70 research outputs found

    Mining trajectory databases for multi-object movement patterns

    Get PDF
    Ph.DDOCTOR OF PHILOSOPH

    A Proposal of Code Completion Problem for Java Programming Learning Assistant System

    Get PDF
    To enhance Java programming educations in schools, we have developed a Web-based Java Programming Learning Assistant System (JPLAS) that provides a variety of programming assignments to cover different learning stages. For the first stage, JPLAS offers the element fill-in-blank problem where students study the grammar and code reading through filling the blank elements, composed of reserved words, identifiers, and control symbols, in a high-quality code. Unfortunately, it has been observed that students can fill the blanks without reading the code carefully, because the choice is limited for each blank. In this paper, we propose a code completion problem as a generalization of the element fill-in-blank problem. To solve the drawback, it does not explicitly show blank locations in the code, which expects students to carefully read the code to understand the grammar and code structure. The correctness of the answer is verified through string matching of each statement with the filled elements and the corresponding correct one. Besides, to encourage students to study readable code writing, the correct statement satisfies the coding rules including the spaces. For evaluations, we generated six code completion and element fill-in-blank problems respectively, and asked ten students in two universities to solve them. Their solution results show that the code completion problem is much harder than the element fill-in-blank problem, and requires far deeper code reading and understanding of coding rules

    A Trust-Based Adaptive Access Control Model for Wireless Sensor Networks

    Get PDF
    Wireless Sensor Networks (WSNs) have recently attracted much interest in the research community because of their wide range of applications. One emerging application for WSNs involves their use in healthcare where they are generally termed Wireless Medical Sensor Networks (WMSNs). In a hospital, fitting patients with tiny, wearable, wireless vital sign sensors would allow doctors, nurses and others to continuously monitor the state of those in their care. In the healthcare industry, patients are expected to be treated in reasonable time and any loss in data availability can result in further decline in the patient’s condition or can even lead to death. Therefore, the availability of data is more important than security concerns. The overwhelming priority is to take care of the patient, but the privacy and confidentiality of that patient’s medical records cannot be neglected. In current healthcare applications, there are many problems concerning security policy violations such as unauthorised denial of use, unauthorised information modification and unauthorised information release of medical data in the real world environment. Current WSN access control models used the traditional Role-Based Access Control (RBAC) or cryptographic methods for data access control but the systems still need to predefine attributes, roles and policies before deployment. It is, however, difficult to determine in advance all the possible needs for access in real world applications because there may be unanticipated situations at any time. This research proceeds to study possible approaches to address the above issues and to develop a new access control model to fill the gaps in work done by the WSN research community. Firstly, the adaptive access control model is proposed and developed based on the concept of discretionary overriding to address the data availability issue. In the healthcare industry, there are many problems concerning unauthorised information release. So, we extended the adaptive access control model with a prevention and detection mechanism to detect security policy violations, and added the concept of obligation to take a course of action when a restricted access is granted or denied. However, this approach does not consider privacy of patients’ information because data availability is prioritised. To address the conflict between data availability and data privacy, this research proposed the Trust-based Adaptive Access Control (TBA2C) model that integrates the concept of trust into the previous model. A simple user behaviour trust model is developed to calculate the behaviour trust value which measures the trustworthiness of the users and that is used as one of the defined thresholds to override access policy for data availability purpose, but the framework of the TBA2C model can be adapted with other trust models in the research community. The trust model can also protect data privacy because only a user who satisfies the relevant trust threshold can get restricted access in emergency and unanticipated situations. Moreover, the introduction of trust values in the enforcement of authorisation decisions can detect abnormal data access even from authorised users. Ponder2 is used to develop the TBA2C model gradually, starting from a simple access control model to the full TBA2C. In Ponder2, a Self-Managed Cell (SMC) simulates a sensor node with the TBA2C engine inside it. Additionally, to enable a full comparison with the proposed TBA2C model, the Break-The-Glass Role Based Access Control (BTGRBAC) model is redesigned and developed in the same platform (Ponder2). The proposed TBA2C model is the first to realise a flexible access control engine and to address the conflict between data availability and data privacy by combining the concepts of discretionary overriding, the user behaviour trust model, and the prevention and detection mechanism

    A Survey of Access Control Models in Wireless Sensor Networks

    Get PDF
    Copyright 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/)Wireless sensor networks (WSNs) have attracted considerable interest in the research community, because of their wide range of applications. However, due to the distributed nature of WSNs and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. Resource constraints in sensor nodes mean that security mechanisms with a large overhead of computation and communication are impractical to use in WSNs; security in sensor networks is, therefore, a challenge. Access control is a critical security service that offers the appropriate access privileges to legitimate users and prevents illegitimate users from unauthorized access. However, access control has not received much attention in the context of WSNs. This paper provides an overview of security threats and attacks, outlines the security requirements and presents a state-of-the-art survey on access control models, including a comparison and evaluation based on their characteristics in WSNs. Potential challenging issues for access control schemes in WSNs are also discussed.Peer reviewe

    The Role Of Brand Image On Brand Trust And Loyalty For Purified Drinking Bottled Water Brands In Tachileik

    Get PDF
    Bottled water consumption has been on the rise globally but the brand image of bottled water remains unstudied. Motivated by the significant value of brand image as a source of brand equity, particularly from customer-based aspect, this study puts an emphasis on brand image in examining its role on brand trust and brand loyalty. The contribution lies not only in revealing the image role in bottled water, but also the cognitive, affective and sensory domains of image perceptions. In other words, cognitive image, affective image, and sensory image are studied. While cognitive image is rational in nature of the perceptual process and has closer relationship with the tangible aspects of encounters and experiences with the brand, the affective or emotional image is more related to feelings that arise as a result of, for instances, corporate social responsibility (CSR) and customer services. Sensory aspect of brand image is vastly neglected in the extant literature. These three dimensions of brand image form the customers’ mental constructions and gives rise to meaningful perceptions to influence brand trust and brand loyalty. The findings of this study can provide the brand marketers with a strategic guide to improve the brand perceptions of consumers and thus induce brand loyalty. Besides, on the theoretical domain, this study provides an imagery insight in more balanced manner – cognitively, affectively, and sensory wise. The main statistical analysis tools to be used are factor analysis, reliability analysis, t-test, ANOVA, multiple regression and structural equation modeling (SEM) analyses, including mediating impact analysis. Data would be collected from the consumers of purified bottled water in Tachileik, Myanmar

    An evaluation of break-the-glass access control model for medical data in wireless sensor networks

    Get PDF
    Wireless Sensor Networks (WSNs) have recently attracted a lot of attention in the research community because it is easy to deploy them in the physical environment and collect and disseminate environmental data from them. The collected data from sensor nodes can vary based on what kind of application is used for WSNs. Data confidentiality and access control to that collected data are the most challenging issues in WSNs because the users are able to access data from the different location via ad-hoc manner. Access control is one of the critical requirements to prevent unauthorised access from users. The current access control models in information systems cannot be applied straightforwardly because of some limitations namely limited energy, resource and memory, and low computation capability. Based on the requirements of WSNs, we proposed the Break-The-Glass Access Control (BTG-AC) model which is the modified and redesigned version of Break-The-Glass Role-Based Access Control (BTG-RBAC) model. The several changes within the access control engine are made in BTG-RBAC to apply and fit in WSNs. We developed the BTG-AC model in Ponder2 package. Also a medical scenario was developed to evaluate the BTG-AC model for medical data in WSNs. In this paper, detail design, implementation phase, evaluation result and policies evaluation for the BTG-AC model are presented. Based on the evaluation result, the BTG-AC model can be used in WSNs after several modifications have been made under Ponder2 Package

    How big is it really? Assessing the efficacy of indirect estimates of body size in Asian elephants

    Get PDF
    Information on an organism’s body size is pivotal in understanding its life history and fitness, as well as helping inform conservation measures. However, for many species, particularly large-bodied wild animals, taking accurate body size measurements can be a challenge. Various means to estimate body size have been employed, from more direct methods such as using photogrammetry to obtain height or length measurements, to indirect prediction of weight using other body morphometrics or even the size of dung boli. It is often unclear how accurate these measures are because they cannot be compared to objective measures. Here, we investigate how well existing estimation equations predict the actual body weight of Asian elephants Elephas maximus, using body measurements (height, chest girth, length, foot circumference and neck circumference) taken directly from a large population of semi-captive animals in Myanmar (n = 404). We then define new and better fitting formulas to predict body weight in Myanmar elephants from these readily available measures. We also investigate whether the important parameters height and chest girth can be estimated from photographs (n = 151). Our results show considerable variation in the ability of existing estimation equations to predict weight, and that the equations proposed in this paper predict weight better in almost all circumstances. We also find that measurements from standardised photographs reflect body height and chest girth after applying minor adjustments. Our results have implications for size estimation of large wild animals in the field, as well as for management in captive settings.</p

    The Development and Growth of Tissues Derived From Cranial Neural Crest and Primitive Mesoderm Is Dependent on the Ligation Status of Retinoic Acid Receptor γ: Evidence That Retinoic Acid Receptor γ Functions to Maintain stem/progenitor Cells in the Absence of Retinoic Acid

    Get PDF
    An important study demonstrating how retinoic acid receptor gamma plays a key role in tissue formation and regenerationFinal publication is available from Mary Ann Liebert, Inc., publishers http://dx.doi.org/10.1089/scd.2014.0235Retinoic acid (RA) signaling is important to normal development. However, the function of the different RA receptors (RARs)--RARα, RARβ, and RARγ--is as yet unclear. We have used wild-type and transgenic zebrafish to examine the role of RARγ. Treatment of zebrafish embryos with an RARγ-specific agonist reduced somite formation and axial length, which was associated with a loss of hoxb13a expression and less-clear alterations in hoxc11a or myoD expression. Treatment with the RARγ agonist also disrupted formation of tissues arising from cranial neural crest, including cranial bones and anterior neural ganglia. There was a loss of Sox 9-immunopositive neural crest stem/progenitor cells in the same anterior regions. Pectoral fin outgrowth was blocked by RARγ agonist treatment. However, there was no loss of Tbx-5-immunopositive lateral plate mesodermal stem/progenitor cells and the block was reversed by agonist washout or by cotreatment with an RARγ antagonist. Regeneration of the caudal fin was also blocked by RARγ agonist treatment, which was associated with a loss of canonical Wnt signaling. This regenerative response was restored by agonist washout or cotreatment with the RARγ antagonist. These findings suggest that RARγ plays an essential role in maintaining stem/progenitor cells during embryonic development and tissue regeneration when the receptor is in its nonligated state

    Parametric Study of Applied Stresses on Infiltration Modular Cells installed under Roads

    Get PDF
    Abstract Modular geocellular units are applicable for the prevention and minimisation of stormwater runoff and flooding as a sustainable and cost-effective solution of road applications for drainage. The integrated units buried are exposed to the dead loads and live loads emerging from the surrounding soil pressure, pore water pressure and surcharge. Thus, a computer program using MATLAB is developed for the assessment of the total vertical and lateral earth pressure exerting on the modules complying with the Australian Standards AS 467

    Investigating associations between nematode infection and three measures of sociality in Asian elephants

    Get PDF
    Frequent social interactions, proximity to conspecifics, and group density are main drivers of infections and parasite transmissions. However, recent theoretical and empirical studies suggest that the health benefits of sociality and group living can outweigh the costs of infection and help social individuals fight infections or increase their infection-related tolerance level. Here, we combine the advantage of studying artificially created social work groups with different demographic compositions with free-range feeding and social behaviours in semi-captive Asian elephants (Elephas maximus), employed in timber logging in Myanmar. We examine the link between gastro-intestinal nematode load (strongyles and Strongyloides spp.), estimated by faecal egg counts, and three different aspects of an elephant's social world: individual solitary behaviour, work group size, and work group sex ratio. Controlling for sex, age, origin, time since last deworming treatment, year, human sampler bias, and individual identity, we found that infection by nematodes ranged from 0 to 2720 eggs/g between and within 26 male and 45 female elephants over the 4-year study period. However, such variation was not linked to any investigated measures of sociality in either males or females. Our findings highlight the need for finer-scale studies, establishing how sociality is limited by, mitigates, or protects against infection in different ecological contexts, to fully understand the mechanisms underlying these pathways. Significance statement Being social involves not only benefits, such as improved health, but also costs, including increased risk of parasitism and infectious disease. We studied the relationship between and three different sociality measures-solitary behaviour, group size, and the proportion of females to males within a group-and infection by gut nematodes (roundworms), using a unique study system of semi-captive working Asian elephants. Our system allows for observing how infection is linked to sociality measures across different social frameworks. We found that none of our social measures was associated with nematode infection in the studied elephants. Our results therefore suggest that here infection is not a large cost to group living, that it can be alleviated by the benefits of increased sociality, or that there are weak infection-sociality associations present which could not be captured and thus require finer-scale measures than those studied here. Overall, more studies are needed from a diverse range of systems that investigate specific aspects of social infection dynamics.Peer reviewe
    corecore