41,199 research outputs found

    Recording, Documentation, and Information Management for the Conservation of Heritage Places: Guiding Principles

    Get PDF
    Provides guidance on integrating recording, documentation, and information management of territories, sites, groups of buildings, or monuments into the conservation process; evaluating proposals; consulting specialists; and controlling implementation

    Connecting practice to research (and back to practice): making the leap from design practice to design research

    Get PDF
    This paper explores two questions: what skills and knowledge can be derived from research and brought back into design practice; and how can we better prepare designers to undertake research? Its aim was to enable design practitioners wishing to pursue research to understand the process and anticipate the scope and level of work. Additionally, it addressed the questions of how design education can incorporate a research-based curriculum and how professional bodies can promote the value of research to practitioners? A complementary paper was co-written and presented at the CONNECTED 07 conference, Sydney. It explores the process of undertaking a PhD within the framework of the UK design education system by examining it from a design and business perspective (Yee, J.S.R, Michlewski, K. and Bohemia, E. (2007) 'Interrogating the Academic Research Process in UK Design Education from Design and Business Perspectives', ConnectED 2007 – International Conference on Design Education, Sydney, (http://www.designdictator.com/publications/connected07.pdf). Yee’s research bridges the gap between contemporary design practice, the growth of professional knowledge and pedagogy, via empirical study and theoretical discourse. Yee is currently 2nd supervisor for a PhD, entitled; ‘The Development of a Framework to Understand Potential Relationships Between Services and Their Users’ and is contributing to the development of the Professional Practice Doctorate in Design in the CfDR

    Pathways: Augmenting interoperability across scholarly repositories

    Full text link
    In the emerging eScience environment, repositories of papers, datasets, software, etc., should be the foundation of a global and natively-digital scholarly communications system. The current infrastructure falls far short of this goal. Cross-repository interoperability must be augmented to support the many workflows and value-chains involved in scholarly communication. This will not be achieved through the promotion of single repository architecture or content representation, but instead requires an interoperability framework to connect the many heterogeneous systems that will exist. We present a simple data model and service architecture that augments repository interoperability to enable scholarly value-chains to be implemented. We describe an experiment that demonstrates how the proposed infrastructure can be deployed to implement the workflow involved in the creation of an overlay journal over several different repository systems (Fedora, aDORe, DSpace and arXiv).Comment: 18 pages. Accepted for International Journal on Digital Libraries special issue on Digital Libraries and eScienc

    Towards a Layered Architectural View for Security Analysis in SCADA Systems

    Full text link
    Supervisory Control and Data Acquisition (SCADA) systems support and control the operation of many critical infrastructures that our society depend on, such as power grids. Since SCADA systems become a target for cyber attacks and the potential impact of a successful attack could lead to disastrous consequences in the physical world, ensuring the security of these systems is of vital importance. A fundamental prerequisite to securing a SCADA system is a clear understanding and a consistent view of its architecture. However, because of the complexity and scale of SCADA systems, this is challenging to acquire. In this paper, we propose a layered architectural view for SCADA systems, which aims at building a common ground among stakeholders and supporting the implementation of security analysis. In order to manage the complexity and scale, we define four interrelated architectural layers, and uses the concept of viewpoints to focus on a subset of the system. We indicate the applicability of our approach in the context of SCADA system security analysis.Comment: 7 pages, 4 figure

    Computational Design. Design in the Age of a Knowledge Society

    Get PDF

    Leachate treatment by conventional coagulation, electrocoagulation and two-stage coagulation (conventional coagulation and electrocoagulation)

    Get PDF
    Leachate is widely explored and investigated due to highly polluted and difficult to treat. Leachate treatment commonly involves advanced, complicated and high cost activities. Conventional coagulation is widely used in the treatment of wastewater but the sludge production becomes the biggest constraint in this treatment. Electrocoagulation is an alternative to conventional method because it has the same application but produce less sludge and requires simple equipment. Thus, combination of conventional coagulation and electrocoagulation can improve the efficiency of coagulation process in leachate treatment. This article is focusing on the efficiency of single and combined treatment as well as the improvement made by combined treatment. Based on review, the percentage reduction of current density and dose of coagulant was perceptible. As much 50% reduction of current density, duration of treatment, and dose of coagulant able to be obtained by using combined treatment. This combined treatment is able to reduce the cost and at the same time reduce the duration of treatment. Hence, the combined treatment offers an alternative technique for landfill leachate treatment on the removal of pollutants

    Linking consumer trust perception in constructing an e-commerce trust model

    Get PDF
    Trust issues is still considered as a main obstacle in the implementation of eCommerce Due to the increasing numbers of cyber crimes committed today, consumers are faced with doubt to engage in online shopping. As a safety precaution, consumers will take certain measures to protect their information by evaluating and assessing these websites trustworthiness before an actual purchase occurs. This paper describes a model that examines the elements related to online consumer behavior and to investigate this behavior towards building and increasing trust. The applicability of the model was tested in attempt to view consumers' acceptance towards the model and its component. The fmdings indicate the respondents are aware of the trust issue surrounding e-Commerce implementation as they accept and agreed with the model and its components

    Sharing economy vs sharing cultures? Designing for social, economic and environmental good

    Get PDF
    This paper explores the story behind a crowdfunding service as an example of sharing technology. Research in a small neighborhood of London showed how locally-developed initiatives can differ in tone, scale, ambition and practice to those getting attention in the so-called sharing economy. In local accounts, we see an emphasis on organizing together to create shared spaces for collaborative use of resources and joint ownership of projects and places. Whereas, many global business models feature significant elements of renting, leasing and hiring and focus only on resource management, sometimes at the expense of community growth. The service we discuss is based in the area we studied and has a collective model of sharing, but hopes to be part of the new global movement. We use this hybridity to problematize issues of culture, place and scalability in developing sharing resources and addressing sustainability concerns. We relate this to the motivation, rhetoric and design choices of other local sharing enterprises and other global sharing economy initiatives, arguing, in conclusion, that there is no sharing economy, but a variety of new cultures being fostered
    corecore