939 resultados para digital space
Resumo:
Evaluates trends in the imagery built into GIS applications to supplement existing vector data of streets, boundaries, infrastructure and utilities. These include large area digital orthophotos, Landsat and SPOT data. Future developments include 3 to 5 metre pixel resolutions from satellites, 1 to 2 metres from aircraft. GPS and improved image analysis techniques will also assist in improving resolution and accuracy.
Resumo:
In 1999 the global recorded music industry had experienced a period of growth that had lasted for almost a quarter of a century. Approximately one billion records were sold worldwide in 1974, and by the end of the century, the number of records sold was more than three times as high. At the end of the nineties, spirits among record label executives were high and few music industry executives at this time expected that a team of teenage Internet hackers, led by Shawn Fanning (at the time a student at Northeastern University in Boston) would ignite the turbulent process that eventually would undermine the foundations of the industry.
Resumo:
Using Media-Access-Control (MAC) address for data collection and tracking is a capable and cost effective approach as the traditional ways such as surveys and video surveillance have numerous drawbacks and limitations. Positioning cell-phones by Global System for Mobile communication was considered an attack on people's privacy. MAC addresses just keep a unique log of a WiFi or Bluetooth enabled device for connecting to another device that has not potential privacy infringements. This paper presents the use of MAC address data collection approach for analysis of spatio-temporal dynamics of human in terms of shared space utilization. This paper firstly discuses the critical challenges and key benefits of MAC address data as a tracking technology for monitoring human movement. Here, proximity-based MAC address tracking is postulated as an effective methodology for analysing the complex spatio-temporal dynamics of human movements at shared zones such as lounge and office areas. A case study of university staff lounge area is described in detail and results indicates a significant added value of the methodology for human movement tracking. By analysis of MAC address data in the study area, clear statistics such as staff’s utilisation frequency, utilisation peak periods, and staff time spent is obtained. The analyses also reveal staff’s socialising profiles in terms of group and solo gathering. The paper is concluded with a discussion on why MAC address tracking offers significant advantages for tracking human behaviour in terms of shared space utilisation with respect to other and more prominent technologies, and outlines some of its remaining deficiencies.
Resumo:
Quantitative determination of modification of primary sediment features, by the activity of organisms (i.e., bioturbation) is essential in geosciences. Some methods proposed since the 1960s are mainly based on visual or subjective determinations. The first semiquantitative evaluations of the Bioturbation Index, Ichnofabric Index, or the amount of bioturbation were attempted, in the best cases using a series of flashcards designed in different situations. Recently, more effective methods involve the use of analytical and computational methods such as X-rays, magnetic resonance imaging or computed tomography; these methods are complex and often expensive. This paper presents a compilation of different methods, using Adobe® Photoshop® software CS6, for digital estimation that are a part of the IDIAP (Ichnological Digital Analysis Images Package), which is an inexpensive alternative to recently proposed methods, easy to use, and especially recommended for core samples. The different methods — “Similar Pixel Selection Method (SPSM)”, “Magic Wand Method (MWM)” and the “Color Range Selection Method (CRSM)” — entail advantages and disadvantages depending on the sediment (e.g., composition, color, texture, porosity, etc.) and ichnological features (size of traces, infilling material, burrow wall, etc.). The IDIAP provides an estimation of the amount of trace fossils produced by a particular ichnotaxon, by a whole ichnocoenosis or even for a complete ichnofabric. We recommend the application of the complete IDIAP to a given case study, followed by selection of the most appropriate method. The IDIAP was applied to core material recovered from the IODP Expedition 339, enabling us, for the first time, to arrive at a quantitative estimation of the discrete trace fossil assemblage in core samples.
Resumo:
Social media have become crucial tools for political activists and protest movements, providing another channel for promoting messages and garnering support. Twitter, in particular, has been identified as a noteworthy medium for protests in countries including Iran and Egypt to receive global attention. The Occupy movement, originating with protests in, and the physical occupation of, Wall Street, and inspiring similar demonstrations in other U.S. cities and around the world, has been intrinsically linked with social media through location-specific hashtags: #ows for Occupy Wall Street, #occupysf for San Francisco, and so on. While the individual protests have a specific geographical focus-highlighted by the physical occupation of parks, buildings, and other urban areas-Twitter provides a means for these different movements to be linked and promoted through tweets containing multiple hashtags. It also serves as a channel for tactical communications during actions and as a space in which movement debates take place. This paper examines Twitter's use within the Occupy Oakland movement. We use a mixture of ethnographic research through interviews with activists and participant observation of the movements' activities, and a dataset of public tweets containing the #oo hashtag from early 2012. This research methodology allows us to develop a more accurate and nuanced understanding of how movement activists use Twitter by cross-checking trends in the online data with observations and activists' own reported use of Twitter. We also study the connections between a geographically focused movement such as Occupy Oakland and related, but physically distant, protests taking place concurrently in other cities. This study forms part of a wider research project, Mapping Movements, exploring the politics of place, investigating how social movements are composed and sustained, and the uses of online communication within these movements.
Resumo:
This thesis opens up the design space for awareness research in CSCW and HCI. By challenging the prevalent understanding of roles in awareness processes and exploring different mechanisms for actively engaging users in the awareness process, this thesis provides a better understanding of the complexity of these processes and suggests practical solutions for designing and implementing systems that support active awareness. Mutual awareness, a prominent research topic in the fields of Computer-Supported Cooperative Work (CSCW) and Human-Computer Interaction (HCI) refers to a fundamental aspect of a person’s work: their ability to gain a better understanding of a situation by perceiving and interpreting their co-workers actions. Technologically-mediated awareness, used to support co-workers across distributed settings, distinguishes between the roles of the actor, whose actions are often limited to being the target of an automated data gathering processes, and the receiver, who wants to be made aware of the actors’ actions. This receiver-centric view of awareness, focusing on helping receivers to deal with complex sets of awareness information, stands in stark contrast to our understanding of awareness as social process involving complex interactions between both actors and receivers. It fails to take into account an actors’ intimate understanding of their own activities and the contribution that this subjective understanding could make in providing richer awareness information. In this thesis I challenge the prevalent receiver-centric notion of awareness, and explore the conceptual foundations, design, implementation and evaluation of an alternative active awareness approach by making the following five contributions. Firstly, I identify the limitations of existing awareness research and solicit further evidence to support the notion of active awareness. I analyse ethnographic workplace studies that demonstrate how actors engage in an intricate interplay involving the monitoring of their co-workers progress and displaying aspects of their activities that may be of relevance to others. The examination of a large body of awareness research reveals that while disclosing information is a common practice in face-to-face collaborative settings it has been neglected in implementations of technically mediated awareness. Based on these considerations, I introduce the notion of intentional disclosure to describe the action of users actively and deliberately contributing awareness information. I consider challenges and potential solutions for the design of active awareness. I compare a range of systems, each allowing users to share information about their activities at various levels of detail. I discuss one of the main challenges to active awareness: that disclosing information about activities requires some degree of effort. I discuss various representations of effort in collaborative work. These considerations reveal that there is a trade-off between the richness of awareness information and the effort required to provide this information. I propose a framework for active awareness, aimed to help designers to understand the scope and limitations of different types of intentional disclosure. I draw on the identified richness/effort trade-off to develop two types of intentional disclosure, both of which aim to facilitate the disclosure of information while reducing the effort required to do so. For both of these approaches, direct and indirect disclosure, I delineate how they differ from related approaches and define a set of design criteria that is intended to guide their implementation. I demonstrate how the framework of active awareness can be practically applied by building two proof-of-concept prototypes that implement direct and indirect disclosure respectively. AnyBiff, implementing direct disclosure, allows users to create, share and use shared representations of activities in order to express their current actions and intentions. SphereX, implementing indirect disclosure, represents shared areas of interests or working context, and links sets of activities to these representations. Lastly, I present the results of the qualitative evaluation of the two prototypes and analyse the results with regard to the extent to which they implemented their respective disclosure mechanisms and supported active awareness. Both systems were deployed and tested in real world environments. The results for AnyBiff showed that users developed a wide range of activity representations, some unanticipated, and actively used the system to disclose information. The results further highlighted a number of design considerations relating to the relationship between awareness and communication, and the role of ambiguity. The evaluation of SphereX validated the feasibility of the indirect disclosure approach. However, the study highlighted the challenges of implementing cross-application awareness support and translating the concept to users. The study resulted in design recommendations aimed to improve the implementation of future systems.
Resumo:
In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.
Resumo:
Digital learning has come a long way from the days of simple 'if-then' queries. It is now enabled by countless innovations that support knowledge sharing, openness, flexibility, and independent inquiry. Set against an evolutionary context this study investigated innovations that directly support human inquiry. Specifically, it identified five activities that together are defined as the 'why dimension' – asking, learning, understanding, knowing, and explaining why. Findings highlight deficiencies in mainstream search-based approaches to inquiry, which tend to privilege the retrieval of information as distinct from explanation. Instrumental to sense-making, the 'why dimension' provides a conceptual framework for development of 'sense-making technologies'.
Resumo:
From journalism to social media, the practices of our professional storytellers continue to evolve and change along with our storytelling institutions and their functions. Comprehending these developments is a key problem of contemporary media and cultural studies. Are the politics of representation giving way to a new progressive politics of self-representation and direct participation? Or, instead, are these new genres of self-representation part of a more general demotic turn in the function of contemporary media? Do media merely mediate or amplify cultural identities, or is media functionality becoming, closer to that of a translator or even an author of identities? How can we know if the changing actor-networks of storytelling contribute to a wider democratisation, a reshaping of the hierarchies of voice and agency? This chapter considers the place of one specific critical participatory media production practice known as 'digital storytelling’ in addressing these larger questions of socio-cultural change.
Resumo:
This article deals with time-domain hydroelastic analysis of a marine structure. The convolution terms associated with fluid memory effects are replaced by an alternative state-space representation, the parameters of which are obtained by using realization theory. The mathematical model established is validated by comparison to experimental results of a very flexible barge. Two types of time-domain simulations are performed: dynamic response of the initially inert structure to incident regular waves and transient response of the structure after it is released from a displaced condition in still water. The accuracy and the efficiency of the simulations based on the state-space model representations are compared to those that integrate the convolutions.
Resumo:
This article explores how universities might engage more effectively with the imperative to develop students’ 21st century skills for the information society, by examining learning challenges and professional learning strategies of successful digital media professionals. The findings of qualitative interviews with professionals from Australian games, online publishing, apps and software development companies reinforce an increasing body of literature that suggests that legacy university structures and pedagogical approaches are not conducive to learning for professional capability in the digital age. Study participants were ambivalent about the value of higher education to digital careers, in general preferring a range of situated online and face-to-face social learning strategies for professional currency. This article draws upon the learning preferences of the professionals in this study to present a model of 21st century learning, as linked with extant theory relating to informal, self-determined learning and communities of practice.
Resumo:
Background Regenerative endodontics is an innovative treatment concept aiming to regenerate pulp, dentin and root structures. In the diseased or necrotic tooth, the limitation in vascular supply renders successful tissue regeneration/generation in a whole tooth challenging. The aim of this study is to evaluate the ability of vascularized tissue to develop within a pulpless tooth using tissue engineering techniques. Materials and methods A pulpless tooth chamber, filled with collagen I gel containing isolated rat dental pulp cells (DPC) and angiogenic growth factors, was placed into a hole created in the femoral cortex or into its own tooth socket, respectively. The gross, histological and biochemical characteristics of the de novo tissue were evaluated at 4 and 8weeks post-transplantation. Results Tooth revascularization and tissue generation was observed only in the femur group, confirming the important role of vascular supply in tissue regeneration. The addition of cells and growth factors significantly promoted connective tissue production in the tooth chamber. Conclusion Successful revascularization and tissue regeneration in this model demonstrate the importance of a direct vascular supply and the advantages of a stem cell approach. © 2012 John Wiley & Sons A/S.
Resumo:
Brisbane City Hall (BCH) is arguably one of Brisbane’s most notable and iconic buildings. Serving as the public’s central civic and municipal building since 1930, the importance of this heritage listed building to cultural significance and identity is unquestionable. This attribute is reflected within the local government, with a simplified image of the halls main portico entrance supplying Brisbane City Council with its insignia and trademark signifier. Regardless of these qualities, this building has been neglected in a number of ways, primarily in the physical sense with built materials, but also, and just as importantly, through inaccurate and undocumented works. Numerous restoration and renovation works have been undertaken throughout BCH’s lifetime, however the records of these amendments are far and few between. Between 2010 and 2013, BCH underwent major restoration works, the largest production project undertaken on the building since its initial construction. Just prior to this conservation process, the full extent of the buildings deterioration was identified, much of which there was little to no original documentation of. This has led to a number of issues pertaining to what investigators expected to find within the building, versus what was uncovered (the unexpected), which have resulted directly from this lack of data. This absence of record keeping is the key factor that has contributed to the decay and unknown deficiencies that had amassed within BCH. Accordingly, this raises a debate about the methods of record keeping, and the need for a more advanced process that is able to be integrated within architectural and engineering programs, whilst still maintaining the ability to act as a standalone database. The immediate objective of this research is to investigate the restoration process of BCH, with focus on the auditorium, to evaluate possible strategies to record and manage data connected to building pathology so that a framework can be developed for a digital heritage management system. The framework produced for this digital tool will enable dynamic uses of a centralised database and aims to reduce the significant data loss. Following an in-depth analysis of this framework, it can be concluded that the implementation of the suggested digital tool would directly benefit BCH, and could ultimately be incorporated into a number of heritage related built form.