965 resultados para Online control


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The future emergence of many types of airborne vehicles and unpiloted aircraft in the national airspace means collision avoidance is of primary concern in an uncooperative airspace environment. The ability to replicate a pilot’s see and avoid capability using cameras coupled with vision based avoidance control is an important part of an overall collision avoidance strategy. But unfortunately without range collision avoidance has no direct way to guarantee a level of safety. Collision scenario flight tests with two aircraft and a monocular camera threat detection and tracking system were used to study the accuracy of image-derived angle measurements. The effect of image-derived angle errors on reactive vision-based avoidance performance was then studied by simulation. The results show that whilst large angle measurement errors can significantly affect minimum ranging characteristics across a variety of initial conditions and closing speeds, the minimum range is always bounded and a collision never occurs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A novel intelligent online demand side management system is proposed for peak load management in low-voltage distribution networks. This method uses low-cost controllers with low-bandwidth two-way communication installed in custumers’ premises and at distribution transformers to manage the peak load while maximising customer satisfaction. A multi-objective decision making process is proposed to select the load(s) to be delayed or controlled. The efficacy of the proposed control system is verified by simulation of three different feeder types.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: The 30-item USDI is a self-report measure that assesses depressive symptoms among university students. It consists of three correlated three factors: Lethargy, Cognitive-Emotional and Academic motivation. The current research used confirmatory factor analysis to asses construct validity and determine whether the original factor structure would be replicated in a different sample. Psychometric properties were also examined. Method: Participants were 1148 students (mean age 22.84 years, SD = 6.85) across all faculties from a large Australian metropolitan university. Students completed a questionnaire comprising of the USDI, the Depression Anxiety Stress Scale (DASS) and Life Satisfaction Scale (LSS). Results: The three correlated factor model was shown to be an acceptable fit to the data, indicating sound construct validity. Internal consistency of the scale was also demonstrated to be sound, with high Cronbach Alpha values. Temporal stability of the scale was also shown to be strong through test-retest analysis. Finally, concurrent and discriminant validity was examined with correlations between the USDI and DASS subscales as well as the LSS, with sound results contributing to further support the construct validity of the scale. Cut-off points were also developed to aid total score interpretation. Limitations: Response rates are unclear. In addition, the representativeness of the sample could be improved potentially through targeted recruitment (i.e. reviewing the online sample statistics during data collection, examining the representativeness trends and addressing particular faculties within the university that were underrepresented). Conclusions: The USDI provides a valid and reliable method of assessing depressive symptoms found among university students.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A long-running issue in appetite research concerns the influence of energy expenditure on energy intake. More than 50 years ago, Otto G. Edholm proposed that "the differences between the intakes of food [of individuals] must originate in differences in the expenditure of energy". However, a relationship between energy expenditure and energy intake within any one day could not be found, although there was a correlation over 2 weeks. This issue was never resolved before interest in integrative biology was replaced by molecular biochemistry. Using a psychobiological approach, we have studied appetite control in an energy balance framework using a multi-level experimental system on a single cohort of overweight and obese human subjects. This has disclosed relationships between variables in the domains of body composition [fat-free mass (FFM), fat mass (FM)], metabolism, gastrointestinal hormones, hunger and energy intake. In this Commentary, we review our own and other data, and discuss a new formulation whereby appetite control and energy intake are regulated by energy expenditure. Specifically, we propose that FFM (the largest contributor to resting metabolic rate), but not body mass index or FM, is closely associated with self-determined meal size and daily energy intake. This formulation has implications for understanding weight regulation and the management of obesity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: The effect of exercise on body mass is likely to be partially mediated through changes in appetite control. However, no studies have examined the effect of chronic exercise on obestatin and cholecystokinin (CCK) plasma concentrations or the sensitivity to detect differences in preload energy in obese individuals. The objective of this study was to investigate the effects of chronic exercise on 1) fasting and postprandial plasma concentrations of obestatin, CCK, leptin, and glucose insulinotropic peptide (GIP) and 2) the accuracy of energy compensation in response to covert preload manipulation. Methods: This study used a 12-wk supervised exercise program in 22 sedentary overweight/obese individuals. Fasting/postprandial plasma concentrations of obestatin, CCK, leptin, and GIP were assessed before and after the intervention. Energy compensation at a 30-min test meal after a high-energy (607 kcal) or a low-energy (246 kcal) preload and for the rest of the day (cumulative energy intake [EI]) was also measured. Results: There was a significant reduction in the plasma concentration of fasting plasma GIP and both fasting and postprandial leptin concentrations after the exercise intervention (P < 0.05 for all). No significant changes were observed for CCK or obestatin. A significant preload–exercise interaction (P = 0.011) was observed on cumulative EI and energy compensation for the same period (−87% ± 196% vs 68% ± 165%, P = 0.011). Weight loss (3.5 ± 1.4 kg, P < 0.0001) was not correlated with changes in energy compensation. Conclusions: This study suggests that exercise improves the accuracy of compensation for previous EI, independent of weight loss. Unexpectedly, and in contrast to GIP and leptin, exercise-induced weight loss had no effect on obestatin or CCK concentrations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Online social networks can be modelled as graphs; in this paper, we analyze the use of graph metrics for identifying users with anomalous relationships to other users. A framework is proposed for analyzing the effectiveness of various graph theoretic properties such as the number of neighbouring nodes and edges, betweenness centrality, and community cohesiveness in detecting anomalous users. Experimental results on real-world data collected from online social networks show that the majority of users typically have friends who are friends themselves, whereas anomalous users’ graphs typically do not follow this common rule. Empirical analysis also shows that the relationship between average betweenness centrality and edges identifies anomalies more accurately than other approaches.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis examines online spoof videos in China. It shows the relationship between user-created content and change and how such videos are impacting on social memory. In the West, we are witnessing two outstanding trends in media. On the one hand, media are turning more "demotic" (Turner, 2006) and "participatory" (Jenkins, 2006), whereby lay audiences use popular media for identity formation, representation and association, reconfiguring the media and cultural landscape, and rendering invalid the old paradigm based on the dichotomy of audience and author, creator and consumer, expert and amateur. On the other hand, in both mainstream media and user-creation online there is a trend towards "silly citizenship", with comedy, send-ups and spoofs that used to reside in the margin propelled to the central stage in both pleasure and politics (Hartley, 2010), as is shown in the rising popularity of the Daily Show, Colbert Report, and spoof videos in elections ,e.g. the 2008 presidential election in US (Gray, Jones, & Thompson, 2009; Tryon, 2008). User generated content—and spoof subcultures—is now much a debated phenomenon in China. However, with different political (one party rule and censorship) and cultural (media regarded mainly as instrument for education and social stabilization instead of a critical fourth estate) configurations, will the social and cultural impacts of the two trends in the West be as the same in China? If not, what will be the specificities in the China context? The project starts with a historical review of popular culture and user-created content in China, before turning to spoof videos and looking at how they are produced and shared, travel and diffused on the Internet, and how the communities and sub-cultures forming and emerging around spoof videos are changing the overall cultural landscape in China. By acting as a participant observer in online video sharing sites and conducting face-to face as well as online interviews, I identify lead users and creators of spoof videos and the social networks emerging around them. I call these lead users "skill hubs" and their networks "liquid communities", foregrounding the fact that their appeal doesn’t come from their amicable personality, but rather from their creative skills; and that the networks surrounding them are in a permanent flux, with members coming and going as they see fit. I argue that the "liquidness" (Bauman, 2000) of these communities is what makes them constantly creative and appealing. Textual analysis of online videos, their comments and derivatives are conducted to tease out the uses that that can be made of spoof videos, namely as phatic communication, as alternative memory and as political engagement. Through these analyses I show that spoof videos constitute not only a space where young generations can engage with each other, communicate their anger and dissatisfaction, fun and hope, and where they participate in socio-cultural and political debates, but also create a space where they can experiment with their new skills, new ideas, and new citizenship. The rise of spoof videos heralds the beginning of a trend in popular culture in contemporary China towards the "canonization of the jester" and the dethroning of the establishment. I also argue that a historical perspective is needed to understand the current surge of use creativity and user activism in China, and that many forms of popular media we experience today have their antecedents in various stages of Chinese history. The entrenched "control-resistance" binary is inadequate in interpreting the rich, flux and multilayered Internet space in China.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the last decade, smartphones have gained widespread usage. Since the advent of online application stores, hundreds of thousands of applications have become instantly available to millions of smart-phone users. Within the Android ecosystem, application security is governed by digital signatures and a list of coarse-grained permissions. However, this mechanism is not fine-grained enough to provide the user with a sufficient means of control of the applications' activities. Abuse of highly sensible private information such as phone numbers without users' notice is the result. We show that there is a high frequency of privacy leaks even among widely popular applications. Together with the fact that the majority of the users are not proficient in computer security, this presents a challenge to the engineers developing security solutions for the platform. Our contribution is twofold: first, we propose a service which is able to assess Android Market applications via static analysis and provide detailed, but readable reports to the user. Second, we describe a means to mitigate security and privacy threats by automated reverse-engineering and refactoring binary application packages according to the users' security preferences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Private data stored on smartphones is a precious target for malware attacks. A constantly changing environment, e.g. switching network connections, can cause unpredictable threats, and require an adaptive approach to access control. Context-based access control is using dynamic environmental information, including it into access decisions. We propose an "ecosystem-in-an-ecosystem" which acts as a secure container for trusted software aiming at enterprise scenarios where users are allowed to use private devices. We have implemented a proof-of-concept prototype for an access control framework that processes changes to low-level sensors and semantically enriches them, adapting access control policies to the current context. This allows the user or the administrator to maintain fine-grained control over resource usage by compliant applications. Hence, resources local to the trusted container remain under control of the enterprise policy. Our results show that context-based access control can be done on smartphones without major performance impact.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

University learning increasingly includes online learning experiences embedded within teaching with the dual policy intentions of increasing flexibility and learner engagement. In this research project, three university lecturers from different teaching contexts selected technologies for online learning to enhance learner engagement by encouraging peer learning. A sociocultural view of learning was used to conceptualise the technological and social affordances that might enable student peer participation and engagement. The research explored the question: “What are the benefits and barriers experienced by students engaging in online peer collaboration?” Students reported benefits including a sense of belonging that enhanced motivation, and professional identity. This article also reports on some of the challenges for students and University academics when engaging in online learning communities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ultimate goal of an access control system is to allocate each user the precise level of access they need to complete their job - no more and no less. This proves to be challenging in an organisational setting. On one hand employees need enough access to the organisation’s resources in order to perform their jobs and on the other hand more access will bring about an increasing risk of misuse - either intentionally, where an employee uses the access for personal benefit, or unintentionally, through carelessness or being socially engineered to give access to an adversary. This thesis investigates issues of existing approaches to access control in allocating optimal level of access to users and proposes solutions in the form of new access control models. These issues are most evident when uncertainty surrounding users’ access needs, incentive to misuse and accountability are considered, hence the title of the thesis. We first analyse access control in environments where the administrator is unable to identify the users who may need access to resources. To resolve this uncertainty an administrative model with delegation support is proposed. Further, a detailed technical enforcement mechanism is introduced to ensure delegated resources cannot be misused. Then we explicitly consider that users are self-interested and capable of misusing resources if they choose to. We propose a novel game theoretic access control model to reason about and influence the factors that may affect users’ incentive to misuse. Next we study access control in environments where neither users’ access needs can be predicted nor they can be held accountable for misuse. It is shown that by allocating budget to users, a virtual currency through which they can pay for the resources they deem necessary, the need for a precise pre-allocation of permissions can be relaxed. The budget also imposes an upper-bound on users’ ability to misuse. A generalised budget allocation function is proposed and it is shown that given the context information the optimal level of budget for users can always be numerically determined. Finally, Role Based Access Control (RBAC) model is analysed under the explicit assumption of administrators’ uncertainty about self-interested users’ access needs and their incentives to misuse. A novel Budget-oriented Role Based Access Control (B-RBAC) model is proposed. The new model introduces the notion of users’ behaviour into RBAC and provides means to influence users’ incentives. It is shown how RBAC policy can be used to individualise the cost of access to resources and also to determine users’ budget. The implementation overheads of B-RBAC is examined and several low-cost sub-models are proposed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports on the implementation of a non-invasive electroencephalography-based brain-computer interface to control functions of a car in a driving simulator. The system is comprised of a Cleveland Medical Devices BioRadio 150 physiological signal recorder, a MATLAB-based BCI and an OKTAL SCANeR advanced driving experience simulator. The system utilizes steady-state visual-evoked potentials for the BCI paradigm, elicited by frequency-modulated high-power LEDs and recorded with the electrode placement of Oz-Fz with Fz as ground. A three-class online brain-computer interface was developed and interfaced with an advanced driving simulator to control functions of the car, including acceleration and steering. The findings are mainly exploratory but provide an indication of the feasibility and challenges of brain-controlled on-road cars for the future, in addition to a safe, simulated BCI driving environment to use as a foundation for research into overcoming these challenges.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Several approaches have been introduced in the literature for active noise control (ANC) systems. Since the filtered-x least-mean-square (FxLMS) algorithm appears to be the best choice as a controller filter, researchers tend to improve performance of ANC systems by enhancing and modifying this algorithm. This paper proposes a new version of the FxLMS algorithm, as a first novelty. In many ANC applications, an on-line secondary path modeling method using white noise as a training signal is required to ensure convergence of the system. As a second novelty, this paper proposes a new approach for on-line secondary path modeling on the basis of a new variable-step-size (VSS) LMS algorithm in feed forward ANC systems. The proposed algorithm is designed so that the noise injection is stopped at the optimum point when the modeling accuracy is sufficient. In this approach, a sudden change in the secondary path during operation makes the algorithm reactivate injection of the white noise to re-adjust the secondary path estimate. Comparative simulation results shown in this paper indicate the effectiveness of the proposed approach in reducing both narrow-band and broad-band noise. In addition, the proposed ANC system is robust against sudden changes of the secondary path model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study examined the effects of personal and social resources, coping strategies and appraised stress on employees' levels of anxiety and depression. In relation to the effects of resources and coping strategies, two different models were tested. The main effects model proposes that, irrespective of the level of stress, coping resources and coping strategies have direct effects on well-being. In contrast, the buffering model predicts that the buffering effects of coping resources and strategies are only evident at high levels of stress. One hundred lawyers completed a structured self-administered questionnaire that measured their personal and social resources, use of problem-focused and emotion-focused coping strategies, and appraisals of the stressfulness of the situation. Results revealed generally strong support for the main effects model in the prediction of employee levels of anxiety and depression. Lower levels of anxiety were linked to judgements of lower levels of organizational change, greater self-confidence, greater internality of control beliefs and less use of emotion-focused coping strategies. Lower levels of depression in employees were also linked to judgements of lower levels of organizational change, greater use of resources and less appraised stress. There was only limited support for the buffering effects model. Due to the small size of the sample, the findings need to be explored further in other contexts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Past work has clearly demonstrated that numerous commonly used metallic materials will support burning in oxygen, especially at higher pressures. An approach to rectify this significant safety problem has been successfully developed and implemented by applying the concept of Situational Non-Flammability. This approach essentially removes or breaks one leg of the conceptual fire triangle, a tool commonly used to define the three things that are required to support burning; a fuel, an ignition source and an oxidizer. Since an oxidiser is always present in an oxygen system as are ignition sources, the concept of Situational Non-Flammability essentially removes the fuel leg of the fire triangle by only utilising materials that will not burn at the maximum pressure, for example, that the control valve is to be used in. The utilisation of this approach has lead to the development of a range of oxygen components that are practically unable to burn while in service at their design pressure thus providing an unparalleled level of first safety while not compromising on the performance or endurance required in the function of these components. This paper describes the concept of Situational Non-Flammability, how it was used to theoretically evaluate designs of components for oxygen service and the outcomes of the actual development, fabrication and finally utilisation of these components in real oxygen systems in a range of flow control devices.