900 resultados para static nodes
Resumo:
A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.
Resumo:
The performing arts have traditionally made limited use of and showed limited acceptance of computing technology. There are cognitive, physical, environmental, and social influences on the use of computers in performing arts. This paper will examine those influences on the practice of computers in the performing arts and their implications for education in those areas. These implications for the learning environment include infrastructure, interface design, industrial design, and software functionality. Although many of the issues raised in this paper are common to all visual and performing arts, there are significant differences between them which require abstraction of the concepts presented in this paper beyond the more practical focus intended. In particular there are differences in the ways humans are involved in the presentation of a work, and the transitory verses static nature of time in art products.
Resumo:
The creative work of this study is a novel-length work of literary fiction called Keeping House (published as Grace's Table, by University of Queensland Press, April 2014). Grace has not had twelve people at her table for a long time. Hers isn't the kind of family who share regular Sunday meals. As Grace prepares the feast, she reflects on her life, her marriage and her friendships. When the three generations of her family come together, simmering tensions from the past threaten to boil over. The one thing that no one can talk about is the one thing that no one can forget. Grace's Table is a moving and often funny novel using food as a language to explore the power of memory and the family rituals that define us. The exegetical component of this study does not adhere to traditional research pedagogies. Instead, it follows the model of what the literature describes as fictocriticism. It is the intention that the exegesis be read as a hybrid genre; one that combines creative practice and theory and blurs the boundaries between philosophy and fiction. In offering itself as an alternative to the exegetical canon it provides a model for the multiplicity of knowledge production suited to the discipline of practice-led research. The exegesis mirrors structural elements of the creative work by inviting twelve guests into the domestic space of the novel to share a meal. The guests, chosen for their diverse thinking, enable examination of the various agents of power involved in the delivery of food. Their ideas cross genders, ages and time periods; their motivations and opinions often collide. Some are more concerned with the spatial politics of where food is consumed, others with its actual preparation and consumption. Each, however, provides a series of creative reflective conversations throughout the meal which help to answer the research question: How can disempowered women take authority within their domestic space? Michel de Certeau must defend his "operational tactics" or "art of the weak" 1 as a means by which women can subvert the colonisation of their domestic space against Michel Foucault's ideas about the functions of a "disciplinary apparatus". 2 Erving Goffman argues that the success of de Certeau's "tactics" depends upon his theories of "performance" and "masquerade" 3; a claim de Certeau refutes. Doreen Massey and the author combine forces in arguing for space, time and politics to be seen as interconnected, non-static and often contested. The author calls for identity, or sense of self, to be considered a further dimension which impacts on the function of spatial models. Yu-Fi Tuan speaks of the intimacy of kitchens; Gaston Bachelard the power of daydreams; and Jean Anthelme Brillat-Savarin gives the reader a taste of the nourishing arts. Roland Barthes forces the author to reconsider her function as a writer and her understanding of the reader's relationship with a text. Fictional characters from two texts have a place at the table – Marian from The Edible Woman by Margaret Atwood 4 and Lilian from Lilian's Story by Kate Grenville. 5 Each explores how they successfully subverted expectations of their gender. The author interprets and applies elements of the conversations to support Grace's tactics in the novel as well as those related to her own creative research practice. Grace serves her guests, reflecting on what is said and how it relates to her story. Over coffee, the two come together to examine what each has learned.
Resumo:
Background and Purpose Although plantar fascial thickening is a sonographic criterion for the diagnosis of plantar fasciitis, the effect of local loading and structural factors on fascial morphology are unknown. The purposes of this study were to compare sonographic measures of fascial thickness and radiographic measures of arch shape and regional loading of the foot during gait in individuals with and without unilateral plantar fasciitis and to investigate potential relationships between these loading and structural factors and the morphology of the plantar fascia in individuals with and without heel pain. Subjects The participants were 10 subjects with unilateral plantar fasciitis and 10 matched asymptomatic controls. Methods Heel pain on weight bearing was measured by a visual analog scale. Fascial thickness and static arch angle were determined from bilateral sagittal sonograms and weight-bearing lateral foot roentgenograms. Regional plantar loading was estimated from a pressure plate. Results On average, the plantar fascia of the symptomatic limb was thicker than the plantar fascia of the asymptomatic limb (6.1±1.4 mm versus 4.2±0.5 mm), which, in turn, was thicker than the fascia of the matched control limbs (3.4±0.5 mm and 3.5±0.6 mm). Pain was correlated with fascial thickness, arch angle, and midfoot loading in the symptomatic foot. Fascial thickness, in turn, was positively correlated with arch angle in symptomatic and asymptomatic feet and with peak regional loading of the midfoot in the symptomatic limb. Discussion and Conclusion The findings indicate that fascial thickness and pain in plantar fasciitis are associated with the regional loading and static shape of the arch.
Resumo:
An inverse association exists between some bacterial infections and the prevalence of asthma. We investigated whether Streptococcus pneumoniae infection protects against asthma using mouse models of ovalbumin (OVA)-induced allergic airway disease (AAD). Mice were intratracheally infected or treated with killed S. pneumoniae before, during or after OVA sensitisation and subsequent challenge. The effects of S. pneumoniae on AAD were assessed. Infection or treatment with killed S. pneumoniae suppressed hallmark features of AAD, including antigen-specific T-helper cell (Th) type 2 cytokine and antibody responses, peripheral and pulmonary eosinophil accumulation, goblet cell hyperplasia, and airway hyperresponsiveness. The effect of infection on the development of specific features of AAD depended on the timing of infection relative to allergic sensitisation and challenge. Infection induced significant increases in regulatory T-cell (Treg) numbers in lymph nodes, which correlated with the degree of suppression of AAD. Tregs reduced T-cell proliferation and Th2 cytokine release. The suppressive effects of infection were reversed by anti-CD25 treatment. Respiratory infection or treatment with S. pneumoniae attenuates allergic immune responses and suppresses AAD. These effects may be mediated by S. pneumoniae-induced Tregs. This identifies the potential for the development of therapeutic agents for asthma from S. pneumoniae.
Resumo:
Despite the challenges that giftedness can add to self-formation during early adolescence, gifted young adolescents seldom are asked about their lives outside of counselling and educational contexts. The study considers the complexities that face gifted young adolescents in the process of self-discovery and self-representation, thereby building a case for seeking their own viewpoints. A guiding assumption for the study was that gifted young adolescents may respond positively to the opportunity to share their own perspectives and their own versions of “who they are”. The theoretical underpinnings for this study drew from Dialogical Self Theory. The study resides within an interactive view of self as a dynamic construction rather than a static state, where “who we are” is formed in everyday exchanges with self and others. Self-making as a process among gifted young adolescents is presented as an interactive network of “I” voices interpreted to reflect internal and external dialogue. In this way, self is understood within dialogical concepts of voices as multiple expressions. The study invited twelve gifted young adolescents to write freely about themselves over a six month period in an email journal project. Participants were recruited online and by word-of-mouth and they were able to negotiate their own levels of involvement. Access to the lives of individual young adolescents was sought in an out-of-school setting using narrative methods of personal writing in the form of journals sent as emails to the researcher. The role of the researcher was to act as a supportive listener who responded to participant-led emails and thereby facilitated the process of authoring that occurred across the data-gathering phase. The listening process involved responses that were affirming and designed to build trust. Data in the form of email texts were analysed using a close listening method that uncovered patterns of voices that were explicitly or subtly expressed by participants. The interpretation of voices highlighted the tensions and contradictions involved in the process of participants forming a “self” that emerged as multiple “I” voices. There were three key findings of the study. First, the gifted young adolescent participants each constructed a self around four key voices of Author, Achiever, Resistor/Co-operator and Self-Innovator. These voices were dialogical selfconstructions that showed multiplicity as a normal way of being. Second, the selfmaking processes of the gifted young adolescent participants were guided by a hierarchy of voices that were directed through self-awareness. Third, authoring in association with a responsive adult listener emerged as a dialogic space for promoting self-awareness and a language of self-expression among gifted young adolescents. The findings of the study contribute to knowledge about gifted young adolescents by presenting their own versions of “who” they are, perspectives that might differ from mainstream perceptions. Participants were shown to have highly diverse, complex and individual expressions that have implications for how well they are understood and supported by others. The use of email journals helped to create a synergy for self-disclosure and a safe space for self-expression where participants’ abilities to be themselves were encouraged. Increased self-awareness and selfknowledge among gifted young adolescents is vital to their self-formation and their management of self and others’ expectations. This study makes an original contribution to the field of self-study by highlighting the processes and complexities of young adolescents’ self-constructions. Through the innovative use of narrative methods and an inter-disciplinary approach, the voices of gifted young adolescents were privileged. At a practical level, the study can inform educators, policy-makers, parents and all those who seek to contribute to the well-being of gifted young adolescents.
Resumo:
Many luxury heritage brands operate on the misconception that heritage is interchangeable with history rather than representative of the emotional response they originally developed in their customer. This idea of heritage as static history inhibits innovation, prevents dynamic renewal and impedes their ability to redefine, strengthen and position their brand in current and emerging marketplaces. This paper examines a number of heritage luxury brands that have successfully identified the original emotional responses they developed in their customers and, through innovative approaches in design, marketing, branding and distribution evoke these responses in contemporary consumers. Using heritage and innovation hand-in-hand, these brands have continued to grow and develop a vision of heritage that incorporates both historical and contemporary ideas to meet emerging customer needs. While what constitutes a ‘luxury’ item is constantly challenged in this era of accessible luxury products, up scaling and aspirational spending, this paper sees consumers’ emotional needs as the key element in defining the concept of luxury. These emotional qualities consistently remain relevant due to their ability to enhance a positive sense of identity for the brand user. Luxury is about the ‘experience’ not just the product providing the consumer with a sense of enhanced status or identity through invoked feelings of exclusivity, authenticity, quality, uniqueness and culture. This paper will analyse luxury heritage brands that have successfully combined these emotional values with those of their ‘heritage’ to create an aura of authenticity and nostalgia that appeals to contemporary consumers. Like luxury, the line where clothing becomes fashion is blurred in the contemporary fashion industry; however, consumer emotion again plays an important role. For example, clothing becomes ‘fashion’ for consumers when it affects their self perception rather than fulfilling basic functions of shelter and protection. Successful luxury heritage brands can enhance consumers’ sense of self by involving them in the ‘experience’ and ‘personality’ of the brand so they see it as a reflection of their own exclusiveness, authentic uniqueness, belonging and cultural value. Innovation is a valuable tool for heritage luxury brands to successfully generate these desired emotional responses and meet the evolving needs of contemporary consumers. While traditionally fashion has been a monologue from brand to consumer, new technology has given consumers a voice to engage brands in a conversation to express their evolving needs, ideas and feedback. As a result, in this consumer-empowered era of information sharing, this paper defines innovation as the ability of heritage luxury brands to develop new design and branding strategies in response to this consumer feedback while retaining the emotional core values of their heritage. This paper analyses how luxury heritage brands can effectively position themselves in the contemporary marketplace by separating heritage from history to incorporate innovative strategies that will appeal to consumer needs of today and tomorrow.
Resumo:
Facial expression is an important channel for human communication and can be applied in many real applications. One critical step for facial expression recognition (FER) is to accurately extract emotional features. Current approaches on FER in static images have not fully considered and utilized the features of facial element and muscle movements, which represent static and dynamic, as well as geometric and appearance characteristics of facial expressions. This paper proposes an approach to solve this limitation using ‘salient’ distance features, which are obtained by extracting patch-based 3D Gabor features, selecting the ‘salient’ patches, and performing patch matching operations. The experimental results demonstrate high correct recognition rate (CRR), significant performance improvements due to the consideration of facial element and muscle movements, promising results under face registration errors, and fast processing time. The comparison with the state-of-the-art performance confirms that the proposed approach achieves the highest CRR on the JAFFE database and is among the top performers on the Cohn-Kanade (CK) database.
Resumo:
Transcutaneous immunization (TCI) involves the direct application of antigen plus adjuvant to skin, taking advantage of the large numbers of Langerhans cells and other resident skin dendritic cells, that process antigen then migrate to draining lymph nodes where immune responses are initiated. We have used this form of immunization to protect mice against genital tract and respiratory tract chlamydial infection. Protection was associated with local antibody responses in the vagina, uterus and lung as well as strong Th1 responses in the lymph nodes draining the reproductive tract and lungs respectively. In this study we show that topical application of GM-CSF to skin enhances the numbers and activation status of epidermal dendritic cells. Topical application of GM-CSF also increased the immune responses elicited by TCI. GM-CSF supplementation greatly increased cytokine (IFNgamma and IL-4) gene expression in lymph node and splenic cells compared to cells from animals immunized without GM-CSF. IgG responses in serum, uterine lavage and bronchoalveolar lavage and IgA responses in vaginal lavage were also increased by topical application of GM-CSF. The studies show that TCI induces protection against genital and respiratory tract chlamydial infections and that topical application of cytokines such as GM-CSF can enhance TCI-induced antibody and cell-mediated immunity.
Resumo:
Chlamydia pneumoniae causes a range of respiratory infections including bronchitis, pharyngitis and pneumonia. Infection has also been implicated in exacerbation/initiation of asthma and chronic obstructive pulmonary disease (COPD) and may play a role in atherosclerosis and Alzheimer's disease. We have used a mouse model of Chlamydia respiratory infection to determine the effectiveness of intranasal (IN) and transcutaneous immunization (TCI) to prevent Chlamydia lung infection. Female BALB/c mice were immunized with chlamydial major outer membrane protein (MOMP) mixed with cholera toxin and CpG oligodeoxynucleotide adjuvants by either the IN or TCI routes. Serum and bronchoalveolar lavage (BAL) were collected for antibody analysis. Mononuclear cells from lung-draining lymph nodes were stimulated in vitro with MOMP and cytokine mRNA production determined by real time PCR. Animals were challenged with live Chlamydia and weighed daily following challenge. At day 10 (the peak of infection) animals were sacrificed and the numbers of recoverable Chlamydia in lungs determined by real time PCR. MOMP-specific antibody-secreting cells in lung tissues were also determined at day 10 post-infection. Both IN and TCI protected animals against weight loss compared to non-immunized controls with both immunized groups gaining weight by day 10-post challenge while controls had lost 6% of body weight. Both immunization protocols induced MOMP-specific IgG in serum and BAL while only IN immunization induced MOMP-specific IgA in BAL. Both immunization routes resulted in high numbers of MOMP-specific antibody-secreting cells in lung tissues (IN > TCI). Following in vitro re-stimulation of lung-draining lymph node cells with MOMP; IFNγ mRNA increased 20-fold in cells from IN immunized animals (compared to non-immunized controls) while IFNγ levels increased 6- to 7-fold in TCI animals. Ten days post challenge non-immunized animals had >7000 IFU in their lungs, IN immunized animals <50 IFU and TCI immunized animals <1500 IFU. Thus, both intranasal and transcutaneous immunization protected mice against respiratory challenge with Chlamydia. The best protection was obtained following IN immunization and correlated with IFNγ production by mononuclear cells in lung-draining LN and MOMP-specific IgA in BAL.
Resumo:
An application of image processing techniques to recognition of hand-drawn circuit diagrams is presented. The scanned image of a diagram is pre-processed to remove noise and converted to bilevel. Morphological operations are applied to obtain a clean, connected representation using thinned lines. The diagram comprises of nodes, connections and components. Nodes and components are segmented using appropriate thresholds on a spatially varying object pixel density. Connection paths are traced using a pixel-stack. Nodes are classified using syntactic analysis. Components are classified using a combination of invariant moments, scalar pixel-distribution features, and vector relationships between straight lines in polygonal representations. A node recognition accuracy of 82% and a component recognition accuracy of 86% was achieved on a database comprising 107 nodes and 449 components. This recogniser can be used for layout “beautification” or to generate input code for circuit analysis and simulation packages
Resumo:
In dynamic and uncertain environments such as healthcare, where the needs of security and information availability are difficult to balance, an access control approach based on a static policy will be suboptimal regardless of how comprehensive it is. The uncertainty stems from the unpredictability of users’ operational needs as well as their private incentives to misuse permissions. In Role Based Access Control (RBAC), a user’s legitimate access request may be denied because its need has not been anticipated by the security administrator. Alternatively, even when the policy is correctly specified an authorised user may accidentally or intentionally misuse the granted permission. This paper introduces a novel approach to access control under uncertainty and presents it in the context of RBAC. By taking insights from the field of economics, in particular the insurance literature, we propose a formal model where the value of resources are explicitly defined and an RBAC policy (entailing those predictable access needs) is only used as a reference point to determine the price each user has to pay for access, as opposed to representing hard and fast rules that are always rigidly applied.