718 resultados para Dynamic primary user


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work is motivated by the desire to covertly track mobile targets, either animal or human, in previously unmapped outdoor natural environments using off-road robotic platforms with a non-negligible acoustic signature. The use of robots for stealthy surveillance is not new. Many studies exist but only consider the navigation problem to maintain visual covertness. However, robotic systems also have a significant acoustic footprint from the onboard sensors, motors, computers and cooling systems, and also from the wheels interacting with the terrain during motion. All these can jepordise any visual covertness. In this work, we experimentally explore the concepts of opportunistically utilizing naturally occurring sounds within outdoor environments to mask the motion of a robot, and being visually covert whilst maintaining constant observation of the target. Our experiments in a constrained outdoor built environment demonstrate the effectiveness of the concept by showing a reduced acoustic signature as perceived by a mobile target allowing the robot to covertly navigate to opportunistic vantage points for observation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes a texture recognition based method for segmenting kelp from images collected in highly dynamic shallow water environments by an Autonomous Underwater Vehicle (AUV). A particular challenge is image quality that is affected by uncontrolled lighting, reduced visibility, significantly varying perspective due to platform egomotion, and kelp sway from wave action. The kelp segmentation approach uses the Mahalanobis distance as a way to classify Haralick texture features from sub-regions within an image. The results illustrate the applicability of the method to classify kelp allowing construction of probability maps of kelp masses across a sequence of images.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Childhood autism falls under the guise of autism spectrum disorders and is generally found in children over two years of age. There are of course variations in severity and clinical manifestations, however the most common features being disinterest in social interaction and engagement in ritualistic and repetitive behaviours. In Singapore the incidence of autism is on the rise as parents are becoming more aware of the early signs of autism and seek healthcare programmes to ensure the quality of life for their child is optimised. Two such programmes, Applied Behaiour Analysis and Floortime approach have proven successful in alleviating some of the behavioural and social skills problems associated with autism. Using positive behaviour reinforcement both Applied Behaviour Analysis and Floortime approach reward behaviour associated with positive social responses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Health care in the community setting is one of the more challenging contexts for evidence-based practice. Community-based care comprises more than simply transplanting hospital care into people’s homes; in addition to the provision of supportive services, it also takes a range of approaches to health care practice that promotes optimal health and builds the capacity of individuals and communities to respond to their health needs. Primary health care is comprised of the diverse activities that build sustainable community capacity to achieve health and well-being throughout all of life’s stages. The expansive nature of primary health care means that a map for practice is not feasible; however a framework which can be adapted to suit the variety of situations and practice settings can be identified. The focus of this chapter is to broadly define and explore the principles of primary health care and consider the contexts of primary health care in relation to evidence-based practice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Scenario 1 A buys a two storey commercial building built along the only street frontage to the property. Vehicles cannot reach the rear of the property as the building extends across the entire width of the land. A bought the building with full knowledge that vehicular access to the rest of the property had been compromised by a desire to obtain maximum street frontage for the building which was occupied by a commercial tenant. On street parking is scarce in the surrounding area. A (to the knowledge of the adjoining owner B) constructs a carpark at the rear of the building. The employees of A’s tenant have been using the carpark obtaining access via a driveway on B’s land. To formalise this arrangement, A seeks a right of way for vehicles to travel down B’s driveway to access the carpark...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rail steel bridges are vulnerable to high impact forces due to the passage of trains; unfortunately the determination of these transient impact forces is not straightforward as these are affected by a large number of parameters, including the wagon design, the wheel-rail contact and the design parameters of the bridge deck and track, as well as the operational parameters – wheel load and speed. To determine these impact forces, a detailed rail train-track/bridge dynamic interaction model has been developed, which includes a comprehensive train model using multi-body dynamics approach and a flexible track/bridge model using Euler– Bernoulli beam theory. Single and multi-span bridges have been modelled to examine their dynamic characteristics. From the single span bridge, the train critical speed is determined; the minimum distance of two peak loadings is found to affect the train critical speed. The impact factor and the dynamic characteristics are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a new kind of asymmetric mutual authentication from passwords with stronger privacy against malicious servers, lest they be tempted to engage in “cross-site user impersonation” to each other. It enables a person to authenticate (with) arbitrarily many independent servers, over adversarial channels, using a memorable and reusable single short password. Beside the usual PAKE security guarantees, our framework goes to lengths to secure the password against brute-force cracking from privileged server information.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mitchell critiques Georges Perec's Life a User's Manual, which articulates compellingly the confluence of literature and architecture studies that emerged in the late twentieth century. He argues the Perec's novel diverges from this tradition, for, rather than being a search for origins and true expression, Life a User's Manual denies the very possibility of originality. He adds that Perec's architext is de-constructive and ironic.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes the design and implementation of a wireless neural telemetry system that enables new experimental paradigms, such as neural recordings during rodent navigation in large outdoor environments. RoSco, short for Rodent Scope, is a small lightweight user-configurable module suitable for digital wireless recording from freely behaving small animals. Due to the digital transmission technology, RoSco has advantages over most other wireless modules of noise immunity and online user-configurable settings. RoSco digitally transmits entire neural waveforms for 14 of 16 channels at 20 kHz with 8-bit encoding which are streamed to the PC as standard USB audio packets. Up to 31 RoSco wireless modules can coexist in the same environment on non-overlapping independent channels. The design has spatial diversity reception via two antennas, which makes wireless communication resilient to fading and obstacles. In comparison with most existing wireless systems, this system has online user-selectable independent gain control of each channel in 8 factors from 500 to 32,000 times, two selectable ground references from a subset of channels, selectable channel grounding to disable noisy electrodes, and selectable bandwidth suitable for action potentials (300 Hz–3 kHz) and low frequency field potentials (4 Hz–3 kHz). Indoor and outdoor recordings taken from freely behaving rodents are shown to be comparable to a commercial wired system in sorting for neural populations. The module has low input referred noise, battery life of 1.5 hours and transmission losses of 0.1% up to a range of 10 m.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the Journal of Media Innovations comes into existence, this article reflects on the first and most obvious question: just what do we mean by “media innovations”? Drawing on the examples of a range of recent innovations in media technologies and practices, initiated by a variety of media audiences, users, professionals, and providers, it explores the interplay between the different drivers of innovation and the effects of such innovation on the complex frameworks of contemporary society and the media ecology which supports it. In doing so, this article makes a number of key observations: first, it notes that media innovation is an innovation in media practices at least as much as in media technologies, and that changes to the practices of media both reflect and promote societal changes as well – media innovations are never just media technology innovations. Second, it shows that the continuing mediatisation of society, and the shift towards a more widespread participation of ordinary users as active content creators and media innovators, make it all the more important to investigate in detail these interlinked, incremental, everyday processes of media and societal change – media innovations are almost always also user innovations. Finally, it suggests that a full understanding of these processes as they unfold across diverse interleaved media spaces and complex societal structures necessarily requires a holistic perspective on media innovations, which considers the contemporary media ecology as a crucial constitutive element of societal structures and seeks to trace the repercussions of innovations across both media and society – media innovations are inextricably interlinked with societal innovations (even if, at times, they may not be considered to be improvements to the status quo).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter describes the challenges of integrating new technologies with literacy education in pre-service primary teacher education in Australia. The authors describe the policy context and regulatory mechanisms controlling pre-service education, including a national set of professional standards for graduate teachers, a new national curriculum for school students, the introduction of high stakes national assessment for school students, and the looming threat of decontextualized back-to-the-basics professional entry tests for aspiring teachers. The chapter includes three case studies of the authors’ pedagogical practices that attempt to reframe conceptions of the literacy capabilities of pre-service teachers to reflect the complex and sophisticated requirements of teachers in contemporary schooling. The authors conclude the chapter with a discussion of the implications of these case studies as they illustrate the ways that pre-service teachers can be scaffolded and supported to develop creative capacity and critical awareness of the kinds of literacies required in the digital age despite restrictive regimes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we address the control design problem of positioning of over-actuated marine vehicles with control allocation. The proposed design is based on a combined position and velocity loops in a multi-variable anti-windup implementation together with a control allocation mapping. The vehicle modelling is considered with appropriate simplifications related to low-speed manoeuvring hydrodynamics and vehicle symmetry. The control design is considered together with a control allocation mapping. We derive analytical tuning rules based on requirements of closed-loop stability and performance. The anti- windup implementation of the controller is obtained by mapping the actuator-force constraint set into a constraint set for the generalized forces. This approach ensures that actuation capacity is not violated by constraining the generalized control forces; thus, the control allocation is simplified since it can be formulated as an unconstrained problem. The mapping can also be modified on-line based on actuator availability to provide actuator-failure accommodation. We provide a proof of the closed-loop stability and illustrate the performance using simulation scenarios for an open-frame underwater vehicle.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Affordance is an important concept in HCI. There are various interpretations of affordances but it has been difficult to use this concept for design purposes. Often the treatment of affordances in the current HCI literature has been as a one-to-one relationship between a user and an artefact. According to our views, affordance is a dynamic, always emerging relationship between a human and his environment. We believe that the social and cultural contexts within which an artefact is situated affect the way in which the artefact is used. Using a Structuration Theory approach, we argue that affordances need also be treated at a much broader level, encompassing social and cultural aspects. We suggest that affordances should be seen at three levels: single user, organizational (or work group) and societal. Focusing on the organizational level affordances, we provide details of several important factors that affect the emergence of affordances.