982 resultados para Educational Networks


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper a new graph-theory and improved genetic algorithm based practical method is employed to solve the optimal sectionalizer switch placement problem. The proposed method determines the best locations of sectionalizer switching devices in distribution networks considering the effects of presence of distributed generation (DG) in fitness functions and other optimization constraints, providing the maximum number of costumers to be supplied by distributed generation sources in islanded distribution systems after possible faults. The proposed method is simulated and tested on several distribution test systems in both cases of with DG and non DG situations. The results of the simulations validate the proposed method for switch placement of the distribution network in the presence of distributed generation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Video games have shown great potential as tools that both engage and motivate players to achieve tasks and build communities in fantasy worlds. We propose that the application of game elements to real world activities can aid in delivering contextual information in interesting ways and help young people to engage in everyday events. Our research will explore how we can unite utility and fun to enhance information delivery, encourage participation, build communities and engage users with utilitarian events situated in the real world. This research aims to identify key game elements that work effectively to engage young digital natives, and provide guidelines to influence the design of interactions and interfaces for event applications in the future. This research will primarily contribute to areas of user experience and pervasive gaming.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Protection of a distribution network in the presence of distributed generators (DGs) using overcurrent relays is a challenging task due to the changes in fault current levels and reverse power flow. Specifically, in the presence of current limited converter interfaced DGs, overcurrent relays may fail to isolate the faulted section either in grid connected or islanded mode of operation. In this paper, a new inverse type relay is presented to protect a distribution network, which may have several DG connections. The new relay characteristic is designed based on the measured admittance of the protected line. The relay is capable of detecting faults under changing fault current levels. The relay performance is evaluated using PSCAD simulation and laboratory experiments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An introduction to thinking about and understanding probability that highlights the main pits and trapfalls that befall logical reasoning

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An introduction to elicitation of experts' probabilities, which illustrates common problems with reasoning and how to circumvent them during elicitation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An introduction to design of eliciting knowledge from experts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An introduction to eliciting a conditional probability table in a Bayesian Network model, highlighting three efficient methods for populating a CPT.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Change is a regular part of school life. Educational innovations are constantly being implements in order to benefit students, improve outcomes and meet the obligations and accountability demands of governments. Rapid social and technological change has occurred within and around schools during the past 15 or more years, impacting upon curricula and pedagogies. Simultaneously, there has been a trend towards incorporating youth voice, where young people share in the decisions that will impact on their school experiences (Mitra, 2008a, 2004). Most recently, with the advent of the first National Australian Curriculum (McGaw, 2010), there is an imposed curriculum change, which reflects the growing global trend towards centralised control over what students learn in school (Zhao, 2011) and highlights that schools have to respond to change from all levels. Spears (in press) also notes that parents are raising children in an increasingly wireless world which is far removed from the one in which they were raised. Educators are teaching in schools that are vastly different technologically from those they knew as children and adolescents, or even those in which they were teaching a decade ago. Children born in 1995, the year when the Internet was first commercialised, are 16 years old in 2011 and, whilst parents may have embraced technological advances in their own adult working or social lives, they are yet to fathom fully what it means for their children and their relationships: to be educated and to socialise in the midst of mobile social media. Young people have greater access to more information than at any time past and move seamlessly between online and offline environments, often referring to them as â˜the same lifeâ (Spears, Kofoed, Bartolo, Palermiti and Castabile, in press). Along with these changes has come the transformation of traditional forms of bullying to cyberbullying, amid the public perception that bullying generally is becoming worse in schools.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent times considerable research attention has been directed to understanding dark networks, especially criminal and terrorist networks. Dark networks are those in which member motivations are self rather than public interested, achievements come at the cost of other individuals, groups or societies and, in addition, their activities are both â˜covert and illegalâ (Raab & Milward, 2003: 415). This â˜darknessâ has implications for the way in which these networks are structured, the strategies adopted and their recruitment methods. Such entities exhibit distinctive operating characteristics including most notably the tension between creating an efficient network structure while retaining the ability to hide from public view while avoiding catastrophic collapse should one member cooperate with authorities (Bouchard 2007). While theoretical emphasis has been on criminal and terrorist networks, recent work has demonstrated that corrupt police networks exhibit some distinctive characteristics. In particular, these entities operate within the shadows of a host organisation - the Police Force and distort the functioning of the â˜Thin Blue Lineâ as the interface between the law abiding citizenry and the criminal society. Drawing on data derived from the Queensland Fitzgerald Commission of Enquiry into Police Misconduct and related documents, this paper examines the motivations, structural properties and operational practices of corrupt police networks and compares and contrasts these with other dark networks with â˜brightâ public service networks. The paper confirms the structural differences between dark corrupt police networks and bright networks and suggests. However, structural embeddedness alone is found to be an insufficient theoretical explanation for member involvement in networks and that a set of elements combine to impact decision-making. Although offering important insights into network participation, the paperâs findings are especially pertinent in identifying additional points of intervention for police corruption networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines approaches to the visualisation of â˜invisibleâ communications networks. It situates network visualisation as a critical design exercise, and explores how community artists might use such a practice to develop telematic art projects â works that use communications networks as their medium. The paperâs hypotheses are grounded in the Australian community media arts field, but could be applied to other collaborative contexts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Twitter is now well established as the worldâs second most important social media platform, after Facebook. Its 140-character updates are designed for brief messaging, and its network structures are kept relatively flat and simple: messages from users are either public and visible to all (even to unregistered visitors using the Twitter website), or private and visible only to approved â˜followersâ of the sender; there are no more complex definitions of degrees of connection (family, friends, friends of friends) as they are available in other social networks. Over time, Twitter users have developed simple, but effective mechanisms for working around these limitations: â˜#hashtagsâ, which enable the manual or automatic collation of all tweets containing the same #hashtag, as well allowing users to subscribe to content feeds that contain only those tweets which feature specific #hashtags; and â˜@repliesâ, which allow senders to direct public messages even to users whom they do not already follow. This paper documents a methodology for extracting public Twitter activity data around specific #hashtags, and for processing these data in order to analyse and visualize the @reply networks existing between participating users â both overall, as a static network, and over time, to highlight the dynamic structure of @reply conversations. Such visualizations enable us to highlight the shifting roles played by individual participants, as well as the response of the overall #hashtag community to new stimuli â such as the entry of new participants or the availability of new information. Over longer timeframes, it is also possible to identify different phases in the overall discussion, or the formation of distinct clusters of preferentially interacting participants.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Though stadium style seating in large lecture theatres may suggest otherwise, effective teaching and learning is a not a spectator sport. A challenge in creating effective learning environments in both physical and virtual spaces is to provide optimal opportunity for student engagement in active learning. Queensland University of Technology (QUT) has developed the Open Web Lecture (OWL), a new web-based student response application, which seamlessly integrates a virtual learning environment within the physical learning space. The result is a blended learning experience; a fluid collaboration between academic and students connected to OWL via the Universityâs Wi-Fi using their own laptop or mobile web device. QUT is currently piloting the OWL application to encourage student engagement. OWL offers opportunities for participants to: ⢠Post comments and questions ⢠Reply to comments⨠⢠"Like" comments⨠⢠Poll students and review data ⢠Review archived sessions. Many of these features instinctively appeal to student users of social networking media, yet avail the academic of control within the University network. Student privacy is respected through a system of preserving peer-peer anonymity, a functionality that seeks to address a traditional reluctance to speak up in large classes. The pilot is establishing OWL as an opportunity for engaging students in active learning opportunities by enabling ⢠virtual learning in physical spaces for large group lectures, seminar groups, workshops and conferences ⢠live collaborative technology connecting students and the academic via the wireless network using their own laptop or mobile device ⢠an non- intimidating environment in which to ask questions ⢠promotion of a sense of community ⢠instant feedback ⢠problem based learning. The student and academic response to OWL has been overwhelmingly positive, crediting OWL as an easy to use application, which creates effective learning opportunities though interactivity and immediate feedback. This poster and accompanying online presentation of the technology will demonstrate how OWL offers new possibilities for active learning in physical spaces by: ⢠providing increased opportunity for student engagement ⢠supporting a range of learners and learning activities ⢠fostering blended learning experiences. The presentation will feature visual displays of the technology, its various interfaces and feedback including clips from interviews with students and academics participating in the early stages of the pilot.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Diversity techniques have long been used to combat the channel fading in wireless communications systems. Recently cooperative communications has attracted lot of attention due to many benefits it offers. Thus cooperative routing protocols with diversity transmission can be developed to exploit the random nature of the wireless channels to improve the network efficiency by selecting multiple cooperative nodes to forward data. In this paper we analyze and evaluate the performance of a novel routing protocol with multiple cooperative nodes which share multiple channels. Multiple shared channels cooperative (MSCC) routing protocol achieves diversity advantage by using cooperative transmission. It unites clustering hierarchy with a bandwidth reuse scheme to mitigate the co-channel interference. Theoretical analysis of average packet reception rate and network throughput of the MSCC protocol are presented and compared with simulated results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A new relationship type of social networks - online dating - are gaining popularity. With a large member base, users of a dating network are overloaded with choices about their ideal partners. Recommendation methods can be utilized to overcome this problem. However, traditional recommendation methods do not work effectively for online dating networks where the dataset is sparse and large, and a two-way matching is required. This paper applies social networking concepts to solve the problem of developing a recommendation method for online dating networks. We propose a method by using clustering, SimRank and adapted SimRank algorithms to recommend matching candidates. Empirical results show that the proposed method can achieve nearly double the performance of the traditional collaborative filtering and common neighbor methods of recommendation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rule extraction from neural network algorithms have been investigated for two decades and there have been significant applications. Despite this level of success, rule extraction from neural network methods are generally not part of data mining tools, and a significant commercial breakthrough may still be some time away. This paper briefly reviews the state-of-the-art and points to some of the obstacles, namely a lack of evaluation techniques in experiments and larger benchmark data sets. A significant new development is the view that rule extraction from neural networks is an interactive process which actively involves the user. This leads to the application of assessment and evaluation techniques from information retrieval which may lead to a range of new methods.