991 resultados para Artur Rei Lendas


Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the current curriculum focus on correlating classroom problem solving lessons to real-world contexts, are LEGO robotics an effective problem solving tool? This present study was designed to investigate this question and to ascertain what problem solving strategies primary students engaged with when working with LEGO robotics and whether the students were able to effectively relate their problem solving strategies to real-world contexts. The qualitative study involved 23 Grade 6 students participating in robotics activities. The study included data collected from researcher observations of student problem solving discussions, collected software programs, and data from a student completed questionnaire. Results from the study indicated that the robotic activities assisted students to reflect on the problem-solving decisions they made. The study also highlighted that the students were able to relate their problem solving strategies to real-world contexts. The study demonstrated that while LEGO robotics can be considered useful problem solving tools in the classroom, careful teacher scaffolding needs to be implemented in regards to correlating LEGO with authentic problem solving. Further research in regards to how teachers can best embed real-world contexts into effective robotics lessons is recommended.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The emergence of mobile and ubiquitous computing has created what is referred to as a hybrid space – a virtual layer of digital information and interaction opportunities that sits on top and augments the physical environment. The increasing connectedness through such media, from anywhere to anybody at anytime, makes us less dependent on being physically present somewhere in particular. But, what is the role of ubiquitous computing in making physical presence at a particular place more attractive? Acknowledging historic context and identity as important attributes of place, this work embarks on a ‘global sense of place’ in which the cultural diversity, multiple identities, backgrounds, skills and experiences of people traversing a place are regarded as social assets of that place. The aim is to explore ways how physical architecture and infrastructure of a place can be mediated towards making invisible social assets visible, thus augmenting people’s situated social experience. Thereby, the focus is on embodied media, i.e. media that materialise digital information as observable and sometimes interactive parts of the physical environment hence amplify people’s real world experience, rather than substituting or moving it to virtual spaces.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A patient-centric DRM approach is proposed for protecting privacy of health records stored in a cloud storage based on the patient's preferences and without the need to trust the service provider. Contrary to the current server-side access control solutions, this approach protects the privacy of records from the service provider, and also controls the usage of data after it is released to an authorized user.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the current curriculum focus on correlating classroom problem solving lessons to real-world contexts, are LEGO robotics an effective problem solving tool? This present study was designed to investigate this question and to ascertain what problem solving strategies primary students engaged with when working with LEGO robotics and whether the students were able to effectively relate their problem solving strategies to real-world contexts. The qualitative study involved 23 Grade 6 students participating in robotics activities at a Brisbane primary school. The study included data collected from researcher observations of student problem solving discussions, collected software programs, and data from a student completed questionnaire. Results from the study indicated that the robotic activities assisted students to reflect on the problem solving decisions they made. The study also highlighted that the students were able to relate their problem solving strategies to real-world contexts. The study demonstrated that while LEGO robotics can be considered useful problem solving tools in the classroom, careful teacher scaffolding needs to be implemented in regards to correlating LEGO with authentic problem solving. Further research in regards to how teachers can best embed realworld contexts into effective robotics lessons is recommended.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Public transportation is an environment with great potential for applying innovative ubiquitous computing services to enhance user experiences. This paper provides the underpinning rationale for research that will be looking at how real-time passenger information system deployed by transit authorities can provide a core platform to improve commuters’ user experiences during all stages of their journey. The proposal builds on this platform to inform the design and development of innovative social media, mobile computing and geospatial information applications, with the hope to create fun and meaningful experiences for passengers during their everyday travel. Furthermore, we present the findings of our pilot study that aims to offer a better understanding of passengers’ activities and social interactions during their daily commute.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As ambient computing blends into the fabric of the modern urban environment developing a positive interplay between people, places, and technology to create enlivened, interactive cities becomes a necessary priority in how we imagine, understand, design, and develop cities. Designing technology for art, culture and gastronomic experiences, that are rich in community, can provide the means for collaborative action to (re)create cities that are lively, engaging, and promote a sense of well being as well as belonging.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

While Conceptual fashion design practices have been a pervasive influence in fashion since the early 1980s, there is little academic analysis that might explain how they are distinct from conventional fashion design practices. In addition, fashion practitioners have not historically contributed to fashion research. As a result, contemporary fashion practitioners have difficulty setting critical contexts and expanding their creative work as there is little relevant literature available from practitioner perspectives. This project uses practice-led research to develop a discourse for understanding Conceptual fashion design process and how it relates to more conventional fashion design practices. In this exegesis I use Conceptual art as a lens to expand understandings of Conceptual fashion and my own creative practice. This analysis demonstrates that there are valuable connections to be drawn between Conceptual art and Conceptual fashion practice. In particular, these connections reveal the differences between the way Conceptual and more conventional fashion designers relate to the conceptual and the visual in their design process. This exploration demonstrates that while fashion is a visual field, Conceptual fashion designers produce a more ‘intellectual’ type of fashion that uses the visual to communicate ideas that question the nature of fashion. I explore the relevance of these ideas through application and experimentation in my creative practice projects by drawing from systems and rules identified in the work of early Conceptual artists and contemporary Conceptual fashion designers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In a traditional anti-jamming system a transmitter who wants to send a signal to a single receiver spreads the signal power over a wide frequency spectrum with the aim of stopping a jammer from blocking the transmission. In this paper, we consider the case that there are multiple receivers and the transmitter wants to broadcast a message to all receivers such that colluding groups of receivers cannot jam the reception of any other receiver. We propose efficient coding methods that achieve this goal and link this problem to well-known problems in combinatorics. We also link a generalisation of this problem to the Key Distribution Pattern problem studied in combinatorial cryptography.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The power of sharing computation in a cryptosystem is crucial in several real-life applications of cryptography. Cryptographic primitives and tasks to which threshold cryptosystems have been applied include variants of digital signature, identification, public-key encryption and block ciphers etc. It is desirable to extend the domain of cryptographic primitives which threshold cryptography can be applied to. This paper studies threshold message authentication codes (threshold MACs). Threshold cryptosystems usually use algebraically homomorphic properties of the underlying cryptographic primitives. A typical approach to construct a threshold cryptographic scheme is to combine a (linear) secret sharing scheme with an algebraically homomorphic cryptographic primitive. The lack of algebraic properties of MACs rules out such an approach to share MACs. In this paper, we propose a method of obtaining a threshold MAC using a combinatorial approach. Our method is generic in the sense that it is applicable to any secure conventional MAC by making use of certain combinatorial objects, such as cover-free families and their variants. We discuss the issues of anonymity in threshold cryptography, a subject that has not been addressed previously in the literature in the field, and we show that there are trade-offis between the anonymity and efficiency of threshold MACs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Taking into consideration of growing energy needs and concern for environmental degradation, clean and inexhaustible energy source, such as solar energy, is receiving greater attention for various applications. The use of solar energy system reduces pollution, waste and has little or no harmful effects on the environment. It is appreciated that this source of energy can be complementary rather than being competitive to conventional energy sources. In order to collect and harness energy from the sun, a solar collector is essential. A solar collector is basically a heat exchanger that transforms solar radiant energy into heat or thermal energy. Improvement of performance is essential for commercial acceptance of their use in such applications. Many studies have been undertaken on the enhancement of thermal performance of solar collectors, using diverse materials of various shapes, dimensions and layouts. In the literature, various collector designs have been proposed and tested with the objective of meeting these requirements [1-8]. Omer et al. [1] found the efficiency of a solar collector of about 70% in a solar assisted heat pump system. Traditional solar collectors are single phase collectors, in which the working fluid is either air or water. Different modifications are suggested and applied to improve the heat transfer between the absorber and working fluid in a collector. These modifications include the use of absorber with fins attached [2,3], corrugated absorber [4,5], matrix type absorber [6], V-groove solar air collector [7]. Karim et al. [8] approached a review of design and construction of three types (flat, vee-grooved, and finned) of air collectors. Two-phase collectors, on the other hand, have significant potential for continuous operation round the clock, when used in conjunction with a compressor, as found in a solar assisted heat-pump cycle.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This report provides an overview of the tornado impact on the safe operation and shutdown of nuclear power plants in the United States. The motivation for this review stems from the damage and failure of the Fukushima nuclear power plant on March 11, 2011. That disaster warrants comparison of the safety measures in place within the global nuclear power industry.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The zombie has long been regarded as a “fundamentally American creation” (Bishop 2010) and a western monster representing the fears and anxieties of Western society. Since the renaissance of the zombie movie in the early 2000s, a subsequent surge in international production has seen the release of movies from Norway, Cuba, Pakistan and Thailand to name a few. Although Japanese zombie movies have been far more visible for Western cult audiences than in mainstream markets, Japanese cinema has emerged as one of the more prolific producers of zombie films outside of Anglophone or Western European countries in recent years. Films such as Helldriver (2010), Zombie TV (2013), Versus (2000), Tokyo Zombie (2005), Happiness of the Katakuris (2001) and anime television series High School of the Dead (2010) have generated varying degrees of popularity and critical attention internationally. At first glance Japanese zombie films, with musical zombie interludes, undead yakuza henchmen and revenge-seeking yūrei zombies, appear fundamentally different to their Western counterparts. Yet, on closer examination, the Japanese zombie movie could be regarded as a hybrid and intertextual generic form drawing on syntactic conventions at the core of a universal zombie sub-genre established by Western filmmaking traditions, while also distilling culturally specific tropes unique to various Japanese horror cinema sub-genres. Most importantly, the Japanese zombie film extracts, emphasises and revises particular conventions and motifs common within Western zombie films that are particularly relevant to Japanese audiences. This chapter investigates the cultural resonance of key generic motifs identifiable in the Japanese zombie film. It establishes a production context and the influence of Japanese horror cinema on style and thematic concerns. It then examines the function of prominent narrative conventions, namely: the source, outbreak and spread of infection; mutation and the representation of the monster; and the inclusion of supernatural and religious motifs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The identification of molecular networks at the system level in mammals is accelerated by next-generation mammalian genetics without crossing, which requires both the efficient production of whole-body biallelic knockout (KO) mice in a single generation and high-performance phenotype analyses. Here, we show that the triple targeting of a single gene using the CRISPR/Cas9 system achieves almost perfect KO efficiency (96%–100%). In addition, we developed a respiration-based fully automated noninvasive sleep phenotyping system, the Snappy Sleep Stager (SSS), for high-performance (95.3% accuracy) sleep/wake staging. Using the triple-target CRISPR and SSS in tandem, we reliably obtained sleep/wake phenotypes, even in double-KO mice. By using this system to comprehensively analyze all of the N-methyl-D-aspartate (NMDA) receptor family members, we found Nr3a as a short-sleeper gene, which is verified by an independent set of triple-target CRISPR. These results demonstrate the application of mammalian reverse genetics without crossing to organism-level systems biology in sleep research.