910 resultados para indivisible objects
Resumo:
This paper conceptualizes a framework for bridging the BIM-Specifications divide by embedding project-specific information in BIM objects by means of a product library. We demonstrate how model information, enriched with data at various levels of development (LODs), can evolve simultaneously with design and construction using a window object embedded in a wall as life-cycle phase exemplars at different levels of granularity. The conceptual approach is informed by the need for exploring an approach that takes cognizance of the limitations of current modelling tools in enhancing the information content of BIM models. Therefore, this work attempts to answer the question, “How can the modelling of building information be enhanced throughout the life-cycle phases of buildings utilizing building specification information?”
Resumo:
Background The wellness construct has application in a number of fields including education, healthcare and counseling, particularly with regard to female adolescents. The effective measurement of wellness in adolescents can assist researchers and practitioners in determining lifestyle behaviors in which they are lacking. Behavior change interventions can then be designed which directly aid in the promotion of these areas. Methods The 5-Factor Wellness Inventory (designed to measure the Indivisible Self model of wellness) is a popular instrument for measuring the broad aspects of wellness amongst adolescents. The instrument comprises 97 items contributing to 17 subscales, five dimension scores, four context scores, total wellness score, and a life satisfaction index. This investigation evaluated the test-retest (intra-rater) reliability of the 5 F-Wel instrument in repeated assessments (seven days apart) among adolescent females aged 12-14 years. Percentages of exact agreement for individual items, and the number of respondents who scored within +/-5, +/-7.5 and +/-10 points for total wellness and the five summary dimension scores were calculated. Results Overall, 46 (95.8%) participants responded with complete data and were included in the analysis. Item agreement ranged from 47.8% to 100% across the 97 items (median 69.9%, interquartile range 60.9%-73.9%). The percentage of respondents who scored within +/-5, +/-7.5 and +/-10 points for total wellness at the re-assessment was 87.0%, 97.8% and 97.8% respectively. The percentage of respondents who scored within +/-5, +/-7.5 and +/-10 for the domain scores at the reassessment ranged between 54.3-76.1%, 78.3-95.7% and 89.1-95.7% respectively across the five dimensions. Conclusions These findings suggest there was considerable variation in agreement between the two assessments on some individual items. However, the total wellness score and the five dimension summary scores remained comparatively stable between assessments.
Resumo:
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan’s 2009 analysis has demonstrated OSAP’s authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan’s analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev–Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan.
Resumo:
The power of sharing computation in a cryptosystem is crucial in several real-life applications of cryptography. Cryptographic primitives and tasks to which threshold cryptosystems have been applied include variants of digital signature, identification, public-key encryption and block ciphers etc. It is desirable to extend the domain of cryptographic primitives which threshold cryptography can be applied to. This paper studies threshold message authentication codes (threshold MACs). Threshold cryptosystems usually use algebraically homomorphic properties of the underlying cryptographic primitives. A typical approach to construct a threshold cryptographic scheme is to combine a (linear) secret sharing scheme with an algebraically homomorphic cryptographic primitive. The lack of algebraic properties of MACs rules out such an approach to share MACs. In this paper, we propose a method of obtaining a threshold MAC using a combinatorial approach. Our method is generic in the sense that it is applicable to any secure conventional MAC by making use of certain combinatorial objects, such as cover-free families and their variants. We discuss the issues of anonymity in threshold cryptography, a subject that has not been addressed previously in the literature in the field, and we show that there are trade-offis between the anonymity and efficiency of threshold MACs.
Resumo:
Service mismatches involve the adaptation of structural and behavioural interfaces of services, which in practice incurs long lead times through manual, coding e ort. We propose a framework, complementary to conventional service adaptation, to extract comprehensive and seman- tically normalised service interfaces, useful for interoperability in large business networks and the Internet of Services. The framework supports introspection and analysis of large and overloaded operational signa- tures to derive focal artefacts, namely the underlying business objects of services. A more simpli ed and comprehensive service interface layer is created based on these, and rendered into semantically normalised in- terfaces, given an ontology accrued through the framework from service analysis history. This opens up the prospect of supporting capability comparisons across services, and run-time request backtracking and ad- justment, as consumers discover new features of a service's operations through corresponding features of similar services. This paper provides a rst exposition of the service interface synthesis framework, describing patterns having novel requirements for unilateral service adaptation, and algorithms for interface introspection and business object alignment. A prototype implementation and analysis of web services drawn from com- mercial logistic systems are used to validate the algorithms and identify open challenges and future research directions.
Resumo:
This chapter focuses on the physicality of the iPad as an object, and how that physicality affects the interactions children have with the device generally, and the apps specifically. Thinking about the physicality of the iPad is important because the materials, size, weight and appearance make the iPad quite unlike most other toys and equipment in the kindergarten space. Most strikingly, this physicality does not ‘represent’ the virtual vast dimensions of the iPad brought about through the diverse functions and contents of the apps contained in it. While the iPad is small enough and functional enough to be easily handled and operated even by young children, it is capable of performing highly complex, highly technological tasks that take it beyond its diminutive dimensions. This virtual-actual contrast is interesting to consider in relation to the other resources more commonly found in a kindergarten space. While objects such as toys, bricks, building materials often do prompt the child to imagine and invent beyond the physical boundaries of the toy, they not have the same types of virtual-actual contrasts of a digital device such as the iPad. How then, might children be drawn to the iPad because of its physical, technological and virtual difference? Particularly, how might this virtual-actual difference impact on the physical skills associated with writing and drawing: skills usually learnt through the use of a pencil and paper? While the research project did not set out to compare how digital and paper-based resources affect writing and drawing skills there was great interest to see how young children negotiated drawing and writing on the shiny glass surface of the iPad.
Resumo:
Anuradha Mathur and Dilip da Cunha theorise in their work on cities and flooding that it is not the floodwaters that threaten lives and homes, the real cause of danger in natural disaster is the fixity of modern civilisation. Their work traces the fluidity of the boundaries between 'dry' and 'wet' land challenging the deficiencies of traditional cartography in representing the extents of bodies of water. Mathur and da Cunha propose a process of unthinking to address the redevelopment of communities in the aftermath of natural disaster. By documenting the path of floodwaters in non-Euclidean space they propose a more appropriate response to flooding. This research focuses on the documentation of flooding in the interior of dwellings, which is an extreme condition of damage by external conditions in an environment designed to protect from these very elements. Because the floodwaters don't discriminate between the interior and the exterior, they move between structures with disregard for the systems of space we have in place. With the rapid clean up that follows flood damage, little material evidence is left for post mortem examination. This is especially the case for the flood damaged interior, piles of materials susceptible to the elements, furniture, joinery and personal objects line curbsides awaiting disposal. There is a missed opportunity in examining the interior in the after math of flood, in the way that Mathur and Dilip investigate floods and the design of cities, the flooded interior proffers an undersigned interior to study. In the absence of intact flood damaged interior, this research relies on two artists' documentation of the flooded interior. The first case study is the mimetic scenographic interiors of a flood-damaged office exhibited in the Bangkok art gallery by the group _Proxy in 2011. The second case study is Robert Polidori's photographic exhibition in New Orleans, described by Julianna Preston as, 'a series of interiors undetected by satellite imaging or storm radar. More telling, more dramatic, more unnerving, more alarming, they force a disturbance of what is familiar'.
Resumo:
Throughout a lifetime of operation, a mobile service robot needs to acquire, store and update its knowledge of a working environment. This includes the ability to identify and track objects in different places, as well as using this information for interaction with humans. This paper introduces a long-term updating mechanism, inspired by the modal model of human memory, to enable a mobile robot to maintain its knowledge of a changing environment. The memory model is integrated with a hybrid map that represents the global topology and local geometry of the environment, as well as the respective 3D location of objects. We aim to enable the robot to use this knowledge to help humans by suggesting the most likely locations of specific objects in its map. An experiment using omni-directional vision demonstrates the ability to track the movements of several objects in a dynamic environment over an extended period of time.
Resumo:
This chapter uses as a beginning point Walter Benjamin’s famous essay ‘The work of art in the age of technological reproducibility’(1935/2008) to discuss Media Arts education. It locates ‘Media Arts’ at the intersection of three key ideas: 1) media arts products as objects for popular and everyday consumption and intervention by individuals and broader audiences; 2) materiality and how individuals use their bodies and technologies to produce, combine and share digital materials and; 3) the construction of aesthetic knowledge and how this relates to critical and conceptual thinking. These ideas are discussed in the context of the development of curriculum for students at all ages of schooling, with specific attention given to the knowledge and skills students might develop within Media Arts education in primary schools. Examples from a Media Arts project in a primary school in Australia – where a new Media Arts national curriculum has been developed –are provided to illustrate the key ideas discussed in the chapter.
Resumo:
The Minerals Council of Australia’s (MCA) Water Accounting Framework (WAF) is an industry lead initiative to enable cross company communication and comparisons of water management performance. The WAF consists of two models, the Input-Output Model that represents water interactions between an operation and its surrounding environment and the Operational Model that represents water interactions within an operation. Recently, MCA member companies have agreed to use the Input-Output Model to report on their external water interactions in Australian operations, with some adopting it globally. The next step will be to adopt the Operational Model. This will expand the functionality of the WAF from corporate reporting to allowing widespread identification of inefficiencies and to connect internal and external interactions. Implementing the WAF, particularly the Operational Model, is non-trivial. It can be particularly difficult for operations that are unfamiliar with the WAF definitions and methodology, lack information pertaining to flow volumes or contain unusual configurations. Therefore, there is a need to help industry with its implementation. This work presents a step-by-step guide to producing the Operational Model. It begins by describing a methodology for implementing the Operational Model by describing the identification of pertinent objects (stores, tasks and treatments), quantification of flows, aggregation of objects and production of reports. It then discusses how the Operational Model can represent a series of challenging scenarios and how it can be connected with Input-Output Model to improve water management.
Resumo:
A exhibition of sculptural assemblages that continue my exploration of self-portraiture and the sculptural object. The work specifically extends the formal vocabulary of my studio to incorporate smaller composite arrangements with an emphasis on the sculptural support. Small objects that are either modelled or cast from life are assembled into four tableaux that respond to the object-relations that arise through the production process. The resulting exhibiton thus acts a meditation on the ontology of art practice, conceived as a topology of objects.
Resumo:
Abstract Within the field of Information Systems, a good proportion of research is concerned with the work organisation and this has, to some extent, restricted the kind of application areas given consideration. Yet, it is clear that information and communication technology deployments beyond the work organisation are acquiring increased importance in our lives. With this in mind, we offer a field study of the appropriation of an online play space known as Habbo Hotel. Habbo Hotel, as a site of media convergence, incorporates social networking and digital gaming functionality. Our research highlights the ethical problems such a dual classification of technology may bring. We focus upon a particular set of activities undertaken within and facilitated by the space – scamming. Scammers dupe members with respect to their ‘Furni’, virtual objects that have online and offline economic value. Through our analysis we show that sometimes, online activities are bracketed off from those defined as offline and that this can be related to how the technology is classified by members – as a social networking site and/or a digital game. In turn, this may affect members’ beliefs about rights and wrongs. We conclude that given increasing media convergence, the way forward is to continue the project of educating people regarding the difficulties of determining rights and wrongs, and how rights and wrongs may be acted out with respect to new technologies of play online and offline.
Resumo:
Accurate three-dimensional representations of cultural heritage sites are highly valuable for scientific study, conservation, and educational purposes. In addition to their use for archival purposes, 3D models enable efficient and precise measurement of relevant natural and architectural features. Many cultural heritage sites are large and complex, consisting of multiple structures spatially distributed over tens of thousands of square metres. The process of effectively digitising such geometrically complex locations requires measurements to be acquired from a variety of viewpoints. While several technologies exist for capturing the 3D structure of objects and environments, none are ideally suited to complex, large-scale sites, mainly due to their limited coverage or acquisition efficiency. We explore the use of a recently developed handheld mobile mapping system called Zebedee in cultural heritage applications. The Zebedee system is capable of efficiently mapping an environment in three dimensions by continually acquiring data as an operator holding the device traverses through the site. The system was deployed at the former Peel Island Lazaret, a culturally significant site in Queensland, Australia, consisting of dozens of buildings of various sizes spread across an area of approximately 400 × 250 m. With the Zebedee system, the site was scanned in half a day, and a detailed 3D point cloud model (with over 520 million points) was generated from the 3.6 hours of acquired data in 2.6 hours. We present results demonstrating that Zebedee was able to accurately capture both site context and building detail comparable in accuracy to manual measurement techniques, and at a greatly increased level of efficiency and scope. The scan allowed us to record derelict buildings that previously could not be measured because of the scale and complexity of the site. The resulting 3D model captures both interior and exterior features of buildings, including structure, materials, and the contents of rooms.
Resumo:
While the half-angle which encloses a Kelvin ship wave pattern is commonly accepted to be 19.47 degrees, recent observations and calculations for sufficiently fast-moving ships suggest that the apparent wake angle decreases with ship speed. One explanation for this decrease in angle relies on the assumption that a ship cannot generate wavelengths much greater than its hull length. An alternative interpretation is that the wave pattern that is observed in practice is defined by the location of the highest peaks; for wakes created by sufficiently fast-moving objects, these highest peaks no longer lie on the outermost divergent waves, resulting in a smaller apparent angle. In this paper, we focus on the problems of free surface flow past a single submerged point source and past a submerged source doublet. In the linear version of these problems, we measure the apparent wake angle formed by the highest peaks, and observe the following three regimes: a small Froude number pattern, in which the divergent waves are not visible; standard wave patterns for which the maximum peaks occur on the outermost divergent waves; and a third regime in which the highest peaks form a V-shape with an angle much less than the Kelvin angle. For nonlinear flows, we demonstrate that nonlinearity has the effect of increasing the apparent wake angle so that some highly nonlinear solutions have apparent wake angles that are greater than Kelvin's angle. For large Froude numbers, the effect on apparent wake angle can be more dramatic, with the possibility of strong nonlinearity shifting the wave pattern from the third regime to the second. We expect our nonlinear results will translate to other more complicated flow configurations, such as flow due to a steadily moving closed body such as a submarine.
Resumo:
Annually, several million tonnes of waste are produced from reworks, demolition, and use of substandard materials. Building Information Modelling (BIM), a digital representation of facilities and their constituent data, is a viable means of addressing some concerns about the impacts of these processes. BIM functionalities can be extended and combined with rich building information from specifications and product libraries, for efficient, streamlined design and construction. This paper conceptualises a framework for BIM-knowledge transfer from advanced economies for adaptation and use in urban development works in developing nations using the Sydney Down Under and Lagos Eko Atlantic projects as reference points. We present a scenario that highlights BIM-based lifecycle planning/specifications as agents of sustainable construction (in terms of cost and time) crucial to the quality of as-built data from early on in city development. We show how, through the use of BIM, city planners in developing nations can avoid high, retrospective (and sometimes wasteful) maintenance costs and leapfrog infrastructure management standards of advanced economies. Finally, this paper illustrates how BIM can address concerns about economic sustainability during city development in developing countries by enriching model objects with specification information sourced from a product library.