927 resultados para Mixed Reality framework


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Increasing use of computerized systems in our daily lives creates new adversarial opportunities for which complex mechanisms are exploited to mend the rapid development of new attacks. Behavioral Biometrics appear as one of the promising response to these attacks. But it is a relatively new research area, specific frameworks for evaluation and development of behavioral biometrics solutions could not be found yet. In this paper we present a conception of a generic framework and runtime environment which will enable researchers to develop, evaluate and compare their behavioral biometrics solutions with repeatable experiments under the same conditions with the same data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The umbrella of Australian research higher degree (RHD) offerings has broadened from the traditional MPhil/PhD programmes to include a range of professional masters and doctoral degrees. This article reports on the experiences of three PhD students, engaged in an informally managed industry partnered research programme, described in this article as the work integrated research higher degree (WIRHD). Their learning process shares the attributes from both the traditional PhD programme and professional doctorates. However, because of the blended nature of the learning contexts, candidates engaged in the WIRHD programme must address a wider range of issues than those following the traditional RHD pathway. An exploratory case study approach was adopted with the view to develop an integrative framework to explain the various contexts that influence the learning experience of WIRHD candidates, as well as a structured approach to guide this contemporary form of industry partnered WIRHD process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Securing IT infrastructures of our modern lives is a challenging task because of their increasing complexity, scale and agile nature. Monolithic approaches such as using stand-alone firewalls and IDS devices for protecting the perimeter cannot cope with complex malwares and multistep attacks. Collaborative security emerges as a promising approach. But, research results in collaborative security are not mature, yet, and they require continuous evaluation and testing. In this work, we present CIDE, a Collaborative Intrusion Detection Extension for the network security simulation platform ( NeSSi 2 ). Built-in functionalities include dynamic group formation based on node preferences, group-internal communication, group management and an approach for handling the infection process for malware-based attacks. The CIDE simulation environment provides functionalities for easy implementation of collaborating nodes in large-scale setups. We evaluate the group communication mechanism on the one hand and provide a case study and evaluate our collaborative security evaluation platform in a signature exchange scenario on the other.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Teachers need professional development to keep current with teaching practices, although costs for extensive professional development can be prohibitive across an education system. Mentoring provides one way for embedding cost-effective professional development. This mixed-method study includes surveying mentor teachers (n = 101) on a five-part Likert scale and interviews with experienced mentors (n = 10) to investigate professional development for mentors as a result of the mentoring process. Quantitative data were analysed through a pedagogical knowledge framework and qualitative data were collated into themes. Survey data showed that although mentoring of pedagogical knowledge was variable, mentoring pedagogical knowledge practices occurs with the majority of mentors, which requires mentors to evaluate and articulate teaching practices. Qualitative data showed that mentoring acted as professional development and led towards enhancing communication skills, developing leadership roles (problem-solving and building capacity) and advancing pedagogical knowledge. Providing professional development to teachers on mentoring can help to build capacity in two ways: quality mentoring of preservice teachers through explicit mentoring practices, and reflecting and deconstructing teaching practices for mentors’ own pedagogical advancements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The evolution of classic power grids to smart grids creates chances for most participants in the energy sector. Customers can save money by reducing energy consumption, energy providers can better predict energy demand and environment benefits since lower energy consumption implies lower energy production including a decrease of emissions from plants. But information and communication systems supporting smart grids can also be subject to classical or new network attacks. Attacks can result in serious damage such as harming privacy of customers, creating economical loss and even disturb the power supply/demand balance of large regions and countries. In this paper, we give an overview about the German smart measuring architecture, protocols and security. Afterwards, we present a simulation framework which enables researchers to analyze security aspects of smart measuring scenarios.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Nurse practitioner education and practice has been guided by generic competency standards in Australia since 2006. Development of specialist competencies has been less structured and there are no formal standards to guide education and continuing professional development for specialty fields. There is limited international research and no Australian research into development of specialist nurse practitioner competencies. This pilot study aimed to test data collection methods, tools and processes in preparation for a larger national study to investigate specialist competency standards for emergency nurse practitioners. Research into specialist emergency nurse practitioner competencies has not been conducted in Australia. Methods: Mixed methods research was conducted with a sample of experienced emergency nurse practitioners. Deductive analysis of data from a focus group workshop informed development of a draft specialty competency framework. The framework was subsequently subjected to systematic scrutiny for consensus validation through a two round Delphi Study. Results: The Delphi study first round had a 100% response rate; the second round 75% response rate. The scoring for all items in both rounds was above the 80% cut off mark with the lowest mean score being 4.1 (82%) from the first round. Conclusion: The authors collaborated with emergency nurse practitioners to produce preliminary data on the formation of specialty competencies as a first step in developing an Australian framework.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Knowledge has been widely recognised as a determinant of business performance. Business capabilities require an effective share of resource and knowledge. Specifically, knowledge sharing (KS) between different companies and departments can improve manufacturing processes since intangible knowledge plays an enssential role in achieving competitive advantage. This paper presents a mixed method research study into the impact of KS on the effectiveness of new product development (NPD) in achieving desired business performance (BP). Firstly, an empirical study utilising moderated regression analysis was conducted to test whether and to what extent KS has leveraging power on the relationship between NPD and BP constructs and variables. Secondly, this empirically verified hypothesis was validated through explanatory case studies involving two Taiwanese manufacturing companies using a qualitative interaction term pattern matching technique. The study provides evidence that knowledge sharing and management activities are essential for deriving competitive advantage in the manufacturing industry.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The scarcity of large parcels of land in well-serviced areas is one motivator for redeveloping industrial or commercial property that is abandoned or underused and often environmentally contaminated – so-called brownfield land. Poor industrial waste disposal practices caused by industrial activities including gas works, factories, railway land and waste tips have contributed to many instances of contaminated land identified as brownfield sites. It is estimated there are between 10,000 and 160,000 brownfield sites in Australia, with Queensland accounting for around 4000 of these.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

between mid 2010 and early 2011, Queensland road related infrastructures were devastated by flood and cyclone related natural disasters. Responding to these recent events and in preparing for more regular and intense climate-change induced events in future, the Queensland Government is now reviewing how post-disaster road infrastructure recovery projects are planned and delivered. In particular, there is awareness that rebuilding such infrastructure need sustainable strategies across economic, environmental and social dimensions. A comprehensive sustainability assessment framework for pre and post disaster situations can minimize negative impact on our communities, economy and environment. This research is underway to develop a comprehensive sustainability element frame work for post disaster management in road infrastructures in Queensland, Australia. Analyzing the implications of disruption to transport network and associated services is an important part of preparing local and regional responses to the impacts of natural disasters. This research can contribute to strategic planning, management leading to safe, efficient and integrated transport system that supports sustainable economic, social and environmental outcomes in Queensland. Within this context, this paper provides an overview of the qualitative mixed-method research approach involving literature reviews and case studies to explore and evaluate a number of sustainability elements with a view to develop operational strategies for disaster recovery road projects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We introduce the Network Security Simulator (NeSSi2), an open source discrete event-based network simulator. It incorporates a variety of features relevant to network security distinguishing it from general-purpose network simulators. Compared to the predecessor NeSSi, it was extended with a three-tier plugin architecture and a generic network model to shift its focus towards simulation framework for critical infrastructures. We demonstrate the gained adaptability by different use cases

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Communication processes are vital in the lifecycle of BPM projects. With this in mind, much research has been performed into facilitating this key component between stakeholders. Amongst the methods used to support this process are personalized process visualisations. In this paper, we review the development of this visualization trend, then, we propose a theoretical analysis framework based upon communication theory. We use this framework to provide theoretical support to the conjecture that 3D virtual worlds are powerful tools for communicating personalised visualisations of processes within a workplace. Meta requirements are then derived and applied, via 3D virtual world functionalities, to generate example visualisations containing personalized aspects, which we believe enhance the process of communcation between analysts and stakeholders in BPM process (re)design activities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information privacy is a crucial aspect of eHealth. Appropriate privacy management measures are therefore essential for its success. However, traditional measures for privacy preservation such as rigid access controls (i.e., preventive measures) are not suitable to eHealth because of the specialised and information - intensive nature of healthcare itself, and the nature of the information. Healthcare professionals (HCP) require easy, unrestricted access to as much information as possible towards making well - informed decisions. On the other end of the scale however, consumers (i.e., patients) demand control over their health information and raise concerns for privacy arising from internal activities (i.e., information use by HCPs). A proper balance of these competing concerns is vital for the implementation of successful eHealth systems. Towards reaching this balance, we propose an information accountability framework (IAF) for eHealth systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An increased interest in utilising groups of Unmanned Aerial Vehicles (UAVs) with heterogeneous capabilities and autonomy is presenting the challenge to effectively manage such during missions and operations. This has been the focus of research in recent years, moving from a traditional UAV management paradigm of n-to-1 (n operators for one UAV, with n being at least two operators) toward 1-to-n (one operator, multiple UAVs). This paper has expanded on the authors’ previous work on UAV functional capability framework, by incorporating the concept of Functional Level of Autonomy (F-LOA) with two configurations: The lower F-LOA configuration contains sufficient information for the operator to generate solutions and make decisions to address perturbation events. Alternatively, the higher F-LOA configuration presents information reflecting on the F-LOA of the UAV, allowing the operator to interpret solutions and decisions generated autonomously, and decide whether to veto from this decision.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

ICT integration has been advocated to provide opportunities to improve students’ achievement and engagement through transforming the educational setting. A valuable tool that contributes in enhancing and developing students’ cognitive skills for lifelong learning, ICT integration has introduced a new educational philosophy, shifting the role of students into a more central position in the pedagogical processes. Kuwait, as with many other countries, has recently planned ICT integration to develop its citizen’s capacities. This study sought to capture the principals’, teachers’, and students’ perceptions of ICT integration in pedagogical activities, as well as how ICT is being used for learning and teaching activities in three ICT leading Kuwaiti secondary schools. Interviews with principals, teachers, and students were conducted, along with an open-ended questionnaire for the teachers, researcher observations, and document analysis. The findings revealed that ICT integration in Kuwait needed to be reinforced to accomplish the ICT integration objectives. A call for further support for teachers, and a reconsideration of the ICT integration strategies were also recommended.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The history of war is blighted with astonishing reminders of man’s ability to cast his sense of humanity aside and inflict unspeakable harm upon one another. The ruthless bombing of Dresden, the callousness of the Nazi concentration camps and the massacre of the Tutsis are but a few of the atrocities that have haunted our past. In response to these atrocities, society has imposed an ever-increasing number of laws and rules to regulate warfare. Amongst these is the doctrine of command responsibility. The doctrine of command responsibility states that a commander is criminally liable for the crimes of his subordinates if he knew or should have known of their crimes. This paper will examine whether the doctrine is an appropriate and realistic legal standard to hold commanders accountable to or whether the doctrine is more a reflection of social sentiment and legal rhetoric. If the doctrine, and indeed the law of war in general, is unrealistic then the law cannot fulfil its purpose - that is, the prevention of atrocities. Instead of being solely a reflection of moral authority and social sentiments the law must also be a tool that guides and shapes the decisions and actions of the military through the chaotic and brutal nature of war...