16 resultados para Geraldi, João Wanderley
Resumo:
In this chapter, ideas from ecological psychology and nonlinear dynamics are integrated to characterise decision-making as an emergent property of self-organisation processes in the interpersonal interactions that occur in sports teams. A conceptual model is proposed to capture constraints on dynamics of decisions and actions in dyadic systems, which has been empirically evaluated in simulations of interpersonal interactions in team sports. For this purpose, co-adaptive interpersonal dynamics in team sports such as rubgy union have been studied to reveal control parameter and collective variable relations in attacker-defender dyads. Although interpersonal dynamics of attackers and defenders in 1 vs 1 situations showed characteristics of chaotic attractors, the informational constraints of rugby union typically bounded dyadic systems into low dimensional attractors. Our work suggests that the dynamics of attacker-defender dyads can be characterised as an evolving sequence since players' positioning and movements are connected in diverse ways over time.
Resumo:
Ecological dynamics characterizes adaptive behavior as an emergent, self-organizing property of interpersonal interactions in complex social systems. The authors conceptualize and investigate constraints on dynamics of decisions and actions in the multiagent system of team sports. They studied coadaptive interpersonal dynamics in rugby union to model potential control parameter and collective variable relations in attacker–defender dyads. A videogrammetry analysis revealed how some agents generated fluctuations by adapting displacement velocity to create phase transitions and destabilize dyadic subsystems near the try line. Agent interpersonal dynamics exhibited characteristics of chaotic attractors and informational constraints of rugby union boxed dyadic systems into a low dimensional attractor. Data suggests that decisions and actions of agents in sports teams may be characterized as emergent, self-organizing properties, governed by laws of dynamical systems at the ecological scale. Further research needs to generalize this conceptual model of adaptive behavior in performance to other multiagent populations.
Resumo:
In the region of self-organized criticality (SOC) interdependency between multi-agent system components exists and slight changes in near-neighbor interactions can break the balance of equally poised options leading to transitions in system order. In this region, frequency of events of differing magnitudes exhibits a power law distribution. The aim of this paper was to investigate whether a power law distribution characterized attacker-defender interactions in team sports. For this purpose we observed attacker and defender in a dyadic sub-phase of rugby union near the try line. Videogrammetry was used to capture players’ motion over time as player locations were digitized. Power laws were calculated for the rate of change of players’ relative position. Data revealed that three emergent patterns from dyadic system interactions (i.e., try; unsuccessful tackle; effective tackle) displayed a power law distribution. Results suggested that pattern forming dynamics dyads in rugby union exhibited SOC. It was concluded that rugby union dyads evolve in SOC regions suggesting that players’ decisions and actions are governed by local interactions rules.
Resumo:
Work-integrated learning in the form of internships is increasingly important for universities as they seek to compete for students, and seek links with industries. Yet, there is surprisingly little empirical research on the details of internships: (1) What they should accomplish? How they should be structure? (3) How students performance should be assess? There is also surprisingly little conceptual analysis of these key issues, either for business internships in general. or for marketing internships in particular. Furthermore, the "answers" on these issues may differ depending upon the perspective if the three stakeholders: students, business managers and university academics. There is not study in the marketing literature which surveys all three groups on these important aspects of internships. To fill these gaps, this paper discusses and analyses internships goals, internship structure, and internship assessment or undergraduate marketing internships, and then reports on a survey of the views of all three stakeholder groups on these issues. There are a considerable variety of approaches for internships, but generally there is consensus among the stake holder groups, with some notable differences. Managerial implication include recognition of the importance of having and academic aspects in internships; mutual understanding concerning needs and constraints; and the requirement that companies, students, and academics take a long-term view of internship programs to achieve mutually beneficial outcomes.
Resumo:
Bridges are important infrastructures of all nations and are required for transportation of goods as well as human. A catastrophic failure can result in loss of lives and enormous financial hardship to the nation. Hence, there is an urgent need to monitor our infrastructures to prolong their life span, at the same time catering for heavier and faster moving traffics. Although various kinds of sensors are now available to monitor the health of the structures due to corrosion, they do not provide permanent and long term measurements. This paper investigates the fabrication of Carbon Nanotube (CNT) based composite sensors for structural health monitoring. The CNTs, a key material in nanotechnology has aroused great interest in the research community due to their remarkable mechanical, electrochemical, piezoresistive and other physical properties. Multi-wall CNT (MWCNT)/Nafion composite sensors were fabricated to evaluate their electrical properties when subjected to chemical solutions, to simulate a chemical reaction due to corrosion and real life corrosion experimental tests. The electrical resistance of the sensor electrode was dramatically changed due to corrosion. The novel sensor is expected to effectively detect corrosion in structures based on the measurement of electrical impedances of the CNT composite.
Resumo:
Dragon stream cipher is one of the focus ciphers which have reached Phase 2 of the eSTREAMproject. In this paper, we present a new method of building a linear distinguisher for Dragon. The distinguisher is constructed by exploiting the biases of two S-boxes and the modular addition which are basic components of the nonlinear function F. The bias of the distinguisher is estimated to be around 2−75.32 which is better than the bias of the distinguisher presented by Englund and Maximov. We have shown that Dragon is distinguishable from a random cipher by using around 2150.6 keystream words and 259 memory. In addition, we present a very efficient algorithm for computing the bias of linear approximation of modular addition.
Resumo:
This paper presents algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. For unstuttered SOBER-t32, two different attacks are implemented. In the first attack, we obtain multivariate equations of degree 10. Then, an algebraic attack is developed using a collection of output bits whose relation to the initial state of the LFSR can be described by low-degree equations. The resulting system of equations contains 2^69 equations and monomials, which can be solved using the Gaussian elimination with the complexity of 2^196.5. For the second attack, we build a multivariate equation of degree 14. We focus on the property of the equation that the monomials which are combined with output bit are linear. By applying the Berlekamp-Massey algorithm, we can obtain a system of linear equations and the initial states of the LFSR can be recovered. The complexity of attack is around O(2^100) with 2^92 keystream observations. The second algebraic attack is applicable to SOBER-t16 without stuttering. The attack takes around O(2^85) CPU clocks with 2^78 keystream observations.
Resumo:
NLS is one of the stream ciphers submitted to the eSTREAM project. We present a distinguishing attack on NLS by Crossword Puzzle (CP) attack method which is introduced in this paper. We build the distinguisher by using linear approximations of both the non-linear feedback shift register (NFSR) and the nonlinear filter function (NLF). Since the bias of the distinguisher depends on the Konst value, which is a key-dependent word, we present the graph showing how the bias of distinguisher vary with Konst. In result, we estimate the bias of the distinguisher to be around O(2^−30). Therefore, we claim that NLS is distinguishable from truly random cipher after observing O(2^60) keystream words. The experiments also show that our distinguishing attack is successful on 90.3% of Konst among 2^32 possible values. We extend the CP attack to NLSv2 which is a tweaked version of NLS. In result, we build a distinguisher which has the bias of around 2− 48. Even though this attack is below the eSTREAM criteria (2^−40), the security margin of NLSv2 seems to be too low.
Resumo:
To provide card holder authentication while they are conducting an electronic transaction using mobile devices, VISA and MasterCard independently proposed two electronic payment protocols: Visa 3D Secure and MasterCard Secure Code. The protocols use pre-registered passwords to provide card holder authentication and Secure Socket Layer/ Transport Layer Security (SSL/TLS) for data confidentiality over wired networks and Wireless Transport Layer Security (WTLS) between a wireless device and a Wireless Application Protocol (WAP) gateway. The paper presents our analysis of security properties in the proposed protocols using formal method tools: Casper and FDR2. We also highlight issues concerning payment security in the proposed protocols.
Resumo:
We present a distinguishing attack against SOBER-128 with linear masking. We found a linear approximation which has a bias of 2^− − 8.8 for the non-linear filter. The attack applies the observation made by Ekdahl and Johansson that there is a sequence of clocks for which the linear combination of some states vanishes. This linear dependency allows that the linear masking method can be applied. We also show that the bias of the distinguisher can be improved (or estimated more precisely) by considering quadratic terms of the approximation. The probability bias of the quadratic approximation used in the distinguisher is estimated to be equal to O(2^− − 51.8), so that we claim that SOBER-128 is distinguishable from truly random cipher by observing O(2^103.6) keystream words.
Resumo:
NLS is a stream cipher which was submitted to the eSTREAM project. A linear distinguishing attack against NLS was presented by Cho and Pieprzyk, which was called Crossword Puzzle (CP) attack. NLSv2 is a tweak version of NLS which aims mainly at avoiding the CP attack. In this paper, a new distinguishing attack against NLSv2 is presented. The attack exploits high correlation amongst neighboring bits of the cipher. The paper first shows that the modular addition preserves pairwise correlations as demonstrated by existence of linear approximations with large biases. Next, it shows how to combine these results with the existence of high correlation between bits 29 and 30 of the S-box to obtain a distinguisher whose bias is around 2^−37. Consequently, we claim that NLSv2 is distinguishable from a random cipher after observing around 2^74 keystream words.
Resumo:
This study investigated the effects of high-intensity interval training (HIIT) vs. work-matched moderate-intensity continuous exercise (MOD) on metabolism and counterregulatory stress hormones. In a randomized and counterbalanced order, 10 well-trained male cyclists and triathletes completed a HIIT session [81.6 ± 3.7% maximum oxygen consumption (V̇o2 max); 72.0 ± 3.2% peak power output; 792 ± 95 kJ] and a MOD session (66.7 ± 3.5% V̇o2 max; 48.5 ± 3.1% peak power output; 797 ± 95 kJ). Blood samples were collected before, immediately after, and 1 and 2 h postexercise. Carbohydrate oxidation was higher (P = 0.037; 20%), whereas fat oxidation was lower (P = 0.037; −47%) during HIIT vs. MOD. Immediately after exercise, plasma glucose (P = 0.024; 20%) and lactate (P < 0.01; 5.4×) were higher in HIIT vs. MOD, whereas total serum free fatty acid concentration was not significantly different (P = 0.33). Targeted gas chromatography-mass spectromtery metabolomics analysis identified and quantified 49 metabolites in plasma, among which 11 changed after both HIIT and MOD, 13 changed only after HIIT, and 5 changed only after MOD. Notable changes included substantial increases in tricarboxylic acid intermediates and monounsaturated fatty acids after HIIT and marked decreases in amino acids during recovery from both trials. Plasma adrenocorticotrophic hormone (P = 0.019), cortisol (P < 0.01), and growth hormone (P < 0.01) were all higher immediately after HIIT. Plasma norepinephrine (P = 0.11) and interleukin-6 (P = 0.20) immediately after exercise were not significantly different between trials. Plasma insulin decreased during recovery from both HIIT and MOD (P < 0.01). These data indicate distinct differences in specific metabolites and counterregulatory hormones following HIIT vs. MOD and highlight the value of targeted metabolomic analysis to provide more detailed insights into the metabolic demands of exercise.
Resumo:
The association of endoplasmic reticulum aminopeptidase 2 (ERAP2) with ankylosing spondylitis (AS) was recently described in the large International Genetics of AS Consortium Immunochip study...
Resumo:
Ankylosing spondylitis is a common, highly heritable inflammatory arthritis affecting primarily the spine and pelvis. In addition to HLA-B*27 alleles, 12 loci have previously been identified that are associated with ankylosing spondylitis in populations of European ancestry, and 2 associated loci have been identified in Asians. In this study, we used the Illumina Immunochip microarray to perform a case-control association study involving 10,619 individuals with ankylosing spondylitis (cases) and 15,145 controls. We identified 13 new risk loci and 12 additional ankylosing spondylitis-associated haplotypes at 11 loci. Two ankylosing spondylitis-associated regions have now been identified encoding four aminopeptidases that are involved in peptide processing before major histocompatibility complex (MHC) class I presentation. Protective variants at two of these loci are associated both with reduced aminopeptidase function and with MHC class I cell surface expression.
Resumo:
This paper investigates the effect that text pre-processing approaches have on the estimation of the readability of web pages. Readability has been highlighted as an important aspect of web search result personalisation in previous work. The most widely used text readability measures rely on surface level characteristics of text, such as the length of words and sentences. We demonstrate that different tools for extracting text from web pages lead to very different estimations of readability. This has an important implication for search engines because search result personalisation strategies that consider users reading ability may fail if incorrect text readability estimations are computed.