977 resultados para Active Pixel Sensor
Resumo:
The aim of this study was to examine older adults’ understanding and interpretation of a validated questionnaire for physical activity surveillance, the Active Australia Survey (AAS). To address this aim, cognitive interviewing techniques were used during face-to-face semi-structured interviews with 44 adults aged 65-89 years. Qualitative data analysis revealed that participants were confused with questionnaire phrasing, misunderstood the scope of activities to include in answers, and misunderstood the time frame of activities to report. They also struggled to accurately estimate the frequency and duration of their activities. Our findings suggest that AAS questions may be interpreted differently by older adults than intended by survey developers. Findings also suggest that older adults use a range of methods for calculating PA frequency and duration. The issues revealed in this study may be useful for adapting AAS for use in older community-dwelling adults.
Resumo:
In this paper, we report some initial findings from our investigations into the Australian Government’s Longitudinal Study of Australian Children dataset. It is revealed that the majority of Australian children are exceeding the government’s Screen Time recommendations and that most of their screen time is spent as TV viewing, as opposed to video game play or computer use. In light of this finding,we review the body of research surrounding children’s engagement in Screen Time activities and the associated positive and negative effects. Based on existing evidence,we define two categories of Screen Time—Active Screen Time and Passive Screen Time. It is proposed that this distinction provides a more accurate classification of Screen Time and a more informative lens through which to consider the associated benefits and detrimental effects for young children.
Resumo:
Evaluating physical activity is important for public health population research and evaluating lifestyle interventions among targeted groups. Self-reported questionnaires are frequently used to evaluate physical activity in a variety of contexts where resource or pragmatic limitations prohibit the use of more sophisticated approaches. However, prior research in the use of other patient reported outcomes in healthcare settings has highlighted that simply completing a questionnaire may change a patients’ behaviour or responses to subsequent questions. This methodology study aimed to examine whether completing a standard physical activity questionnaire altered patients responses to two related questions a) whether they are ‘sufficiently physically active’ and b) whether they desire ‘to be more physically active.’
Resumo:
Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
The concept of older adults contributing to society in a meaningful way has been termed ‘active ageing’. Active ageing reflects changes in prevailing theories of social and psychological aspects of ageing, with a focus on individuals' strengths as opposed to their deficits or pathology. In order to explore predictors of active ageing, the Australian Active Ageing (Triple A) project group undertook a national postal survey of participants over the age of 50 years recruited randomly through their 2004 membership of a large Australia-wide senior's organisation. The survey comprised 178 items covering paid and voluntary work, learning, social, spiritual, emotional, health and home, life events and demographic items. A 45% response rate (2655 returned surveys) reflected an expected balance of gender, age and geographic representation of participants. The data were analysed using data mining techniques to represent generalizations on individual situations. Data mining identifies the valid, novel, potentially useful and understandable patterns and trends in data. The results based on the clustering mining technique indicate that physical and emotional health combined with the desire to learn were the most significant factors when considering active ageing. The findings suggest that remaining active in later life is not only directly related to the maintenance of emotional and physical health, but may be significantly intertwined with the opportunity to engage in on-going learning activities that are relevant to the individual. The findings of this study suggest that practitioners and policy makers need to incorporate older peoples' learning needs within service and policy framework developments.
Resumo:
Reliable communications is one of the major concerns in wireless sensor networks (WSNs). Multipath routing is an effective way to improve communication reliability in WSNs. However, most of existing multipath routing protocols for sensor networks are reactive and require dynamic route discovery. If there are many sensor nodes from a source to a destination, the route discovery process will create a long end-to-end transmission delay, which causes difficulties in some time-critical applications. To overcome this difficulty, the efficient route update and maintenance processes are proposed in this paper. It aims to limit the amount of routing overhead with two-tier routing architecture and introduce the combination of piggyback and trigger update to replace the periodic update process, which is the main source of unnecessary routing overhead. Simulations are carried out to demonstrate the effectiveness of the proposed processes in improvement of total amount of routing overhead over existing popular routing protocols.
Resumo:
This chapter presents a comparative survey of recent key management (key distribution, discovery, establishment and update) solutions for wireless sensor networks. We consider both distributed and hierarchical sensor network architectures where unicast, multicast and broadcast types of communication take place. Probabilistic, deterministic and hybrid key management solutions are presented, and we determine a set of metrics to quantify their security properties and resource usage such as processing, storage and communication overheads. We provide a taxonomy of solutions, and identify trade-offs in these schemes to conclude that there is no one-size-fits-all solution.
Resumo:
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pairwise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighboring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools.
Resumo:
Our everyday environment is full of text but this rich source of information remains largely inaccessible to mobile robots. In this paper we describe an active text spotting system that uses a small number of wide angle views to locate putative text in the environment and then foveates and zooms onto that text in order to improve the reliability of text recognition. We present extensive experimental results obtained with a pan/tilt/zoom camera and a ROS-based mobile robot operating in an indoor environment.
Resumo:
This paper presents a novel power control strategy that decouples the active and reactive power for a synchronous generator connected to a power network. The proposed control paradigm considers the capacitance of the transmission line along with its resistance and reactance as-well. Moreover the proposed controller takes into account all cases of R-X relationships, thus allowing it to function in Virtual Power Plant (VPP) structures which operate at both medium voltage (MV) and low voltage (LV) levels. The independent control of active and reactive power is achieved through rotational transformations of the terminal voltages and currents at the synchronous generator's output. This paper details the control technique by first presenting the mathematical and electrical network analysis of the methodology and then successfully implementing the control using MATLAB-SIMULINK simulation.
Resumo:
Secure communications between large number of sensor nodes that are randomly scattered over a hostile territory, necessitate efficient key distribution schemes. However, due to limited resources at sensor nodes such schemes cannot be based on post deployment computations. Instead, pairwise (symmetric) keys are required to be pre-distributed by assigning a list of keys, (a.k.a. key-chain), to each sensor node. If a pair of nodes does not have a common key after deployment then they must find a key-path with secured links. The objective is to minimize the keychain size while (i) maximizing pairwise key sharing probability and resilience, and (ii) minimizing average key-path length. This paper presents a deterministic key distribution scheme based on Expander Graphs. It shows how to map the parameters (e.g., degree, expansion, and diameter) of a Ramanujan Expander Graph to the desired properties of a key distribution scheme for a physical network topology.
Resumo:
Current state of the art robot mapping and navigation systems produce impressive performance under a narrow range of robot platform, sensor and environmental conditions, in contrast to animals such as rats that produce “good enough” maps that enable them to function under an incredible range of situations. In this paper we present a rat-inspired featureless sensor-fusion system that assesses the usefulness of multiple sensor modalities based on their utility and coherence for place recognition during a navigation task, without knowledge as to the type of sensor. We demonstrate the system on a Pioneer robot in indoor and outdoor environments with abrupt lighting changes. Through dynamic weighting of the sensors, the system is able to perform correct place recognition and mapping where the static sensor weighting approach fails.
High-sensitivity fiber Bragg grating temperature sensor at high temperature [一种高温下高灵敏光纤光栅温度传感器的制作方法]
Resumo:
A method of making full use of the durable strain which fiber Bragg grating (FBG) can undertake is presented, which hugely improves the sensitivities of FBG temperature sensors at high temperature. When a sensor is manufactured at room temperature, its FBG should be given a pre-relaxing length according to the temperature it is asked to measure; once the temperature rise to the asked one, its FBG starts to be stretched and it starts to work with high sensitivity. The relationship between the pre-relaxing length and the working temperature is analyzed. In experiments, when the pre-relaxing lengths are 0.2mm、0.5mm、0.6mm, the working temperatures rise 25℃、50℃、61℃, respectively, and the sensitivities are almost the same (675pm/℃). The facts that the experimental results agree well with the theoretical analyses verify this method’s validity.
Resumo:
As a novel sensing element, fiber Bragg grating (FBG) is sensitive to both temperature and strain. Basing on this character, high sensitivity FBG temperature sensor can be made. However, as a result of the strain limit of the fiber, the temperature range it can endure is quite narrow. This drawback limits its application and complicates its storage and transport. We design and manufacture a FBG temperature sensor with tunable sensitivity. By tuning its sensitivity, its temperature range is changed, which enlarges its application field, solves the problem of storage and transport, and brighten the future of FBG in temperature measurement. In experiment, by changing the fixing position of the bimetal we tuned the sensitivity of the high sensitivity FBG sensor to different values (-47 pm/℃,-97.7 pm/℃,-153.3 pm/℃).
Resumo:
Basing on the character that Fiber Bragg Grating (FBG) is sensitive to both temperature and strain, by using Al and Fe-Ni alloy’s bimetal structure, we successfully design and manufacture a high accuracy FBG temperature sensor for earthquake premonition. Furthermore, we analyze the accuracy of the FBG sensors with enhanced sensitivity for the first time, and get its accuracy is up to ±0.05℃ with highest resolution ever in all FBG temperature sensors (0.0014℃/pm). This work experimentally proves the feasibility of using FBG in the earthquake premonition monitoring, and builds the foundation for the application of optic technology in earthquake premonition monitoring.