942 resultados para Transformations.
Resumo:
This paper presents a novel power control strategy that decouples the active and reactive power for a synchronous generator connected to a power network. The proposed control paradigm considers the capacitance of the transmission line along with its resistance and reactance as-well. Moreover the proposed controller takes into account all cases of R-X relationships, thus allowing it to function in Virtual Power Plant (VPP) structures which operate at both medium voltage (MV) and low voltage (LV) levels. The independent control of active and reactive power is achieved through rotational transformations of the terminal voltages and currents at the synchronous generator's output. This paper details the control technique by first presenting the mathematical and electrical network analysis of the methodology and then successfully implementing the control using MATLAB-SIMULINK simulation.
Resumo:
The SimCalc Vision and Contributions Advances in Mathematics Education 2013, pp 419-436 Modeling as a Means for Making Powerful Ideas Accessible to Children at an Early Age Richard Lesh, Lyn English, Serife Sevis, Chanda Riggs … show all 4 hide » Look Inside » Get Access Abstract In modern societies in the 21st century, significant changes have been occurring in the kinds of “mathematical thinking” that are needed outside of school. Even in the case of primary school children (grades K-2), children not only encounter situations where numbers refer to sets of discrete objects that can be counted. Numbers also are used to describe situations that involve continuous quantities (inches, feet, pounds, etc.), signed quantities, quantities that have both magnitude and direction, locations (coordinates, or ordinal quantities), transformations (actions), accumulating quantities, continually changing quantities, and other kinds of mathematical objects. Furthermore, if we ask, what kind of situations can children use numbers to describe? rather than restricting attention to situations where children should be able to calculate correctly, then this study shows that average ability children in grades K-2 are (and need to be) able to productively mathematize situations that involve far more than simple counts. Similarly, whereas nearly the entire K-16 mathematics curriculum is restricted to situations that can be mathematized using a single input-output rule going in one direction, even the lives of primary school children are filled with situations that involve several interacting actions—and which involve feedback loops, second-order effects, and issues such as maximization, minimization, or stabilizations (which, many years ago, needed to be postponed until students had been introduced to calculus). …This brief paper demonstrates that, if children’s stories are used to introduce simulations of “real life” problem solving situations, then average ability primary school children are quite capable of dealing productively with 60-minute problems that involve (a) many kinds of quantities in addition to “counts,” (b) integrated collections of concepts associated with a variety of textbook topic areas, (c) interactions among several different actors, and (d) issues such as maximization, minimization, and stabilization.
Resumo:
This paper deals with the transformations that have occurred in news journalism worldwide in the early 21st century. I argue that they havebeen the most significant changes to the profession for 100 years, and the challenges facing the news media industry in responding to them are substantial, as are those facing journalism education. This argument is developed in relation to the crisis of the newspaper business model, and why social media, blogging and citizen journalism have not filled the gap left by the withdrawal of resources from traditional journalism. It also draws upon Wikileaks as a case study in debates about computational and data-driven journalism, and whether large-scale "leaks" of electronic documents may be the future of investigative journalism.
Resumo:
Highly sensitive infrared (IR) cameras provide high-resolution diagnostic images of the temperature and vascular changes of breasts. These images can be processed to emphasize hot spots that exhibit early and subtle changes owing to pathology. The resulting images show clusters that appear random in shape and spatial distribution but carry class dependent information in shape and texture. Automated pattern recognition techniques are challenged because of changes in location, size and orientation of these clusters. Higher order spectral invariant features provide robustness to such transformations and are suited for texture and shape dependent information extraction from noisy images. In this work, the effectiveness of bispectral invariant features in diagnostic classification of breast thermal images into malignant, benign and normal classes is evaluated and a phase-only variant of these features is proposed. High resolution IR images of breasts, captured with measuring accuracy of ±0.4% (full scale) and temperature resolution of 0.1 °C black body, depicting malignant, benign and normal pathologies are used in this study. Breast images are registered using their lower boundaries, automatically extracted using landmark points whose locations are learned during training. Boundaries are extracted using Canny edge detection and elimination of inner edges. Breast images are then segmented using fuzzy c-means clustering and the hottest regions are selected for feature extraction. Bispectral invariant features are extracted from Radon projections of these images. An Adaboost classifier is used to select and fuse the best features during training and then classify unseen test images into malignant, benign and normal classes. A data set comprising 9 malignant, 12 benign and 11 normal cases is used for evaluation of performance. Malignant cases are detected with 95% accuracy. A variant of the features using the normalized bispectrum, which discards all magnitude information, is shown to perform better for classification between benign and normal cases, with 83% accuracy compared to 66% for the original.
Resumo:
Business transformations are complex organisational change endeavours that result in a business performing current work differently, or performing different work. Information Technology (IT) is a key enabler of such initiatives, but comes with its challenges, as revamping the IT infrastructure in large-scale organisations implies high complexity, high risk, and often high failure rates. We view business transformations as a collection of management services that are demanded and enacted at a program level, defined as abstract resources that provide the managerial capabilities necessary for business transformations. In this research-in-progress, we explore what triggers the need for management services in response to the challenges in business transformation management. We analyse data from two exploratory case studies using the critical incident technique as our qualitative analysis method. Early findings indicate that management service triggers reside on either the strategic level, which may be internally or externally driven, or at the program management level, which may be situational, influential or reactional. We detail implications for our on-going research.
Resumo:
The decentralisation reform in Indonesia has mandated the Central Government to transfer some functions and responsibilities to local governments including the transfer of human resources, assets and budgets. Local governments became giant asset holders almost overnight and most were ill prepared to handle these transformations. Assets were transferred without analysing local government need, ability or capability to manage the assets and no local government was provided with an asset management framework. Therefore, the aim of this research is to develop a Public Asset Management Framework for provincial governments in Indonesia, especially for infrastructure and real property assets. This framework will enable provincial governments to develop integrated asset management procedures throughout asset‘s lifecycle. Achieving the research aim means answering the following three research questions; 1) How do provincial governments in Indonesia currently manage their public assets? 2) What factors influence the provincial governments in managing these public assets? 3) How is a Public Asset Management Framework developed that is specific for the Indonesian provincial governments‘ situation? This research applied case studies approach after a literature review; document retrieval, interviews and observations were collated. Data was collected in June 2009 (preliminary data collection) and January to July 2010 in the major eastern Indonesian provinces. Once the public asset management framework was developed, a focus group was used to verify the framework. Results are threefold and indicate that Indonesian provincial governments need to improve the effectiveness and efficiency of current practice of public asset management in order to improve public service quality. The second result shows that the 5 major concerns that influence the local government public asset management processes are asset identification and inventory systems, public asset holding, asset guidance and legal arrangements, asset management efficiency and effectiveness, and, human resources and their organisational arrangements. The framework was then applied to assets already transferred to local governments and so included a system of asset identification and a needs analysis to classify the importance of these assets to local governments, their functions and responsibilities in delivering public services. Assets that support local government functions and responsibilities will then be managed using suitable asset lifecycle processes. Those categorised as surplus assets should be disposed. Additionally functions and responsibilities that do not need an asset solution should be performed directly by local governments. These processes must be measured using performance measurement indicators. All these stages should be guided and regulated with sufficient laws and regulations. Constant improvements to the quality and quantity of human resources hold an important role in successful public asset management processes. This research focuses on developing countries, and contributes toward the knowledge of a Public Asset Management Framework at local government level, particularly Indonesia. The framework provides local governments a foundation to improve their effectiveness and efficiency in managing public assets, which could lead to improved public service quality. This framework will ensure that the best decisions are made throughout asset decision ownership and provide a better asset life cycle process, leading to selection of the most appropriate asset, improve its acquisition and delivery process, optimise asset performance, and provide an appropriate disposal program.
Resumo:
Availability has become a primary goal of information security and is as significant as other goals, in particular, confidentiality and integrity. Maintaining availability of essential services on the public Internet is an increasingly difficult task in the presence of sophisticated attackers. Attackers may abuse limited computational resources of a service provider and thus managing computational costs is a key strategy for achieving the goal of availability. In this thesis we focus on cryptographic approaches for managing computational costs, in particular computational effort. We focus on two cryptographic techniques: computational puzzles in cryptographic protocols and secure outsourcing of cryptographic computations. This thesis contributes to the area of cryptographic protocols in the following ways. First we propose the most efficient puzzle scheme based on modular exponentiations which, unlike previous schemes of the same type, involves only a few modular multiplications for solution verification; our scheme is provably secure. We then introduce a new efficient gradual authentication protocol by integrating a puzzle into a specific signature scheme. Our software implementation results for the new authentication protocol show that our approach is more efficient and effective than the traditional RSA signature-based one and improves the DoSresilience of Secure Socket Layer (SSL) protocol, the most widely used security protocol on the Internet. Our next contributions are related to capturing a specific property that enables secure outsourcing of cryptographic tasks in partial-decryption. We formally define the property of (non-trivial) public verifiability for general encryption schemes, key encapsulation mechanisms (KEMs), and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption avors. We show that some generic transformations and concrete constructions enjoy this property and then present a new public-key encryption (PKE) scheme having this property and proof of security under the standard assumptions. Finally, we combine puzzles with PKE schemes for enabling delayed decryption in applications such as e-auctions and e-voting. For this we first introduce the notion of effort-release PKE (ER-PKE), encompassing the well-known timedrelease encryption and encapsulated key escrow techniques. We then present a security model for ER-PKE and a generic construction of ER-PKE complying with our security notion.
Resumo:
While there are many similarities between the languages of the various workflow management systems, there are also significant differences. One particular area of differences is caused by the fact that different systems impose different syntactic restrictions. In such cases, business analysts have to choose between either conforming to the language in their specifications or transforming these specifications afterwards. The latter option is preferable as this allows for a separation of concerns. In this paper we investigate to what extent such transformations are possible in the context of various syntactical restrictions (the most restrictive of which will be referred to as structured workflows). We also provide a deep insight into the consequences, particularly in terms of expressive power, of imposing such restrictions.
Resumo:
In this paper two-dimensional (2-D) numerical investigation of flow past four square cylinders in an in-line square configuration are performed using the lattice Boltzmann method. The gap spacing g=s/d is set at 1, 3 and 6 and Reynolds number ranging from Re=60 to 175. We observed four distinct wake patterns: (i) a steady wake pattern (Re=60 and g=1) (ii) a stable shielding wake pattern (80≤Re≤175 and g=1) (iii) a wiggling shielding wake pattern (60≤Re≤175 and g=3) (iv) a vortex shedding wake pattern (60≤Re≤175 and g=6) At g=1, the Reynolds number is observed to have a strong effect on the wake patterns. It is also found that at g=1, the secondary cylinder interaction frequency significantly contributes for drag and lift coefficients signal. It is found that the primary vortex shedding frequency dominates the flow and the role of secondary cylinder interaction frequency almost vanish at g=6. It is observed that the jet between the gaps strongly influenced the wake interaction for different gap spacing and Reynolds number combination. To fully understand the wake transformations the details vorticity contour visualization, power spectra of lift coefficient signal and time signal analysis of drag and lift coefficients also presented in this paper.
Resumo:
Many aspects of China's academic publishing system differ from the systems found in liberal market based economies of the United States, Western Europe and Australia. A high level of government intervention in both the publishing industry and academia and the challenges associated with attempting to make a transition from a centrally controlled towards a more market based publishing industry are two notable differences; however, as in other countries, academic communities and publishers are being transformed by digital technologies. This research explores the complex yet dynamic digital transformation of academic publishing in China, with a specific focus of the open and networked initiatives inspired by Web 2.0 and social media. The thesis draws on two case studies: Science Paper Online, a government-operated online preprint platform and open access mandate; and New Science, a social reference management website operated by a group of young PhD students. Its analysis of the innovations, business models, operating strategies, influences, and difficulties faced by these two initiatives highlights important characteristics and trends in digital publishing experiments in China. The central argument of this thesis is that the open and collaborative possibilities of Web 2.0 inspired initiatives are emerging outside the established journal and monograph publishing system in China, introducing innovative and somewhat disruptive approaches to the certification, communication and commercial exploitation of knowledge. Moreover, emerging publishing models are enabling and encouraging a new system of practising and communicating science in China, putting into practice some elements of the Open Science ethos. There is evidence of both disruptive change to old publishing structures and the adaptive modification of emergent replacements in the Chinese practice. As such, the transformation from traditional to digital and interactive modes of publishing, involves both competition and convergence between new and old publishers, as well as dynamics of co-evolution involving new technologies, business models, social norms, and government reform agendas. One key concern driving this work is whether there are new opportunities and new models for academic publishing in the Web 2.0 age and social media environment, which might allow the basic functions of communication and certification to be achieved more effectively. This thesis enriches existing knowledge of open and networked transformations of scholarly publishing by adding a Chinese story. Although the development of open and networked publishing platforms in China remains in its infancy, the lessons provided by this research are relevant to practitioners and stakeholders interested in understanding the transformative dynamics of networked technologies for publishing and advocating open access in practice, not only in China, but also internationally.
Resumo:
One set of public institutions that has seen growing discussion about the transformative impact of new media technologies has been universities. The higher education sector, historically one of the more venerable and stable areas of public life, is now the subject of almost continuous speculation about whether it can continue in its current form during the 21st century. Digital media technologies are often seen as being at the forefront of such changes. It has been widely noted that moves towards a knowledge economy generates ‘skills-biased technological change’, that places a premium upon higher education qualifications, and that this earnings gap remains despite the continuing increase in the number of university graduates. As the demand for higher education continues to grow worldwide, there are new discussions about whether technologically-mediated education through new forms such as Massively Open Online Courses (MOOCs) are broadening access to quality learning, or severing the vital connection between teacher and student seen as integral to the learning process. This paper critically appraises such debates in the context of early 21st century higher education. It will discuss ten drivers of change in higher education, many of which are related to themes discussed elsewhere in this book, such as the impact of social media, globalization, and a knowledge economy. It will also consider the issues raised in navigating such developments from the perspective of the ‘Five P’s’: practical issues; personal issues; pedagogical issues; policy issues; and philosophical issues. It also includes a critical evaluation of MOOCs from the point of view of their educational qualities. It will conclude with the observation that while universities will continue to play a significant – and perhaps growing – role in the economy, society and culture, the issues raised about what Clayton Christensen and Henry Eyring term the ‘disruptive university’ (Christensen and Eyring 2011) are nonetheless pressing ones, and that cost and policy pressures in particular are likely to generate significant institutional transformations in higher education worldwide.
Resumo:
In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistinguishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can be essentially relaxed to indistinguishability against chosen-plaintext attacks (IND-CPA) for ciphertexts once they pass the gateway that acts as an IND-CCA/CPA filter by first checking the validity of an incoming IND-CCA ciphertext, then transforming it (if valid) into an IND-CPA ciphertext, and forwarding the latter to the recipient in the private domain. “Non-trivial filtering'' can result in reduced decryption costs on the receivers' side. We identify a class of encryption schemes with publicly verifiable ciphertexts that admit generic constructions of (non-trivial) IND-CCA/CPA filters. These schemes are characterized by existence of public algorithms that can distinguish between valid and invalid ciphertexts. To this end, we formally define (non-trivial) public verifiability of ciphertexts for general encryption schemes, key encapsulation mechanisms, and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption flavours. We further analyze the security impact of public verifiability and discuss generic transformations and concrete constructions that enjoy this property.
Resumo:
In the last fifteen years digital storytelling has come to stand for considerably more than a specific form of collaborative media production. It is also an international network of new media artists, creative practitioners, curators, scholars, and facilitating community media organisations. In May this year the movement will converge on Ankara, Turkey for its Fifth International Conference and Exhibition. The event will draw together key adopters, adapters and innovators in community-based methods of collaborative media production from around the world. Researchers from the Queensland University of Technology will lead a delegation that will include key players in the Australian digital storytelling movement.
Resumo:
There is growing scholarly interest in the everyday work undertaken by screen producers in part prompted by disciplinary shifts (the ‘material turn’, the rise of creative industries research) and in part by major transformations in the business of media production and consumption in recent years. However, the production cultures and motivations of screen producers, particularly those working in emergent online and convergent media markets, remain poorly understood. The 2012 Australian Screen Producer survey, building upon research undertaken in the Australian Screen Content Producer Survey conducted in 2009, was a nation-wide survey-based study of screen content producers working in four industry segments: film, television, corporate and new media production. The broad objectives of the 2012 Australian Producer Survey study were to: • Provide deeper and more detailed analysis into the nature of digital media producers and their practices and how these findings compare to the practices of established screen media producers; • Interrogate issues around the pace of industry change, industry sentiment and how producers are adapting to a changing marketplace; and • Offer insight into the transitional pathways of established media producers into production for digital media markets. The Australian Screen Producer Survey Online Interactive provides users (principally filmmakers, scholars and policymakers) with direct access to raw survey data through an interactive website that allows them to customise queries according to particular interests. The Online Interactive therefore provides customisable findings – unlike ‘static’ research outputs – delineating the practices, attitudes, strategies, and aspirations of screen producers working in feature film, television and corporate production as well as those operating in an increasingly convergent digital media marketplace. The survey was developed by researchers at the ARC Centre of Excellence for Creative Industries and Innovation (CCI), Queensland University of Technology, Deakin University, the Centre for Screen Business at Australian Film Television and Radio School (AFTRS) and was undertaken in association with Bergent Research. The Online Interactive website (http://screenproducersurvey.com/) was developed with support from the Centre for Memory Imagination and Invention (CMII).
Resumo:
This article aims to discuss the notion of moral progress in the theory of recognition. It argues that Axel Honneth's program offers sophisticated theoretical guidance to observe and critically interpret emancipatory projects in contemporary politics based on ideas of individuality and social inclusiveness. Using a case study – the investigation, through frame analysis, of transformations in the portrayal of people with impairment as well as in public discourses on the issue of disability in major Brazilian news media from 1960 to 2008 – this article addresses three controversies: the notion of progress as a directional process; the problem of moral disagreement and conflict of interest in struggles for recognition; and the processes of social learning. By articulating empirically based arguments and Honneth's normative discussions, this study concludes that one can talk about moral progress without losing sight of value pluralism and conflict of interest.