987 resultados para Personal computing
Resumo:
US state-based data breach notification laws have unveiled serious corporate and government failures regarding the security of personal information. These laws require organisations to notify persons who may be affected by an unauthorized acquisition of their personal information. Safe harbours to notification exist if personal information is encrypted. Three types of safe harbour have been identified in the literature: exemptions, rebuttable presumptions and factors. The underlying assumption of exemptions is that encrypted personal information is secure and therefore unauthorized access does not pose a risk. However, the viability of this assumption is questionable when examined against data breaches involving encrypted information and the demanding practical requirements of effective encryption management. Recent recommendations by the Australian Law Reform Commission (ALRC) would amend the Privacy Act 1988 (Cth) to implement a data breach scheme that includes a different type of safe harbour, factor based analysis. The authors examine the potential capability of the ALRC’s proposed encryption safe harbour in relation to the US experience at the state legislature level.
Resumo:
This paper reports on the use of email as a means to access the self-constructions of gifted young adolescents. Australian research shows that gifted young adolescents may feel more lonely and misunderstood than their same-age counterparts, yet they are seldom asked about their lives. Emerging use of online methods as a means of access to individual lives and perceptions has demonstrated the potential offered by the creation of digital texts as narrative data. Details are given of a qualitative study that engaged twelve children aged between 10 and 14 years, who were screened for giftedness, in a project involving the generation of emailed journal entries sent over a period of 6 months. With emphasis on participatory principles, individual young adolescents produced self-managed journal entries that were written and sent to the researcher from personal computers outside the school setting. Drawing from a theoretical understanding of self as constructed within dialogic relationships, the digital setting of email is proposed as a narrative space that fosters healthy self-disclosure. This paper outlines the benefits of using email as a means to explore emotions, promote reflective accounts of self and support the development of a personal language for self-expression. Individual excerpts will be presented to show that the harnessing of personal narratives within an email context has potential to yield valuable insights into the emotions, personal realities and experiences of gifted young adolescents. Findings will be presented to show that the co-construction of self-expressive and explanatory narratives supported by a facilitative adult listener promoted healthy self-awareness amongst participants. This paper contributes to appreciative conversations about using online methods as a flexible and practical avenue for conducting educational research. Furthermore, digital writing in email form will be presented as having distinct advantages over face-to-face methods when utilised with gifted young adolescents who may be unwilling to disclose information within school-based settings.
Resumo:
The International Network of Indigenous Health Knowledge and Development (INIHKD) Conference was held from Monday 24 May to Friday 28 May 2010 at Kiana Lodge, Port Madison Indian Reservation, Suquamish Nation, Washington State, United States of America. The overall theme for the 4th Biennial Conference was ‘Knowing Our Roots: Indigenous Medicines, Health Knowledges and Best Practices’.
Resumo:
This contribution proposes the effect of the studio practice compiling vocals from many takes on the performance of vocalists.
Resumo:
Since 2005 QUT through a number of large Teaching and Learning Grants has sponsored a range of teamwork learning initiatives to assist students to develop the teamwork skills demanded by industry. After a suite of six online team learning modules was developed, first year unit coordinators requested an additional module to address the challenges of working with the diverse range of social, cultural and personal values that students from different backgrounds bring to student teams. The Intercultural Teams module asks students to map themselves against a Cultural Orientations Framework so they can understand their own cultural beliefs. By learning about other cultural orientations and comparing and analysing their effects, team members can develop communication and team process management strategies to leverage their differences to realise effective and creative outcomes. The interactive session will demonstrate the elements of the Intercultural Teams module and ask participants to consider ways the module can be integrated into classroom learning to support the development of students’ intercultural competencies.
Resumo:
In this column, Dr. Peter Corke of CSIRO, Australia, gives us a description of MATLAB Toolboxes he has developed. He has been passionately developing tools to enable students and teachers to better understand the theoretical concepts behind classical robotics and computer vision through easy and intuitive simulation and visualization. The results of this labor of love have been packaged as MATLAB Toolboxes: the Robotics Toolbox and the Vision Toolbox. –Daniela Rus, RAS Education Cochair
Resumo:
A large-scale, outdoor, pervasive computing system based on the Fleck hardware platform applies sensor network technology to farming. Comprising static and animal-borne mobile nodes, the system measures the state of a complex, dynamic system comprising climate, soil, pasture, and animals. This data supports prediction of the land's future state and improved management outcomes through closed-loop control. This article is part of a special issue, Building a Sensor-Rich World.
Resumo:
This paper reports on a large, long-term mobile wireless sensor network deployment. The trial was part of an animal study involving 45 animals. During the trial, 15 animals were equipped with wireless sensor nodes for a week. The paper discusses various issues with such a deployment including electronic design, software design, animal ethics clearance, logistics, and wearable computing equipment for animals. The paper also presents some preliminary analysis of the data obtained from the deployment, both from the perspective of network parameters and animal movement behavior.
Resumo:
The mechanisms of helicopter flight create a unique, high-vibration environment which can play havoc with the accurate operation of on-board sensors. Vibration isolation of electronic sensors from structural borne oscillations is paramount to their reliable and accurate use. Effective isolation is achieved by realising a trade-off between the properties of the suspended instrument package, and the isolation mechanism. This is made more difficult as the weight and size of the sensors and computing hardware decreases with advances in technology. This paper presents a history of the design, challenges, constraints and construction of an integrated isolated vision and sensor platform and landing gear for the CSIRO autonomous X-Cell helicopter. The results of isolation performance and in-flight tests of the platform in autonomous flight are presented.
Resumo:
In this paper we present a model for defining and enforcing a fine-grained information flow policy. We describe how the policy can be enforced on a typical computer and present experiments using the proposed model. A key feature of the model is that it allows the expression of rules which detail precisely which information elements are allowed to mix together. For example, the model allows the expression of a policy which forbids a doctor from mixing the personal medical details of the patients. The enforcement mechanisms tracks and records information flows within the system so that dynamic changes to the policy can be made with respect to information elements which may have propagated to different locations in the system.
Personal epistemology in pre-service teachers : belief changes throughout a teacher education course
Resumo:
Classrooms of the 21st century are complex systems. They support diverse learners from varied contexts and function in a “messy” bricolage of policy contexts. This complexity is also evident in the nature of teaching and learning deployed in these classrooms. There is also, in current contexts, a general expectation that teachers will support students to construct, rather than simply receive knowledge. This process of constructing knowledge requires a focus on critical thinking in complex social and real world contexts (see also Elen & Clarebout, 2001; Yang, Chang & Hsu 2008). Critical thinking, which involves the identification and evaluation of multiple perspectives when making decisions, is a process of knowing – a tool of wisdom (Kuhn & Udell, 2001). Schommer-Aikens, Bird and Bakken (2010) refer to classrooms that encourage critical thinking as “epistemologically based” in which “the teacher encourages his/her students to look for connections among concepts within the text, with their prior knowledge, and with concepts found in the world beyond themselves” (p. 48).
Resumo:
Digital rights management allows information owners to control the use and dissemination of electronic documents via a machine-readable licence. Documents are distributed in a protected form such that they may only be used with trusted environments, and only in accordance with terms and conditions stated in the licence. Digital rights management has found uses in protecting copyrighted audio-visual productions, private personal information, and companies' trade secrets and intellectual property. This chapter describes a general model of digital rights management together with the technologies used to implement each component of a digital rights management system, and desribes how digital rights management can be applied to secure the distribution of electronic information in a variety of contexts.
Resumo:
Robust image hashing seeks to transform a given input image into a shorter hashed version using a key-dependent non-invertible transform. These image hashes can be used for watermarking, image integrity authentication or image indexing for fast retrieval. This paper introduces a new method of generating image hashes based on extracting Higher Order Spectral features from the Radon projection of an input image. The feature extraction process is non-invertible, non-linear and different hashes can be produced from the same image through the use of random permutations of the input. We show that the transform is robust to typical image transformations such as JPEG compression, noise, scaling, rotation, smoothing and cropping. We evaluate our system using a verification-style framework based on calculating false match, false non-match likelihoods using the publicly available Uncompressed Colour Image database (UCID) of 1320 images. We also compare our results to Swaminathan’s Fourier-Mellin based hashing method with at least 1% EER improvement under noise, scaling and sharpening.
Resumo:
Reputation and proof-of-work systems have been outlined as methods bot masters will soon use to defend their peer-to-peer botnets. These techniques are designed to prevent sybil attacks, such as those that led to the downfall of the Storm botnet. To evaluate the effectiveness of these techniques, a botnet that employed these techniques was simulated, and the amount of resources required to stage a successful sybil attack against it measured. While the proof-of-work system was found to increase the resources required for a successful sybil attack, the reputation system was found to lower the amount of resources required to disable the botnet.