26 resultados para Thomas Mac


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper introduces an energy-efficient Rate Adaptive MAC (RA-MAC) protocol for long-lived Wireless Sensor Networks (WSN). Previous research shows that the dynamic and lossy nature of wireless communication is one of the major challenges to reliable data delivery in a WSN. RA-MAC achieves high link reliability in such situations by dynamically trading off radio bit rate for signal processing gain. This extra gain reduces the packet loss rate which results in lower energy expenditure by reducing the number of retransmissions. RA-MAC selects the optimal data rate based on channel conditions with the aim of minimizing energy consumption. We have implemented RA-MAC in TinyOS on an off-the-shelf sensor platform (TinyNode), and evaluated its performance by comparing RA-MAC with state-ofthe- art WSN MAC protocol (SCP-MAC) by experiments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The high moisture content of mill mud (typically 75–80% for Australian factories) results in high transportation costs for the redistribution of mud onto cane farms. The high transportation cost relative to the nutrient value of the mill mud results in many milling companies subsidising the cost of this recycle to ensure a wide distribution across the cane supply area. An average mill would generate about 100 000 t of mud (at 75% moisture) in a crushing season. The development of mud processing facilities that will produce a low moisture mud that can be effectively incorporated into cane land with existing or modified spreading equipment will improve the cost efficiency of mud redistribution to farms; provide an economical fertiliser alternative to more farms in the supply area; and reduce the potential for adverse environmental impacts from farms. A research investigation assessing solid bowl decanter centrifuges to produce low moisture mud with low residual pol was undertaken and the results compared to the performance of existing rotary vacuum filters in factory trials. The decanters were operated on filter mud feed in parallel with the rotary vacuum filters to allow comparisons of performance. Samples of feed, mud product and filtrate were analysed to provide performance indicators. The decanter centrifuge could produce mud cakes with very low moistures and residual pol levels. Spreading trials in cane fields indicated that the dry cake could be spread easily by standard mud trucks and by trucks designed specifically to spread fertiliser.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Thomas Young (1773-1829) carried out major pioneering work in many different subjects. In 1800 he gave the Bakerian Lecture of the Royal Society on the topic of the “mechanism of the eye”: this was published in the following year (Young, 1801). Young used his own design of optometer to measure refraction and accommodation, and discovered his own astigmatism. He considered the different possible origins of accommodation and confirmed that it was due to change in shape of the lens rather than to change in shape of the cornea or an increase in axial length. However, the paper also dealt with many other aspects of visual and ophthalmic optics, such as biometric parameters, peripheral refraction, longitudinal chromatic aberration, depth-of-focus and instrument myopia. These aspects of the paper have previously received little attention. We now give detailed consideration to these and other less-familiar features of Young’s work and conclude that his studies remain relevant to many of the topics which currently engage visual scientists.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In addition to his work on physical optics, Thomas Young (1773-1829) made several contributions to geometrical optics, most of which received little recognition in his time or since. We describe and assess some of these contributions: Young’s construction (the basis for much of his geometric work), paraxial refraction equations, oblique astigmatism and field curvature, and gradient-index optics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: James Clerk Maxwell is usually recognized as being the first, in 1854, to consider using inhomogeneous media in optical systems. However, some fifty years earlier Thomas Young, stimulated by his interest in the optics of the eye and accommodation, had already modeled some applications of gradient-index optics. These applications included using an axial gradient to provide spherical aberration-free optics and a spherical gradient to describe the optics of the atmosphere and the eye lens. We evaluated Young’s contributions. Method: We attempted to derive Young’s equations for axial and spherical refractive index gradients. Raytracing was used to confirm accuracy of formula. Results: We did not confirm Young’s equation for the axial gradient to provide aberration-free optics, but derived a slightly different equation. We confirmed the correctness of his equations for deviation of rays in a spherical gradient index and for the focal length of a lens with a nucleus of fixed index surrounded by a cortex of reducing index towards the edge. Young claimed that the equation for focal length applied to a lens with part of the constant index nucleus of the sphere removed, such that the loss of focal length was a quarter of the thickness removed, but this is not strictly correct. Conclusion: Young’s theoretical work in gradient-index optics received no acknowledgement from either his contemporaries or later authors. While his model of the eye lens is not an accurate physiological description of the human lens, with the index reducing least quickly at the edge, it represented a bold attempt to approximate the characteristics of the lens. Thomas Young’s work deserves wider recognition.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a model for generating a MAC tag with a stream cipher using the input message indirectly. Several recent proposals represent instances of this model with slightly different options. We investigate the security of this model for different options, and identify cases which permit forgery attacks. Based on this, we present a new forgery attack on version 1.4 of 128-EIA3. Design recommendations to enhance the security of proposals following this general model are given.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a model for generating a MAC tag by injecting the input message directly into the internal state of a nonlinear filter generator. This model generalises a similar model for unkeyed hash functions proposed by Nakano et al. We develop a matrix representation for the accumulation phase of our model and use it to analyse the security of the model against man-in-the-middle forgery attacks based on collisions in the final register contents. The results of this analysis show that some conclusions of Nakano et al regarding the security of their model are incorrect. We also use our results to comment on several recent MAC proposals which can be considered as instances of our model and specify choices of options within the model which should prevent the type of forgery discussed here. In particular, suitable initialisation of the register and active use of a secure nonlinear filter will prevent an attacker from finding a collision in the final register contents which could result in a forged MAC.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article discusses David M. Thomas' 2012 exhibition at Boxcopy. Thomas' exhibition conflates the space of the studio with that of the gallery. In doing so, he draws out complex relationships between production and presentation, subjectivity and sociality. This article focuses on these aspects of Thomas' creative exploration of identity and its mutability through art making.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report is the eight deliverable of the Real Time and Predictive Traveller Information project and the third deliverable of the Arterial Travel Time Information sub-project in the Integrated Traveller Information research Domain of the Smart Transport Research Centre. The primary objective of the Arterial Travel Time Information sub-project is to develop algorithms for real-time travel time estimation and prediction models for arterial traffic. Brisbane arterial network is highly equipped with Bluetooth MAC Scanners, which can provide travel time information. Literature is limited with the knowledge on the Bluetooth protocol based data acquisition process and accuracy and reliability of the analysis performed using the data. This report expands the body of knowledge surrounding the use of data from Bluetooth MAC Scanner (BMS) as a complementary traffic data source. A multi layer simulation model named Traffic and Communication Simulation (TCS) is developed. TCS is utilised to model the theoretical properties of the BMS data and analyse the accuracy and reliability of travel time estimation using the BMS data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Histories of Catholic education have received little attention by Church historians and are usually written by members of the Catholic clergy, with a strong emphasis placed on the spiritual and building accomplishments of the bishops. This thesis examines the provision of Catholic Education in Australasia, with a focus on the contribution of three men, Jean Baptiste Francois Pompallier, Thomas Arnold and Julian Edmund Tenison Woods. These men received support from the female religious orders in the regions where they worked, frequently with little recognition or praise by Catholic Church authorities. The tenets of their faith gave Pompallier and Woods strength and reinforced their determination to succeed. Arnold, however, possessed a strong desire to change society. All three believed in the desirability of providing Catholic schooling for the poor, with the curriculum facilitating the acquisition of socially desirable values and traits, including obedience, honesty, moral respectability and a strong adherence to Catholic religious values. The beneficiaries included society, future employers, the Church, the children and their parents. With the exception of promoting distinctly Catholic religious values, Roman Catholic schools and National schools in Australasia shared identical objectives. Historians have neglected the contributions of these men.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recently there has been significant interest of researchers and practitioners on the use of Bluetooth as a complementary transport data. However, literature is limited with the understanding of the Bluetooth MAC Scanner (BMS) based data acquisition process and the properties of the data being collected. This paper first provides an insight on the BMS data acquisition process. Thereafter, it discovers the interesting facts from analysis of the real BMS data from both motorway and arterial networks of Brisbane, Australia. The knowledge gained is helpful for researchers and practitioners to understand the BMS data being collected which is vital to the development of management and control algorithms using the data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a model for the generation of a MAC tag using a stream cipher. The input message is used indirectly to control segments of the keystream that form the MAC tag. Several recent proposals can be considered as instances of this general model, as they all perform message accumulation in this way. However, they use slightly different processes in the message preparation and finalisation phases. We examine the security of this model for different options and against different types of attack, and conclude that the indirect injection model can be used to generate MAC tags securely for certain combinations of options. Careful consideration is required at the design stage to avoid combinations of options that result in susceptibility to forgery attacks. Additionally, some implementations may be vulnerable to side-channel attacks if used in Authenticated Encryption (AE) algorithms. We give design recommendations to provide resistance to these attacks for proposals following this model.