suggests a greater capacity for risk in retirement accounts.
Resumo:
Kinship care is the oldest form of alternative child care in the world. Recent years have witnessed a significant increase in the number of children being placed in kinship care across Western countries. However, in contrast to rapid knowledge advances about formal kinship care, far less is known about the needs of children in informal kinship care, especially in Asian contexts. This thesis and the study upon which it is formed sought to redress this knowledge gap. Qualitative approach was adopted to explore social constructions of children in informal kinship care in rural China. Parents in China seeking work in cities have left behind around 58 million rural children, mostly with relatives and without the involvement of the state. The present study examined caregivers’ and school personnel’s understandings of these school-age children’s needs through semi-structured interviews with 23 kin caregivers and five school personnel in Shijiapu Town, Jilin Province, China. The central question that guided the whole study is: What are the needs of children in informal kinship care in rural Jilin Province, China? Interpretative Phenomenological Analysis was used to categorise and interpret the qualitative data. Based on participants’ constructions, this study developed a need model with eight themes. They are: (1) emotional needs and mental health, (2) relationships, (3) empowerment and agency, (4) safety, (5) education, (6) basic care, (7) physical health, and (8) personal development. These needs are grounded in the Chinese context, and therefore a good understanding of Chinese culture is essential to address them. The first four needs particularly capture children’s separations from their parents, and the rest are more general, and can be applied to most Chinese children. To meet the most important need for children left behind, namely education, these caregivers determined that others needs sometimes have to be compromised. Children left behind are a vulnerable group in contemporary rural China, and their diverse needs are attended to by several groups. This study found that as children’s closest kin while their parents are away, caregivers play a vital role in salving the children’s emotional loss. Caregivers’ love and familial obligations strongly motivate them to care for these children, and sensitivity to social stigma makes them strive to show their love and care to compensate for perceived differences between these children and their peers. Caregivers’ efforts to make children happy, however, were sometimes criticised by some school personnel, who see this as spoiling. The conflicting viewpoint between caregivers and school personnel indicate their different roles and perceptions in children’s lives, and the latter influence these children in a more authoritative way. Informal kinship care has several advantages of addressing children’s needs, especially their needs for emotional bonds with family. Community-based kin networks provide children with both emotional and material support. However, these advantages sometimes are restricted by caregivers’ child rearing capacity. Having developed a model of the needs of children left behind in China, this study suggests that caregivers, school personnel and government social services work in harmony to be child-centred and meet these children’s diverse needs. The unmet needs of children left behind mainly result from unbalanced development between urban and rural China, therefore, it is imperative to enhance state policies and programs that improve wellbeing for this growing part of China’s people.