445 resultados para frame
Resumo:
Distributed Wireless Smart Camera (DWSC) network is a special type of Wireless Sensor Network (WSN) that processes captured images in a distributed manner. While image processing on DWSCs sees a great potential for growth, with its applications possessing a vast practical application domain such as security surveillance and health care, it suffers from tremendous constraints. In addition to the limitations of conventional WSNs, image processing on DWSCs requires more computational power, bandwidth and energy that presents significant challenges for large scale deployments. This dissertation has developed a number of algorithms that are highly scalable, portable, energy efficient and performance efficient, with considerations of practical constraints imposed by the hardware and the nature of WSN. More specifically, these algorithms tackle the problems of multi-object tracking and localisation in distributed wireless smart camera net- works and optimal camera configuration determination. Addressing the first problem of multi-object tracking and localisation requires solving a large array of sub-problems. The sub-problems that are discussed in this dissertation are calibration of internal parameters, multi-camera calibration for localisation and object handover for tracking. These topics have been covered extensively in computer vision literatures, however new algorithms must be invented to accommodate the various constraints introduced and required by the DWSC platform. A technique has been developed for the automatic calibration of low-cost cameras which are assumed to be restricted in their freedom of movement to either pan or tilt movements. Camera internal parameters, including focal length, principal point, lens distortion parameter and the angle and axis of rotation, can be recovered from a minimum set of two images of the camera, provided that the axis of rotation between the two images goes through the camera's optical centre and is parallel to either the vertical (panning) or horizontal (tilting) axis of the image. For object localisation, a novel approach has been developed for the calibration of a network of non-overlapping DWSCs in terms of their ground plane homographies, which can then be used for localising objects. In the proposed approach, a robot travels through the camera network while updating its position in a global coordinate frame, which it broadcasts to the cameras. The cameras use this, along with the image plane location of the robot, to compute a mapping from their image planes to the global coordinate frame. This is combined with an occupancy map generated by the robot during the mapping process to localised objects moving within the network. In addition, to deal with the problem of object handover between DWSCs of non-overlapping fields of view, a highly-scalable, distributed protocol has been designed. Cameras that follow the proposed protocol transmit object descriptions to a selected set of neighbours that are determined using a predictive forwarding strategy. The received descriptions are then matched at the subsequent camera on the object's path using a probability maximisation process with locally generated descriptions. The second problem of camera placement emerges naturally when these pervasive devices are put into real use. The locations, orientations, lens types etc. of the cameras must be chosen in a way that the utility of the network is maximised (e.g. maximum coverage) while user requirements are met. To deal with this, a statistical formulation of the problem of determining optimal camera configurations has been introduced and a Trans-Dimensional Simulated Annealing (TDSA) algorithm has been proposed to effectively solve the problem.
Resumo:
Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.
Resumo:
In this practice-led research project I work to show how a re-reading and a particular form of listening to the sound-riddled nature of Gertrude Stein's work, Two: Gertrude Stein and her Brother, presents us with a contemporary theory of sound in language. This theory, though in its infancy, is a particular enjambment of sounded language that presents itself as an event, engaged with meaning, with its own inherent voice. It displays a propensity through engagement with the 'other' to erupt into love. In this thesis these qualities are reverberated further through the work of Seth Kim-Cohen's notion of the non-cochlear, Simon Jarvis's notion of musical thinking, Jean-Jacques Lecercle's notion of délire or nonsense, Luce Irigaray's notion of jouissant love and the Bracha Ettinger's notion of the generative matrixial border space. This reading then is simultaneously paired with my own work of scoring and creating a digital opera from Stein's work, thereby testing and performing Stein's theory. In this I show how a re-reading and relistening to Stein's work can be significant to feminist ethical language frames, contemporary philosophy, sonic art theory and digital language frames. Further significance of this study is that when the reverberation of Stein's engagements with language through sound can be listened to, a pattern emerges, one that encouragingly problematizes subjectivity and interweaves genres/methods and means, creating a new frame for sound in language, one with its own voice that I call soundage.
Resumo:
In this paper we present key ideas for an ecological dynamics approach to learning that reveal the importance of learner–environment interactions to frame outdoor experiential learning.We propose that ecological dynamics provides a useful framework for understanding the interacting constraints of the learning process and for designing learning opportunities in outdoor experiential learning.
Resumo:
The Australian beach is a significant component of the Australian culture and a way of life. The Australian Beachspace explores existing research about the Australian beach from a cultural and Australian studies perspective. Initially, the beach in Australian studies has been established within a binary opposition. Fiske, Hodge, and Turner (1987) pioneered the concept of the beach as a mythic space, simultaneously beautiful but abstract. In comparison, Meaghan Morris (1998) suggested that the beach was in fact an ordinary or everyday space. The research intervenes in previous discussions, suggesting that the Australian beach needs to be explored in spatial terms as well as cultural ones. The thesis suggests the beach is more than these previously established binaries and uses Soja's theory of Thirdspace (1996) to posit the term beachspace as a way of describing this complex site. The beachspace is a lived space that encompasses both the mythic and ordinary and more. A variety of texts have been explored in this work, both film and literature. The thesis examines textual representations of the Australian beach using Soja's Thirdspace as a frame to reveal the complexities of the Australian beach through five thematic chapters. Some of the texts discussed include works by Tim Winton's Breath (2008) and Land's Edge (1993), Robert Drewe's short story collections The Bodysurfers (1987) and The Rip (2008), and films such as Newcastle (dir. Dan Castle 2008) and Blackrock (dir. Steve Vidler 1997). Ultimately The Australian Beachspace illustrates that the multiple meanings of the beach's representations are complex and yet frequently fail to capture the layered reality of the Australian beach. The Australian beach is best described as a beachspace, a complex space that allows for the mythic and/or/both ordinary at once.
Resumo:
Purpose To examine choroidal thickness (ChT) and its spatial distribution across the posterior pole in pediatric subjects with normal ocular health and minimal refractive error. Methods ChT was assessed using spectral domain optical coherence tomography (OCT) in 194 children aged between 4-12 years, with spherical equivalent refractive errors between +1.25 and -0.50 DS. A series of OCT scans were collected, imaging the choroid along 4 radial scan lines centered on the fovea (each separated by 45°). Frame averaging was used to reduce noise and enhance chorio-scleral junction visibility. The transverse scale of each scan was corrected to account for magnification effects associated with axial length. Two independent masked observers manually segmented the OCT images to determine ChT at foveal centre, and averaged across a series of perifoveal zones over the central 5 mm. Results The average subfoveal ChT was 330 ± 65 µm (range 189-538 µm), and was significantly influenced by age (p=0.04). The ChT of the 4 to 6 year old age group (312 ± 62 µm) was significantly thinner compared to the 7 to 9 year olds (337 ± 65 µm, p<0.05) and bordered on significance compared to the 10 to 12 year olds (341 ± 61 µm, p=0.08). ChT also exhibited significant variation across the posterior pole, being thicker in more central regions. The choroid was thinner nasally and inferiorly compared to temporally and superiorly. Multiple regression analysis revealed age, axial length and anterior chamber depth were significantly associated with subfoveal ChT (p<0.001). Conclusions ChT increases significantly from early childhood to adolescence. This appears to be a normal feature of childhood eye growth.
Resumo:
Claims that violence is gender-neutral are increasingly becoming “common sense” in Canada. Antifeminist groups assert that the high rates of woman abuse uncovered by major Canadian national surveys conducted in the early 1990s are greatly exaggerated and that women are as violent as men. The production of degendered rhetoric about “intimate partner violence” contributes to claims that women’s and men’s violence is symmetrical and mutual. This article critically evaluates common claims about Canadian women’s use of nonlethal force in heterosexual intimate relationships in the context of the political struggle over the hegemonic frame for violence and abuse. The extant Canadian research documenting significant sex differences in violence and abuse against adult intimate partners is reviewed.
Resumo:
A new cold formed structural section known as the hollow flange beam is currently under development in Australia. This section will have many applications, particularly in portal frame buildings. This paper discusses the lateral distortional buckling behaviour of the hollow flange beam.
Resumo:
Mentoring relationships during pre-service education are a significant relationship through which emerging teachers negotiate their teacher identity (Iancu-Haddad & Oplatka, 2009; Hudson, 2010). It is therefore important to understand how mentor teachers frame their expectations. This paper explores mentoring relationships established within a Queensland partnership program funded through the Federal Government’s Improving Teacher Quality National Partnership Agreement (DEEWR, 2011). Within the broader policy context, these mentoring relationships were seen as an important space for pre-service teachers to experience cultural induction into Education Queensland schooling, and be advocates for quality teaching (Willis, Bahr, Bannah, & Welch, 2012). Interview and survey data from 14 teacher mentors were analysed using a dialectic constant comparison approach (Dick 2007). Three significant themes were identified. Mentor teachers’ understanding of their roles positioned pre-service teachers as either novices or alternatively as colleagues, and these had implications for the opportunities for learning that were then made available to the pre-service teachers. The mentor teacher’s beliefs about teaching as a practical craft, and how the mentor teachers judged a pre-service teacher’s “enthusiasm” were also analysed. Understanding the factors that guide teacher mentor approaches may inform future designs of mentoring and preservice teacher preparation programs.
Resumo:
Recent developments in wearable ECG technology have seen renewed interest in the use of Heart Rate Variability (HRV) feedback for stress management. Yet, little is know about the efficacy of such interventions. Positive reappraisal is an emotion regulation strategy that involves changing the way a situation is construed to decrease emotional impact. We sought to test the effectiveness of an intervention that used feedback on HRV data to prompt positive reappraisal during a stressful work task. Participants (N=122) completed two 20-minute trials of an inbox activity. In-between the first and the second trial participants were assigned to the waitlist control condition, a positive reappraisal via psycho-education condition, or a positive reappraisal via HRV feedback condition. Results revealed that using HRV data to frame a positive reappraisal message is more effective than using psycho-education (or no intervention)–especially for increasing positive mood and reducing arousal.
Resumo:
IEEE 802.11p is the new standard for Inter-Vehicular Communications (IVC) using the 5.9 GHz frequency band, as part of the DSRC framework; it will enable applications based on Cooperative Systems. Simulation is widely used to estimate or verify the potential benefits of such cooperative applications, notably in terms of safety for the drivers. We have developed a performance model for 802.11p that can be used by simulations of cooperative applications (e.g. collision avoidance) without requiring intricate models of the whole IVC stack. Instead, it provide a a straightforward yet realistic modelisation of IVC performance. Our model uses data from extensive field trials to infer the correlation between speed, distance and performance metrics such as maximum range, latency and frame loss. Then, we improve this model to limit the number of profiles that have to be generated when there are more than a few couples of emitter-receptor in a given location. Our model generates realistic performance for rural or suburban environments among small groups of IVC-equipped vehicles and road side units.
Resumo:
We come together as editors to prepare an introduction to this international volume at a time of economic turbulence, new uncertainties about the future, and a growing demand on the part of most governments for further alignment of education with the economy. Literacy, in particular, is in the vanguard, for literacy only too frequently is positioned as a proxy for education. What are the purposes of literacy teaching and how is it to be achieved? What counts as literacy in ‘new times,’ in ‘participatory culture’ where people ‘believe their contributions matter, and feel some degree of social connection with one another’ (Abrams and Merchant, Chapter 23)? How can everyone be included as critical citizens of the world in whatever definition of literacy we endorse? What fresh perspectives, new ways of thinking, and good ideas for the understanding of literacy are out there? What are the possibilities for the future? An exploration of these kinds of questions and their answers, however tentative, provides us, we believe, with our best defense against the uncertainties of our age. In some respects this is our overall purpose in the volume, to explore our understanding and future possibilities by bringing together critical reviews of the major theories, methods, and pedagogical advances that have taken place in the past 20 years in the field of literacy research at the primary/elementary school level. Each chapter in the volume is newly written for the Handbook while overall the book is intended to be a distillation of key thinking and theory which offers new directions for research in literacy. It aims to revisit current interpretations, make novel connections, frame new possibilities, and encourage researchers to pursue innovative and compelling lines of inquiry...
Resumo:
Literacy is promoted as one factor in overcoming disadvantage. In this paper, we employ Fraser’s (1997 & 2008) framing of social justice in order to analyse the disparate agendas of literacy education for improved outcomes in national policy. We do this to better understand the dilemmas confronting preservice teachers as they prepare to become teachers in complex education contexts. We then examine what 20 preservice primary teachers say about social justice in interview responses to a scripted scenario. Our findings demonstrate that most preservice teachers are trying to demonstrate that they have a well-placed commitment to teaching for social justice, however, most of our respondents are yet to frame productive practices that might work in providing socially just education for the students they will teach. These outcomes raise possibilities for future iterations of preservice teacher courses at the case study site and beyond.
Resumo:
The nucleotide sequence of the genomic RNA of barley yellow dwarf virus, PAV serotype was determined except for the 5′-terminal base, and its genome organization deduced. The 5,677 nucleotide genome contains five large open reading frames (ORFs). The genes for the coat protein (1) and the putative viral RNA-dependent RNA polymerase were identified. The latter shows a striking degree of similarity to that of carnation mottle virus (CarMV). By comparison with corona- and retrovirus RNAs, it is proposed that a translational frameshift is involved in expression of the polymerase. An ORF encoding an Mr 49,797 protein (50K ORF) may be translated by in-frame readthrough of the coat protein stop codon. The coat protein, an overlapping 17K ORF, and a 3′ 6.7K ORF are likely to be expressed via subgenomic mRNAs. © 1988 IRL Press Limited.
Resumo:
The nucleotide sequences of several animal, plant and bacterial genomes are now known, but the functions of many of the proteins that they are predicted to encode remain unclear. RNA interference is a gene-silencing technology that is being used successfully to investigate gene function in several organisms - for example, Caenorhabditis elegans. We discuss here that RNA-induced gene silencing approaches are also likely to be effective for investigating plant gene function in a high-throughput, genome-wide manner.