Mortara M.,CNR Institute for Applied Mathematics and Information Technologies |
Catalano C.E.,CNR Institute for Applied Mathematics and Information Technologies |
Bellotti F.,University of Genoa |
Fiucci G.,ORT France |
And 2 more authors.
Journal of Cultural Heritage | Year: 2014
Immersive technologies such as virtual environments and augmented reality have a clear potential to support the experiencing of cultural heritage by the large public, complementing the current tools and practices based on tangible goods such as museums, exhibitions, books and visual content. Serious games-videogames designed for educational objectives-appear as a new tool to learn cultural content in an engaging way. In this paper, we will provide an extensive portrait of the current proposition of serious games in the cultural sector, highlighting the educational objectives of games in this domain and analysing the complex relations between genre, context of use, technological solutions and learning effectiveness. We finally identify and discuss the most significant challenges in the design and adoption of educational games in cultural heritage. © 2013 Elsevier Masson SAS.
Moubarak P.M.,Innovation Village
IET Control Theory and Applications | Year: 2015
The new algorithm presented in this study, called TRAC (trust-region reflective adaptive controller), performs online adaptive control of time-varying linear or linearisable systems subject to parametric disturbances. The process of accomplishing such adaptive control consists of feeding the measured output signal back to TRAC-which occupies the outer loop of a control scheme-as well as the reference signal. Knowing the order of the closed-loop system in the inner loop, a parametric model of the time-varying output is derived as a function of the system's variables, such as damping and natural frequencies. Using trust-region optimisation, these parameters are estimated in real-time by recursively fitting the actual output into the parametric model. This allows for the location of the actual poles to be estimated in the s-domain after the poles have been shifted by the disturbance. Accordingly, the gains are re-tuned in order to return the actual poles to their desired location and absorb the disturbance. The primary advantage of TRAC relative to the state-of-the-art is its computational simplicity which is owed to search space restriction and heuristic approximations with trust-region search. A video of a sample application describing real-time TRAC-based control can be found on the IET's Digital Library. © The Institution of Engineering and Technology 2015.
Berkeley N.,Innovation Village |
Jarvis D.,Conventry University
26th Electric Vehicle Symposium 2012 | Year: 2012
Whilst traditional automotive manufacturing regions continue to face tremendous competitive pressures new opportunities are emerging with strong governmental support to encourage the manufacture and adoption of low carbon vehicles (LCV). This paper examines such opportunities in the West Midlands region of the UK, where the automotive 'cluster' remains one of the largest in the country and where failure to adapt to changing markets could prove economically and socially damaging. It suggests that the Region should build on its strengths at the upper end of the technology spectrum and establish itself as a leader in the area of LCV technologies. In doing so it is recognised that a co-ordinated and holistic approach is required, involving multiple layers of government, backed up by a strong and supportive policy framework. As such, the abolition of regional government in England presents a serious challenge. It remains to be seen whether the new Local Enterprise Partnerships in the Region can overcome constraints of funding, capacity, co-ordination and remit to fill the void left by the abolition of the Regional Development Agency. Failure to do so would mean that the economic development opportunities presented by low carbon vehicles may not be fully realised.
Madar I.L.,Methodica |
Smith M.,Innovation Village |
Knackfuss P.,InfoConsult Gesellschaft fur Informationstechnik mbH
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST | Year: 2015
The demographic change that is foreseeable in the future will permeate all throughout society, and require new approaches to ageing and its concomitant challenges. Serious games are one of the answers towards this challenge. Herein, we describe ways how the SafeMove project plans to employ serious games in the context of helping elderly people with light dementia to operate on their own. Due to the multi-facetted approach of the SafeMove project, serious games are embedded in a holistic system for the elderly, which will ultimately help them stay active and ambulatory as long as possible, while feeling safe and well cared for. This will enable them to stay in the comfort of their own homes for as long as possible, while helping them stay active and socially connected. The serious games will provide the impetus to exercise more, as well as connect with others playing the same games. © Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015.
Malcolm J.A.,Innovation Village
British Journal of Politics and International Relations | Year: 2016
• Illustrates the way in which the pursuit of a 'war on terror' in the aftermath of the terrorist attacks in the United States of America on 11 September 2001 framed a policy environment that securitised UK ports. • Provides a detailed elaboration of counter-terrorism practice in UK ports in the context of responses to international terrorism, laying out a typology that others interested in port security can work from. • Highlights the spatial dimension to the securitisation of UK ports alongside its temporal dimension, noting the pursuit, particularly by the British state and port owners, for greater knowledge about, and through this control over, activities associated with UK ports. • Contributes towards efforts to more clearly map and conceptualise maritime security by illustrating the way in which security practice within the shore component of the maritime domain-ports-was justified and practices institutionalised. This article lays out a typology of counter-terrorism practice in the UK ports in the context of responses to international terrorism, providing a mechanism to examine port security. Focusing on developments in the years after the International Ship and Port Facility (ISPS) Code came into force on 1 July 2004, the article first lays out the policy environment in which counter-terrorism practice was implemented, arguing that the securitisation of UK ports was framed by the pursuit of the 'war on terror'. With this complete, the article moves to elaborate the typology, examining 'legislation and regulations', 'institutional developments and infrastructure changes' alongside 'working practices' implemented. The article concludes by utilising the typology to argue that the counter-terrorism security response relating to UK ports in this context was constantly evolving, layered and increasingly expansive in scope, highlighting a spatial dimension to the securitisation of UK ports. © The Author(s) 2016.