929 resultados para Graphic simulators
Resumo:
Grandiflora: Recent Paintings by Daniel Mafe The paintings of Grandiflora are improvised around a range of different flower motifs culled from medieval textiles and botanical illustrations. Each of the paintings is constructed upon a ground of flat, palely luminous yellow occasionally supplemented by additional areas of high-keyed pastel. Pink, blue, green and mauve together with the yellow, generate a shimmering and even incandescent glow. The graphic images of the flowers with the flat colour areas are then contrasted and worked over with richly sensual, abstract gestures of paint. Within the work there is a pronounced almost rococo-esque opticality as it operates between these different visual codes of flat colour, recognizable floral forms, and gesture. These codes combine to produce a definite visceral impact on the viewer, a pronounced and tactile sense of the experience and ambiguity inherent in perceiving. This ambiguity is interestingly at odds with the apparently clean and crisp quality each painting demonstrates as an integrated whole. Indeed each piece goes on to reveal, despite the use of overt figurative quotations, a sense of the purely abstract which in its turn concretely establishes the ornamental.
Resumo:
The global road safety problem The role of human factors in road crashes The use of driving simulators in road safety research The CARRS-Q advanced driving simulator –Functionality –Problems encountered and related solutions Past and current projects using the driving simulator Limitations of driving simulators
Resumo:
The use of Trusted Platform Module (TPM) is be- coming increasingly popular in many security sys- tems. To access objects protected by TPM (such as cryptographic keys), several cryptographic proto- cols, such as the Object Specific Authorization Pro- tocol (OSAP), can be used. Given the sensitivity and the importance of those objects protected by TPM, the security of this protocol is vital. Formal meth- ods allow a precise and complete analysis of crypto- graphic protocols such that their security properties can be asserted with high assurance. Unfortunately, formal verification of these protocols are limited, de- spite the abundance of formal tools that one can use. In this paper, we demonstrate the use of Coloured Petri Nets (CPN) - a type of formal technique, to formally model the OSAP. Using this model, we then verify the authentication property of this protocol us- ing the state space analysis technique. The results of analysis demonstrates that as reported by Chen and Ryan the authentication property of OSAP can be violated.
Resumo:
WHAT: An interactive installation with full body interface, digital projection, multi-touch sensitive screen surfaces, interactive 3D gaming software, motorised dioramas, 4.1 spatial sound & new furniture forms - investigating the cultural dimensions of sustainability through the lens of 'time'. “Time is change, time is finitude. Humans are a finite species. Every decision we make today brings that end closer, or alternatively pushes it further away. Nothing can be neutral”. Tony Fry DETAILS: Each participant/viewer lies comfortably on their back. Directly above them is a semi-transparent Perspex screen that displays projected 3D imagery and is simultaneously sensitive to the lightest of finger touches. Depending upon the ever changing qualities of the projected image on this screen the participant can see through its surface to a series of physical dioramas suspended above, lit by subtle LED spotlighting. This diorama consists of a slowly rotating series of physical environments, which also include several animatronic components, allowing the realtime composition of whimsical ‘landscapes’ of both 'real' and 'virtual' media. Through subtle, non-didactic touch-sensitive interactivity the participant then has influence over both the 3D graphic imagery, the physical movements of the diorama and the 4 channel immersive soundscape, creating an uncanny blend of physical and virtual media. Five speakers positioned around the room deliver a rich interactive soundscape that responds both audibly and physically to interactions.
Resumo:
Ethnography is now a well-established research methodology for virtual environments, and the vast majority of accounts have one aspect in common, whether textual or graphic environments – that of the embodied avatar. In this article, I first discuss the applicability of such a methodology to non-avatar environments such as Eve Online, considering where the methodology works and the issues that arise in its implementation – particularly for the consideration of sub-communities within the virtual environment. Second, I consider what alternative means exist for getting at the information that is obtained through an ethnographic study of the virtual environment. To that end, I consider the practical and ethical implications of utilizing existing accounts, the importance of the meta-game discourse, including those sources outside of the control of the environment developer, and finally the utility in combining personal observations with accounts of other ethnographers, both within and between environments.
Resumo:
miRDeep and its varieties are widely used to quantify known and novel micro RNA (miRNA) from small RNA sequencing (RNAseq). This article describes miRDeep*, our integrated miRNA identification tool, which is modeled off miRDeep, but the precision of detecting novel miRNAs is improved by introducing new strategies to identify precursor miRNAs. miRDeep* has a user-friendly graphic interface and accepts raw data in FastQ and Sequence Alignment Map (SAM) or the binary equivalent (BAM) format. Known and novel miRNA expression levels, as measured by the number of reads, are displayed in an interface, which shows each RNAseq read relative to the pre-miRNA hairpin. The secondary pre-miRNA structure and read locations for each predicted miRNA are shown and kept in a separate figure file. Moreover, the target genes of known and novel miRNAs are predicted using the TargetScan algorithm, and the targets are ranked according to the confidence score. miRDeep* is an integrated standalone application where sequence alignment, pre-miRNA secondary structure calculation and graphical display are purely Java coded. This application tool can be executed using a normal personal computer with 1.5 GB of memory. Further, we show that miRDeep* outperformed existing miRNA prediction tools using our LNCaP and other small RNAseq datasets. miRDeep* is freely available online at http://www.australianprostatecentre.org/research/software/mirdeep-star
Resumo:
What are the information practices of teen content creators? In the United States over two thirds of teens have participated in creating and sharing content in online communities that are developed for the purpose of allowing users to be producers of content. This study investigates how teens participating in digital participatory communities find and use information as well as how they experience the information. From this investigation emerged a model of their information practices while creating and sharing content such as film-making, visual art work, story telling, music, programming, and web site design in digital participatory communities. The research uses grounded theory methodology in a social constructionist framework to investigate the research problem: what are the information practices of teen content creators? Data was gathered through semi-structured interviews and observation of teen’s digital communities. Analysis occurred concurrently with data collection, and the principle of constant comparison was applied in analysis. As findings were constructed from the data, additional data was collected until a substantive theory was constructed and no new information emerged from data collection. The theory that was constructed from the data describes five information practices of teen content creators. The five information practices are learning community, negotiating aesthetic, negotiating control, negotiating capacity, and representing knowledge. In describing the five information practices there are three necessary descriptive components, the community of practice, the experiences of information and the information actions. The experiences of information include information as participation, inspiration, collaboration, process, and artifact. Information actions include activities that occur in the categories of gathering, thinking and creating. The experiences of information and information actions intersect in the information practices, which are situated within the specific community of practice, such as a digital participatory community. Finally, the information practices interact and build upon one another and this is represented in a graphic model and explanation.
Resumo:
Research background: Communicating the diverse nature of multimodal practice is inherently difficult for the design-led research academic. Websites are an effective means of displaying images and text, but for the user/viewer the act of viewing is often random and disorienting, due to the non-linear means of accessing the information. This characteristic of websites limits the medium’s efficacy in regard to presenting an overarching philosophical standpoint or theme - the key driver behind most academic research. Research Contribution: This website: http://www.ianweirarchitect.com, presents a means of reconciling this problem by presenting a deceptively simple graphic and temporal layout, which limits the opportunity for the user/viewer to become disoriented and miss the key themes and issues that binds, the otherwise divergent, research material together. Research significance: http://www.ianweirarchitect.com, is a creative work that supplements Dr Ian Weir’s exhibition “Enacted Cartography” held in August 2012 in Brisbane and in August/September 2012 in Venice, Italy for the 13th International Architecture Exhibition (Venice Architecture Biennale). Dr Weir was selected by the Australian Institute of Architects to represent innovation in architectural practice for the Institute’s Formations: New Practices in Australian Architecture, exhibition and catalogue (of the same name) held in the Australian Pavilion, The Giardini, Venice. This website is creative output that compliments Dr Weir’s other multimodal outputs including photographic artworks, cartographic maps and architectural designs.
Resumo:
NeSSi (network security simulator) is a novel network simulation tool which incorporates a variety of features relevant to network security distinguishing it from general-purpose network simulators. Its capabilities such as profile-based automated attack generation, traffic analysis and support for detection algorithm plug-ins allow it to be used for security research and evaluation purposes. NeSSi has been successfully used for testing intrusion detection algorithms, conducting network security analysis and developing overlay security frameworks. NeSSi is built upon the agent framework JIAC, resulting in a distributed and extensible architecture. In this paper, we provide an overview of the NeSSi architecture as well as its distinguishing features and briefly demonstrate its application to current security research projects.
Resumo:
Ocean gliders constitute an important advance in the highly demanding ocean monitoring scenario. Their effciency, endurance and increasing robustness make these vehicles an ideal observing platform for many long term oceanographic applications. However, they have proved to be also useful in the opportunis-tic short term characterization of dynamic structures. Among these, mesoscale eddies are of particular interest due to the relevance they have in many oceano-graphic processes.
Resumo:
We blend research from human-computer interface (HCI) design with computational based crypto- graphic provable security. We explore the notion of practice-oriented provable security (POPS), moving the focus to a higher level of abstraction (POPS+) for use in providing provable security for security ceremonies involving humans. In doing so we high- light some challenges and paradigm shifts required to achieve meaningful provable security for a protocol which includes a human. We move the focus of security ceremonies from being protocols in their context of use, to the protocols being cryptographic building blocks in a higher level protocol (the security cere- mony), which POPS can be applied to. In order to illustrate the need for our approach, we analyse both a protocol proven secure in theory, and a similar proto- col implemented by a �nancial institution, from both HCI and cryptographic perspectives.
Resumo:
We introduce the Network Security Simulator (NeSSi2), an open source discrete event-based network simulator. It incorporates a variety of features relevant to network security distinguishing it from general-purpose network simulators. Compared to the predecessor NeSSi, it was extended with a three-tier plugin architecture and a generic network model to shift its focus towards simulation framework for critical infrastructures. We demonstrate the gained adaptability by different use cases
Resumo:
While much of the control and many of the activities found in today’s classrooms have been placed in the hands of the learners and learning has become inquiry-based, there remains a need for teachers to use teaching tools that would facilitate this student-centered teaching process. This article identifies the K-W-L Chart as one such tool and follows a case study of four Kuwaiti ‘Family and Consumer Sciences’ teaching / learning events to evaluate their ability to enhance the learning outcomes of eight students. The research was designed from a qualitative, multi-tiered design approach and was assessed through a constant comparative method of data analysis of interview responses, classroom observations and worksheet-assessments. The results showed that the use of K-W-L Charts influenced the teachers and learners toward a more inquiry-based approach and facilitated a more student-centered and collaborative learning environment, raising the level of interest and the amount of personal input given by the students.
Resumo:
“Supermassive” is a synchronised four-channel video installation with sound. Each video channel shows a different camera view of an animated three-dimensional scene, which visually references galactic or astral imagery. This scene is comprised of forty-four separate clusters of slowly orbiting white text. Each cluster refers to a different topic that has been sourced online. The topics are diverse with recurring subjects relating to spirituality, science, popular culture, food and experiences of contemporary urban life. The slow movements of the text and camera views are reinforced through a rhythmic, contemplative soundtrack. As an immersive installation, “Supermassive” operates somewhere between a meditational mind map and a representation of a contemporary data stream. “Supermassive” contributes to studies in the field of contemporary art. It is particularly concerned with the ways that graphic representations of language can operate in the exploration of contemporary lived experiences, whether actual or virtual. Artists such as Ed Ruscha and Christopher Wool have long explored the emotive and psychological potentials of graphic text. Other artists such as Doug Aitken and Pipilotti Rist have engaged with the physical and spatial potentials of audio-visual installations to create emotive and symbolic experiences for their audiences. Using a practice-led research methodology, “Supermassive” extends these creative inquiries. By creating a reflective atmosphere in which divergent textual subjects are pictured together, the work explores not only how we navigate information, but also how such navigations inform understandings of our physical and psychological realities. “Supermassive” has been exhibited internationally at LA Louver Gallery, Venice, California in 2013 and nationally with GBK as part of Art Month Sydney, also in 2013. It has been critically reviewed in The Los Angeles Times.
Resumo:
A well-developed brand helps to establish a solid identity and creates support to an image that is coherent to the actual motivations in an institution. Educational institutions have inherent characteristics that are diverse from the other sort of institutions, mainly when the focus is set on its internal and external publics. Consequently, these institutions should deal with the development of their brand and identity system also in a different approach. This research aims to investigate the traditional methodology for brand and identity systems development and proposes some modifications in order to allow a broader inclusion of the stakeholders in the process. The implementation of the new Oceanography Course in the Federal University of Bahia (UFBA) offered a unique opportunity to investigate and test these new strategies. In order to investigate and relate the image, identity, interaction and experience concepts through a participative methodology, this research project applies the new suggested strategies in the development of a brand and an identity system for the Oceanography Course in UFBA. Open surveys have been carried out between the alumni, lecturers and coordination body, in order to discover and establish a symbol for the course. The statistic analysis of the surveys’ results showed clear aesthetic preferences to some icons and colours to represent the course. The participative methodology celebrated, in this project, a democratization of the generally expert-centred brand development process.