998 resultados para Melbourne (Vic.) -- Photographs


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Computer vision is an attractive solution for uninhabited aerial vehicle (UAV) collision avoidance, due to the low weight, size and power requirements of hardware. A two-stage paradigm has emerged in the literature for detection and tracking of dim targets in images, comprising of spatial preprocessing, followed by temporal filtering. In this paper, we investigate a hidden Markov model (HMM) based temporal filtering approach. Specifically, we propose an adaptive HMM filter, in which the variance of model parameters is refined as the quality of the target estimate improves. Filters with high variance (fat filters) are used for target acquisition, and filters with low variance (thin filters) are used for target tracking. The adaptive filter is tested in simulation and with real data (video of a collision-course aircraft). Our test results demonstrate that our adaptive filtering approach has improved tracking performance, and provides an estimate of target heading not present in previous HMM filtering approaches.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper describes modelling, estimation and control of the horizontal translational motion of an open-source and cost effective quadcopter — the MikroKopter. We determine the dynamics of its roll and pitch attitude controller, system latencies, and the units associated with the values exchanged with the vehicle over its serial port. Using this we create a horizontal-plane velocity estimator that uses data from the built-in inertial sensors and an onboard laser scanner, and implement translational control using a nested control loop architecture. We present experimental results for the model and estimator, as well as closed-loop positioning.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper presents a Six Sigma case study analysis involving three service organizations of Singapore. The organizations are a local hospital, a construction and related engineering service, and a consultancy service. These organizations embarked on their Six Sigma journey around 2003-2004. Though the hospital was slightly ahead than the other two in beginning Six Sigma. These organizations have since achieved significant service improvements through implementation of Six Sigma to their different divisions. Through a series of structured interviews with Six Sigma project champions, team leaders, and members; project reports; public archives; and observations; this study explores the Six Sigma journey of these organizations. The results portray a list of success factors which led to the Six Sigma initiatives, the process of Six Sigma implementation through proper identification of critical-to-quality characteristics, tools and techniques, and the performance indicators which display the improvements due to Six Sigma.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper presents a path planning technique for ground vehicles that accounts for the dynamics of the vehicle, the topography of the terrain and the wheel/ground interaction properties such as friction. The first two properties can be estimated using well known sensors and techniques, but the third is not often estimated even though it has a significant effect on the motion of a high-speed vehicle. We introduce a technique which allows the estimation of wheel slip from which frictional parameters can be inferred. We present simulation results which show the importance of modelling topography and ground properties and experimental results which show how ground properties can be estimated along a 350m outdoor traverse.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In this paper we explore the ability of a recent model-based learning technique Receding Horizon Locally Weighted Regression (RH-LWR) useful for learning temporally dependent systems. In particular this paper investigates the application of RH-LWR to learn control of Multiple-input Multiple-output robot systems. RH-LWR is demonstrated through learning joint velocity and position control of a three Degree of Freedom (DoF) rigid body robot.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

There has been an abundance of education reform recommendations for teaching and teacher education as a result of national and international reviews. A major criticism in education is the lack of connection between theory and practice (or praxis), that is, how the learning at university informs practical applications for teaching in the classroom. This paper presents the Teacher Education Done Differently (TEDD) project, funded by the Department of Education, Employment and Workplace Relations (DEEWR). It outlines how it has re-structured its offering of coursework in a Bachelor of Education (BEd) held at an Australian university campus to embrace praxis. Establishing partnerships was crucial to the development of this project. TEDD initially gathered a reference group of educators, which included university staff, school executives, and other key stakeholders, who formed an Advisory Group and Steering Committee. These groups formed a collective vision for TEDD and aimed to motivate others, foster team work, and create leadership roles that would benefit all stakeholders. The paper presents how university units changed to include a stronger praxis development for preservice teachers. Preservice teachers take their learning into schools within lead-up programs such as Ed Start for practicum I, III, and IV; Science in Schools, and Studies of Society and its Environment (SOSE). Findings showed that opportunities for undertaking additional real-world experiences were perceived to assist the preservice teachers’ praxis development. Additional school-based experiences as lead-up days for field experiences and as avenues for exploring the teaching of specific subject areas presented as an opportunity for enhancing education for all.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Defence organisations perform information security evaluations to confirm that electronic communications devices are safe to use in security-critical situations. Such evaluations include tracing all possible dataflow paths through the device, but this process is tedious and error-prone, so automated reachability analysis tools are needed to make security evaluations faster and more accurate. Previous research has produced a tool, SIFA, for dataflow analysis of basic digital circuitry, but it cannot analyse dataflow through microprocessors embedded within the circuit since this depends on the software they run. We have developed a static analysis tool that produces SIFA compatible dataflow graphs from embedded microcontroller programs written in C. In this paper we present a case study which shows how this new capability supports combined hardware and software dataflow analyses of a security critical communications device.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Data flow analysis techniques can be used to help assess threats to data confidentiality and integrity in security critical program code. However, a fundamental weakness of static analysis techniques is that they overestimate the ways in which data may propagate at run time. Discounting large numbers of these false-positive data flow paths wastes an information security evaluator's time and effort. Here we show how to automatically eliminate some false-positive data flow paths by precisely modelling how classified data is blocked by certain expressions in embedded C code. We present a library of detailed data flow models of individual expression elements and an algorithm for introducing these components into conventional data flow graphs. The resulting models can be used to accurately trace byte-level or even bit-level data flow through expressions that are normally treated as atomic. This allows us to identify expressions that safely downgrade their classified inputs and thereby eliminate false-positive data flow paths from the security evaluation process. To validate the approach we have implemented and tested it in an existing data flow analysis toolkit.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This article presents a novel approach to confidentiality violation detection based on taint marking. Information flows are dynamically tracked between applications and objects of the operating system such as files, processes and sockets. A confidentiality policy is defined by labelling sensitive information and defining which information may leave the local system through network exchanges. Furthermore, per application profiles can be defined to restrict the sets of information each application may access and/or send through the network. In previous works, we focused on the use of mandatory access control mechanisms for information flow tracking. In this current work, we have extended the previous information flow model to track network exchanges, and we are able to define a policy attached to network sockets. We show an example application of this extension in the context of a compromised web browser: our implementation detects a confidentiality violation when the browser attempts to leak private information to a remote host over the network.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The world’s increasing complexity, competitiveness, interconnectivity, and dependence on technology generate new challenges for nations and individuals that cannot be met by continuing education as usual (Katehi, Pearson, & Feder, 2009). With the proliferation of complex systems have come new technologies for communication, collaboration, and conceptualisation. These technologies have led to significant changes in the forms of mathematical and scientific thinking that are required beyond the classroom. Modelling, in its various forms, can develop and broaden children’s mathematical and scientific thinking beyond the standard curriculum. This paper first considers future competencies in the mathematical sciences within an increasingly complex world. Next, consideration is given to interdisciplinary problem solving and models and modelling. Examples of complex, interdisciplinary modelling activities across grades are presented, with data modelling in 1st grade, model-eliciting in 4th grade, and engineering-based modelling in 7th-9th grades.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper presents a practical framework to synthesize multi-sensor navigation information for localization of a rotary-wing unmanned aerial vehicle (RUAV) and estimation of unknown ship positions when the RUAV approaches the landing deck. The estimation performance of the visual tracking sensor can also be improved through integrated navigation. Three different sensors (inertial navigation, Global Positioning System, and visual tracking sensor) are utilized complementarily to perform the navigation tasks for the purpose of an automatic landing. An extended Kalman filter (EKF) is developed to fuse data from various navigation sensors to provide the reliable navigation information. The performance of the fusion algorithm has been evaluated using real ship motion data. Simulation results suggest that the proposed method can be used to construct a practical navigation system for a UAV-ship landing system.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The middle classes form the bulk of Indian migrants who head for Australian shores today. Yet, within Australia, general knowledge of the conditions that drive Indians’ determined search for opportunities overseas is limited to the few who have contact with international students and migrants from the sub-continent, and the skewed, melodramatic antics of Bollywood. It is my suggestion that a broader understanding of the underlying reasons that push Indians to migrate to societies like Australia can be had through readings of Chetan’s Bhagat’s four hugely popular novels: Five Point Someone, One night @the Call Center, The 3 mistakes of My life and Two States. Bhagat is a graduate of India’s famed Indian Institute of Technology and a former Non-Resident Indian investment banker who has since returned to live in Delhi. His experiences make him the perfect mouthpiece for middle India and his paperbacks depict that stratum of Indian society’s obsessions with social mobility, marriage, regional and religious divides with great sympathy and conviction. Drawing on observations made during a recent visit to India, I illustrate what an exploration of Bhagat’s paperbacks reveals about everyday, contemporary India and what it adds to Australian understandings of Indians and India today.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

To understand the nature of police organisations and their management in an Australian context it is necessary to appreciate the recent history of policing at least in the last 30 years. In doing so an overall perspective is gained on the various reform efforts and organisational changes that have taken place in Australian policing. With this police reform perspective clearly in mind it then becomes possible to appreciate that the organization and management of the institution of policing in Australia is nested within the larger framework of ‘governance’. Hence, this notion of governance will be used as the key focal point around which to understand how police organizations manage their mission in the Australian context. Finally, the chapter discusses the inevitable ‘tension spaces’ that arise in policing and the need for police organizations to better manage such complexities.