3,590 research outputs found
Development of PAN (personal area network) for Mobile Robot Using Bluetooth Transceiver
In recent years, wireless applications using radio frequency (RF) have been rapidly evolving in personal computing and communications devices. Bluetooth technology was created to replace the cables used on mobile devices. Bluetooth is an open specification and encompasses a simple low-cost, low power solution for integration into devices. This research work aim was to provide a PAN (personal area network) for computer based mobile robot that supports real-time control of four mobile robots from a host mobile robot. With ad hoc topology, mobile robots may request and establish a connection when it is within the range or terminated the connection when it leaves the area. A system that contains both hardware and software is designed to enable the robots to participate in multi-agent robotics system (MARS). Computer based mobile robot provide operating system that enabled development of wireless connection via IP address
Live Migration in Emerging Cloud Paradigms
The elastic provisioning of resources and the capability to adapt to changing resource demand and environmental conditions on-the-fly are, probably, key success factors of cloud computing. Live migration of virtual resources is of pivotal importance in achieving such key properties. However, the ability to effectively and efficiently determine which resource to be migrated and where, by satisfying proper objectives and constraints, remains a research challenge. The existing literature is generally based on metaheuristics running a central resolver. Such an approach is not suitable because it only considers the quality-of-service aspect during the decision-making performance while ignoring the regulatory challenges. This column highlights the regulatory challenges associated with the cross-border dataflow implication of migration and stresses the need to adopt alternative decision approaches.postprin
Smartphone applications for behavioural interventions with at risk drinkers
Background: Problem drinking is a worldwide concern and a comorbid health problem for psychiatric illness. With the rising trend in e-mental health interventions, the advancement of smartphone technology has ushered in an era where smartphone apps can be used for behavioural change intervention in problem drinking.
Objectives: The aim of the study is to contribute towards the development of a smartphone app for use with problem drinkers based on behavioural modification principles.
Methods: 7 post graduate students in the School of Health Professions at Murdoch University were interviewed about the use of smartphone apps for problem drinking and the interview transcripts were subjected to thematic analysis.
Findings: Themes that emerged include: accessibility, milestones, commitment and notifications.
Conclusions: These findings shed light on the development of the e-mental health intervention for problem drinking. Implications on clients from diverse cultures and various age groups are discussed
Smartphone applications for behavioural interventions with at risk drinkers
Background: Problem drinking is a worldwide concern and a comorbid health problem for psychiatric illness. With the rising trend in e-mental health interventions, the advancement of smartphone technology has ushered in an era where smartphone apps can be used for behavioural change intervention in problem drinking.
Objectives: The aim of the study is to contribute towards the development of a smartphone app for use with problem drinkers based on behavioural modification principles.
Methods: 7 post graduate students in the School of Health Professions at Murdoch University were interviewed about the use of smartphone apps for problem drinking and the interview transcripts were subjected to thematic analysis.
Findings: Themes that emerged include: accessibility, milestones, commitment and notifications.
Conclusions: These findings shed light on the development of the e-mental health intervention for problem drinking. Implications on clients from diverse cultures and various age groups are discussed
Recommended from our members
Patient-Related Barriers to Timely Dialysis Access Preparation: A Qualitative Study of the Perspectives of Patients, Family Members, and Health Care Providers
Rational & Objective
A key aspect of smooth transition to dialysis is the timely creation of a permanent access. Despite early referral to kidney care, initiation onto dialysis is still suboptimal for many patients, which has clinical and cost implications. This study aimed to explore perspectives of various stakeholders on barriers to timely access creation.
Study Design
Qualitative study.
Setting & Participants
Semi-structured interviews with 96 participants (response rate, 67%), including patients with stage 4 chronic kidney disease (n = 30), new hemodialysis patients with (n = 18) and without (n = 20) permanent access (arteriovenous fistula), family members (n = 19), and kidney health care providers (n = 9).
Analytical Approach
Thematic analysis.
Results
Patients reported differential levels of behavioral activation toward access creation: avoidance/denial, wait and see, or active intention. 6 core themes were identified: (1) lack of symptoms, (2) dialysis fear and practical concerns (exaggerated fear, pain, cost, lifestyle disruptions, work-related concerns, burdening their families), (3) evaluating value against costs/risks of access creation (benefits, threat of operation, viability, prompt for early initiation), (4) preference for alternatives, (5) social influences (hearsay, family involvement, experiences of others), and (6) health care provider interactions (mistrust, interpersonal tension, lack of clarity on information). Themes were common to all groups, whereas nuanced perspectives of family members and health care providers were noted in some subthemes.
Limitations
Response bias.
Conclusions
Individual, interpersonal, and psychosocial factors compromise dialysis preparation and contribute to suboptimal dialysis initiation. Our findings support the need for interventions to improve patient and family engagement and address emotional concerns and misperceptions about preparing for dialysis
Psychological Safety and Norm Clarity in Software Engineering Teams
In the software engineering industry today, companies primarily conduct their
work in teams. To increase organizational productivity, it is thus crucial to
know the factors that affect team effectiveness. Two team-related concepts that
have gained prominence lately are psychological safety and team norms. Still,
few studies exist that explore these in a software engineering context.
Therefore, with the aim of extending the knowledge of these concepts, we
examined if psychological safety and team norm clarity associate positively
with software developers' self-assessed team performance and job satisfaction,
two important elements of effectiveness.
We collected industry survey data from practitioners (N = 217) in 38
development teams working for five different organizations. The result of
multiple linear regression analyses indicates that both psychological safety
and team norm clarity predict team members' self-assessed performance and job
satisfaction. The findings also suggest that clarity of norms is a stronger
(30\% and 71\% stronger, respectively) predictor than psychological safety.
This research highlights the need to examine, in more detail, the
relationship between social norms and software development. The findings of
this study could serve as an empirical baseline for such, future work.Comment: Submitted to CHASE'201
Effect of Inflow and Infiltration in Sewerage System of Residential Area, Kuantan, Pahang
Inflow and infiltration is a phenomenon in sewerage systems that can have negative effects on the environment and human health if not treated properly. Collaboration has been made between Universiti Malaysia Pahang (UMP) and Indah Water Konsortium Sdn. Bhd. (IWK) where the purpose is to evaluate the amount of inflow and infiltration happening in sewerage systems of residential areas in Kuantan. For this part of the study, one sewer pipeline (MH92a–MH92b) was selected at the residential area of Bandar Putra, having a population equivalent of 1694. The method used in this research was the Flowrate method to tabulate data. ISCO 2150 and 4250 Area Velocity Flowmeters were used to measure flow rate data in the sewer pipeline, whereas ISCO 674 Rain Gauge was used to collect rainfall intensity data. Calibration of all the equipment was done at the Hydrology and Hydraulic Laboratory in UMP. The data was collected for 41 days with each measurement separated by an interval of five minutes. The result shows that the average percentage Infiltration Rate of Qpeak and Qave in this residential catchment were 10.3% and 26.5% which is higher than the value mentioned in Hammer and Hammer (2012). Inflow and infiltration is a real concern, so more study is required to determine whether revision of the infiltration rate recommended in the Malaysian Standard is needed
Traveling Granular Segregation Patterns in a Long Drum Mixer
Mixtures of granular media often exhibit size segregation along the axis of a
partially-filled, horizontal, rotating cylinder. Previous experiments have
observed axial bands of segregation that grow from concentration fluctuations
and merge in a manner analogous to spinodal decomposition. We have observed
that a new dynamical state precedes this effect in certain mixtures:
bi-directional traveling waves. By preparing initial conditions, we found that
the wave speed decreased with wavelength. Such waves appear to be inconsistent
with simple PDE models which are first order in time.Comment: 11 page
LiPISC: A Lightweight and Flexible Method for Privacy-Aware Intersection Set Computation
Privacy-aware intersection set computation (PISC) can be modeled as secure multi-party computation. The basic idea is to compute the intersection of input sets without leaking privacy. Furthermore, PISC should be sufficiently flexible to recommend approximate intersection items. In this paper, we reveal two previously unpublished attacks against PISC, which can be used to reveal and link one input set to another input set, resulting in privacy leakage. We coin these as Set Linkage Attack and Set Reveal Attack. We then present a lightweight and flexible PISC scheme (LiPISC) and prove its security (including against Set Linkage Attack and Set Reveal Attack)
- …