917 resultados para hard paraffin


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The increasing capability of mobile devices and social networks to gather contextual and social data has led to increased interest in context-aware computing for mobile applications. This paper explores ways of reconciling two different viewpoints of context, representational and interactional, that have arisen respectively from technical and social science perspectives on context-aware computing. Through a case study in agile ridesharing, the importance of dynamic context control, historical context and broader context is discussed. We build upon earlier work that has sought to address the divide by further explicating the problem in the mobile context and expanding on the design approaches.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The quality of early life experiences are known to influence a child’s capacities for emotional, social, cognitive and physical competence throughout their life (Peterson, 1996; Zubrick et al., 2008). These early life experiences are directly affected by parenting and family environments. A lack of positive parenting has significant implications both for children, and the broader communities in which they live (Davies & Cummings, 1994; Dryfoos, 1990; Sanders, 1995). Young parents are known to be at risk of experiencing adverse circumstances that affect their ability to provide positive parenting to their children (Milan et al., 2004; Trad, 1995). There is a need to provide parenting support programs to young parents that offer opportunities for them to come together, support each other and learn ways to provide for their children’s developmental needs in a friendly, engaging and non-judgemental environment. This research project examines the effectiveness of a 10 week group music therapy program Sing & Grow as an early parenting intervention for 535 young parents. Sing & Grow is a national early parenting intervention program funded by the Australian Government and delivered by Playgroup Queensland. It is designed and delivered by Registered Music Therapists for families at risk of marginalisation with children aged from birth to three years. The aim of the program is to improve parenting skills and parent-child interactions, and increase social support networks through participation in a group that is strengths-based and structured in a way that lends itself to modelling, peer learning and facilitated learning. During the 10 weeks parents have opportunities to learn practical, hands-on ways to interact and play with their children that are conducive to positive parent-child relationships and ongoing child development. A range of interactive, nurturing, stimulating and developmental music activities provide the framework for parents to interact and play with their children. This research uses data collected through the Sing & Grow National Evaluation Study to examine outcomes for all participants aged 25 years and younger, who attended programs during the Sing & Grow pilot study and main study from mid-2005 to the end of 2007. The research examines the change from pre to post in self-reported parent behaviours, parent mental health and parent social support, and therapist observed parent-child interactions. A range of statistical analyses are used to address each Research Objective for the young parent population, and for subgroups within this population. Research Objective 1 explored the patterns of attendance in the Sing & Grow program for young parents, and for subgroups within this population. Results showed that levels of attendance were lower than expected and influenced by Indigenous status and source of family income. Patterns of attendance showed a decline over time and incomplete data rates were high which may indicate high dropout rates. Research Objective 2 explored perceived satisfaction, benefits and social support links made. Satisfaction levels with the program and staff were very high. Indigenous status was associated with lower levels of reported satisfaction with both the program and staff. Perceived benefits from participation in the program were very high. Employment status was associated with perceived benefits: parents who were not employed were more likely than employed parents to report that their understanding of child development had increased as a result of participation in the program. Social support connections were reported for participants with other professionals, services and parents. In particular, families were more likely to link up with playgroup staff and services. Those parents who attended six or more sessions were significantly more likely to attend a playgroup than those who attended five sessions or less. Social support connections were related to source of family income, level of education, Indigenous status and language background. Research Objective 3 investigated pre to post change on self-report parenting skills and parent mental health. Results indicated that participation in the Sing & Grow program was associated with improvements in parent mental health. No improvements were found for self-reported parenting skills. Research Objective 4 investigated pre to post change in therapist observation measures of parent-child interactions. Results indicated that participation in the Sing & Grow program was associated with large and significant improvements in parent sensitivity to, engagement with and acceptance of the child. There were significant interactions across time (pre to post) for the parent characteristics of Indigenous status, family income and level of education. Research Objective 5 explored the relationship between the number of sessions attended and extent of change on self-report outcomes and therapist observed outcomes, respectively. For each, an overall change score was devised to ascertain those parents who had made any positive changes over time. Results showed that there was no significant relationship between high attendance and positive change in either the self-report or therapist observed behavioural measures. A risk index was also constructed to test for a relationship between the risk status of the parent. Parents with the highest risk status were significantly more likely to attend six or more sessions than other parents, but risk status was not associated with any differences in parent reported outcomes or therapist observations. The results of this research study indicate that Sing & Grow is effective in improving outcomes for young parents’ mental health, parent-child interactions and social support connections. High attendance by families in the highest category for risk factors may indicate that the program is effective at engaging and retaining parents who are most at-risk and therefore traditionally hard to reach. Very high levels of satisfaction and perceived benefits support this. Further research is required to help confirm the promising evidence from the current study that a short term group music therapy program can support young parents and improve their parenting outcomes. In particular, this needs to address the more disappointing outcomes of the current research study to improve attendance and engagement of all young parents in the program and especially the needs of young Indigenous parents.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a comprehensive study to find the most efficient bitrate requirement to deliver mobile video that optimizes bandwidth, while at the same time maintains good user viewing experience. In the study, forty participants were asked to choose the lowest quality video that would still provide for a comfortable and long-term viewing experience, knowing that higher video quality is more expensive and bandwidth intensive. This paper proposes the lowest pleasing bitrates and corresponding encoding parameters for five different content types: cartoon, movie, music, news and sports. It also explores how the lowest pleasing quality is influenced by content type, image resolution, bitrate, and user gender, prior viewing experience, and preference. In addition, it analyzes the trajectory of users’ progression while selecting the lowest pleasing quality. The findings reveal that the lowest bitrate requirement for a pleasing viewing experience is much higher than that of the lowest acceptable quality. Users’ criteria for the lowest pleasing video quality are related to the video’s content features, as well as its usage purpose and the user’s personal preferences. These findings can provide video providers guidance on what quality they should offer to please mobile users.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Volatile properties of particle emissions from four compressed natural gas (CNG) and four diesel buses were investigated under steady state and transient driving modes on a chassis dynamometer. The exhaust was diluted utilising a full-flow continuous volume sampling system and passed through a thermodenuder at controlled temperature. Particle number concentration and size distribution were measured with a condensation particle counter and a scanning mobility particle sizer, respectively. We show that, while almost all the particles emitted by the CNG buses were in the nanoparticle size range, at least 85% and 98% were removed at 100ºC and 250ºC, respectively. Closer analysis of the volatility of particles emitted during transient cycles showed that volatilisation began at around 40°C with the majority occurring by 80°C. Particles produced during hard acceleration from rest exhibited lower volatility than that produced during other times of the cycle. Based on our results and the observation of ash deposits on the walls of the tailpipes, we suggest that these non-volatile particles were composed mostly of ash from lubricating oil. Heating the diesel bus emissions to 100ºC removed ultrafine particle numbers by 69% to 82% when a nucleation mode was present and just 18% when it was not.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The growing importance and need of data processing for information extraction is vital for Web databases. Due to the sheer size and volume of databases, retrieval of relevant information as needed by users has become a cumbersome process. Information seekers are faced by information overloading - too many result sets are returned for their queries. Moreover, too few or no results are returned if a specific query is asked. This paper proposes a ranking algorithm that gives higher preference to a user’s current search and also utilizes profile information in order to obtain the relevant results for a user’s query.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Client puzzles are moderately-hard cryptographic problems neither easy nor impossible to solve that can be used as a counter-measure against denial of service attacks on network protocols. Puzzles based on modular exponentiation are attractive as they provide important properties such as non-parallelisability, deterministic solving time, and linear granularity. We propose an efficient client puzzle based on modular exponentiation. Our puzzle requires only a few modular multiplications for puzzle generation and verification. For a server under denial of service attack, this is a significant improvement as the best known non-parallelisable puzzle proposed by Karame and Capkun (ESORICS 2010) requires at least 2k-bit modular exponentiation, where k is a security parameter. We show that our puzzle satisfies the unforgeability and difficulty properties defined by Chen et al. (Asiacrypt 2009). We present experimental results which show that, for 1024-bit moduli, our proposed puzzle can be up to 30 times faster to verify than the Karame-Capkun puzzle and 99 times faster than the Rivest et al.'s time-lock puzzle.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The design of artificial intelligence in computer games is an important component of a player's game play experience. As games are becoming more life-like and interactive, the need for more realistic game AI will increase. This is particularly the case with respect to AI that simulates how human players act, behave and make decisions. The purpose of this research is to establish a model of player-like behavior that may be effectively used to inform the design of artificial intelligence to more accurately mimic a player's decision making process. The research uses a qualitative analysis of player opinions and reactions while playing a first person shooter video game, with recordings of their in game actions, speech and facial characteristics. The initial studies provide player data that has been used to design a model of how a player behaves.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Materials with one-dimensional (1D) nanostructure are important for catalysis. They are the preferred building blocks for catalytic nanoarchitecture, and can be used to fabricate designer catalysts. In this thesis, one such material, alumina nanofibre, was used as a precursor to prepare a range of nanocomposite catalysts. Utilising the specific properties of alumina nanofibres, a novel approach was developed to prepare macro-mesoporous nanocomposites, which consist of a stacked, fibrous nanocomposite with a core-shell structure. Two kinds of fibrous ZrO2/Al2O3 and TiO2/Al2O3 nanocomposites were successfully synthesised using boehmite nanofibers as a hard temperate and followed by a simple calcination. The alumina nanofibres provide the resultant nanocomposites with good thermal stability and mechanical stability. A series of one-dimensional (1D) zirconia/alumina nanocomposites were prepared by the deposition of zirconium species onto the 3D framework of boehmite nanofibres formed by dispersing boehmite nanofibres into a butanol solution, followed by calcination at 773 K. The materials were characterised by X-ray diffraction (XRD), Scanning electron microscopy (SEM), Transmission electron microscope (TEM), N2 adsorption/desorption, Infrared Emission Spectroscopy (IES), and Fourier Transform Infrared spectroscopy (FT-IR). The results demonstrated that when the molar percentage, X, X=100*Zr/(Al+Zr), was > 30%, extremely long ZrO2/Al2O3 composite nanorods with evenly distributed ZrO2 nanocrystals formed on their surface. The stacking of such nanorods gave rise to a new kind of macroporous material without the use of any organic space filler\template or other specific drying techniques. The mechanism for the formation of these long ZrO2/Al2O3 composite nanorods is proposed in this work. A series of solid-superacid catalysts were synthesised from fibrous ZrO2/Al2O3 core and shell nanocomposites. In this series, the zirconium molar percentage was varied from 2 % to 50 %. The ZrO2/Al2O3 nanocomposites and their solid superacid counterparts were characterised by a variety of techniques including 27Al MAS-NMR, SEM, TEM, XPS, Nitrogen adsorption and Infrared Emission Spectroscopy. NMR results show that the interaction between zirconia species and alumina strongly correlates with pentacoordinated aluminium sites. This can also be detected by the change in binding energy of the 3d electrons of the zirconium. The acidity of the obtained superacids was tested by using them as catalysts for the benzolyation of toluene. It was found that a sample with a 50 % zirconium molar percentage possessed the highest surface acidity equalling that of pristine sulfated zirconia despite the reduced mass of zirconia. Preparation of hierarchically macro-mesoporous catalyst by loading nanocrystallites on the framework of alumina bundles can provide an alternative system to design advanced nanocomposite catalyst with enhanced performance. A series of macro-mesoporous TiO2/Al2O3 nanocomposites with different morphologies were synthesised. The materials were calcined at 723 K and were characterised by X-ray diffraction (XRD), Scanning electron microscopy (SEM), Transmission electron microscope (TEM), N2 adsorption/desorption, Infrared Emission Spectroscopy (IES), and UV-visible spectroscopy (UV-visible). A modified approach was proposed for the synthesis of 1D (fibrous) nanocomposite with higher Ti/Al molar ratio (2:1) at lower temperature (<100oC), which makes it possible to synthesize such materials on industrial scale. The performances of a series of resultant TiO2/Al2O3 nanocomposites with different morphologies were evaluated as a photocatalyst for the phenol degradation under UV irradiation. The photocatalyst (Ti/Al =2) with fibrous morphology exhibits higher activity than that of the photocatalyst with microspherical morphology which indeed has the highest Ti to Al molar ratio (Ti/Al =3) in the series of as-synthesised hierarchical TiO2/Al2O3 nanocomposites. Furthermore, the photocatalytic performances, for the fibrous nanocomposites with Ti/Al=2, were optimized by calcination at elevated temperatures. The nanocomposite prepared by calcination at 750oC exhibits the highest catalytic activity, and its performance per TiO2 unit is very close to that of the gold standard, Degussa P 25. This work also emphasizes two advantages of the nanocomposites with fibrous morphology: (1) the resistance to sintering, and (2) good catalyst recovery.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

For people with intellectual disabilities there are significant barriers to inclusion in socially cooperative endeavours. This paper investigates the effectiveness of Stomp, a tangible user interface (TUI) designed to provide new participatory experiences for people with intellectual disability. Results from an observational study reveal the extent to which the Stomp system supports social and physical interaction. The tangible, spatial and embodied qualities of Stomp result in an experience that does not rely on the acquisition of specific competencies before interaction and engagement can occur.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, No-Wait, No-Buffer, Limited-Buffer, and Infinite-Buffer conditions for the flow-shop problem (FSP) have been investigated. These four different buffer conditions have been combined to generate a new class of scheduling problem, which is significant for modelling many real-world scheduling problems. A new heuristic algorithm is developed to solve this strongly NP-hard problem. Detailed numerical implementations have been analysed and promising results have been achieved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Local governments struggle to engage time poor and seemingly apathetic citizens, as well as the city’s young digital natives, the digital locals. This project aims at providing a lightweight, technological contribution towards removing the hierarchy between those who build the city and those who use it. We aim to narrow this gap by enhancing people’s experience of physical spaces with digital, civic technologies that are directly accessible within that space. This paper presents the findings of a design trial allowing users to interact with a public screen via their mobile phones. The screen facilitated a feedback platform about a concrete urban planning project by promoting specific questions and encouraging direct, in-situ, real-time responses via SMS and twitter. This new mechanism offers additional benefits for civic participation as it gives voice to residents who otherwise would not be heard. It also promotes a positive attitude towards local governments and gathers information different from more traditional public engagement tools.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Acknowledgement that many children in Australia travel in restraints that do not offer them the best protection has led to recent changes in legislation such that the type of restraint for children under 7 years is now specified. This paper reports the results of two studies (observational; focus group/ survey) carried out in the state of Queensland to evaluate the effectiveness of these changes to the legislation. Observations suggested that almost all of the children estimated as aged 0-12 years were restrained (95%). Analysis of the type of restraint used for target-aged children (0-6 year olds) suggests that the proportion using an age-appropriate restraint has increased by an estimated 7% since enactment of the legislation. However, around 1 in 4 children estimated as aged under 7 years were using restraints too large for good fit. Results from the survey and focus group suggested parents were supportive of the changes in legislation. Non-Indigenous parents agreed that the changes had been necessary, were effective at getting children into the right restraints, were easy to understand as well as making it clear what restraint to use with children. Moreover, they did not see the legislation as too complicated or too hard to comply with. Indigenous parents who participated in a focus group also regarded the legislation as improving children’s safety. However, they identified the cost of restraints as an important barrier to compliance. In summary, the legislation appears to have had a positive effect on compliance levels and on raising parental awareness of the need to restrain children child-specific restraints for longer. However, it would seem that an important minority of parents transition their children into larger restraints too early for optimal protection. Intervention efforts should aim to better inform these parents about appropriate ages for transition, especially from forward facing childseats. This could potentially be through use of other important transitions that occur at the same age, such as starting school. The small proportion of parents who do not restrain their children at all are also an important community sector to target. Finally, obtaining restraints presents a significant barrier to compliance for parents on limited incomes and interventions are needed to address this.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Privacy issues have hindered the evolution of e-health since its emergence. Patients demand better solutions for the protection of private information. Health professionals demand open access to patient health records. Existing e-health systems find it difficult to fulfill these competing requirements. In this paper, we present an information accountability framework (IAF) for e-health systems. The IAF is intended to address privacy issues and their competing concerns related to e-health. Capabilities of the IAF adhere to information accountability principles and e-health requirements. Policy representation and policy reasoning are key capabilities introduced in the IAF. We investigate how these capabilities are feasible using Semantic Web technologies. We discuss with the use of a case scenario, how we can represent the different types of policies in the IAF using the Open Digital Rights Language (ODRL).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a program’s object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or program’s security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The tool’s capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.