3,590 research outputs found

    Development of PAN (personal area network) for Mobile Robot Using Bluetooth Transceiver

    Get PDF
    In recent years, wireless applications using radio frequency (RF) have been rapidly evolving in personal computing and communications devices. Bluetooth technology was created to replace the cables used on mobile devices. Bluetooth is an open specification and encompasses a simple low-cost, low power solution for integration into devices. This research work aim was to provide a PAN (personal area network) for computer based mobile robot that supports real-time control of four mobile robots from a host mobile robot. With ad hoc topology, mobile robots may request and establish a connection when it is within the range or terminated the connection when it leaves the area. A system that contains both hardware and software is designed to enable the robots to participate in multi-agent robotics system (MARS). Computer based mobile robot provide operating system that enabled development of wireless connection via IP address

    Live Migration in Emerging Cloud Paradigms

    Get PDF
    The elastic provisioning of resources and the capability to adapt to changing resource demand and environmental conditions on-the-fly are, probably, key success factors of cloud computing. Live migration of virtual resources is of pivotal importance in achieving such key properties. However, the ability to effectively and efficiently determine which resource to be migrated and where, by satisfying proper objectives and constraints, remains a research challenge. The existing literature is generally based on metaheuristics running a central resolver. Such an approach is not suitable because it only considers the quality-of-service aspect during the decision-making performance while ignoring the regulatory challenges. This column highlights the regulatory challenges associated with the cross-border dataflow implication of migration and stresses the need to adopt alternative decision approaches.postprin

    Smartphone applications for behavioural interventions with at risk drinkers

    Get PDF
    Background: Problem drinking is a worldwide concern and a comorbid health problem for psychiatric illness. With the rising trend in e-mental health interventions, the advancement of smartphone technology has ushered in an era where smartphone apps can be used for behavioural change intervention in problem drinking. Objectives: The aim of the study is to contribute towards the development of a smartphone app for use with problem drinkers based on behavioural modification principles. Methods: 7 post graduate students in the School of Health Professions at Murdoch University were interviewed about the use of smartphone apps for problem drinking and the interview transcripts were subjected to thematic analysis. Findings: Themes that emerged include: accessibility, milestones, commitment and notifications. Conclusions: These findings shed light on the development of the e-mental health intervention for problem drinking. Implications on clients from diverse cultures and various age groups are discussed

    Smartphone applications for behavioural interventions with at risk drinkers

    Get PDF
    Background: Problem drinking is a worldwide concern and a comorbid health problem for psychiatric illness. With the rising trend in e-mental health interventions, the advancement of smartphone technology has ushered in an era where smartphone apps can be used for behavioural change intervention in problem drinking. Objectives: The aim of the study is to contribute towards the development of a smartphone app for use with problem drinkers based on behavioural modification principles. Methods: 7 post graduate students in the School of Health Professions at Murdoch University were interviewed about the use of smartphone apps for problem drinking and the interview transcripts were subjected to thematic analysis. Findings: Themes that emerged include: accessibility, milestones, commitment and notifications. Conclusions: These findings shed light on the development of the e-mental health intervention for problem drinking. Implications on clients from diverse cultures and various age groups are discussed

    Psychological Safety and Norm Clarity in Software Engineering Teams

    Full text link
    In the software engineering industry today, companies primarily conduct their work in teams. To increase organizational productivity, it is thus crucial to know the factors that affect team effectiveness. Two team-related concepts that have gained prominence lately are psychological safety and team norms. Still, few studies exist that explore these in a software engineering context. Therefore, with the aim of extending the knowledge of these concepts, we examined if psychological safety and team norm clarity associate positively with software developers' self-assessed team performance and job satisfaction, two important elements of effectiveness. We collected industry survey data from practitioners (N = 217) in 38 development teams working for five different organizations. The result of multiple linear regression analyses indicates that both psychological safety and team norm clarity predict team members' self-assessed performance and job satisfaction. The findings also suggest that clarity of norms is a stronger (30\% and 71\% stronger, respectively) predictor than psychological safety. This research highlights the need to examine, in more detail, the relationship between social norms and software development. The findings of this study could serve as an empirical baseline for such, future work.Comment: Submitted to CHASE'201

    Effect of Inflow and Infiltration in Sewerage System of Residential Area, Kuantan, Pahang

    Get PDF
    Inflow and infiltration is a phenomenon in sewerage systems that can have negative effects on the environment and human health if not treated properly. Collaboration has been made between Universiti Malaysia Pahang (UMP) and Indah Water Konsortium Sdn. Bhd. (IWK) where the purpose is to evaluate the amount of inflow and infiltration happening in sewerage systems of residential areas in Kuantan. For this part of the study, one sewer pipeline (MH92a–MH92b) was selected at the residential area of Bandar Putra, having a population equivalent of 1694. The method used in this research was the Flowrate method to tabulate data. ISCO 2150 and 4250 Area Velocity Flowmeters were used to measure flow rate data in the sewer pipeline, whereas ISCO 674 Rain Gauge was used to collect rainfall intensity data. Calibration of all the equipment was done at the Hydrology and Hydraulic Laboratory in UMP. The data was collected for 41 days with each measurement separated by an interval of five minutes. The result shows that the average percentage Infiltration Rate of Qpeak and Qave in this residential catchment were 10.3% and 26.5% which is higher than the value mentioned in Hammer and Hammer (2012). Inflow and infiltration is a real concern, so more study is required to determine whether revision of the infiltration rate recommended in the Malaysian Standard is needed

    Traveling Granular Segregation Patterns in a Long Drum Mixer

    Full text link
    Mixtures of granular media often exhibit size segregation along the axis of a partially-filled, horizontal, rotating cylinder. Previous experiments have observed axial bands of segregation that grow from concentration fluctuations and merge in a manner analogous to spinodal decomposition. We have observed that a new dynamical state precedes this effect in certain mixtures: bi-directional traveling waves. By preparing initial conditions, we found that the wave speed decreased with wavelength. Such waves appear to be inconsistent with simple PDE models which are first order in time.Comment: 11 page

    LiPISC: A Lightweight and Flexible Method for Privacy-Aware Intersection Set Computation

    Get PDF
    Privacy-aware intersection set computation (PISC) can be modeled as secure multi-party computation. The basic idea is to compute the intersection of input sets without leaking privacy. Furthermore, PISC should be sufficiently flexible to recommend approximate intersection items. In this paper, we reveal two previously unpublished attacks against PISC, which can be used to reveal and link one input set to another input set, resulting in privacy leakage. We coin these as Set Linkage Attack and Set Reveal Attack. We then present a lightweight and flexible PISC scheme (LiPISC) and prove its security (including against Set Linkage Attack and Set Reveal Attack)
    corecore