8,073 research outputs found
Mitosporic fungi from Sardar sarovar
The present paper deals with five species of Dematiaceous mitosporic fungi were collected from the submerged wood samples from the Sardar Sarovar region. Four species viz. Ellisembia plovercovensis Goh and Hyde, Monodictys trichocladiopsis Goh and Hyde, Neta angliae Hyde & Goh and Xylomyces elegans Goh, Ho, Hyde and Tsui are being recorded for the first time form India. Brief notes and illustration are given for each taxon. Geographical distribution of each species in India is also provided. 
Basic and morphological properties of Bukit Goh bauxite
Investigation conducted by International Maritime Organization (IMO) concluded that the loss of the Bulk Jupiter that carrying bauxite from Kuantan has uncovered evidence to suggest liquefaction led to loss of stability. This research analysed Bukit Goh bauxite and comparison was made with International Maritime Solid Bulk Cargoes (IMSBC Code) standard. To analyse these characteristics of the bauxite, four samples were selected at Bukit Goh, Kuantan ; two of the samples from the Bukit Goh mine and two samples from the stock piles were tested to identify the bauxite basic and morphological properties by referring to GEOSPEC 3 : Model Specification for Soil Testing ; particle size distribution, moisture content and specific gravity and its morphological properties. Laboratory tests involved including Hydrometer test, Small Pycnometer test, Dry Sieve test and Field Emission Scanning Electron Microscop (FESEM) test. The results show that the average moisture content of raw Bukit Goh bauxite is 20.64% which exceeded the recomended value of maximum 10%. Average fine material for raw bauxite is 37.75% which should not be greater than 30% per IMSBC standard. By that, the bauxite from Bukit Goh mine do not achieved the minimum requirements and standards of the IMSBC standard and need to undergo beneficiation process for better quality and safety
Dematiaceous Hyphomycetes from North Maharashtra
The present paper deals with three species of Dictyosporium Corda viz. Dictyosporium elegans Corda, Dictyosporium cocophilum Bat and Dictyosporium tetraseriale Goh,Yanna and Hyde were collected from the submerged wood samples from the various water bodies in North Maharashtra region. Two species viz. Dictyosporium cocophilum Bat and Dictyosporium tetraseriale Goh,Yanna and Hyde are recorded for the first time form India. Brief notes and illustration are given for each taxon. Geographical distribution of each species in India is also provided
Dialogue based interfaces for universal access.
Conversation provides an excellent means of communication for almost all people. Consequently, a conversational interface is an excellent mechanism for allowing people to interact with systems. Conversational systems are an active research area, but a wide range of systems can be developed with current technology. More sophisticated interfaces can take considerable effort, but simple interfaces can be developed quite rapidly. This paper gives an introduction to the current state of the art of conversational systems and interfaces. It describes a methodology for developing conversational interfaces and gives an example of an interface for a state benefits web site. The paper discusses how this interface could improve access for a wide range of people, and how further development of this interface would allow a larger range of people to use the system and give them more functionality
Recommended from our members
Childhood, children and family lives in China
In this chapter we bring into focus those aspects of family lives in China that are concerned with childrenās family relationships, and the ways in which such issues are part and parcel of the broader institutionalisation of childhood. We draw on theoretical frameworks in the sociology of childhood and childhood studies (e.g., Prout, 2004; Qvortrup, 2000; Smith and Greene, 2014). Since these theoretical perspectives have developed predominantly in Anglophone literature, some researchers have considered their relevance to, and utility for, China and Chinese childhoods (Goh, 2011; Miao, 2013; Wang YY, 2011, 2014a, 2014b; Zheng, 2012a, 2012b; Ribbens McCarthy et al., 2017). In engaging with existing theories, and applying them to, Chinese childrenās family lives, we seek to go beyond any tendency to just āadd in the missing childrenā to existing discussions (Kesby et al., 2006: 186), and give consideration to a variety of cultural and local contexts that characterise China and illuminate why it is necessary to decentre universalist thinking
(Jullien, 2008/2014
A Framework for Exploring and Evaluating Mechanics in Human Computation Games
Human computation games (HCGs) are a crowdsourcing approach to solving
computationally-intractable tasks using games. In this paper, we describe the
need for generalizable HCG design knowledge that accommodates the needs of both
players and tasks. We propose a formal representation of the mechanics in HCGs,
providing a structural breakdown to visualize, compare, and explore the space
of HCG mechanics. We present a methodology based on small-scale design
experiments using fixed tasks while varying game elements to observe effects on
both the player experience and the human computation task completion. Finally
we discuss applications of our framework using comparisons of prior HCGs and
recent design experiments. Ultimately, we wish to enable easier exploration and
development of HCGs, helping these games provide meaningful player experiences
while solving difficult problems.Comment: 11 pages, 5 figure
An examination into the role of knowledge management and computer security in organizations
Organisations develop their computer security procedures based on external guidelines such as
ISO 17799 with very little provision to incorporate organisational knowledge in their security
procedures. While these external guidelines make recommendations as to how an organisation
should develop and implement best practices in computer security they often fail to provide a
mechanism that links the security process to the organisational knowledge. The result is that
often, security policies, procedures and controls are implemented that are neither strong nor
consistent with the organisation's objectives. This study has examined the role of Knowledge
Management in organisational Computer Security in 19 Australian SMEs. The study has
determined that although the role of knowledge management in organisational computer security
is currently limited, there appears to be evidence to argue that the application of knowledge
management systems to organisational computer security development and management
processes will considerably enhance performance and reduce costs.
The study supports that future research is warranted to focus on how existing computer security
standards and practices can be improved to allow for a stronger integration with organisational
knowledge through the application of knowledge management systems
- ā¦