679 resultados para Vic
Resumo:
In this paper we explore the ability of a recent model-based learning technique Receding Horizon Locally Weighted Regression (RH-LWR) useful for learning temporally dependent systems. In particular this paper investigates the application of RH-LWR to learn control of Multiple-input Multiple-output robot systems. RH-LWR is demonstrated through learning joint velocity and position control of a three Degree of Freedom (DoF) rigid body robot.
Resumo:
There has been an abundance of education reform recommendations for teaching and teacher education as a result of national and international reviews. A major criticism in education is the lack of connection between theory and practice (or praxis), that is, how the learning at university informs practical applications for teaching in the classroom. This paper presents the Teacher Education Done Differently (TEDD) project, funded by the Department of Education, Employment and Workplace Relations (DEEWR). It outlines how it has re-structured its offering of coursework in a Bachelor of Education (BEd) held at an Australian university campus to embrace praxis. Establishing partnerships was crucial to the development of this project. TEDD initially gathered a reference group of educators, which included university staff, school executives, and other key stakeholders, who formed an Advisory Group and Steering Committee. These groups formed a collective vision for TEDD and aimed to motivate others, foster team work, and create leadership roles that would benefit all stakeholders. The paper presents how university units changed to include a stronger praxis development for preservice teachers. Preservice teachers take their learning into schools within lead-up programs such as Ed Start for practicum I, III, and IV; Science in Schools, and Studies of Society and its Environment (SOSE). Findings showed that opportunities for undertaking additional real-world experiences were perceived to assist the preservice teachers’ praxis development. Additional school-based experiences as lead-up days for field experiences and as avenues for exploring the teaching of specific subject areas presented as an opportunity for enhancing education for all.
Resumo:
Defence organisations perform information security evaluations to confirm that electronic communications devices are safe to use in security-critical situations. Such evaluations include tracing all possible dataflow paths through the device, but this process is tedious and error-prone, so automated reachability analysis tools are needed to make security evaluations faster and more accurate. Previous research has produced a tool, SIFA, for dataflow analysis of basic digital circuitry, but it cannot analyse dataflow through microprocessors embedded within the circuit since this depends on the software they run. We have developed a static analysis tool that produces SIFA compatible dataflow graphs from embedded microcontroller programs written in C. In this paper we present a case study which shows how this new capability supports combined hardware and software dataflow analyses of a security critical communications device.
Resumo:
Data flow analysis techniques can be used to help assess threats to data confidentiality and integrity in security critical program code. However, a fundamental weakness of static analysis techniques is that they overestimate the ways in which data may propagate at run time. Discounting large numbers of these false-positive data flow paths wastes an information security evaluator's time and effort. Here we show how to automatically eliminate some false-positive data flow paths by precisely modelling how classified data is blocked by certain expressions in embedded C code. We present a library of detailed data flow models of individual expression elements and an algorithm for introducing these components into conventional data flow graphs. The resulting models can be used to accurately trace byte-level or even bit-level data flow through expressions that are normally treated as atomic. This allows us to identify expressions that safely downgrade their classified inputs and thereby eliminate false-positive data flow paths from the security evaluation process. To validate the approach we have implemented and tested it in an existing data flow analysis toolkit.
Resumo:
This article presents a novel approach to confidentiality violation detection based on taint marking. Information flows are dynamically tracked between applications and objects of the operating system such as files, processes and sockets. A confidentiality policy is defined by labelling sensitive information and defining which information may leave the local system through network exchanges. Furthermore, per application profiles can be defined to restrict the sets of information each application may access and/or send through the network. In previous works, we focused on the use of mandatory access control mechanisms for information flow tracking. In this current work, we have extended the previous information flow model to track network exchanges, and we are able to define a policy attached to network sockets. We show an example application of this extension in the context of a compromised web browser: our implementation detects a confidentiality violation when the browser attempts to leak private information to a remote host over the network.
Resumo:
The world’s increasing complexity, competitiveness, interconnectivity, and dependence on technology generate new challenges for nations and individuals that cannot be met by continuing education as usual (Katehi, Pearson, & Feder, 2009). With the proliferation of complex systems have come new technologies for communication, collaboration, and conceptualisation. These technologies have led to significant changes in the forms of mathematical and scientific thinking that are required beyond the classroom. Modelling, in its various forms, can develop and broaden children’s mathematical and scientific thinking beyond the standard curriculum. This paper first considers future competencies in the mathematical sciences within an increasingly complex world. Next, consideration is given to interdisciplinary problem solving and models and modelling. Examples of complex, interdisciplinary modelling activities across grades are presented, with data modelling in 1st grade, model-eliciting in 4th grade, and engineering-based modelling in 7th-9th grades.
Resumo:
This paper presents a practical framework to synthesize multi-sensor navigation information for localization of a rotary-wing unmanned aerial vehicle (RUAV) and estimation of unknown ship positions when the RUAV approaches the landing deck. The estimation performance of the visual tracking sensor can also be improved through integrated navigation. Three different sensors (inertial navigation, Global Positioning System, and visual tracking sensor) are utilized complementarily to perform the navigation tasks for the purpose of an automatic landing. An extended Kalman filter (EKF) is developed to fuse data from various navigation sensors to provide the reliable navigation information. The performance of the fusion algorithm has been evaluated using real ship motion data. Simulation results suggest that the proposed method can be used to construct a practical navigation system for a UAV-ship landing system.
Resumo:
The middle classes form the bulk of Indian migrants who head for Australian shores today. Yet, within Australia, general knowledge of the conditions that drive Indians’ determined search for opportunities overseas is limited to the few who have contact with international students and migrants from the sub-continent, and the skewed, melodramatic antics of Bollywood. It is my suggestion that a broader understanding of the underlying reasons that push Indians to migrate to societies like Australia can be had through readings of Chetan’s Bhagat’s four hugely popular novels: Five Point Someone, One night @the Call Center, The 3 mistakes of My life and Two States. Bhagat is a graduate of India’s famed Indian Institute of Technology and a former Non-Resident Indian investment banker who has since returned to live in Delhi. His experiences make him the perfect mouthpiece for middle India and his paperbacks depict that stratum of Indian society’s obsessions with social mobility, marriage, regional and religious divides with great sympathy and conviction. Drawing on observations made during a recent visit to India, I illustrate what an exploration of Bhagat’s paperbacks reveals about everyday, contemporary India and what it adds to Australian understandings of Indians and India today.
Resumo:
To understand the nature of police organisations and their management in an Australian context it is necessary to appreciate the recent history of policing at least in the last 30 years. In doing so an overall perspective is gained on the various reform efforts and organisational changes that have taken place in Australian policing. With this police reform perspective clearly in mind it then becomes possible to appreciate that the organization and management of the institution of policing in Australia is nested within the larger framework of ‘governance’. Hence, this notion of governance will be used as the key focal point around which to understand how police organizations manage their mission in the Australian context. Finally, the chapter discusses the inevitable ‘tension spaces’ that arise in policing and the need for police organizations to better manage such complexities.
Resumo:
Object segmentation is one of the fundamental steps for a number of robotic applications such as manipulation, object detection, and obstacle avoidance. This paper proposes a visual method for incorporating colour and depth information from sequential multiview stereo images to segment objects of interest from complex and cluttered environments. Rather than segmenting objects using information from a single frame in the sequence, we incorporate information from neighbouring views to increase the reliability of the information and improve the overall segmentation result. Specifically, dense depth information of a scene is computed using multiple view stereo. Depths from neighbouring views are reprojected into the reference frame to be segmented compensating for imperfect depth computations for individual frames. The multiple depth layers are then combined with color information from the reference frame to create a Markov random field to model the segmentation problem. Finally, graphcut optimisation is employed to infer pixels belonging to the object to be segmented. The segmentation accuracy is evaluated over images from an outdoor video sequence demonstrating the viability for automatic object segmentation for mobile robots using monocular cameras as a primary sensor.
Resumo:
Our research explores the design of networked technologies to facilitate local suburban communications and to encourage people to engage with their local community. While there are many investigations of interaction designs for networked technologies, most research utilises small exercises, workshops or other short-term studies to investigate interaction designs. However, we have found these short-term methods to be ineffective in the context of understanding local community interaction. Moreover we find that people are resistant to putting their time into workshops and exercises, understandably so because these are academic practices, not local community practices. Our contribution is to detail a long term embedded design approach in which we interact with the community over the long term in the course of normal community goings-on with an evolving exploratory prototype. This paper discusses the embedded approach to working in the wild for extended field research.
Resumo:
In this paper we present a novel algorithm for localization during navigation that performs matching over local image sequences. Instead of calculating the single location most likely to correspond to a current visual scene, the approach finds candidate matching locations within every section (subroute) of all learned routes. Through this approach, we reduce the demands upon the image processing front-end, requiring it to only be able to correctly pick the best matching image from within a short local image sequence, rather than globally. We applied this algorithm to a challenging downhill mountain biking visual dataset where there was significant perceptual or environment change between repeated traverses of the environment, and compared performance to applying the feature-based algorithm FAB-MAP. The results demonstrate the potential for localization using visual sequences, even when there are no visual features that can be reliably detected.
Resumo:
“The process of innovation is often seen as being very linear, with research results, new technologies or user insights being channelled, often prematurely, into specific products and process” (Kyffin and Gardien 2009). It is precisely this perception of innovation-as-linear-process which this paper seeks to challenge. While there are many current theories and much contemporary literature available which discuss the management and catalysts of innovation, what is missing are examples of how innovation occurs from the application of these theories and literature (Wrigley & Bucolo 2010). This paper addresses both this gap and perceptions of the viability of linear innovation by presenting a case study for the commercialisation of a core technology (a cleantech, semi-portable mass-energy generator posited as a direct competitor to conventional energy provision systems), within an 18-month timeframe by the use of the Design-Led Innovation approach: “a process of creating a sustainable competitive advantage by radically changing the customer value proposition” (Bucolo & Matthews 2011).
Resumo:
Mentors (cooperating classroom teachers) have a shared responsibility with universities for developing preservice teachers’ pedagogical practices, particularly towards becoming reflective practitioners. Preservice teachers need to participate actively in their own learning, by reflecting and acting on the mentor’s constructive feedback provided during planning and feedback dialogue sessions. This case study uses feedback practices outlined within a five-factor mentoring model to analyse dialogue between a mentor and her respective mentee during different stages in their school-based programs (first practicum). This investigation uses multiple data sources such as video and audio-recorded interviews, archival documents from participants such as lesson plans, reflections and reports to examine preservice teacher’s reflections and implementations of practice as a result of her mentor’s feedback (e.g., establish expectations, review lesson plans, observe teaching then provide oral and written feedback, and evaluate progress). Findings indicated that reflective thinking was more apparent when the mentor did not dominate conversations but instead asked astute pedagogical knowledge questions to facilitate the mentee’s reflections on practice.