948 resultados para Digital Informational Environments
Resumo:
The authors present a Cause-Effect fault diagnosis model, which utilises the Root Cause Analysis approach and takes into account the technical features of a digital substation. The Dempster/Shafer evidence theory is used to integrate different types of fault information in the diagnosis model so as to implement a hierarchical, systematic and comprehensive diagnosis based on the logic relationship between the parent and child nodes such as transformer/circuit-breaker/transmission-line, and between the root and child causes. A real fault scenario is investigated in the case study to demonstrate the developed approach in diagnosing malfunction of protective relays and/or circuit breakers, miss or false alarms, and other commonly encountered faults at a modern digital substation.
Resumo:
Persistent digital hyperthermia, presumably due to vasodilation, occurs during the developmental and acute stages of insulin-induced laminitis. The objectives of this study were to determine if persistent digital hyperthermia is the principal pathogenic mechanism responsible for the development of laminitis. The potent vasodilator, ATP-MgCl 2 was infused continuously into the distal phalanx of the left forefoot of six Standardbred racehorses for 48h via intra-osseous infusion to promote persistent digital hyperthermia. The right forefoot was infused with saline solution and acted as an internal control. Clinical signs of lameness at the walk were not detected at 0h, 24h or 48h post-infusion. Mean±SE hoof wall temperatures of the left forefoot (29.4±0.25°C) were higher (P<0.05) than those on the right (27.5±0.38°C). Serum insulin (15.0±2.89μIU/mL) and blood glucose (5.4±0.22mM) concentrations remained unchanged during the experiment. Histopathological evidence of laminitis was not detected in any horse. The results demonstrated that digital vasodilation up to 30 °C for a period of 48. h does not trigger laminitis in the absence of hyperinsulinaemia. Thus, although digital hyperthermia may play a role in the pathogenesis of laminitis, it is not the sole mechanism involved.
Resumo:
STUDY DESIGN: Controlled laboratory study. OBJECTIVES: To investigate the reliability and concurrent validity of photographic measurements of hallux valgus angle compared to radiographs as the criterion standard. BACKGROUND: Clinical assessment of hallux valgus involves measuring alignment between the first toe and metatarsal on weight-bearing radiographs or visually grading the severity of deformity with categorical scales. Digital photographs offer a noninvasive method of measuring deformity on an exact scale; however, the validity of this technique has not previously been established. METHODS: Thirty-eight subjects (30 female, 8 male) were examined (76 feet, 54 with hallux valgus). Computer software was used to measure hallux valgus angle from digital records of bilateral weight-bearing dorsoplantar foot radiographs and photographs. One examiner measured 76 feet on 2 occasions 2 weeks apart, and a second examiner measured 40 feet on a single occasion. Reliability was investigated by intraclass correlation coefficients and validity by 95% limits of agreement. The Pearson correlation coefficient was also calculated. RESULTS: Intrarater and interrater reliability were very high (intraclass correlation coefficients greater than 0.96) and 95% limits of agreement between photographic and radiographic measurements were acceptable. Measurements from photographs and radiographs were also highly correlated (Pearson r = 0.96). CONCLUSIONS: Digital photographic measurements of hallux valgus angle are reliable and have acceptable validity compared to weight-bearing radiographs. This method provides a convenient and precise tool in assessment of hallux valgus, while avoiding the cost and radiation exposure associated with radiographs.
Resumo:
This chapter describes a university/high school partnership focused on digital storytelling. It also explains the multi-stage process used to establish this successful partnership and project. The authors discuss the central role that technology played in developing this university/high school partnership, a collaboration that extended the impact of a digital storytelling project to reach high school students, university students, educators, high school administrators, and the local community. Valuing a reflective process that can lead to the creation of a powerful final product, the authors describe the impact of digital storytelling on multiple stakeholders, including the 13 university students and 33 culturally and linguistically diverse high school youth who participated during the fall of 2009. In addition, the chapter includes reflections from university and high school student participants expressed during focus groups conducted throughout the project. While most participants had a positive experience with the project, complications with the technology component often caused frustrations and additional challenges. Goals for sharing this project are to critically evaluate digital storytelling, describe lessons learned, and recommend good practices for others working within a similar context or with parallel goals.
Resumo:
Although mobile phones are often used in public urban places to interact with one’s geographically dispersed social circle, they can also facilitate interactions with people in the same public urban space. The PlaceTagz study investigates how physical artefacts in public urban places can be utilised and combined with mobile phone technologies to facilitate interactions. Printed on stickers, PlaceTagz are QR codes linking to a digital message board enabling collocated users to interact with each other over time resulting in a place-based digital memory. This exploratory project set out to investigate if and how PlaceTagz are used by urban dwellers in a real world deployment. We present findings from analysing content received through PlaceTagz and interview data from application users. QR codes, which do not contain any contextual information, piqued the curiosity of users wondering about the embedded link’s destination and provoked comments in regards to people, place and technology.
Resumo:
Recognizing the impact of reconfiguration on the QoS of running systems is especially necessary for choosing an appropriate approach to dealing with dynamic evolution of mission-critical or non-stop business systems. The rationale is that the impaired QoS caused by inappropriate use of dynamic approaches is unacceptable for such running systems. To predict in advance the impact, the challenge is two-fold. First, a unified benchmark is necessary to expose QoS problems of existing dynamic approaches. Second, an abstract representation is necessary to provide a basis for modeling and comparing the QoS of existing and new dynamic reconfiguration approaches. Our previous work [8] has successfully evaluated the QoS assurance capabilities of existing dynamic approaches and provided guidance of appropriate use of particular approaches. This paper reinvestigates our evaluations, extending them into concurrent and parallel environments by abstracting hardware and software conditions to design an evaluation context. We report the new evaluation results and conclude with updated impact analysis and guidance.
Resumo:
Key establishment is a crucial primitive for building secure channels in a multi-party setting. Without quantum mechanics, key establishment can only be done under the assumption that some computational problem is hard. Since digital communication can be easily eavesdropped and recorded, it is important to consider the secrecy of information anticipating future algorithmic and computational discoveries which could break the secrecy of past keys, violating the secrecy of the confidential channel. Quantum key distribution (QKD) can be used generate secret keys that are secure against any future algorithmic or computational improvements. QKD protocols still require authentication of classical communication, although existing security proofs of QKD typically assume idealized authentication. It is generally considered folklore that QKD when used with computationally secure authentication is still secure against an unbounded adversary, provided the adversary did not break the authentication during the run of the protocol. We describe a security model for quantum key distribution extending classical authenticated key exchange (AKE) security models. Using our model, we characterize the long-term security of the BB84 QKD protocol with computationally secure authentication against an eventually unbounded adversary. By basing our model on traditional AKE models, we can more readily compare the relative merits of various forms of QKD and existing classical AKE protocols. This comparison illustrates in which types of adversarial environments different quantum and classical key agreement protocols can be secure.
Resumo:
Building Web 2.0 sites does not necessarily ensure the success of the site. We aim to better understand what improves the success of a site by drawing insight from biologically inspired design patterns. Web 2.0 sites provide a mechanism for human interaction enabling powerful intercommunication between massive volumes of users. Early Web 2.0 site providers that were previously dominant are being succeeded by newer sites providing innovative social interaction mechanisms. Understanding what site traits contribute to this success drives research into Web sites mechanics using models to describe the associated social networking behaviour. Some of these models attempt to show how the volume of users provides a self-organising and self-contextualisation of content. One model describing coordinated environments is called stigmergy, a term originally describing coordinated insect behavior. This paper explores how exploiting stigmergy can provide a valuable mechanism for identifying and analysing online user behavior specifically when considering that user freedom of choice is restricted by the provided web site functionality. This will aid our building better collaborative Web sites improving the collaborative processes.
Resumo:
Online victimisation of children is concerned with sexual abuse caused with the help of online technologies. Digital forensics is a powerful methodology to discover, prevent and bring criminals to justice. Digital forensics is dependent on tools and access to information from a variety of sources in digital government. This paper reports from a knowledge enhancement project to gain new insights into offender investigations in law enforcement.
Resumo:
Issues in Green Criminology: confronting harms against environments, humanity and other animals aims to provide, if not a manifesto, then at least a significant resource for thinking about green criminology, a rapidly developing field. It offers a set of specially written introductions and a variety of current and new directions, wide-ranging in scope and international in terms of coverage and contributors. It provides focused discussions of current and cutting edge issues that will influence the emergence of a coherent perspective on green issues. The contributors are drawn from the leading thinkers in the field. The twelve chapters of the book explore the myriad ways in which governments, transnational corporations, military apparatuses and ordinary people going about their everyday lives routinely harm environments, other animals and humanity. The book will be essential reading not only for students taking courses in colleges and universities but also for activists in the environmental and animal rights movements. Its concern is with an ever-expanding agenda - the whys, the hows and the whens of the generation and control of the many aspects of harm to environments, ecological systems and all species of animals, including humans. These harms include, but are not limited to, exploitation, modes of discrimination and disempowerment, degradation, abuse, exclusion, pain, injury, loss and suffering. Straddling and intersecting these many forms of harm are key concepts for a green criminology such as gender inequalities, racism, dominionism and speciesism, classism, the north/south divide, the accountability of science, and the ethics of global capitalist expansion. Green criminology has the potential to provide not only a different way of examining and making sense of various forms of crime and control responses (some well known, others less so) but can also make explicable much wider connections that are not generally well understood. As all societies face up to the need to confront harms against environments, other animals and humanity, criminology will have a major role to play. This book will be an essential part of this process.
Resumo:
The digital humanities are growing rapidly in response to a rise in Internet use. What humanists mostly work on, and which forms much of the contents of our growing repositories, are digital surrogates of originally analog artefacts. But is the data model upon which many of those surrogates are based – embedded markup – adequate for the task? Or does it in fact inhibit reusability and flexibility? To enhance interoperability of resources and tools, some changes to the standard markup model are needed. Markup could be removed from the text and stored in standoff form. The versions of which many cultural heritage texts are composed could also be represented externally, and computed automatically. These changes would not disrupt existing data representations, which could be imported without significant data loss. They would also enhance automation and ease the increasing burden on the modern digital humanist.