889 resultados para Step count
Resumo:
Recent experiments [F. E. Pinkerton, M. S. Meyer, G. P. Meisner, M. P. Balogh, and J. J. Vajo, J. Phys. Chem. C 111, 12881 (2007) and J. J. Vajo and G. L. Olson, Scripta Mater. 56, 829 (2007)] demonstrated that the recycling of hydrogen in the coupled LiBH4/MgH2 system is fully reversible. The rehydrogenation of MgB2 is an important step toward the reversibility. By using ab initio density functional theory calculations, we found that the activation barrier for the dissociation of H2 are 0.49 and 0.58 eV for the B and Mg-terminated MgB2(0001) surface, respectively. This implies that the dissociation kinetics of H2 on a MgB2 (0001) surface should be greatly improved compared to that in pure Mg materials. Additionally, the diffusion of dissociated H atom on the Mg-terminated MgB2(0001) surface is almost barrier-less. Our results shed light on the experimentally-observed reversibility and improved kinetics for the coupled LiBH4/MgH2 system.
Resumo:
Purpose The neuromuscular mechanisms determining the mechanical behaviour of the knee during landing impact remain poorly understood. It was hypothesised that neuromuscular preparation is subject-specific and ranges along a continuum from passive to active. Methods A group of healthy men (N = 12) stepped-down from a knee-high platform for 60 consecutive trials. Surface EMG of the quadriceps and hamstrings was used to determine pre-impact onset timing, activation amplitude and cocontraction for each trial. Partial least squares regression was used to associate pre-impact preparation with post-impact knee stiffness and coordination. Results The group analysis revealed few significant changes in pre-impact preparation across trial blocks. Single-subject analyses revealed changes in muscle activity that varied in size and direction between individuals. Further, the association between pre-impact preparation and post-impact knee mechanics was subject-specific and ranged along a continuum of strategies. Conclusion The findings suggest that neuromuscular preparation during step landing is subject-specific and its association to post-impact knee mechanics occurs along a continuum, ranging from passive to active control strategies. Further work should examine the implications of these strategies on the distribution of knee forces in-vivo.
Resumo:
The count-min sketch is a useful data structure for recording and estimating the frequency of string occurrences, such as passwords, in sub-linear space with high accuracy. However, it cannot be used to draw conclusions on groups of strings that are similar, for example close in Hamming distance. This paper introduces a variant of the count-min sketch which allows for estimating counts within a specified Hamming distance of the queried string. This variant can be used to prevent users from choosing popular passwords, like the original sketch, but it also allows for a more efficient method of analysing password statistics.
Resumo:
eHealth systems promise enviable benefits and capabilities for healthcare delivery. However, the technologies that make these capabilities possible introduce undesirable drawbacks such as information security related threats, which need to be appropriately addressed. Lurking in these threats are information privacy concerns. Addressing them has proven to be difficult because they often conflict with information access requirements of healthcare providers. Therefore, it is important to achieve an appropriate balance between these requirements. We contend that information accountability (IA) can achieve this balance. In this paper, we introduce accountable-eHealth (AeH) systems, which are eHealth systems that utilise IA as a measure of information privacy. We discuss how AeH system protocols can successfully achieve the aforementioned balance of requirements. As a means of implementation feasibility, we compare characteristics of AeH systems with Australia’s Personally Controlled Electronic Health Record (PCEHR) sys-tem and identify similarities and highlight the differences and the impact those differences would have to the eHealth domain.
Resumo:
INFORMAS (International Network for Food and Obesity/non-communicable diseases Research, Monitoring and Action Support) aims to monitor and benchmark the healthiness of food environments globally. In order to assess the impact of food environments on population diets, it is necessary to monitor population diet quality between countries and over time. This paper reviews existing data sources suitable for monitoring population diet quality, and assesses their strengths and limitations. A step-wise framework is then proposed for monitoring population diet quality. Food balance sheets (FBaS), household budget and expenditure surveys (HBES) and food intake surveys are all suitable methods for assessing population diet quality. In the proposed ‘minimal’ approach, national trends of food and energy availability can be explored using FBaS. In the ‘expanded’ and ‘optimal’ approaches, the dietary share of ultra-processed products is measured as an indicator of energy-dense, nutrient-poor diets using HBES and food intake surveys, respectively. In addition, it is proposed that pre-defined diet quality indices are used to score diets, and some of those have been designed for application within all three monitoring approaches. However, in order to enhance the value of global efforts to monitor diet quality, data collection methods and diet quality indicators need further development work.
Resumo:
This paper describes the theory and practice for a stable haptic teleoperation of a flying vehicle. It extends passivity-based control framework for haptic teleoperation of aerial vehicles in the longest intercontinental setting that presents great challenges. The practicality of the control architecture has been shown in maneuvering and obstacle-avoidance tasks over the internet with the presence of significant time-varying delays and packet losses. Experimental results are presented for teleoperation of a slave quadrotor in Australia from a master station in the Netherlands. The results show that the remote operator is able to safely maneuver the flying vehicle through a structure using haptic feedback of the state of the slave and the perceived obstacles.
Resumo:
The need for native Information Systems (IS) theories has been discussed by several prominent scholars. Contributing to their conjectural discussion, this research moves towards theorizing IS success as a native theory for the discipline. Despite being one of the most cited scholarly works to-date, IS success of DeLone and McLean (1992) has been criticized by some for lacking focus on the theoretical approach. Following theory development frameworks, this study improves the theoretical standing of IS success by minimizing interaction and inconsistency. The empirical investigation of theorizing IS success includes 1396 respondents, gathered through six surveys and a case study. The respondents represent 70 organisations, multiple Information Systems, and both private and public sector organizations.
Resumo:
Australia's economic growth and national identity have been widely celebrated as being founded on the nation's natural resources. With the golden era of pastoralism fading into the distance, a renewed love affair with primary industries has been much lauded, particularly by purveyors of neoliberal ideology. The considerable wealth generated by resource extraction has, despite its environmental and social record, proved seductive to the university sector. The mining industry is one of a number of industries and sectors (alongside pharmaceutical, chemical and biotechnological) that is increasingly courting Australian universities. These new public-private alliances are often viewed as the much-needed cash cow to bridge the public funding shortfall in the tertiary sector. However, this trend also raises profound questions about the capacity of public good institutions, as universities were once assumed to be, to maintain institutional independence and academic freedoms.
Resumo:
The complete structural elucidation of complex lipids, including glycerophospholipids, using only mass spectrometry represents a major challenge to contemporary analytical technologies. Here, we demonstrate that product ions arising from the collision-induced dissociation (CID) of the [M + Na] + adduct ions of phospholipids can be isolated and subjected to subsequent gas-phase ozonolysis-known as ozone-induced dissociation (OzID)-in a linear ion-trap mass spectrometer. The resulting CID/OzID experiment yields abundant product ions that are characteristic of the acyl substitution on the glycerol backbone (i.e., sn-position). This approach is shown to differentiate sn-positional isomers, such as the regioisomeric phosphatidylcholine pair of PC 16:0/18:1 and PC 18:1/16:0. Importantly, CID/OzID provides a sensitive diagnostic for the existence of an isomeric mixture in a given sample. This is of very high value for the analysis of tissue extracts since CID/OzID analyses can reveal changes in the relative abundance of isomeric constituents even within different tissues from the same animal. Finally, we demonstrate the ability to assign carbon-carbon double bond positions to individual acyl chains at specific backbone positions by adding subsequent CID and/or OzID steps to the workflow and that this can be achieved in a single step using a hybrid triple quadrupole-linear ion trap mass spectrometer. This unique approach represents the most complete and specific structural analysis of lipids by mass spectrometry demonstrated to date and is a significant step towards comprehensive top-down lipidomics. This journal is © The Royal Society of Chemistry 2014. Grant Number ARC/DP0986628, ARC/FT110100249, ARC/LP110200648
Resumo:
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.
Resumo:
Multimedia communication capabilities are rapidly expanding, and visual information is easily shared electronically, yet funding bodies still rely on paper grant proposal submissions. Incorporating modern technologies will streamline the granting process by increasing the fidelity of grant communication, improving the efficiency of review, and reducing the cost of the process.
Resumo:
We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on human identification protocols. The attack is an application of Coppersmith’s baby-step giant-step algorithm on human identification protcols. Under this attack, the achievable security of some of the best candidates for human identification protocols in the literature is further reduced. We show that our protocol preserves similar usability while achieves better security than these protocols. A comprehensive security analysis is provided which suggests parameters guaranteeing desired levels of security.
Resumo:
Titanium oxide films with trilayer structure grown on fluorine doped tin oxide substrate were prepared from one-step hydrothermal process. The trilayer structure consists of microflowers, nanorod array and compact nanoparticulates, which is expected to possess the merits of good light harvesting, a high electron transport rate, while avoiding the issues of electron shunting. The photovoltaic performance was comprehensively studied and a 60% enhancement in short circuit photocurrent density was found from microflowers contribution as a light scattering layer. This unique trilayer structure exhibits great potential application in future dye-sensitized solar cells.
Resumo:
Background Accelerometers have become one of the most common methods of measuring physical activity (PA). Thus, validity of accelerometer data reduction approaches remains an important research area. Yet, few studies directly compare data reduction approaches and other PA measures in free-living samples. Objective To compare PA estimates provided by 3 accelerometer data reduction approaches, steps, and 2 self-reported estimates: Crouter's 2-regression model, Crouter's refined 2-regression model, the weighted cut-point method adopted in the National Health and Nutrition Examination Survey (NHANES; 2003-2004 and 2005-2006 cycles), steps, IPAQ, and 7-day PA recall. Methods A worksite sample (N = 87) completed online-surveys and wore ActiGraph GT1M accelerometers and pedometers (SW-200) during waking hours for 7 consecutive days. Daily time spent in sedentary, light, moderate, and vigorous intensity activity and percentage of participants meeting PA recommendations were calculated and compared. Results Crouter's 2-regression (161.8 +/- 52.3 minutes/day) and refined 2-regression (137.6 +/- 40.3 minutes/day) models provided significantly higher estimates of moderate and vigorous PA and proportions of those meeting PA recommendations (91% and 92%, respectively) as compared with the NHANES weighted cut-point method (39.5 +/- 20.2 minutes/day, 18%). Differences between other measures were also significant. Conclusions When comparing 3 accelerometer cut-point methods, steps, and self-report measures, estimates of PA participation vary substantially.