22,861 research outputs found

    Multicriteria mapping manual: version 1.0

    Get PDF
    This Manual offers basic advice on how to do multicriteria mapping (MCM). It suggests how to: go about designing and building a typical MCM project; engage with participants and analyse results – and get the most out of the online MCM tool. Key terms are shown in bold italics and defined and explained in a final Annex. The online MCM software tool provides its own operational help. So this Manual is more focused on the general approach. There are no rigid rules. MCM is structured, but very flexible. It allows many more detailed features than can be covered here. MCM users are encouraged to think for themselves and be responsible and creative

    A visual thesis? techniques for reporting practice-led research

    Get PDF
    This paper describes an approach taken to the use of visual material as a significant part of PhD thesis in an Industrial Design research project. The aspiration to make creative work central to the thesis has been debated in a wide range of disciplines, but there are few examples of successful practice, especially in design. The authors sought to make visual material central to the process of developing a PhD thesis and worked with a research student to put this into practice. The process was beneficial to both the student and his audience and it is hoped that this approach provides a starting point for further development of practice-based research</p

    Federated Identity and Access Management for the Internet of Things

    Get PDF

    A picture is worth a thousand words: The perplexing problem of indexing images

    Get PDF
    Indexing images has always been problematic due to their richness of content and innate subjectivity. Three traditional approaches to indexing images are described and analyzed. An introduction of the contemporary use of social tagging is presented along with its limitations. Traditional practices can continue to be used as a stand-alone solution, however deficiencies limit retrieval. A collaborative technique is supported by current research and a model created by the authors for its inception is explored. CONTENTdm® is used as an example to illustrate tools that can help facilitate this process. Another potential solution discussed is the expansion of algorithms used in computer extraction to include the input and influence of human indexer intelligence. Further research is recommended in each area to discern the most effective method

    Resource sharing and hybrid libraries: the MALIBU Project

    Get PDF
    The British electronic libraries programme has funded four projects to develop thinking on so-called hybrid libraries and one of these is MALIBU (Modernising Academic Libraries in British Universities), based at King's College London. Working with the libraries of Oxford and Southampton Universities it will take a very rich set of humanities resources from archives and incunabula to digital products and networked resources and create a seamless single access point to all the available resources. It will also explore how strategies can be developed to make resources available locally as operational services rather than unreliably over the Internet. It does not set out to create its own new tools but rather to find ways of integrating tools already in existence or being developed

    The Prairie Post Quarterly Newsletter of the High Plains Regional Climate Center- July 2016

    Get PDF
    Inside this issue: Message from the interim director........................................1 Staff spotlight...........................1 Research update......................2 Product highlight....................3 Partnership spotlight.............3 AWDN information.................4 Update on regional climate conditions..................................4 Outreach/engagement.........5 Recent and upcoming travel and activities.............................

    Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot

    Get PDF
    The rise of connectivity, digitalization, robotics, and artificial intelligence (AI) is rapidly changing our society and shaping its future development. During this technological and societal revolution, security has been persistently neglected, yet a hacked robot can act as an insider threat in organizations, industries, public spaces, and private homes. In this paper, we perform a structured security assessment of Pepper, a commercial humanoid robot. Our analysis, composed by an automated and a manual part, points out a relevant number of security flaws that can be used to take over and command the robot. Furthermore, we suggest how these issues could be fixed, thus, avoided in the future. The very final aim of this work is to push the rise of the security level of IoT products before they are sold on the public market.Comment: 8 pages, 3 figures, 4 table
    • …
    corecore