957 resultados para Hamburg (Germany). Stadtbibliothek.
Resumo:
This paper argues for a future-oriented, inclusion of Engineering Model Eliciting Activities (EngMEAs) in elementary mathematics curricula. In EngMEAs students work with meaningful engineering problems that capitalise on and extend their existing mathematics and science learning, to develop, revise and document powerful models, while working in groups. The models developed by six groups of 12-year students in solving the Natural Gas activity are presented. Results showed that student models adequately solved the problem, although student models did not take into account all the data provided. Student solutions varied to the extent students employed the engineering context in their models and to their understanding of the mathematical concepts involved in the problem. Finally, recommendations for implementing EngMEAs and for further research are discussed.
Resumo:
In this paper, we are concerned with the practical implementation of time optimal numerical techniques on underwater vehicles. We briefly introduce the model of underwater vehicle we consider and present the parameters for the test bed ODIN (Omni-Directional Intelligent Navigator). Then we explain the numerical method used to obtain time optimal trajectories with a structure suitable for the implementation. We follow this with a discussion on the modifications to be made considering the characteristics of ODIN. Finally, we illustrate our computations with some experimental results.
Resumo:
Technology-oriented young firms play an important role for innovation and commercialisation of new ideas. These firms are often founded by engineers, scientists or academics who posses great scientific/technological knowledge, but limited know-how in other aspects of managing a business including knowledge management. Successful managing and integrating their specialised knowledge is of particular importance when it comes to developing a new product or process. This article therefore focuses on the particularities of the knowledge management process in technopreneurial firms. Using a qualitative investigation from a sample of Australian SMEs, a number of key observations are derived which show the challenges of managing knowledge and how important knowledge management is as a management tool for R&D and innovation process in technology-oriented SMEs. Findings suggest that knowledge management and integration processes in these firms are very much project focused and mainly based on ad hoc and informal processes and not embedded within the overall organisational routines.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
Adolescent injury remains a significant public health concern and is often the result of at-risk transport related behaviours. When a person is injured actions taken by bystanders are of crucial importance and timely first aid appears to reduce the severity of some injuries (Hussain & Redmond, 1994). Accordingly, researchers have suggested that first aid training should be more widely available as a potential strategy to reduce injury (Lynch et al., 2006). Further research has identified schools as an ideal setting for learning first aid skills as a means of injury prevention (Maitra, 1997). The current research examines the implications of school based first aid training for young adolescents on injury prevention, particularly relating to transport injuries. First aid training was integrated with peer protection and school connectedness within the Skills for Preventing Injury in Youth (SPIY) program (Buckley & Sheehan, 2009) and evaluated to determine if there was a reduction in the likelihood of transport related injuries at six months post-intervention. In Queensland, Australia, 35 high schools were recruited and randomly assigned to intervention and control conditions in early April 2012. A total of 2,000 Year nine students (mean age 13.5 years, 39% male) completed surveys six months post-intervention in November 2012. Analyses will compare the intervention students with control group students who self-reported i) first aid training with a teacher, professional or other adult and ii) no first aid in the preceding six months. Using the Extended Adolescent Injury Checklist (E-AIC) (Chapman, Buckley & Sheehan, 2011) the transport related injury experiences included being injured while “riding as a passenger in a car”, “driving a car off road” and “riding a bicycle”. It is expected that students taught first aid within SPIY will report significantly fewer transport related injuries in the previous three months, compared to the control groups described above. Analyses will be conducted separately for sex and socio-economic class of schools. Findings from this study will provide insight into the value of first aid in adolescent injury prevention and provide evidence as to whether teaching first aid skills within a school based health education curriculum has traffic safety implications.
Resumo:
The objective of this work is to formulate a nonlinear, coupled model of a container ship during parametric roll resonance, and to validate the model using experimental data.
Resumo:
This paper addresses the development of trust in the use of Open Data through incorporation of appropriate authentication and integrity parameters for use by end user Open Data application developers in an architecture for trustworthy Open Data Services. The advantages of this architecture scheme is that it is far more scalable, not another certificate-based hierarchy that has problems with certificate revocation management. With the use of a Public File, if the key is compromised: it is a simple matter of the single responsible entity replacing the key pair with a new one and re-performing the data file signing process. Under this proposed architecture, the the Open Data environment does not interfere with the internal security schemes that might be employed by the entity. However, this architecture incorporates, when needed, parameters from the entity, e.g. person who authorized publishing as Open Data, at the time that datasets are created/added.
Resumo:
This paper presents a novel vision-based underwater robotic system for the identification and control of Crown-Of-Thorns starfish (COTS) in coral reef environments. COTS have been identified as one of the most significant threats to Australia's Great Barrier Reef. These starfish literally eat coral, impacting large areas of reef and the marine ecosystem that depends on it. Evidence has suggested that land-based nutrient runoff has accelerated recent outbreaks of COTS requiring extensive use of divers to manually inject biological agents into the starfish in an attempt to control population numbers. Facilitating this control program using robotics is the goal of our research. In this paper we introduce a vision-based COTS detection and tracking system based on a Random Forest Classifier (RFC) trained on images from underwater footage. To track COTS with a moving camera, we embed the RFC in a particle filter detector and tracker where the predicted class probability of the RFC is used as an observation probability to weight the particles, and we use a sparse optical flow estimation for the prediction step of the filter. The system is experimentally evaluated in a realistic laboratory setup using a robotic arm that moves a camera at different speeds and heights over a range of real-size images of COTS in a reef environment.
Resumo:
Interest in the area of collaborative Unmanned Aerial Vehicles (UAVs) in a Multi-Agent System is growing to compliment the strengths and weaknesses of the human-machine relationship. To achieve effective management of multiple heterogeneous UAVs, the status model of the agents must be communicated to each other. This paper presents the effects on operator Cognitive Workload (CW), Situation Awareness (SA), trust and performance by increasing the autonomy capability transparency through text-based communication of the UAVs to the human agents. The results revealed a reduction in CW, increase in SA, increase in the Competence, Predictability and Reliability dimensions of trust, and the operator performance.
Resumo:
This paper explores consumer behavioural patterns on a magazine website. By using a unique dataset of real-life click stream data from 295 magazine website visitors, individual sessions are grouped according to the different sections visited on the websites. Interesting behavioural patterns are noted: most importantly, 86 % of all sessions only visit the blogs. This means that the visitors are not exposed to any editorial content at all, and choose to avoid also commercial contents. Sessions visiting editorial content, commercial content or social media links are very few in numbers (each 1 per cent or less of the sessions), thus giving only very limited support to the magazine business model. We noted that consumer behaviour on the magazine website seems to be very goal-oriented and instrumental, rather than exploratory and ritualized. This paper contributes to the current knowledge of media management by shedding light on consumer behaviour on media websites, and opening up the challenges with current media business models. From a more practical perspective, our data questions the general assumption of online platforms as supporter of the print business.
Resumo:
There is an increased interest in measuring the amount of greenhouse gases produced by farming practices . This paper describes an integrated solar powered Unmanned Air Vehicles (UAV) and Wireless Sensor Network (WSN) gas sensing system for greenhouse gas emissions in agricultural lands. The system uses a generic gas sensing system for CH4 and CO2 concentrations using metal oxide (MoX) and non-dispersive infrared sensors, and a new solar cell encapsulation method to power the unmanned aerial system (UAS)as well as a data management platform to store, analyze and share the information with operators and external users. The system was successfully field tested at ground and low altitudes, collecting, storing and transmitting data in real time to a central node for analysis and 3D mapping. The system can be used in a wide range of outdoor applications at a relatively low operational cost. In particular, agricultural environments are increasingly subject to emissions mitigation policies. Accurate measurements of CH4 and CO2 with its temporal and spatial variability can provide farm managers key information to plan agricultural practices. A video of the bench and flight test performed can be seen in the following link: https://www.youtube.com/watch?v=Bwas7stYIxQ
Resumo:
Digital Image
Resumo:
Digital Image
Resumo:
Digital Image
Resumo:
The memoirs were written in New York in 1999. Description of the childhood of Rosemarie Schink, the author's mother, in the rural area of Meuszelwitz, Thuringia, where her grandfather, Franz Harnish, was the station manager. Rosemarie Schink eloped to Amsterdam with the Dutch Jew Judah Easel in 1931. The marriage fall apart soon thereafter, and Rosemarie was taken under the wings of her father-in-law Joseph Easel. The couple stayed officially married until their divorce in 1940, and Rosemarie worked in the pension of her in-laws. She had a long affair with the German Jew Guy Weinberg from Hamburg, a married man who was living in Amsterdam and became the father of her daughter Julia. Description of the Weinberg family history. In 1941 Rosemarie Schink married the Austrian Jewish lawyer Herbert Mauthner, the eldest of three sons of Robert Mauthner, director of the Bodenbacher-Dux Railroad and Melanie Leitner, daughter of a wealthy family from Veszprem, Hungary. Mauthner family history and nobility of the Leitner family, who were admitted to the court of the Austrian Kaiser Franz Joseph.