959 resultados para Adaptive game technology


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Humans have altered environments and enhanced their wellbeing unlike any other creature on the planet (Hielman & Donda, 2007); this is no different whether the environment is ecological, social or organizational. In recent times, the debate regarding greenhouse effects on the global weather patterns and the sustainment of the earth’s temperature necessary for life support has become quite infamously problematic as society pushes to find new sources of energy both renewable and environmentally sustainable. The feedback received on CSG from both government and companies alike is that the opportunities this industry creates has a lasting range of social and economic benefits worth over fifty (50) billion dollars in projects (Queensland Government, 2013). This however, has been overshadowed by social activist and lobbyist groups as ‘Lock the Gate Alliance’ saying, as one part of their report noted from the National Water Commission, “coal seam gas development could cause significant social impacts by disrupting current land-use practices and the local environment through infrastructure construction and access” (Lock the Gate Alliance, n.d.), and “In recent years both a NSW and Federal Senate inquiry into coal seam gas production were deliberately mislead by an organization that claims to work on behalf of the farming community, This is the battle for the end of the fossil fuel industry. This is the end game..." (Ward, 2013).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Extending recent research on the importance of specific resources and skills for the internationalization of start-ups, this article tests a negative binomial model on a sample of 520 recently created high technology firms from the UK and Germany. The results show that previous international experience of entrepreneurs facilitates the rapid penetration of foreign markets, especially when the company features a clear and deliberate strategic intent of internationalization from the outset. This research provides one of the first empirical studies linking the influence of entrepreneurial teams to a high probability of success in the internationalization of high-technology ventures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report provides an overview of the results of a collaborative research project titled "A model for research supervision of international students in engineering and information technology disciplines". This project aimed to identify factors influencing the success of culturally and linguistically diverse (CALD) higher degree research (HDR) students in the fields of Engineering and Information Technology at three Australian Universities: Queensland University of Technology, The University of Western Australia and Curtin University.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information Technology (IT) is successfully applied in a diverse range of fields. Though, the field of Medical Informatics is more than three decades old, it shows a very slow progress compared to many other fields in which the application of IT is growing rapidly. The spending on IT in health care is shooting up but the road to successful use of IT in health care has not been easy. This paper discusses about the barriers to the successful adoption of information technology in clinical environments and outlines the different approaches used by various countries and organisations to tackle the issues successfully. Investing financial and other resources to overcome the barriers for successful adoption of HIT is highly important to realise the dream of a future healthcare system with each customer having secure, private Electronic Health Record (EHR) that is available whenever and wherever needed, enabling the highest degree of coordinated medical care based on the latest medical knowledge and evidence. Arguably, the paper reviews barriers to HIT from organisations’ alignment in respect to the leadership; with their stated values when accepting or willingness to consider the HIT as a determinant factor on their decision-making processes. However, the review concludes that there are many aspects of the organisational accountability and readiness to agree to the technology implementation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Health Informatics is an intersection of information technology, several disciplines of medicine and health care. It sits at the common frontiers of health care services including patient centric, processes driven and procedural centric care. From the information technology perspective it can be viewed as computer application in medical and/or health processes for delivering better health care solutions. In spite of the exaggerated hype, this field is having a major impact in health care solutions, in particular health care deliveries, decision making, medical devices and allied health care industries. It also affords enormous research opportunities for new methodological development. Despite the obvious connections between Medical Informatics, Nursing Informatics and Health Informatics, most of the methodologies and approaches used in Health Informatics have so far originated from health system management, care aspects and medical diagnostic. This paper explores reasoning for domain knowledge analysis that would establish Health Informatics as a domain and recognised as an intellectual discipline in its own right.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Numbers of diesel engines in both stationary and mobile applications are increasing nowadays. Diesel engines emit lower Hydrocarbon (HC) and Carbon monoxide (CO) than gasoline engines. However, they can produce more nitrogen oxides (NOx) and have higher particulate matter (PM). On the other hand, emissions standards are getting stringent day by day due to considerable concerns about unregulated pollutants and particularly ultrafine particles deleterious effect on human health. Non-thermal plasma (NTP) treatment of exhaust gas is known as a promising technology for both NOx and PM reduction by introducing plasma inside the exhaust gas. Vehicle exhaust gases undergo chemical changes when exposed to plasma. In this study, the PM removal mechanism using NTP by applying high voltage pulses of up to 20 kVpp with a repetition rate of 10 kHz are investigated. It is found that, voltage increase not necessarily has a positive effect on PM removal in diesel engine emissions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This original study creates a philosophy of regeneration reuse, which is a conceptual framework that utilises construction and demolition waste products by building component, relocation and adaptive reuse. Case studies from the greater Brisbane, wider southeast Queensland region and greater London area are used to demonstrate the principles of regeneration reuse through research activities, analysis and evaluation. The regeneration reuse conceptual process draws upon assessing embodied carbon and sustainable benefits to deconstruct rather than destruct, and consider alternative options to waste treatment technologies in the built environment. The importance of waste management is examined, specifically the impacts of governance to the principles of regeneration reuse through analysis of legislation in the Australian and UK jurisdictions. Design process considerations when incorporating the principles of regeneration reuse are defined, and phasing and staging assessment explored to determine the most effective point of intervention in the design process to include waste management strategies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents work in progress of EatChaFood – a prototype app designed to increase user knowledge of the currently available domestic supply and location of food, with a view to reducing expired household food waste. In order to reap the benefits that EatChaFood can provide we explore ways to overcome manual data entry as a barrier to use. Our user study has to recognise the limitations of the prototype app, and conduct an evaluation of the interaction design built into the app to promote behaviour change. Innovations in the near future such as the automatic scanning of barcodes on food items or photo-recognition will close the gap between perceived prototype usability and usefulness.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Considering the sheer speed, complexity and ever changing risk in today’s technology saturated business environment, it’s hardly surprising that the call for digitally savvy directors is increasing. Emerging research suggests serious consequences for boards that continue to ignore or delegate enterprise-level technology governance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The addition of game design elements to non-game contexts has become known as gamification. Previous research has suggested that framing tedious and non-motivating tasks as game-like can make them enjoyable and motivating (e.g., de Oliveira, et al., 2010; Fujiki, et al., 2007; Chiu, et al., 2009). Smartphone applications lend themselves to being gamified as the underlying mobile technology has the ability to sense user activities and their surrounding environment. These sensed activities can be used to implement and enforce game-like rules based around many physical activities (e.g., exercise, travel, or eating). If researchers wish to investigate this area, they first need an existing gamified application to study. However if an appropriate application does not exist then the researcher may need to create their own gamified prototype to study. Unfortunately, there is little previous research that details or explains the design and integration of game elements to non-game mobile applications. This chapter explores this gap and shares a framework that was used to add videogame-like achievements to an orientation mobile application developed for new university students. The framework proved useful and initial results are discussed from two studies. However, further development of the framework is needed, including further consideration of what makes an effective gamified experience.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Availability has become a primary goal of information security and is as significant as other goals, in particular, confidentiality and integrity. Maintaining availability of essential services on the public Internet is an increasingly difficult task in the presence of sophisticated attackers. Attackers may abuse limited computational resources of a service provider and thus managing computational costs is a key strategy for achieving the goal of availability. In this thesis we focus on cryptographic approaches for managing computational costs, in particular computational effort. We focus on two cryptographic techniques: computational puzzles in cryptographic protocols and secure outsourcing of cryptographic computations. This thesis contributes to the area of cryptographic protocols in the following ways. First we propose the most efficient puzzle scheme based on modular exponentiations which, unlike previous schemes of the same type, involves only a few modular multiplications for solution verification; our scheme is provably secure. We then introduce a new efficient gradual authentication protocol by integrating a puzzle into a specific signature scheme. Our software implementation results for the new authentication protocol show that our approach is more efficient and effective than the traditional RSA signature-based one and improves the DoSresilience of Secure Socket Layer (SSL) protocol, the most widely used security protocol on the Internet. Our next contributions are related to capturing a specific property that enables secure outsourcing of cryptographic tasks in partial-decryption. We formally define the property of (non-trivial) public verifiability for general encryption schemes, key encapsulation mechanisms (KEMs), and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption avors. We show that some generic transformations and concrete constructions enjoy this property and then present a new public-key encryption (PKE) scheme having this property and proof of security under the standard assumptions. Finally, we combine puzzles with PKE schemes for enabling delayed decryption in applications such as e-auctions and e-voting. For this we first introduce the notion of effort-release PKE (ER-PKE), encompassing the well-known timedrelease encryption and encapsulated key escrow techniques. We then present a security model for ER-PKE and a generic construction of ER-PKE complying with our security notion.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

How and why football referees made decisions was investigated. A constructivist grounded theory methodology was undertaken to tap into the experiential knowledge of referees. The participant cohort comprised 7 A-League referees (aged 23 to 35) and 8 local Brisbane league referees (aged 20 to 50), spanning the lowest to highest levels of competition in men’s football in Australia. Results found that referees used ‘four pillars’ to underpin their judgments, these were conceptual notions of: safety, fairness, accuracy and entertainment. A fifth pillar ‘consistency’ referred to the referee’s ‘contextual sensitivity’. Results were explained using an ecological dynamics framework that emphasises the individual-environment scale of analysis. It was concluded that interacting constraints shape emergent decision-making in referees which are nested in task goals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Robust hashing is an emerging field that can be used to hash certain data types in applications unsuitable for traditional cryptographic hashing methods. Traditional hashing functions have been used extensively for data/message integrity, data/message authentication, efficient file identification and password verification. These applications are possible because the hashing process is compressive, allowing for efficient comparisons in the hash domain but non-invertible meaning hashes can be used without revealing the original data. These techniques were developed with deterministic (non-changing) inputs such as files and passwords. For such data types a 1-bit or one character change can be significant, as a result the hashing process is sensitive to any change in the input. Unfortunately, there are certain applications where input data are not perfectly deterministic and minor changes cannot be avoided. Digital images and biometric features are two types of data where such changes exist but do not alter the meaning or appearance of the input. For such data types cryptographic hash functions cannot be usefully applied. In light of this, robust hashing has been developed as an alternative to cryptographic hashing and is designed to be robust to minor changes in the input. Although similar in name, robust hashing is fundamentally different from cryptographic hashing. Current robust hashing techniques are not based on cryptographic methods, but instead on pattern recognition techniques. Modern robust hashing algorithms consist of feature extraction followed by a randomization stage that introduces non-invertibility and compression, followed by quantization and binary encoding to produce a binary hash output. In order to preserve robustness of the extracted features, most randomization methods are linear and this is detrimental to the security aspects required of hash functions. Furthermore, the quantization and encoding stages used to binarize real-valued features requires the learning of appropriate quantization thresholds. How these thresholds are learnt has an important effect on hashing accuracy and the mere presence of such thresholds are a source of information leakage that can reduce hashing security. This dissertation outlines a systematic investigation of the quantization and encoding stages of robust hash functions. While existing literature has focused on the importance of quantization scheme, this research is the first to emphasise the importance of the quantizer training on both hashing accuracy and hashing security. The quantizer training process is presented in a statistical framework which allows a theoretical analysis of the effects of quantizer training on hashing performance. This is experimentally verified using a number of baseline robust image hashing algorithms over a large database of real world images. This dissertation also proposes a new randomization method for robust image hashing based on Higher Order Spectra (HOS) and Radon projections. The method is non-linear and this is an essential requirement for non-invertibility. The method is also designed to produce features more suited for quantization and encoding. The system can operate without the need for quantizer training, is more easily encoded and displays improved hashing performance when compared to existing robust image hashing algorithms. The dissertation also shows how the HOS method can be adapted to work with biometric features obtained from 2D and 3D face images.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Focuses on the various aspects of advances in future information communication technology and its applications Presents the latest issues and progress in the area of future information communication technology Applicable to both researchers and professionals These proceedings are based on the 2013 International Conference on Future Information & Communication Engineering (ICFICE 2013), which will be held at Shenyang in China from June 24-26, 2013. The conference is open to all over the world, and participation from Asia-Pacific region is particularly encouraged. The focus of this conference is on all technical aspects of electronics, information, and communications ICFICE-13 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of FICE. In addition, the conference will publish high quality papers which are closely related to the various theories and practical applications in FICE. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject. "This work was supported by the NIPA (National IT Industry Promotion Agency) of Korea Grant funded by the Korean Government (Ministry of Science, ICT & Future Planning)."

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The principal focus of this thesis is the representation of a significant creative practice in relation to the design and installation of the Location-Based Game, SCOOT. This project demonstrates new understandings relating to the contingencies and potentials for transferring positive aspects of digital gameplay to everyday physical environments in an effort to reveal hidden histories and revitalise peoples’ interactions with their local urban spaces.