231 resultados para devising


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Teaching and learning in working groups is a challenge to both teacher and student. Collaboration is an elusive concept, difficult to teach, impossible to enforce, yet the ability to work in this way is an essential characteristic of any Creative Industries professional. In 2006, a group of creative industries students were charged with the task of collaboratively creating a performance as part of their coursework. This research project closely followed their development as agents of collaborative creativity using an innovative methodology which combined performance and documentary making. The result is COLLABORATORY - a DVD documentary isolating key behaviours and features of collaborative learning: Convergence and divergence of ideas, Characters and behaviours in collaboration, Leadership and facilitation, Motivation and Intersubjectivity. An engaging presentation of theory and practice capturing what Meill and Littleton (2004) call “the emotional dance of collaboration”.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In teaching introductory economics there has been a tendency to put a lot of emphasis on imparting abstract models and technical skills to students (Stilwell, 2005; Voss, Blais, Greens, & Ahwesh, 1986). This model building approach has the merit of preparing the grounding for students 10 pursue further studies in economics. However, in a business degree with only a small proportion of students majoring in economics, such an approach tend to alienate the majority of students transiting from high school in to university. Surveys in Europe and Australia found that students complained about the lack of relevance of economics courses to the real world and the over-reliance of abstract mathematical modelling (Kirman, 2001; Lewis and Norris, 1997; Siegfried & Round, 2000). BSB112 Economics 1 is one of the eight faculty core units in the Faculty of Business at QUT, with over 1000 students in each semester. In semester I 2008, a new approach to teaching this unit was designed aiming to achieve three inter-related objectives: (1) to provide business students with a first insight into economic thinking and language, (2) to integrate economic analysis with current Australian social, environmental and political issues, and (3) to cater for students with a wide range of academic needs. Strategies used to achieve these objectives included writing up a new text which departs from traditional economics textbooks in important ways, integrating students' cultures in teaching and learning activities, and devising a new assessment format to encourage development of research skills and applications rather than reproduction of factual knowledge. This paper will document the strategies used in this teaching innovation, present quantitative and qualitative evidence to evaluate this new approach and suggest ways of further improvement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

While close talking microphones give the best signal quality and produce the highest accuracy from current Automatic Speech Recognition (ASR) systems, the speech signal enhanced by microphone array has been shown to be an effective alternative in a noisy environment. The use of microphone arrays in contrast to close talking microphones alleviates the feeling of discomfort and distraction to the user. For this reason, microphone arrays are popular and have been used in a wide range of applications such as teleconferencing, hearing aids, speaker tracking, and as the front-end to speech recognition systems. With advances in sensor and sensor network technology, there is considerable potential for applications that employ ad-hoc networks of microphone-equipped devices collaboratively as a virtual microphone array. By allowing such devices to be distributed throughout the users’ environment, the microphone positions are no longer constrained to traditional fixed geometrical arrangements. This flexibility in the means of data acquisition allows different audio scenes to be captured to give a complete picture of the working environment. In such ad-hoc deployment of microphone sensors, however, the lack of information about the location of devices and active speakers poses technical challenges for array signal processing algorithms which must be addressed to allow deployment in real-world applications. While not an ad-hoc sensor network, conditions approaching this have in effect been imposed in recent National Institute of Standards and Technology (NIST) ASR evaluations on distant microphone recordings of meetings. The NIST evaluation data comes from multiple sites, each with different and often loosely specified distant microphone configurations. This research investigates how microphone array methods can be applied for ad-hoc microphone arrays. A particular focus is on devising methods that are robust to unknown microphone placements in order to improve the overall speech quality and recognition performance provided by the beamforming algorithms. In ad-hoc situations, microphone positions and likely source locations are not known and beamforming must be achieved blindly. There are two general approaches that can be employed to blindly estimate the steering vector for beamforming. The first is direct estimation without regard to the microphone and source locations. An alternative approach is instead to first determine the unknown microphone positions through array calibration methods and then to use the traditional geometrical formulation for the steering vector. Following these two major approaches investigated in this thesis, a novel clustered approach which includes clustering the microphones and selecting the clusters based on their proximity to the speaker is proposed. Novel experiments are conducted to demonstrate that the proposed method to automatically select clusters of microphones (ie, a subarray), closely located both to each other and to the desired speech source, may in fact provide a more robust speech enhancement and recognition than the full array could.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dwell times at stations and inter-station run times are the two major operational parameters to maintain train schedule in railway service. Current practices on dwell-time and run-time control are that they are only optimal with respect to certain nominal traffic conditions, but not necessarily the current service demand. The advantages of dwell-time and run-time control on trains are therefore not fully considered. The application of a dynamic programming approach, with the aid of an event-based model, to devise an optimal set of dwell times and run times for trains under given operational constraints over a regional level is presented. Since train operation is interactive and of multi-attributes, dwell-time and run-time coordination among trains is a multi-dimensional problem. The computational demand on devising trains' instructions, a prime concern in real-time applications, is excessively high. To properly reduce the computational demand in the provision of appropriate dwell times and run times for trains, a DC railway line is divided into a number of regions and each region is controlled by a dwell- time and run-time controller. The performance and feasibility of the controller in formulating the dwell-time and run-time solutions for real-time applications are demonstrated through simulations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose of study: Traffic conflicts occur when trains on different routes approach a converging junction in a railway network at the same time. To prevent collisions, a right-of-way assignment is needed to control the order in which the trains should pass the junction. Such control action inevitably requires the braking and/or stopping of trains, which lengthens their travelling times and leads to delays. Train delays cause a loss of punctuality and hence directly affect the quality of service. It is therefore important to minimise the delays by devising a suitable right-of-way assignment. One of the major difficulties in attaining the optimal right-of-way assignment is that the number of feasible assignments increases dramatically with the number of trains. Connected-junctions further complicate the problem. Exhaustive search for the optimal solution is time-consuming and infeasible for area control (multi-junction). Even with the more intelligent deterministic optimisation method revealed in [1], the computation demand is still considerable, which hinders real-time control. In practice, as suggested in [2], the optimality may be traded off by shorter computation time, and heuristic searches provide alternatives for this optimisation problem.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Acoustic emission (AE) technique is one of the popular diagnostic techniques used for structural health monitoring of mechanical, aerospace and civil structures. But several challenges still exist in successful application of AE technique. This paper explores various tools for analysis of recorded AE data to address two primary challenges: discriminating spurious signals from genuine signals and devising ways to quantify damage levels.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Stereo vision is a method of depth perception, in which depth information is inferred from two (or more) images of a scene, taken from different perspectives. Applications of stereo vision include aerial photogrammetry, autonomous vehicle guidance, robotics, industrial automation and stereomicroscopy. A key issue in stereo vision is that of image matching, or identifying corresponding points in a stereo pair. The difference in the positions of corresponding points in image coordinates is termed the parallax or disparity. When the orientation of the two cameras is known, corresponding points may be projected back to find the location of the original object point in world coordinates. Matching techniques are typically categorised according to the nature of the matching primitives they use and the matching strategy they employ. This report provides a detailed taxonomy of image matching techniques, including area based, transform based, feature based, phase based, hybrid, relaxation based, dynamic programming and object space methods. A number of area based matching metrics as well as the rank and census transforms were implemented, in order to investigate their suitability for a real-time stereo sensor for mining automation applications. The requirements of this sensor were speed, robustness, and the ability to produce a dense depth map. The Sum of Absolute Differences matching metric was the least computationally expensive; however, this metric was the most sensitive to radiometric distortion. Metrics such as the Zero Mean Sum of Absolute Differences and Normalised Cross Correlation were the most robust to this type of distortion but introduced additional computational complexity. The rank and census transforms were found to be robust to radiometric distortion, in addition to having low computational complexity. They are therefore prime candidates for a matching algorithm for a stereo sensor for real-time mining applications. A number of issues came to light during this investigation which may merit further work. These include devising a means to evaluate and compare disparity results of different matching algorithms, and finding a method of assigning a level of confidence to a match. Another issue of interest is the possibility of statistically combining the results of different matching algorithms, in order to improve robustness.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Notwithstanding significant efforts by international aid agencies, aid ineffectiveness became apparent in 1990s as the impact of continued development intervention did not endure the expected outcomes. Conventional monitoring and evaluation by those agencies is critiqued for focusing on measuring project outcomes and giving little attention to aspects of sustainability. As a result, devising a rigorous evaluation framework for educational development has been sought in light of recent paradigm shifts in international development. This paper reports on a case study of an Egyptian educational development project highlighting the importance of transforming the evaluation procedures to process evaluation so as to enhance project impact and longevity. This requires building evaluation capacity of the aid recipient country.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Networked Control System (NCS) is a feedback-driven control system wherein the control loops are closed through a real-time network. Control and feedback signals in an NCS are exchanged among the system’s components in the form of information packets via the network. Nowadays, wireless technologies such as IEEE802.11 are being introduced to modern NCSs as they offer better scalability, larger bandwidth and lower costs. However, this type of network is not designed for NCSs because it introduces a large amount of dropped data, and unpredictable and long transmission latencies due to the characteristics of wireless channels, which are not acceptable for real-time control systems. Real-time control is a class of time-critical application which requires lossless data transmission, small and deterministic delays and jitter. For a real-time control system, network-introduced problems may degrade the system’s performance significantly or even cause system instability. It is therefore important to develop solutions to satisfy real-time requirements in terms of delays, jitter and data losses, and guarantee high levels of performance for time-critical communications in Wireless Networked Control Systems (WNCSs). To improve or even guarantee real-time performance in wireless control systems, this thesis presents several network layout strategies and a new transport layer protocol. Firstly, real-time performances in regard to data transmission delays and reliability of IEEE 802.11b-based UDP/IP NCSs are evaluated through simulations. After analysis of the simulation results, some network layout strategies are presented to achieve relatively small and deterministic network-introduced latencies and reduce data loss rates. These are effective in providing better network performance without performance degradation of other services. After the investigation into the layout strategies, the thesis presents a new transport protocol which is more effcient than UDP and TCP for guaranteeing reliable and time-critical communications in WNCSs. From the networking perspective, introducing appropriate communication schemes, modifying existing network protocols and devising new protocols, have been the most effective and popular ways to improve or even guarantee real-time performance to a certain extent. Most previously proposed schemes and protocols were designed for real-time multimedia communication and they are not suitable for real-time control systems. Therefore, devising a new network protocol that is able to satisfy real-time requirements in WNCSs is the main objective of this research project. The Conditional Retransmission Enabled Transport Protocol (CRETP) is a new network protocol presented in this thesis. Retransmitting unacknowledged data packets is effective in compensating for data losses. However, every data packet in realtime control systems has a deadline and data is assumed invalid or even harmful when its deadline expires. CRETP performs data retransmission only in the case that data is still valid, which guarantees data timeliness and saves memory and network resources. A trade-off between delivery reliability, transmission latency and network resources can be achieved by the conditional retransmission mechanism. Evaluation of protocol performance was conducted through extensive simulations. Comparative studies between CRETP, UDP and TCP were also performed. These results showed that CRETP significantly: 1). improved reliability of communication, 2). guaranteed validity of received data, 3). reduced transmission latency to an acceptable value, and 4). made delays relatively deterministic and predictable. Furthermore, CRETP achieved the best overall performance in comparative studies which makes it the most suitable transport protocol among the three for real-time communications in a WNCS.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aging and its effects on inflammation in skeletal muscle at rest and following exercise-induced muscle injury. Am J Physiol Regul Integr Comp Physiol 298: R1485-R1495, 2010. First published April 14, 2010; doi:10.1152/ajpregu.00467.2009.-The world's elderly population is expanding rapidly, and we are now faced with the significant challenge of maintaining or improving physical activity, independence, and quality of life in the elderly. Counteracting the progressive loss of muscle mass that occurs in the elderly, known as sarcopenia, represents a major hurdle in achieving these goals. Indirect evidence for a role of inflammation in sarcopenia is that markers of systemic inflammation correlate with the loss of muscle mass and strength in the elderly. More direct evidence is that compared with skeletal muscle of young people, the number of macrophages is lower, the gene expression of several cytokines is higher, and stress signaling proteins are activated in skeletal muscle of elderly people at rest. Sarcopenia may also result from inadequate repair and chronic maladaptation following muscle injury in the elderly. Macrophage infiltration and the gene expression of certain cytokines are reduced in skeletal muscle of elderly people compared with young people following exercise-induced muscle injury. Further research is required to identify the cause(s) of inflammation in skeletal muscle of elderly people. Additional work is also needed to expand our understanding of the cells, proteins, and transcription factors that regulate inflammation in the skeletal muscle of elderly people at rest and after exercise. This knowledge is critical for devising strategies to restrict sarcopenia, and improve the health of today's elderly population.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This project investigates musicalisation and intermediality in the writing and devising of composed theatre. Its research question asks “How does the narrative of a musical play differ when it emerges from a setlist of original songs?”, the aim being to create performance event that is neither music nor theatre. This involves composition of lyrics, music, action and spoken text, projected image: gathered in a script and presented in performance. Scholars such as Kulezic-Wilson(in Kendrick, L and Roesner, D 2011:34) outline the acoustic dimension to the ‘performative turn’ (Mungen, Ernst and Bentzweizer, 2012) as heralding “…a shift of emphasis on how meaning is created (and veiled) and how the spectrum of theatrical creation and reception is widened.” Rebstock and Roesner (2012) capture approaches similar to this, building on Lehmann’s work in the post-dramatic under the new term ‘composed theatre’. This practice led research draws influence from these new theoretical frames, pushing beyond ‘the musical’. Springing from a set of original songs in dialogue with performed narrative, Bear with Me is a 45 minute music driven work for children, involving projected image and participatory action. Bear with Me’s intermedial hybrid of theatrical, screen and concert presentations shows that a simple setlist of original songs can be the starting point for the structure of a complex intermedial performance. Bear with Me was programmed into the Queensland Performing Arts Centre’s Out of the Box Festival. It was first performed in the Tony Gould Gallery at the Queensland in June 2012. The season sold out. A masterclass on my playwriting methodology was presented at the Connecting The Dots Symposium which ran alongside the festival.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Historically rail organisations have been operating in silos and devising their own training agendas. However with the harmonisation of the Australian workplace health and safety legislation and the appointment of a national rail safety regulator in 2013, rail incident investigator experts are exploring the possibility of developing a unified approach to investigator training. Objectives: The Australian CRC for Rail Innovation commissioned a training needs analysis to identify if common training needs existed between organisations and to assess support for the development of a national competency framework for rail incident investigations. Method: Fifty-two industry experts were consulted to explore the possibility of the development of a standardised training framework. These experts were sourced from within 19 Australasian organisations, comprising Rail Operators and Regulators in Queensland, New South Wales, Victoria, Western Australia, South Australia and New Zealand. Results: Although some competency requirements appear to be organisation specific, the vast majority of reported training requirements were generic across the Australasian rail operators and regulators. Industry experts consistently reported strong support for the development of a national training framework. Significance: The identification of both generic training requirements across organisations and strong support for standardised training indicates that the rail industry is receptive to the development of a structured training framework. The development of an Australasian learning framework could: increase efficiency in course development and reduce costs; establish recognised career pathways; and facilitate consistency with regards to investigator training.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the 20 years since its inception, the EPPM has attracted much empirical support. Currently, and unsurprisingly given that is a model of fear-based persuasion, the EPPM’s explanatory utility has been based only upon fear-based messages. However, an argument is put forth herein, which draws upon existing evidence, that the EPPM may be an efficacious framework for explaining the persuasive process and outcomes of emotion-based messages more broadly when such messages are addressing serious health topics. For the current study, four different types of emotional appeals were purposefully devised and included a fear, an annoyance/agitation, a pride, and a humour-based message. All messages addressed the serious health issue of road safety, and in particular the risky behaviour of speeding. Participants (N = 551) were exposed to only one of the four messages and subsequently provided responses within a survey. A series of 2 (threat: low, high) x 2 (efficacy: low, high) analysis of variance was conducted for each of the appeals based on the EPPM’s message outcomes of acceptance and rejection. Support was found for the EPPM with a number of main effects of threat and efficacy emerging, reflecting that, irrespective of emotional appeal type, high levels of threat and efficacy enhanced message outcomes via maximising acceptance and minimising rejection. Theoretically, the findings provide support for the explanatory utility of the EPPM for emotion-based health messages more broadly. In an applied sense, the findings highlight the value of adopting the EPPM as a framework when devising and evaluating emotion-based health messages for serious health topics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.