973 resultados para Industrial Extension Institute.
Resumo:
Presently, the manufacturing sector faces unprecedented levels of competition in both the domestic and international markets. This competition is mainly as a result of rapidly expanding international trade, gradual removal of protection, substantial reforms in labour markets and industrial relations, rapid technological changes and discerning customers. Intense global competition requires manufacturers to deliver products with higher quality in a shorter time. Simultaneously, owing to new technological innovations, the complexity of the products is increasing. In Australia, the impact of this intense competition and structural changes appear to be having negative effects on the manufacturing sector. This paper discusses the quality and reliability (Q & R) practices and associated drawbacks of Australian manufacturers and presents the findings of an investigation of the challenges Australian manufacturers are currently facing. The results reported in the paper are based on the data collected from a survey using the standard questionnaire. The study was driven by a conceptual model, which relates advanced quality practices to manufacturing performance and manufacturing difficulties.Evidence indicates that Q & R is the main competitive factor for Australian manufacturers. Design capability and on time delivery (OTD) came second. Results show that Australian manufacturers in general are facing some manufacturing difficulties. The relationship between advanced quality practices and company performance and manufacturing difficulties are explored. It is found that the companies who have more emphasis on advanced quality practices have fewer problems in manufacturing practices. Moreover, companies who have actively implemented the advanced quality practices have managed to improve the quality of the product continuously. The results validate the proposed hypothesis and lend credence to current thinking that improvement in Q & R is a vital tool for competitive advantage.
Resumo:
Investigates the use of temporal lip information, in conjunction with speech information, for robust, text-dependent speaker identification. We propose that significant speaker-dependent information can be obtained from moving lips, enabling speaker recognition systems to be highly robust in the presence of noise. The fusion structure for the audio and visual information is based around the use of multi-stream hidden Markov models (MSHMM), with audio and visual features forming two independent data streams. Recent work with multi-modal MSHMMs has been performed successfully for the task of speech recognition. The use of temporal lip information for speaker identification has been performed previously (T.J. Wark et al., 1998), however this has been restricted to output fusion via single-stream HMMs. We present an extension to this previous work, and show that a MSHMM is a valid structure for multi-modal speaker identification
Resumo:
It has been argued that the origins of modern creative industries policies can be found in Australia. The Creative Nation national cultural policy statement released by the Labor government headed by the Prime Minister Paul Keating in 1994 sought an original synthesis of arts and media policies that was outwardly looking, identifying the opportunities presented by what were then new digital media technologies, and clearly stated the economic opportunities presented by promotion of what were referred to at the time as the cultural industries. Several commentators have identified the influence that Creative Nation had on the Blair Labour government when it came to power in the United Kingdom in 1997. Faced with the question of how to revitalise the once-mighty industrial cities of the U.K. after the Conservative government, the Department of Culture, Media and Sport drew upon policy documents such as Australia’s Creative Nation, as well as the experience of local governments in these cities, in looking to the cultural sectors to spearhead new jobs growth, as well as re-branding the cities as cultural or creative cities in a post-industrial economic landscape. This growing alignment of culture and economics, that has been a characteristic of creative industries policies as they have developed in Australia, Britain, East Asia and Europe, marks an interesting shift in the traditional focus of arts and cultural policy as compensatory to the economic domain. The first Chair of what would become the Arts Council of Great Britain (now the Arts Council of England) was the famous economist John Maynard Keynes. In the First Annual Report of the Arts Council for 1945-1946, prepared in the latter stages of the Second World War, Keynes proposed that “the day is not far off when the economic problem will take the back seat where it belongs, and the arena of the heart and the head will be occupied or reoccupied, by our real problems — the problems of life and of human relations, of creation and behaviour and religion”. 中文摘要 1994年工黨執政時期澳洲總理基挺(Paul Keating)發表創意的國家(The Creative Nation)的文化政策聲明堪稱是澳洲現代創意產業的起源,該聲明試圖將藝術與媒體政策結合在一起,其目的在面向海外,為新數位媒體技術尋找機會。聲明中明確指出要推動文化產業為經濟帶來機會。「文化政策也是經濟政策。文化創造財富與附加價值,對創新、行銷與設計有重要貢獻,是我們工業的標誌(badge)。我們創意的層次實際上決定了我們適應新經濟imperatives的能力。文化本身就是項重要出口,是其他產品出口的主要附件(essential accompaniment)。文化吸引觀光與學生,也是我們經濟成功之關鍵。」 創意產業的策略是構建藝術、媒體與資訊電信科技的網絡以利文化產業在國家創新政策策略中擁有一席之地。此一策略最早是由1990年代末英國布萊爾(Tony Blair)的新工黨政府所採行,其後歐洲聯盟、澳洲、紐西蘭、新加坡、台灣、南韓與中國。
Resumo:
This workshop is a continuation and extension to the successful past workshops exploring the intersection of food, technology, place, and people, namely 2009 OZCHI workshop, Hungry 24/7? HCI Design for Sustainable Food Culture and Sustainable Interaction with Food, Technology, and the City [1] and 2010 CHI panel Making Food, Producing Sustainability [3]. The workshop aims to bring together experts from diverse backgrounds including academia, government, industry, and non-for-profit organisations. It specifically aims to create a space for discussion and design of innovative approaches to understanding and cultivating sustainable food practices via human-computer-interaction (HCI) as well as addressing the wider opportunities for the HCI community to engage with food as a key issue for sustainability The workshop addresses environmental, health, and social domains of sustainability in particular, by looking at various conceptual and design approaches in orchestrating sustainable interaction of people and food in and through dynamic techno-social networks.
Resumo:
Its mission is to promote Mathematics and Science in Africa and to provide a focal point for Mathematics university training in Africa. It offers scholarships for up to 50 students to come and study for a period of nine months. Of the 50 students, about 15 positions are reserved for females. In the 2006/2007 intake there were over 250 applicants. The students are housed and fed and their return travel from their home town is fully funded. Lecturers also stay at AIMS and share their meals with the students, so that a rapport quickly develops. The students are away from their families and friends for nine months and are absolutely committed to the discipline of Mathematics. When they first arrive, some of them have little ability in English but since all tuition is in English they quickly learn. Some find the transitions difficult but they all support one another and at the end of their time their English skills are very good. The students do a series of subjects that last for about three weeks each, consisting of 30 contact hours, as well as a thesis/project. Each course has a number of assignments associated with it and these get evaluated. AIMS has seven or eight teaching assistants who help with the tutorials, marking, advice, and who are a vital component of AIMS.
Resumo:
Value Management (VM) initially started in early 1940s in the US manufacturing industry has increasingly becoming popular within the construction industry community internationally. It has been widely accepted as an important tool in the management of projects. The structured, systematic and multi-disciplinary approach in decision making process is a niche for VM in delivering better value for money project to the client investment. It would appear to be gaining some momentum as an essential management tool in the Malaysian construction sector especially in the quantity surveying practice. Quantity surveyors increasing involvement in VM provides an opportunity for the profession to re-model some of its traditional services in a more positive light and develop leading-edge skills and promote the profession. International practice has associated VM to be part of services offered in the quantity surveying practice; especially in UK has proven to be a natural progression of QS profession. The introduction of VM as early 1980’s in Malaysia combined with increasing demand for construction project to facilitate nation progress is shedding a positive light for quantity surveying profession to take lead in developing VM as one of their niche area. Therefore, the quantity surveying profession having the opportunity to take lead of this service which reflect their traditional attributes for providing the best value-for-money advise to the client. This paper shall discuss on the development of VM in Malaysia and the challenges VM face services in QS firm to remain ahead of their competitors.
Resumo:
This article presents a novel approach to confidentiality violation detection based on taint marking. Information flows are dynamically tracked between applications and objects of the operating system such as files, processes and sockets. A confidentiality policy is defined by labelling sensitive information and defining which information may leave the local system through network exchanges. Furthermore, per application profiles can be defined to restrict the sets of information each application may access and/or send through the network. In previous works, we focused on the use of mandatory access control mechanisms for information flow tracking. In this current work, we have extended the previous information flow model to track network exchanges, and we are able to define a policy attached to network sockets. We show an example application of this extension in the context of a compromised web browser: our implementation detects a confidentiality violation when the browser attempts to leak private information to a remote host over the network.
Resumo:
goDesign Travelling Workshop Program for Regional Secondary Students was an initiative of Queensland University of Technology (QUT) and the Design Institute of Australia (DIA) Queensland Branch, which aligned with the DIA unleashed: Queensland design on tour 2010 Exhibition. It was designed be delivered by university design academics in state secondary schools in Chinchilla, Mt Isa, Quilpie, Emerald, Gladstone and Bundaberg between February and September 2010, to approximately 95 secondary students and 24 teachers from the subject areas of visual art, graphics and industrial technology and design. A talk by a visiting design practitioner whose work was displayed in the exhibition, also features in the final day of the program in each town, and student work from the workshop was displayed in the exhibition alongside the professional design work. The three-day workshop is a design immersion program for regional Queensland Secondary Schools, which responds to specific actions outlined in the Queensland Government Design Strategy 2020 to ‘Build Design Knowledge and Learning’ and ‘Foster a Design Culture’. Underpinned by a place-based approach and the integration of Dr Charles Burnette’s IDESIGN teaching model, the program gives students and teachers the opportunity to explore, analyse and reimagine their local town through a series of scaffolded problem solving activities around the theme of ‘place’. The program allows students to gain hands-on experience designing graphics, products, interior spaces and architecture to assist their local community, with the support of design professionals. Students work individually and in groups on real design problems learning sketching, making, communication, presentation and collaboration skills to improve their design process, while considering social, cultural and environmental opportunities. The program was designed to facilitate an understanding of the value of design thinking and its importance to regional communities, to give students more information about various design disciplines as career options, and provide a professional development opportunity for teachers. Advisory assistance for the program was gained through Kelvin Grove State College, Queensland Studies Authority and QMI/Manufacturing Skills Queensland Manager, Manufacturing & Engineering Gateway Schools Project.
Resumo:
Barreto-Lynn-Scott (BLS) curves are a stand-out candidate for implementing high-security pairings. This paper shows that particular choices of the pairing-friendly search parameter give rise to four subfami- lies of BLS curves, all of which offer highly efficient and implementation- friendly pairing instantiations. Curves from these particular subfamilies are defined over prime fields that support very efficient towering options for the full extension field. The coefficients for a specific curve and its correct twist are automat-ically determined without any computational effort. The choice of an extremely sparse search parameter is immediately reflected by a highly efficient optimal ate Miller loop and final exponentiation. As a resource for implementors, we give a list with examples of implementation-friendly BLS curves through several high-security levels.
Resumo:
Background: In vitro investigations have demonstrated the importance of the ribcage in stabilising the thoracic spine. Surgical alterations of the ribcage may change load-sharing patterns in the thoracic spine. Computer models are used in this study to explore the effect of surgical disruption of the rib-vertebrae connections on ligament load-sharing in the thoracic spine. Methods: A finite element model of a T7-8 motion segment, including the T8 rib, was developed using CT-derived spinal anatomy for the Visible Woman. Both the intact motion segment and the motion segment with four successive stages of destabilization (discectomy and removal of right costovertebral joint, right costotransverse joint and left costovertebral joint) were analysed for a 2000Nmm moment in flexion/extension, lateral bending and axial rotation. Joint rotational moments were compared with existing in vitro data and a detailed investigation of the load sharing between the posterior ligaments carried out. Findings: The simulated motion segment demonstrated acceptable agreement with in vitro data at all stages of destabilization. Under lateral bending and axial rotation, the costovertebral joints were of critical importance in resisting applied moments. In comparison to the intact joint, anterior destabilization increases the total moment contributed by the posterior ligaments. Interpretation: Surgical removal of the costovertebral joints may lead to excessive rotational motion in a spinal joint, increasing the risk of overload and damage to the remaining ligaments. The findings of this study are particularly relevant for surgical procedures involving rib head resection, such as some techniques for scoliosis deformity correction.
Resumo:
The primary objective of the experiments reported here was to demonstrate the effects of opening up the design envelope for auditory alarms on the ability of people to learn the meanings of a set of alarms. Two sets of alarms were tested, one already extant and one newly-designed set for the same set of functions, designed according to a rationale set out by the authors aimed at increasing the heterogeneity of the alarm set and incorporating some well-established principles of alarm design. For both sets of alarms, a similarity-rating experiment was followed by a learning experiment. The results showed that the newly-designed set was judged to be more internally dissimilar, and easier to learn, than the extant set. The design rationale outlined in the paper is useful for design purposes in a variety of practical domains and shows how alarm designers, even at a relatively late stage in the design process, can improve the efficacy of an alarm set.
Resumo:
The ionic liquid (IL) 1-ethyl-3-methylimidazolium acetate ([C2mim]OAc) is considered to be an inert solvent of cellulose and lignocellulosic biomass. Acetylation (1.7 % mol, or DS 0.017) of cellulose after dissolution in [C2mim]OAc (150 °C for 20 min), is demonstrated by compositional analysis, FTIR analysis and 13C NMR spectroscopy (in [C2min]OAc with 13C enriched acetate). This acetylation, in the absence of added acylating agents, has not been reported before and may limit [C2mim]OAc utility in industrial scale biomass processing, even at this low extent. For example, cellulose acetylation may contribute to IL loss in processes where the IL is recovered and reused and inhibit enzyme saccharification of cellulose in lignocellulosic biofuel production processes based on saccharification and fermentation.
Resumo:
The concept of produsage developed from the realisation that new language was needed to describe the new phenomena emerging from the intersection of Web 2.0, user-generated content, and social media since the early years of the new millennium. When hundreds, thousands, maybe tens of thousands of participants utilise online platforms to collaborate in the development and continuous improvement of a wide variety of content – from software to informational resources to creative works –, and when this work takes place through a series of more or less unplanned, ad hoc, almost random cooperative encounters, then to describe these processes using terms which were developed during the industrial revolution no longer makes much sense. When – exactly because what takes place here is no longer a form of production in any conventional sense of the word – the outcomes of these massively distributed collaborations appear in the form of constantly changing, permanently mutable bodies of work which are owned at once by everyone and no-one, by the community of contributors as a whole but by none of them as individuals, then to conceptualise them as fixed and complete products in the industrial meaning of the term is missing the point. When what results from these efforts is of a quality (in both depth and breadth) that enables it to substitute for, replace, and even undermine the business model of long-established industrial products, even though precariously it relies on volunteer contributions, and when their volunteering efforts make it possible for some contributors to find semi- or fully professional employment in their field, then conventional industrial logic is put on its head.
Resumo:
It is not uncommon for enterprises today to be faced with the demand to integrate and incor- porate many different and possibly heterogeneous systems which are generally independently designed and developed, to allow seamless access. In effect, the integration of these systems results in one large whole system that must be able, at the same time, to maintain the local autonomy and to continue working as an independent entity. This problem has introduced a new distributed architecture called federated systems. The most challenging issue in federated systems is to find answers for the question of how to efficiently cooperate while preserving their autonomous characteristic, especially the security autonomy. This thesis intends to address this issue. The thesis reviews the evolution of the concept of federated systems and discusses the organisational characteristics as well as remaining security issues with the existing approaches. The thesis examines how delegation can be used as means to achieve better security, especially authorisation while maintaining autonomy for the participating member of the federation. A delegation taxonomy is proposed as one of the main contributions. The major contribution of this thesis is to study and design a mechanism to support dele- gation within and between multiple security domains with constraint management capability. A novel delegation framework is proposed including two modules: Delegation Constraint Man- agement module and Policy Management module. The first module is designed to effectively create, track and manage delegation constraints, especially for delegation processes which require re-delegation (indirect delegation). The first module employs two algorithms to trace the root authority of a delegation constraint chain and to prevent the potential conflict when creating a delegation constraint chain if necessary. The first module is designed for conflict prevention not conflict resolution. The second module is designed to support the first module via the policy comparison capability. The major function of this module is to provide the delegation framework the capability to compare policies and constraints (written under the format of a policy). The module is an extension of Lin et al.'s work on policy filtering and policy analysis. Throughout the thesis, some case studies are used as examples to illustrate the discussed concepts. These two modules are designed to capture one of the most important aspects of the delegation process: the relationships between the delegation transactions and the involved constraints, which are not very well addressed by the existing approaches. This contribution is significant because the relationships provide information to keep track and en- force the involved delegation constraints and, therefore, play a vital role in maintaining and enforcing security for transactions across multiple security domains.