265 resultados para Target Activities
Resumo:
A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.
Resumo:
Aim To identify relationships between preventive activities, psychosocial factors and leg ulcer recurrence in patients with chronic venous leg ulcers. Background Chronic venous leg ulcers are slow to heal and frequently recur, resulting in years of suffering and intensive use of health care resources. Methods A prospective longitudinal study was undertaken with a sample of 80 patients with a venous leg ulcer recruited when their ulcer healed. Data were collected from 2006–2009 from medical records on demographics, medical history and ulcer history; and from self-report questionnaires on physical activity, nutrition, preventive activities and psychosocial measures. Follow-up data were collected via questionnaires every three months for 12 months after healing. Median time to recurrence was calculated using the Kaplan-Meier method. A Cox proportional-hazards regression model was used to adjust for potential confounders and determine effects of preventive strategies and psychosocial factors on recurrence. Results: There were 35 recurrences in a sample of 80 participants. Median time to recurrence was 27 weeks. After adjustment for potential confounders, a Cox proportional hazards regression model found that at least an hour/day of leg elevation, six or more days/week in Class 2 (20–25mmHg) or 3 (30–40mmHg) compression hosiery, higher social support scale scores and higher General Self-Efficacy scores remained significantly associated (p<0.05) with a lower risk of recurrence, while male gender and a history of DVT remained significant risk factors for recurrence. Conclusion Results indicate that leg elevation, compression hosiery, high levels of self-efficacy and strong social support will help prevent recurrence.
Resumo:
This paper presents an automated image‐based safety assessment method for earthmoving and surface mining activities. The literature review revealed the possible causes of accidents on earthmoving operations, investigated the spatial risk factors of these types of accident, and identified spatial data needs for automated safety assessment based on current safety regulations. Image‐based data collection devices and algorithms for safety assessment were then evaluated. Analysis methods and rules for monitoring safety violations were also discussed. The experimental results showed that the safety assessment method collected spatial data using stereo vision cameras, applied object identification and tracking algorithms, and finally utilized identified and tracked object information for safety decision making.
Resumo:
This article is a study of the arts in early childhood as a way of learning, for both children and their teachers. The author suggests that drawing can be a powerful tool for collaborative approaches to pedagogy. When teachers draw with children, pathways of communication can be opened, and the collaborative exercise can trigger processes of transformation for both adult and child. In order to present challenges to more traditional, hands-off pedagogical practices in arts education, this article is an account of reflexive arts pedagogies, and how they can work to improve communication and understandings between adults and children. Within the educational contexts of Australian preschooling and primary schooling, the author examines the process of collaborative drawing, and how this can enable a process of transformation. Her analysis, and the accompanying examples of reflexive practices, combine complementary lenses, socio-cultural and postmodern, that she sees as working in harmony to produce new possibilities, in arts education in particular, and, more broadly, in early childhood education.
Resumo:
Explanations of the role of analogies in learning science at a cognitive level are made in terms of creating bridges between new information and students’ prior knowledge. In this empirical study of learning with analogies in an 11th grade chemistry class, we explore an alternative explanation at the "social" level where analogy shapes classroom discourse. Students in the study developed analogies within small groups and with their teacher. These classroom interactions were monitored to identify changes in discourse that took place through these activities. Beginning from socio-cultural perspectives and hybridity, we investigated classroom discourse during analogical activities. From our analyses, we theorized a merged discourse that explains how the analog discourse becomes intertwined with the target discourse generating a transitional state where meanings, signs, symbols, and practices are in flux. Three categories were developed that capture how students intertwined the analog and target discourses—merged words, merged utterances/sentences, and merged practices.
Resumo:
The purpose of this preliminary study was to determine the relevance of the categorization of the load regime data to assess the functional output and usage of the prosthesis of lower limb amputees. The objectives were a) to introduce a categorization of load regime, b) to present some descriptors of each activity, and c) to report the results for a case. The load applied on the osseointegrated fixation of one transfemoral amputee was recorded using a portable kinetic system for 5 hours. The periods of directional locomotion, localized locomotion, and stationary loading occurred 44%, 34%, and 22% of recording time and each accounted for 51%, 38%, and 12% of the duration of the periods of activity, respectively. The absolute maximum force during directional locomotion, localized locomotion, and stationary loading was 19%, 15%, and 8% of the body weight on the anteroposterior axis, 20%, 19%, and 12% on the mediolateral axis, and 121%, 106%, and 99% on the long axis. A total of 2,783 gait cycles were recorded. Approximately 10% more gait cycles and 50% more of the total impulse than conventional analyses were identified. The proposed categorization and apparatus have the potential to complement conventional instruments, particularly for difficult cases.
Resumo:
We present a technique for estimating the 6DOF pose of a PTZ camera by tracking a single moving target in the image with known 3D position. This is useful in situations where it is not practical to measure the camera pose directly. Our application domain is estimating the pose of a PTZ camerso so that it can be used for automated GPS-based tracking and filming of UAV flight trials. We present results which show the technique is able to localize a PTZ after a short vision-tracked flight, and that the estimated pose is sufficiently accurate for the PTZ to then actively track a UAV based on GPS position data.