Siga este link para ver outros tipos de publicações sobre o tema: Best military smart watches.

Artigos de revistas sobre o tema "Best military smart watches"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Best military smart watches".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.

1

Hedayatnia, Mostafa. "Smart Materials for Silent Alarms". Mechanical Engineering 120, n.º 02 (1 de fevereiro de 1998): 88–89. http://dx.doi.org/10.1115/1.1998-feb-7.

Texto completo da fonte
Resumo:
This article discusses the recent demand for silent alarms. If the device is kept close to a user’s body, such as on her\his wrist or in a back pocket, vibration is well suited for this type of alarm. The technology has been used for sometime in pagers, for example, and the field could someday be expanded to watches and a variety of medical equipment. The most common form of vibrating alert involves a motor that rotates an eccentric weight in an electromagnetic field. However, the smallest of these motors is still too large to fit in watches and other consumer products. Piezoceramic materials can produce motion by receiving electric potential across their polarized surfaces. Using finite-element analysis and optimization, engineers at Philips Corp. in Sunnyvale, Calif., have developed a miniature vibrator/piezo-bender that consumes only 8 milliamperes. In addition to optimization and actual shake tests, ergonomic research has been done to find the best way of improving the vibration performance of these silent alarms. Although the piezo-vibrator device shook strongly enough to get the wearer's attention in most environmental circumstances, that awareness improved greatly when vibrations were pulsed or interrupted.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Vasuki, P., Sesu Priya A e Soundarya R. "A Smart Watchdog - Intruder Detection System". International Journal of Engineering & Technology 7, n.º 3.34 (1 de setembro de 2018): 231. http://dx.doi.org/10.14419/ijet.v7i3.34.18971.

Texto completo da fonte
Resumo:
In todays world, Security is a matter of great concern. Security controls play a vital role in protecting resources from espionage, sabotage, damage and theft. Our proposed system is to develop a security system with improved facilities, which tries to eliminate the limitations posed by the existing security systems. The current manual security system depends mostly on human involvement, which is prone to error, and the security is concentrated only at the front door which requires subjects cooperation. To solve these issues we have proposed a Smart Watchdog System. The system watches the environment, and if there is a human activity, the system captures it. The system automatically detects faces of the individual from the activity using firmware. We have planned to maintain the database of authorised inmates and workers of a place and verifies of every individual arriver. This feature enables the system to automatically recognises the unauthorised users and gives an alert when it encounters entry of unauthorised users even without the human assistance. The system also detects the unauthorised entry in the mass. The entire system is planned to be ported to Raspberry-Pi based Embedded System supported with DC power back up. This method can be employed in ladies hostels as well as to the secured places like the data centre, atomic research centre and military where the unauthorised entry is restricted.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Singh, Soram Ranbir, e Khan Kumar Ajoy. "An Elliptic Curve based Key Management Scheme for Wireless Sensor Networks". Journal of Computational and Theoretical Nanoscience 17, n.º 1 (1 de janeiro de 2020): 409–17. http://dx.doi.org/10.1166/jctn.2020.8683.

Texto completo da fonte
Resumo:
Wireless sensor network (WSN) is a growing expertise which has been used in many areas such as airports, smart watches, smart cities, smart health organizations, and smart homes. It has provided mankind with a lot of benefits in different areas and domains. They are also used in disaster management, habitat monitoring in forests, and many applications in hostile areas such as military; therefore, there is a need to enforce security policy. Also, in many instances of data transfer in WSNs, there is a need of stricter authentication process. Presently, authentication in WSNs is commonly achieved through the use of usernames and passwords. A wicked attacker can impersonate to the network as a genuine user by using stolen password(s). This is chiefly due to the lack of proper key management scheme(s) currently available for WSNs. Moreover, because of limited memory and computing power, it is problematic to decide the proper key management system for WSNs. We propose a key management scheme (KMS) for WSNs using an elliptic curve in this paper. The proposed KMS is implemented in Java SE 6(Mustang) and evaluated for critical performance by using an elliptic curve in a WSN of varied cluster head (CH) sizes.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Chang, Ray-I., Tzu-Chieh Lin e Jeng-Wei Lin. "A Vehicle Passive Entry Passive Start System with the Intelligent Internet of Things". Electronics 13, n.º 13 (26 de junho de 2024): 2506. http://dx.doi.org/10.3390/electronics13132506.

Texto completo da fonte
Resumo:
With the development of sensor and communication technologies, the Internet of Things (IoT) subsystem is gradually becoming a crucial part in vehicles. It can effectively enhance functionalities of vehicles. However, new attack types are also emerging. For example, a driver with the smart key in their pocket can push the start button to start a car. At the same time, security issues in the push-to-start scenario are pervasive, such as smart key forgery. In this study, we propose a vehicle Passive Entry Passive Start (PEPS) system that adopts deep learning algorithms to recognize the driver using the electrocardiogram (ECG) signals measured on the driver’s smart watch. ECG signals are used for personal identification. Smart watches, serving as new smart keys of the PEPS system, can improve convenience and security. In the experiment, we consider commercial smart watches capable of sensing ECG signals. The sample rate and precision are typically lower than those of a 12-lead ECG used in hospitals. The experimental results show that Long Short-Term Memory (LSTM) models achieve the best accuracy score for identity recognition (91%) when a single ECG cycle is used. However, it takes at least 30 min for training. The training of a personalized Auto Encoder model takes only 5 min for each subject. When 15 continuous ECG cycles are sensed and used, this can achieve 100% identity accuracy. As the personalized Auto Encoder model is an unsupervised learning one-class recognizer, it can be trained using only the driver’s ECG signal. This will simplify the management of ECG recordings extremely, as well as the integration of the proposed technology into PEPS vehicles. A FIDO (Fast Identify Online)-like environment for the proposed PEPS system is discussed. Public key cryptography is adopted for communication between the smart watch and the PEPS car. The driver is first verified on the smart watch via local ECG biometric authentication, and then identified by the PEPS car. Phishing attacks, MITM (man in the middle) attacks, and replay attacks can be effectively prevented.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Sharma, Richa, Shalli Rani e Deepali Gupta. "Stress Detection Using Machine Learning Classifiers in Internet of Things Environment". Journal of Computational and Theoretical Nanoscience 16, n.º 10 (1 de outubro de 2019): 4214–19. http://dx.doi.org/10.1166/jctn.2019.8502.

Texto completo da fonte
Resumo:
Over the years, Recommender systems have emerged as a means to provide relevant content to the users, be it in the field of entertainment, social-network, health, education, travel, food or tourism. Further,with the expeditious development of Big Data and Internet of Things (IoT), technology has successfully associated with our everyday life activities with smart healthcare being one. The global acceptance towards smart watches, wearable devices or wearable biosensors have paved the way for the evolution of novel applications for personalized eHealth and mHealth technologies. The data gathered by wearables can further be interpreted using Machine learning algorithms and shared with healthcare experts to provide suitable recommendations. In this work, we study the role of recommender systems in IoT and Cloud and vice-versa. Further, we have analyzed the performance of different machine learning techniques on SWELL dataset. Based on the results, it is observed that 2 Class Neural network performs the best with 98% accuracy.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

C, Vijesh Joe, e Jennifer S. Raj. "Location-based Orientation Context Dependent Recommender System for Users". March 2021 3, n.º 1 (10 de abril de 2021): 14–23. http://dx.doi.org/10.36548/jtcsst.2021.1.002.

Texto completo da fonte
Resumo:
As the technology revolving around IoT sensors develops in a rapid manner, the subsequent social networks that are essential for the growth of the system will be utilized as a means to filter the objects that are preferred by the consumers. The ultimate purpose of the system is to give the customers personalized recommendations based on their preference. Similarly, the location and orientation will also play a crucial role in identifying the preference of the customer is a more efficient manner. Almost all social networks make use of location information to provide better services to the users based on the research performed. Hence there is a need for developing a recommender system that is dependent on location. In this paper, we have incorporated a recommender system that makes use of recommender algorithm that is personalized to take into consideration the context of the user. The preference of the user is analysed with the help of IoT smart devices like the smart watches, Google home, smart phones, ipads etc. The user preferences are obtained from these devices and will enable the recommender system to gauge the best resources. The results based on evaluation are compared with that of the content-based recommender algorithm and collaborative filtering to enable the recommendation engine’s power.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Sriram, Arram, G. Sekhar Reddy, G. L. Anand Babu, Prashant Bachanna, Singh Chhabra Gurpreet, Vishal Moyal, D. C. Shubhangi et al. "A Smart Solution for Cancer Patient Monitoring Based on Internet of Medical Things Using Machine Learning Approach". Evidence-Based Complementary and Alternative Medicine 2022 (24 de junho de 2022): 1–6. http://dx.doi.org/10.1155/2022/2056807.

Texto completo da fonte
Resumo:
The Internet of Medical Things (IoMT) is a huge, exciting new phenomenon that is changing the world of technology and innovating various industries, including healthcare. It has specific applications and changes in the medical world based on what can be done for clinical workflow models. The first and most fundamental thing that IoMT does in healthcare is to bring a flood of new data into medical processes. In this study, an efficient Internet of Medical Things based cancer detection model was proposed. In fact, for many, new fitness monitors and watches are one of the best examples on the Internet; these mobile, portable, wearable devices can record real-time heart rate, blood pressure, and eye movement of cancer patients. These details are sent to doctors or anywhere else. The proposed method leads to a kind of big data renaissance in the health service. The proposed model gets more accuracy while comparing with the existing models. This will help the doctors to analyze the patients’ health report and provides better treatment.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Shukri, Sarah E., Rizik Al-Sayyed, Hamed Al-Bdour, Esraa Alhenawi, Tamara Almarabeh e Hiba Mohammad. "Internet of Things: Underwater routing based on user’s health status for smart diving". International Journal of Data and Network Science 7, n.º 4 (2023): 1715–28. http://dx.doi.org/10.5267/j.ijdns.2023.7.019.

Texto completo da fonte
Resumo:
Technological advancements affect everyday life; they benefited our daily routines, habits, and activities. Underwater diving is one of the most interesting and attractive activities for tourists worldwide but could be risky and challenging. When paths are not clear, diving might take additional time and effort leading to some health problems. Thus, providing divers with proper direction information to surf underwater can be useful and helpful. Also, monitoring diverse health statuses and alerting them in case of any undesirable condition can increase their safety. Smart devices such as mobiles, watches, sensor devices, cellular networks along with the Internet of Things (IoT) can all provide location-based services. Such services can help in providing the best path for the divers and monitor their health status during diving. This paper proposes a new underwater routing approach, called Underwater Routing for Smart Diving “URSD”, which provides divers with routing information to visit underwater cultural or natural resources and monitors their health status during the diving period. The URSD approach was simulated and compared with the shortest path. Results showed that the URSD helped divers to route within paths that have a larger number of nodes, furthermore, it could enhance and improve divers experience and help them mitigate underwater risks.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Khwaounjoo, Prashanna, Gurleen Singh, Sophie Grenfell, Burak Özsoy, Michael R. MacAskill, Tim J. Anderson e Yusuf O. Çakmak. "Non-Contact Hand Movement Analysis for Optimal Configuration of Smart Sensors to Capture Parkinson’s Disease Hand Tremor". Sensors 22, n.º 12 (18 de junho de 2022): 4613. http://dx.doi.org/10.3390/s22124613.

Texto completo da fonte
Resumo:
Parkinson’s disease affects millions worldwide with a large rise in expected burden over the coming decades. More easily accessible tools and techniques to diagnose and monitor Parkinson’s disease can improve the quality of life of patients. With the advent of new wearable technologies such as smart rings and watches, this is within reach. However, it is unclear what method for these new technologies may provide the best opportunity to capture the patient-specific severity. This study investigates which locations on the hand can be used to capture and monitor maximal movement/tremor severity. Using a Leap Motion device and custom-made software the volume, velocity, acceleration, and frequency of Parkinson’s (n = 55, all right-handed, majority right-sided onset) patients’ hand locations (25 joints inclusive of all fingers/thumb and the wrist) were captured simultaneously. Distal locations of the right hand, i.e., the ends of fingers and the wrist showed significant trends (p < 0.05) towards having the largest movement velocities and accelerations. The right hand, compared with the left hand, showed significantly greater volumes, velocities, and accelerations (p < 0.01). Supplementary analysis showed that the volumes, acceleration, and velocities had significant correlations (p < 0.001) with clinical MDS-UPDRS scores, indicating the potential suitability of using these metrics for monitoring disease progression. Maximal movements at the distal hand and wrist area indicate that these locations are best suited to capture hand tremor movements and monitor Parkinson’s disease.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Alekhya, B. "Design and Development of Wearable Antenna: A Literature review". International Journal for Research in Applied Science and Engineering Technology 10, n.º 6 (30 de junho de 2022): 2124–27. http://dx.doi.org/10.22214/ijraset.2022.44247.

Texto completo da fonte
Resumo:
Abstract: Wearable electronics and its related technologie’s demand is growing tremendously in recent years .The major developments that accelerated this growth are decrement in the size of wireless devices, advancement of high-speed wireless networks, accessibility of ultra-compact, evolving battery technologies. Most of the Wearable electronic devices for example smart watches, wristbands, rings etc; we use various types of antennas to sense, fetch, and exchange data wirelessly. As one of the best antennas in many terms like compact size, flexibility and easy design is the micrpstrip patch antenna, therefore designing of the same is done. We are designing a microstrip patch antenna as a wearable antenna for its main usage in WBAN (Wideband Body Area Network). The software of CST studio suite which is a 3D electromagnetic analyzer is udes to design the required antenna, where the methodology of cascading of two antennas is taken into account for the design with required gain.
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Shim, Dongsub, Zheda Mai, Jihwan Jeong, Scott Sanner, Hyunwoo Kim e Jongseong Jang. "Online Class-Incremental Continual Learning with Adversarial Shapley Value". Proceedings of the AAAI Conference on Artificial Intelligence 35, n.º 11 (18 de maio de 2021): 9630–38. http://dx.doi.org/10.1609/aaai.v35i11.17159.

Texto completo da fonte
Resumo:
As image-based deep learning becomes pervasive on every device, from cell phones to smart watches, there is a growing need to develop methods that continually learn from data while minimizing memory footprint and power consumption. While memory replay techniques have shown exceptional promise for this task of continual learning, the best method for selecting which buffered images to replay is still an open question. In this paper, we specifically focus on the online class-incremental setting where a model needs to learn new classes continually from an online data stream. To this end, we contribute a novel Adversarial Shapley value scoring method that scores memory data samples according to their ability to preserve latent decision boundaries for previously observed classes (to maintain learning stability and avoid forgetting) while interfering with latent decision boundaries of current classes being learned (to encourage plasticity and optimal learning of new class boundaries). Overall, we observe that our proposed ASER method provides competitive or improved performance compared to state-of-the-art replay-based continual learning methods on a variety of datasets.
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Johnson, Elizabeth A., e Jane M. Carrington. "Cyber-Situational Awarenss in Clinical Trials Using Wearable Device Technology". Proceedings of the International Symposium on Human Factors and Ergonomics in Health Care 10, n.º 1 (junho de 2021): 33–36. http://dx.doi.org/10.1177/2327857921101011.

Texto completo da fonte
Resumo:
It is estimated 1 in 3 clinical trials utilize a wearable device to gather real-time participant data, including sleep habits, telemetry, and physical activity. While wearable technologies (including smart watches, USBs, and implantable devices) have been revolutionary in their ability to provide a higher precision and accuracy to data acquisition external to the research milieu, there is hesitancy among providers and participants alike given security concerns, perception of cyber-related threats, and meaning attributed to privacy issues. The purpose of this research is to define cyber-situational awareness (CSA) as it pertains to clinical trials, evaluate its current measurement, and describe best practices for research investigators and trial participants to enhance protections in the digital age. This paper reviews integrated elements of CSA within the process of informed consent when wearable devices are implemented for trial procedures. Evaluation of CSA as part of informed consent allows the research site to support the participant in knowledge gaps surrounding the technology while also providing feedback to the trial sponsor as to technology improvements to enhance usability and wearability of the device.
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Blasco, Jorge, e Pedro Peris-Lopez. "On the Feasibility of Low-Cost Wearable Sensors for Multi-Modal Biometric Verification". Sensors 18, n.º 9 (24 de agosto de 2018): 2782. http://dx.doi.org/10.3390/s18092782.

Texto completo da fonte
Resumo:
Biometric systems designed on wearable technology have substantial differences from traditional biometric systems. Due to their wearable nature, they generally capture noisier signals and can only be trained with signals belonging to the device user (biometric verification). In this article, we assess the feasibility of using low-cost wearable sensors—photoplethysmogram (PPG), electrocardiogram (ECG), accelerometer (ACC), and galvanic skin response (GSR)—for biometric verification. We present a prototype, built with low-cost wearable sensors, that was used to capture data from 25 subjects while seated (at resting state), walking, and seated (after a gentle stroll). We used this data to evaluate how the different combinations of signals affected the biometric verification process. Our results showed that the low-cost sensors currently being embedded in many fitness bands and smart-watches can be combined to enable biometric verification. We report and compare the results obtained by all tested configurations. Our best configuration, which uses ECG, PPG and GSR, obtained 0.99 area under the curve and 0.02 equal error rate with only 60 s of training data. We have made our dataset public so that our work can be compared with proposals developed by other researchers.
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Maleczek, Stanisław, Marcin Szczepaniak, Norbert Radek, Stanisław Kowalkowski e Krzysztof A. Bogdanowicz. "Tests of Acid Batteries for Hybrid Energy Storage and Buffering System—A Technical Approach". Energies 15, n.º 10 (11 de maio de 2022): 3514. http://dx.doi.org/10.3390/en15103514.

Texto completo da fonte
Resumo:
Many armies around the world showed an increasing interest for the technology of renewable energy sources for military applications. However, to profit fully from solar or wind energy, an energy storage system is needed. In this article, we present an energy storage system based on acid-lead batteries as a component of a modular generation-storage as a model of military “smart camp”. We proposed a technical approach to study four different types of batteries: DEEP CYCLE, AGM, WET and VRLA in laboratory and real conditions typical for military equipment. It was observed that the best performance was observed for AGM battery in terms of the highest cold cracking amperage equal to 1205 A combined with the most compact construction and resistance to varying thermal conditions from −25 °C, 25 °C and 50 °C. Additionally, a 12-month long-term testing in real conditions revealed that AGM and VRLA showed decrease in capacity value maintaining only approx. 80% of initial value.
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Udovychenko, V., e I. Petrovskyi. "Restoring belligerent-recreational systems through smart specialization tools: challenges and opportunities". Constructive geography and rational use of natural resources, n.º 4 (2024): 81–87. http://dx.doi.org/10.17721/2786-4561.2024.4.special-12/19.

Texto completo da fonte
Resumo:
The article examines key aspects, challenges, and opportunities, as well as tools of smart specialization for the restoration of belligerent-recreational systems that integrate defence capabilities and socio-economic recovery of regions affected by military conflicts or crises. The authors analyse the critical role of these systems in ensuring the security, stability, and prosperity of affected communities, highlighting rapid infrastructure restoration, economic recovery, psychological rehabilitation of the population, and enhancement of the country's international image as main aspects of such recovery. Special attention is given to smart specialization as a strategic tool that promotes the concentration of resources on key innovative areas that best leverage the region’s unique advantages. The article also discusses the main mechanisms of implementing smart specialization, methods, approaches, as well as challenges and opportunities arising in its implementation, illustrating real examples of successful innovation hubs and clusters. The use of smart specialization in the context of recovery not only addresses current challenges but also lays the foundation for sustainable development and long-term stability in post-conflict regions.
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Amertet, Sairoel, Girma Gebresenbet e Hassan Mohammed Alwan. "Modeling of Unmanned Aerial Vehicles for Smart Agriculture Systems Using Hybrid Fuzzy PID Controllers". Applied Sciences 14, n.º 8 (19 de abril de 2024): 3458. http://dx.doi.org/10.3390/app14083458.

Texto completo da fonte
Resumo:
Unmanned aerial vehicles have a wide range of uses in the military field, non-combat situations, and civil works. Due to their ease of operation, unmanned aerial vehicles (UAVs) are highly sought after by farmers and are considered the best agricultural technologies, since different types of controller algorithms are being integrated into drone systems, making drones the most affordable option for smart agriculture sectors. PID controllers are among the controllers frequently incorporated into drone systems. Although PID controllers are frequently used in drones, they have some limitations, such as sensitivity to noise and measurement errors, which can lead to instability or oscillations in the system. On the other hand, PID controllers provide improved accuracy in drone system responses. When using PID controllers to achieve the best performance in a drone system, it is better to share the advantages of PID controllers with other intelligence controllers. One promising option is the fuzzy PID controller. The aim of this study was to control quadcopter states (rolling, altitude, and airspeed) by leveraging quadcopter technology and adding hybrid fuzzy PID controls into the system. The quadcopter system and its controllers were mathematically modeled using the Simulink/MATLAB platform, and the system was controlled by fuzzy PID controllers. For validation purposes, the fuzzy PID controller was compared with a classically tuned PID controller. For roll, height, and airspeed, the fuzzy PID controller provided an improvement of 41.5%, 11%, and 44%, respectively, over the classically tuned PID controller. Therefore, the fuzzy PID controller best suits the needs of farmers and is compatible with smart agriculture systems.
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Rajesh, Dr M. V., P. V. V. S. Srinivas e A. Lakshmanarao. "Intensive Analysis of Routing Algorithm Detection over Mobile Ad hoc Network Using Machine Learning". International Journal of Electrical and Electronics Research 10, n.º 4 (30 de dezembro de 2022): 963–68. http://dx.doi.org/10.37391/ijeer.100435.

Texto completo da fonte
Resumo:
As we are in the Digital Era, in our daily life activities we use different types of communication devices like Mobile Phone, Laptops, Smart watches, etc. and In Common these Mobile Devices allows users to access Information and Services through wireless mode. Basically, there are two types of wireless Networks they are Infrastructure and Infrastructure less Networks. This Infrastructure Network is known as Cellular Networks, they are stationary components, and they used to connect the Mobile Nodes within the Network. But this Infrastructure less Network is also known as Mobile Ad hoc Network (MANET). MANET consist of no fixed Routers and unlimited Nodes. They are Dynamic in Nature. They can move at any direction and at any Movement. It forms a temporary Network for Data Transmission Purpose from Source and Destination. There can be any number of Nodes in Between Source to Destination. Here this Transmission of data is taken place with an Optimal Path in the MANET. This MANET is preferred to be used during Natural Calamities and for Military Operations. Here the node will be created first for communication in this proposed research work. Then the Machine Learning Algorithm will be applied after the node creation. There will be n numbers of nodes, one is master and the n-1 are treated as slaves. The Master node will be concluded by using Highest Network range. The charge will be checked and maintained by Machine Learning Algorithm. Again, Master will update the information. Here ML Algorithm will be act as data centers. The Master node will be changed as per their Capacities based on ML algorithm. In this research work we will discuss about the process of Routing, which will be carried by DSR Algorithm which is more responsive when compared with AODV and DSDV.
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Shi, Wei, Meichen Duan, Hui He, Liangliang Lin, Chen Yang, Chenhao Li e Jizhong Zhao. "Location Adaptive Motion Recognition Based on Wi-Fi Feature Enhancement". Applied Sciences 13, n.º 3 (18 de janeiro de 2023): 1320. http://dx.doi.org/10.3390/app13031320.

Texto completo da fonte
Resumo:
Action recognition is essential in security monitoring, home care, and behavior analysis. Traditional solutions usually leverage particular devices, such as smart watches, infrared/visible cameras, etc. These methods may narrow the application areas due to the risk of privacy leakage, high equipment cost, and over/under-exposure. Using wireless signals for motion recognition can effectively avoid the above problems. However, the motion recognition technology based on Wi-Fi signals currently has some defects, such as low resolution caused by narrow signal bandwidth, poor environmental adaptability caused by the multi-path effect, etc., which make it hard for commercial applications. To solve the above problems, we first propose and implement a position adaptive motion recognition method based on Wi-Fi feature enhancement, which is composed of an enhanced Wi-Fi features module and an enhanced convolution Transformer network. Meanwhile, we improve the generalization ability in the signal processing stage to avoid building an extremely complex model and reduce the demand for system hardware. To verify the generalization of the method, we implement real-world experiments using 9300 network cards and the PicoScenes software platform for data acquisition and processing. By contrast with the baseline method using original channel state information(CSI) data, the average accuracy of our algorithm is improved by 14% in different positions and over 16% in different orientations. Meanwhile, our method has best performance with an accuracy of 90.33% compared with the existing models on public datasets WiAR and WiDAR.
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Wittenberg, Th, R. Koch, N. Pfeiffer, N. Lang, M. Struck, O. Amft e B. Eskofier. "Evaluation of HRV estimation algorithms from PPG data using neural networks". Current Directions in Biomedical Engineering 6, n.º 3 (1 de setembro de 2020): 505–9. http://dx.doi.org/10.1515/cdbme-2020-3130.

Texto completo da fonte
Resumo:
AbstractHeart rate variability (HRV) is a powerful measure to gain information on the activation of the central nervous system and is thus a strong indicator for the overall health and emotional state of a person. Currently, the gold standard for HRV analysis is the examination of R-peaks in electrocardiograms (ECG), which requires a placement of electrodes on the torso. This is often impracticable, especially for the use in daily routines or 24/7 measurements. Photoplethysmograms (PPG) are an alternative to ECG assessment and are easier to acquire, e.g. by using fitness trackers or smart watches. Nevertheless, PPG data is more susceptible to motion artifacts. Hence, goal of this work is to develop and evaluate an artificial neural network (ANN) approach to estimate the R-peak locations in complex PPG signals. Public data collections were used as benchmark to compare our ANN-based approach to state-of-the-art methods. Results show that ANNs can improve HRV estimation during motion. HRV estimations from baseline methods (decision-tree based and automatic multiscalebased peak detection) were compared with the best performing neural network (3L-GRU) using the TROIKA dataset with respect to reference parameters obtained from a manual selection of the peaks in ECG data. In most cases, the neural network based HRV estimation was closer to the reference HRV compared to baseline methods (lower μ and σ ) Also, σ is smaller for the best performing ANN approach across most HRV parameters. Inclusion of another PPG or acceleration channel did not affect HRV estimation. Although, the neural network learning approach outperforms conventional methods, the examined PPG-based HRV estimation has still accuracy limitations. Nonetheless, the proposed estimation approach opens up new directions for further improvement.
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Mishra, Varun, Samarth Nehe, P. G. V. Sai Karthik, Atharva Gulhane e Navyaa Sharma. "CryptO’Roulette A Smart Approach To Modern Encryption". International Journal of Engineering and Advanced Technology 11, n.º 4 (30 de abril de 2022): 77–80. http://dx.doi.org/10.35940/ijeat.b3311.0411422.

Texto completo da fonte
Resumo:
In a symmetric-key cryptosystem, where the secret key is known to both the sender who encrypts the message (let’s call her Alice) and the receiver who decrypts the message (let's call him Bob). Since the secret key is very important so it cannot be disclosed to any third party that is why it should not be exchanged through any public form of communication because if through any means these keys get leaked all the encrypted messages in the future will be compromised [1].We know that the advent of technology has increased the risks of data thefts and compromising data integrity. So, to secretly exchange the key both the parties must hold some sort of private meeting, therefore they need to establish some private communication channel. This is a difficult task practically speaking in terms of internet communications. [6] These days, the utilization of the Internet is developing quickly throughout the planet, and security is turning into a significant public concern. Already security was a significant issue for military applications yet presently the application region has been improved as more correspondence happens on the web. Cryptography is a computer science platform intended to give security to senders and receivers to communicate and recover secret data about an uncertain channel through a cycle called Encryption/Decryption. Cryptography guarantees that the message ought to be sent without change and that only authorized individuals can open and peruse the message [10].In this paper, we tried to randomize the encryption process so that the data becomes more secure and less vulnerable to hacker attacks. We will use the top 4 best existing encryption algorithms like AES, TripleDES, Rabbit, etc., and use them to randomly encrypt the different segments of the message.
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Koulianos, Athanasios, e Antonios Litke. "Blockchain Technology for Secure Communication and Formation Control in Smart Drone Swarms". Future Internet 15, n.º 10 (19 de outubro de 2023): 344. http://dx.doi.org/10.3390/fi15100344.

Texto completo da fonte
Resumo:
Today, intelligent drone technology is rapidly expanding, particularly in the defense industry. A swarm of drones can communicate, share data, and make the best decisions on their own. Drone swarms can swiftly and effectively carry out missions like surveillance, reconnaissance, and rescue operations, without exposing military troops to hostile conditions. However, there are still significant problems that need to be resolved. One of them is to protect communications on these systems from threat actors. In this paper, we use blockchain technology as a defense mechanism against such issues. Drones can communicate data safely, without the need for a centralized authority (ground station), when using a blockchain to facilitate communication between them in a leader–follower hierarchy structure. Solidity has been used to create a compact, lightweight, and effective smart contract that automates the process of choosing a position in a certain swarm formation structure. Additionally, a mechanism for electing a new leader is proposed. The effectiveness of the presented model is assessed through a simulation that makes use of a DApp we created and Gazebo software. The purpose of this work is to develop a reliable and secure UAV swarm communication system that will enable widespread global adoption by numerous sectors.
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Darwesh, Aso M., e Ramyar Abdolrahman Teimoor. "Node Detection and Tracking in Smart Cities Based on Internet of Things and Machine Learning". UHD Journal of Science and Technology 3, n.º 1 (26 de maio de 2019): 30. http://dx.doi.org/10.21928/uhdjst.v3n1y2019.pp30-38.

Texto completo da fonte
Resumo:
It is essential to know that using technologies in a good manner will facilitate human live. Internet of Things (IoT) used widely due to developments in information and verbal exchange technologies. Some of the most famous fields of IoT applications are Identification, transmission, and healthcare which uses IoT technologies to collect information and recognizing the problem and propose the solution for it. In this paper, we try to find RFID nodes and their location. An Android Application used to provide help for those needed. Finding and detection the actual zone of our users are done by using KNN algorithm. We use 3NN because that model gets a better result in our dataset, for transmission depending on the users’ problem. We use a new equation to find weights that integrated with Dijkstra's algorithm, the equation is to calculate the weight between any two nodes using traffic information and image processing for finding a load of road by counting number of vehicles inside the image that collected from our readers. Dijkstra's algorithm is used to find the best path between source and destination using weights between nodes. The idea is used in healthcare, but can be used in many other fields like, security, Information and Communication Technology and Military.
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Bychkov, Oleksii S., Oleksandr V. Gezerdava, Kseniia K. Dukhnovska, Oksana I. Kovtun e Olga O. Leshchenko. "Fitness Tracker Data Analytics". Control Systems and Computers, n.º 2 (306) (julho de 2024): 65–76. http://dx.doi.org/10.15407/csc.2024.02.065.

Texto completo da fonte
Resumo:
The health status of patients is recorded in various sources, such as medical records, portable devices (smart watches, fitness trackers, etc.), forming a characteristic current health status of patients. The goal of the study was the development of medical card software for the analysis of data from fitness bracelets. This will provide an opportunity to collect data for further use of cluster analysis and improvement of the functionality and accuracy of medical monitoring. The object of the study is the use of linear regression to analyze and predict heart rate based on data collected using fitness bracelets. In order to solve this problem, an information system was developed that uses linear regression to analyze the effect of parameters such as Very Active Distance, Fairly Active Minutes, and Calories on the heart rate (Value). Training and validation were performed on data from fitness bracelets. The results confirm the effectiveness of linear regression in predicting heart rate based on the parameters of fitness bracelets. The accuracy of the model was compared under the conditions of aggregation and without it, which allows us to draw conclusions about the optimal conditions for using linear regression for the analysis of fitness data. The study proves the adequacy of the obtained results according to the Student’s criterion. The calculated Student’s t test is 1.31, with the critical test ¾ 2.62. Which proves the adequacy of the developed model. The results of the study confirm that the linear regression model is an effective tool for individual monitoring and optimization of physical activity based on data from fitness bracelets. It is worth considering that the use of linear regression has its limitations and is not always the best choice for complex nonlinear dependencies. In such cases, other machine learning methods may need to be considered.
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Ko, Li-Wei, Yang Chang, Pei-Lun Wu, Heng-An Tzou, Sheng-Fu Chen, Shih-Chien Tang, Chia-Lung Yeh e Yun-Ju Chen. "Development of a Smart Helmet for Strategical BCI Applications". Sensors 19, n.º 8 (19 de abril de 2019): 1867. http://dx.doi.org/10.3390/s19081867.

Texto completo da fonte
Resumo:
Conducting electrophysiological measurements from human brain function provides a medium for sending commands and messages to the external world, as known as a brain–computer interface (BCI). In this study, we proposed a smart helmet which integrated the novel hygroscopic sponge electrodes and a combat helmet for BCI applications; with the smart helmet, soldiers can carry out extra tasks according to their intentions, i.e., through BCI techniques. There are several existing BCI methods which are distinct from each other; however, mutual issues exist regarding comfort and user acceptability when utilizing such BCI techniques in practical applications; one of the main challenges is the trade-off between using wet and dry electroencephalographic (EEG) electrodes. Recently, several dry EEG electrodes without the necessity of conductive gel have been developed for EEG data collection. Although the gel was claimed to be unnecessary, high contact impedance and low signal-to-noise ratio of dry EEG electrodes have turned out to be the main limitations. In this study, a smart helmet with novel hygroscopic sponge electrodes is developed and investigated for long-term usage of EEG data collection. The existing electrodes and EEG equipment regarding BCI applications were adopted to examine the proposed electrode. In the impedance test of a variety of electrodes, the sponge electrode showed performance averaging 118 kΩ, which was comparable with the best one among existing dry electrodes, which averaged 123 kΩ. The signals acquired from the sponge electrodes and the classic wet electrodes were analyzed with correlation analysis to study the effectiveness. The results indicated that the signals were similar to each other with an average correlation of 90.03% and 82.56% in two-second and ten-second temporal resolutions, respectively, and 97.18% in frequency responses. Furthermore, by applying the proposed differentiable power algorithm to the system, the average accuracy of 21 subjects can reach 91.11% in the steady-state visually evoked potential (SSVEP)-based BCI application regarding a simulated military mission. To sum up, the smart helmet is capable of assisting the soldiers to execute instructions with SSVEP-based BCI when their hands are not available and is a reliable piece of equipment for strategical applications.
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

NGUYEN, Thanh-Tam, Son-Thai LE e Van-Thuy LE. "Adaptive Hyperparameter for Face Recognition". International Journal of Innovative Technology and Exploring Engineering 10, n.º 2 (10 de janeiro de 2021): 116–19. http://dx.doi.org/10.35940/ijitee.c8409.0110321.

Texto completo da fonte
Resumo:
One of the widely used prominent biometric techniques for identity authentication is Face Recognition. It plays an essential role in many areas, such as daily life, public security, finance, the military, and the smart school. The facial recognition task is identifying or verifying the identity of a person base on their face. The first step is face detection, which detects and locates human faces in images and videos. The face match process then finds an identity of the detected face. In recent years there have been many face recognition systems improving the performance based on deep learning models. Deep learning learns representations of the face based on multiple processing layers with multiple levels of feature extraction. This approach has made sufficient improvement in face recognition since 2014, launched by the breakthroughs of DeepFace and DeepID. However, finding a way to choose the best hyperparameters remains an open question. In this paper, we introduce a method for adaptive hyperparameters selection to improve recognition accuracy. The proposed method achieves improvements on three datasets.
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Patel, Ujas, Sudeep Tanwar e Anuja Nair. "Performance Analysis of Video On-demand and Live Video Streaming using Cloud based Services". Scalable Computing: Practice and Experience 21, n.º 3 (1 de agosto de 2020): 479–96. http://dx.doi.org/10.12694/scpe.v21i3.1764.

Texto completo da fonte
Resumo:
The advent of Cyber-Physical Systems (CPS) has brought a revolutionary change coined as a mixture of information, communication, computation, and control. With applications in smart grid, health monitoring, automatic avionics, distributed robotics, etc., CPS is currently an area of attention among the academia and industry. The advancement of mobile communications and embedded technology has made it possible to build large scale CPS consisting of the interconnection of mobile phones. These devices collect information about the surrounding environment at any time anywhere basis through real-time video capture. Video streaming has proven to be a massive industry that is growing rapidly playing an important role in everyday life. Customer-driven approach wanting best experience with quality has to be the core offering of contemporary scenario. Video streaming is categorized into Video-On-Demand Streaming (VoDS) and Live Video Streaming (LVS) showing the current state-of-art opportunities. Many diverse applications of video streaming are military video surveillance using drones, live sports match player face recognition, on-demand video characters recognition, movie summarization like identifying parts of the movie which are viewed many times by different users, movie and series recognition, motion detection, gesture recognition, image segmentation, etc. This paper introduces an approach to develop video analysis on VoD and LVS using cloud-based services and analyzes the impact of Quality of Experience (QoE), cost, and bandwidth on the cloud. To achieve the best user experience for video streaming and video analysis, Content Delivery Network (CDN) offers the best QoE at various analyzed locations using various cloud providers like Amazon Web Services (AWS) CloudFront, Google Cloud CDN, Azure CDN, Akamai CDN, etc.
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Horpenko, Danylo R. "Architecture of a mobile transport route selection system by a team of volunteers in the conditions of the military state". Herald of Advanced Information Technology 6, n.º 2 (3 de julho de 2023): 174–84. http://dx.doi.org/10.15276/hait.06.2023.12.

Texto completo da fonte
Resumo:
The work is devoted to the issue of designing the architecture of a mobile system for choosing the route of cargo transportation and passenger transportation by a team of volunteers under martial law. The system provides support to the decision-maker -the coordinator of the volunteer team in conditions of information uncertainty and dynamic changes in the external environment. The system allows you to receive and take into account operational information about the state of the route segments, which is provided by experts in the role of volunteers.The architecture of the mobile system for the volunteer team in the conditions of dynamic changes is client-server. The client sends data entered by volunteer experts to the server using a mobile phone or Internet connection. The volunteer team coordinator's mobile device is the server of the volunteer team's mobile decision support system. The server has a three-tier architecture: the presentation tier, the application logic tier, and the data tier. At the program logic level, a decision-making subsystem based on the multi-criteria modified Smart method is implemented. As a backup, data from the database on the volunteer team coordinator's device is uploaded to the database located on a remote web server.Based on the developed architecture, a mobile system for building a recommended route for a team of volunteers was developed in Java in Android Studio. As an application of the developed mobile system, a practical example of determining the best of five existing cargo transportation routes is considered
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Kumar Padhi, Prafulla. "Valuation and Inception of Ethical Fashion Smart Wearable Born-Global Speculative Start-up (BGSS)". International Journal of Community Development and Management Studies 1 (2017): 117–48. http://dx.doi.org/10.31355/17.

Texto completo da fonte
Resumo:
NOTE: THIS ARTICLE WAS PUBLISHED WITH THE INFORMING SCIENCE INSTITUTE. Aim/Purpose.............................................................................................................................................................................................. Since the valuation of a born-global speculative start-up (BGSS) has been a guessing game and there is no framework in the literature from ethical fashion smart wearable (EFSW) venture valuation perspective, this research explores to create a holistic model using multi-stage valuation method to valuate BGSS at its inception and investigates how ethical is ethical fashion? Background................................................................................................................................................................................................ The concept of ‘Born-Global’ firm was introduced into business theory during 1988. Nowadays, ventures start with a global vision from their inception to introduce products and services in overseas markets. Speculative investment has been a common practice to start-up expedition. Investors gamble on speculative start-ups. The inception phase of any start-up is the embryonic phase and is, therefore, more speculative than successive phases for additional investments. BGSS at its inception possess no operating history. Today fashion industry is one of the largest industries globally, growing leaps and bounds with valuation at 3 trillion U.S. dollars. The emerging smart fashion wearable market projected to cross US$ 30 billion during 2017. Fashion exists not only in garments but also other wearable such as the bracelet, watches, jewelry, and other accessories. Ethical fashion is all about betterment for the people and community at large. This paper identifies the relevant actors and their impact on the ethical aspects and status of the fashion industry. Methodology............................................................................................................................................................................................... The methodology used in this research both qualitative and quantitative approach. Since ethical fashion is a social phenomenon, the qualitative approach is appropriate to deal with various perspective analysis of ethical fashion using case study on four ethical fashion smart wearable ventures. The quantitative method calibrates the valuation of a BGSS at the inception stage using a noble pragmatic multi-stage valuation method because it provides the incentive to focus on achieving the best risk/cost ratio. Contribution.............................................................................................................................................................................................. This research bestows valuable insight using a noble multi-stage valuation method that has been proven successful based on author´s extensive practice to value BGSS at its inception contributing new knowledge to the literature. The application of informing system to frame the discussion on the inter-disciplinary domain of ethical fashion smart wearable creates awareness for fashion industry stakeholders and academic researchers. Findings.................................................................................................................................................................................................... The analysis shows that BGSS is a contemporary phenomenon since so many smart fashions wearable companies have gone through thought provoking and compelling stories to became successful in a highly competitive smart fashion wearable industry. BGSS concept is a brand-new perspective in the EFSW academic research. The findings of this research provide information to various stakeholders of the fashion industry and benefit to a global community at large with a more nuanced understanding of the changes and challenges of the emerging EFSW industry and the way to measure the valuation of a venture at its inception. Recommendations for Practitioners......................................................................................................................................................... This paper reveals nuance understanding for the practitioners in the BGSS valuation at its inception. Since all the traditional valuation methods have their drawbacks when applied to the inception stage of BGSS, this study recommends using multi-stage valuation method because it provides incentive for the best risk/cost ratio. Fashion brands (designers and other stakeholders) should abide by the ethical criteria to make a difference in the global community at large by reducing degradation of the environmental conditions. For the future of ethical fashion, ethical choices must be an available alternative to customers. Fashion companies need to embark upon design to not only be ethical but also stylish, therefore need to create trust by adopting transparency and integrity throughout the value chain. Fashion brand should take advantage of ethical fashion criteria to provide assurance to consumers with socio-cultural aspects in mind, to promote their fashion collections effectively. Recommendation for Researchers............................................................................................................................................................... More research work needs to be accomplished to have a clear analysis of the ethical fashion perspective to cover environmental, socio-cultural, fair trade, human rights, animal rights and other aspects. It is important to study the various stages of BGSS valuation from growth stage to initial public offering stage and beyond to bridge the gap between academic research and practitioners using the multi-stage valuation method. Impact on Society.......................................................................................................................................................................................... Since ethical fashion is of great significance for the contemporary society, raising awareness among various cultural communities globally to promote avantgarde ways regarding ethical fashion criteria, specifically to curb the degradation of the environment, stopping the cruelty on animals and protecting the human rights among consumers is paramount. Future Research............................................................................................................................................................................................ This study will bridge the gap between practice and academic research, scholars should embark upon creating a total addressable market (TAM) theory and empirical analysis studies because the total addressable market is the key and practical determinant of BGSS success. Ethical fashion academic research should be pursued beyond sustainability on smart wearable.
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Pankova, Liudmyla, Anna Pavlovska e Olena Tarasevych. "Cities of Ukraine in the conditions of information economy: Principles and scenarios of the development of post-military recovery". Proceedings of Scientific Works of Cherkasy State Technological University Series Economic Sciences 24, n.º 4 (1 de novembro de 2023): 28–36. http://dx.doi.org/10.62660/ebcstu/4.2023.28.

Texto completo da fonte
Resumo:
The article is devoted to topical issues of re covery of cities of Ukraine in the post-war period and in the conditions of the progress of the information economy. It is noted that for the comprehensive development of cities today, it is necessary to accumulate and process large amounts of information, to disseminate special information technologies and means of communication. Information is becoming both a tool and a recognized strategic resource for social progress, outlining priorities and scenarios for the development of territories. It is proved that management technologies of labor intellectualization business smart specialization automation of production and services are being recognized and implemented. Cities as centers of concentration of knowledge and resources that provide an information type of development of large and small economic systems, social processes and household activities are becoming the centers of information progress, education and science, emergence and development of the information economy. It is determined that cities of Ukraine in pre-war times effectively implemented measures of the state poli cy of digitalization and digitization as mandatory elements of the formation of the national model of the information economy. This movement was enshrined in strategic plans of the government and business, as well as in legal provisions regulating the econ omy and education. Large losses of the Ukrainian economy from the barbaric destruction of the population and cities by the Russian Federation are emphasized. The need to script the deployment of productive forces and the recovery of the country's cities according to the best standards of world experience and information progress is determined. It is recommended to attract the accumulated pre-war manage rial experience of Ukrainian management and world achievements on the issue of post-war recovery. The key principles of urban recovery scripting taking into account information and innovation progress, namely: knowledge management on integrated management platforms; targeted attraction of resources (intellectual, information, investment, innovation ones, security and targeted management risk analysis; smart oriented development of territories; energy independence; transparency, openness and publicity of urban recovery and development processes are identified. Key managerial approaches to targeted regulati on of the economy of Ukrainian cities, namely: compliance of processes with European and global social progress; harmonious, balanced implementation of national and local interests, targeted attraction of resources and accumulated management knowledge system are considered and systematized. The influence of the information economy on the scenarios of post military recovery of Ukrainian cities is substantiated. Impact characteristics and management processes that will take place from targeted regulation: increase in information security and reduction in the risks of economic activities; changes in information culture and communication support of management activities; information asymmetry in the system of management decision making by business and government
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Khan, Saifullah, Muhammad Zahid Khan, Pervez Khan, Gulzar Mehmood, Ajab Khan e Muhammad Fayaz. "An Ant-Hocnet Routing Protocol Based on Optimized Fuzzy Logic for Swarm of UAVs in FANET". Wireless Communications and Mobile Computing 2022 (23 de junho de 2022): 1–12. http://dx.doi.org/10.1155/2022/6783777.

Texto completo da fonte
Resumo:
Drones or unmanned aircraft are commonly known as unmanned aerial vehicles (UAVs), and the ad hoc network formed by these UAVs is commonly known as Flying Ad Hoc Network (FANET). UAVs and FANET were initially associated with military surveillance and intelligence gathering; moreover, they are now excessively used in civilian roles including search and rescue, traffic monitoring, firefighting, videography, and smart agriculture. However, due to the distinctive architecture, they pose considerable design and deployment challenges, prominently related to routing protocols, as the traditional routing protocols cannot be used directly in FANET. For instance, due to high mobility and sparse topology, frequent link breakage and route maintenance incur high overhead and latency. In this paper, we employ the bio-inspired Ant Colony Optimization (ACO) algorithm called “Ant-Hocnet” based on optimized fuzzy logic to improve routing in FANET. Fuzzy logic is used to analyze the information about the status of the wireless links, such as available bandwidth, node mobility, and link quality, and calculate the best wireless links without a mathematical model. To evaluate and compare our design, we implemented it in the MATLAB simulator. The results show that our approach offers improvements in throughput and end-to-end delays, hence enhancing the reliability and efficiency of the FANET.
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Browne, Sarah, M.-Tahar Kechadi, Shane O'Donnell, Mckenzie Dow, Louise Tully, Gerardine Doyle e Grace O'Malley. "Mobile Health Apps in Pediatric Obesity Treatment: Process Outcomes From a Feasibility Study of a Multicomponent Intervention". JMIR mHealth and uHealth 8, n.º 7 (8 de julho de 2020): e16925. http://dx.doi.org/10.2196/16925.

Texto completo da fonte
Resumo:
Background Multicomponent family interventions underline current best practice in childhood obesity treatment. Mobile health (mHealth) adjuncts that address eating and physical activity behaviors have shown promise in clinical studies. Objective This study aimed to describe process methods for applying an mHealth intervention to reduce the rate of eating and monitor physical activity among children with obesity. Methods The study protocol was designed to incorporate 2 mHealth apps as an adjunct to usual care treatment for obesity. Children and adolescents (aged 9-16 years) with obesity (BMI ≥98th centile) were recruited in person from a weight management service at a tertiary health care center in the Republic of Ireland. Eligible participants and their parents received information leaflets, and informed consent and assent were signed. Participants completed 2 weeks of baseline testing, including behavioral and quality of life questionnaires, anthropometry, rate of eating by Mandolean, and physical activity level using a smart watch and the myBigO smartphone app. Thereafter, participants were randomized to the (1) intervention (usual clinical care+Mandolean training to reduce the rate of eating) or (2) control (usual clinical care) groups. Gender and age group (9.0-12.9 years and 13.0-16.9 years) stratifications were applied. At the end of a 4-week treatment period, participants repeated the 2-week testing period. Process evaluation measures included recruitment, study retention, fidelity parameters, acceptability, and user satisfaction. Results A total of 20 participants were enrolled in the study. A web-based randomization system assigned 8 participants to the intervention group and 12 participants to the control group. Attrition rates were higher among the participants in the intervention group (5/8, 63%) than those in the control group (3/12, 25%). Intervention participants undertook a median of 1.0 training meal using Mandolean (25th centile 0, 75th centile 9.3), which represented 19.2% of planned intervention exposure. Only 50% (9/18) of participants with smart watches logged physical activity data. Significant differences in psychosocial profile were observed at baseline between the groups. The Child Behavior Checklist (CBCL) mean total score was 71.7 (SD 3.1) in the intervention group vs 57.6 (SD 6.6) in the control group, t-test P<.001, and also different among those who completed the planned protocol compared with those who withdrew early (CBCL mean total score 59.0, SD 9.3, vs 67.9, SD 5.6, respectively; t-test P=.04). Conclusions A high early attrition rate was a key barrier to full study implementation. Perceived task burden in combination with behavioral issues may have contributed to attrition. Low exposure to the experimental intervention was explained by poor acceptability of Mandolean as a home-based tool for treatment. Self-monitoring using myBigO and the smartwatch was acceptable among this cohort. Further technical and usability studies are needed to improve adherence in our patient group in the tertiary setting.
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Elfouly, Fatma H., Rabie A. Ramadan, Ahmed Y. Khedr, Kusum Yadav, Ahmad Taher Azar e Mohamed A. Abdelhamed. "Efficient Node Deployment of Large-Scale Heterogeneous Wireless Sensor Networks". Applied Sciences 11, n.º 22 (18 de novembro de 2021): 10924. http://dx.doi.org/10.3390/app112210924.

Texto completo da fonte
Resumo:
Wireless Sensor Networks (WSNs) became essential in developing many applications, including smart cities and Internet of Things (IoT) applications. WSN has been used in many critical applications such as healthcare, military, and transportation. Such applications depend mainly on the performance of the deployed sensor nodes. Therefore, the deployment process has to be perfectly arranged. However, the deployment process for a WSN is challenging due to many of the constraints to be taken into consideration. For instance, mobile nodes are already utilized in many applications, and their localization needs to be considered during the deployment process. Besides, heterogeneous nodes are employed in many recent applications due to their efficiency and cost-effectiveness. Moreover, the development areas might have different properties due to their importance. Those parameters increase the deployment complexity and make it hard to reach the best deployment scheme. This work, therefore, seeks to discover the best deployment plan for a WSN, considering these limitations throughout the deployment process. First, the deployment problem is defined as an optimization problem and mathematically formulated using Integer Linear Programming (ILP) to understand the problem better. The main objective function is to maximize the coverage of a given field with a network lifetime constraint. Nodes’ mobility and heterogeneity are added to the deployment constraints. The importance of the monitored field subareas is also introduced in this paper, where some subareas could have more importance than others. The paper utilizes Swarm Intelligence as a heuristic algorithm for the large-scale deployment problem. Simulation experiments show that the proposed algorithm produces efficient deployment schemes with a high coverage rate and minimum energy consumption compared to some recent algorithms. The proposed algorithm shows more than a 30% improvement in coverage and network lifetime.
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Sarhan, Akram, e Mahdi Jemmali. "Novel intelligent architecture and approximate solution for future networks". PLOS ONE 18, n.º 3 (1 de março de 2023): e0278183. http://dx.doi.org/10.1371/journal.pone.0278183.

Texto completo da fonte
Resumo:
Private networks have become popular for secure data sharing and anonymous communication in many domains: enterprise environments, military, journalism, telecommunication, healthcare, to name a few. It has been used with or without internet connection. Its primary purpose is to provide confidentiality, bypass unlawful activities, and protect against common threats such as interception, modification, and censorship. In addition, several private network technologies exist to support secure communications. However, they mostly rely on encryption only. The transmitted data is classified into different confidentiality levels. This research presents a smart private network architecture scheme that transmits constraint-based classified packets. The main directive of this work is the proposed constraint. This constraint is meant to enforce that if two packets belong to the same confidentiality level, they can’t be transmitted through the two routers simultaneously. Therefore, the studied problem is an NP-hard problem. This paper presents the following contributions: (i) proposes a new architecture paradigm for outsourcing a constraint-based multi-classified data sharing securely and transmitted through two routers; (ii) introduces several algorithms to prove the feasibility for this NP-Hard problem; and (iii) implements the algorithms solutions using C++ and compares their performance. Different metrics are used to measure the performance of the proposed algorithms. Randomized Longest Transmission time first algorithm R L T ¯ scored the best algorithm with a percentage of 73.5% and an average gap of 0.002 according to the experimental results. It is remarkable worthy to note that the execution time of all the algorithms is less than 0.001 s.
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Ibraheem, Kais I., e Hisham M. Khudhur. "Optimization algorithm based on the Euler method for solving fuzzy nonlinear equations". Eastern-European Journal of Enterprise Technologies 1, n.º 4 (115) (25 de fevereiro de 2022): 13–19. http://dx.doi.org/10.15587/1729-4061.2022.252014.

Texto completo da fonte
Resumo:
In a variety of engineering, scientific challenges, mathematics, chemistry, physics, biology, machine learning, deep learning, regression classification, computer science, programming, artificial intelligence, in the military, medical and engineering industries, robotics and smart cars, fuzzy nonlinear equations play a critical role. As a result, in this paper, an Optimization Algorithm based on the Euler Method approach for solving fuzzy nonlinear equations is proposed. In mathematics and computer science, the Euler approach (sometimes called the forward Euler method) is a first-order numerical strategy for solving ordinary differential equations (ODEs) with a specified initial value. The local error is proportional to the square of the step size, while the general error is proportional to the step size, according to the Euler technique. The Euler method is frequently used to create more complicated algorithms. The Optimization Algorithm Based on the Euler Method (OBE) uses the logic of slope differences, which is computed by the Euler approach for global optimizations as a search mechanism for promising logic. Furthermore, the mechanism of the proposed work takes advantage of two active phases: exploration and exploitation to find the most important promising areas within the distinct space and the best solutions globally based on a positive movement towards it. In order to avoid the solution of local optimal and increase the rate of convergence, we use the ESQ mechanism. The optimization algorithm based on the Euler method (OBE) is very efficient in solving fuzzy nonlinear equations and approaches the global minimum and avoids the local minimum. In comparison with the GWO algorithm, we notice a clear superiority of the OBE algorithm in reaching the solution with higher accuracy. We note from the numerical results that the new algorithm is 50 % superior to the GWO algorithm in Example 1, 51 % in Example 2 and 55 % in Example 3.
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Ялама, В. В., М. Г. Хмельнюк, О. Ю. Яковлева e В. В. Трандафілов. "Modern refrigeration solutions for maritime sector and marine refrigeration transport". Refrigeration Engineering and Technology 58, n.º 4 (30 de dezembro de 2022): 184–94. http://dx.doi.org/10.15673/ret.v58i4.2568.

Texto completo da fonte
Resumo:
New coming environmental regulations from International Maritime Organization put each involved actor from ship manager, ship owner to cargo owner into a hard situation for a short time period to change the data collection process, to determine gups considering operating needs, to create an improvement plan according to specific requirements, needs, and goals. It is one more signal, in order to reach the sustainability goal, the industry digitalization process, and available efficient and effective use of technologies should be pushed forward. From cold chain digitalization, refrigeration system maintenance, and retrofitting processes, in particular, data science, process science, and data mining can be used. Refrigeration system retrofitting process modelling is presented by data mining technology. A lack of knowledge and investment in cold chain best practices and infrastructure lead to projects failing. Efficient, controlled, and smart Refrigeration is a challenge for the sustainable refrigeration sector. The global reefer transport market will expand up to 6% from 2020 to 2027 and it is vital for countries involved in military operations as well. The results of energy, exergy, and exergoeconomic analysis of different solutions intended for marine refrigeration transport, the cascade refrigeration system with R717-R744 refrigerants is presented. It was found that the optimum condensation temperature for the refrigerant of the high-temperature circuit is 40 °C, while the boiling temperature of the lower-temperature circuit is -50 °C. The temperature mode can be considered optimal ceteris paribus. The article provides an analysis of ejector refrigeration systems that can be used to improve the energy performance of marine refrigeration plants. It is a recommended issue to consider not only industrial requests but policies, and regulations in the force and in projects development status that can change an organization’s vision and aims of a strategic packet in own turn it can be affected a project budget change for labs, research institutions, shipyards.
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Дудин, М. Н., e О. Ф. Малашкина. "Smart integration: using the venture capital market to organise digital cooperation of Russian high-tech companies across borders". Вестник МИРБИС, n.º 2(30) (9 de junho de 2022): 111–29. http://dx.doi.org/10.25634/mirbis.2022.2.12.

Texto completo da fonte
Resumo:
Статья посвящена исследованию состояния и перспектив использования венчурного рынка в организации трансграничной цифровой кооперации российских высокотехнологичных компаний. Методология. При подготовке теоретического раздела научного исследования, посвященному изучению методов оценки зрелости венчурного рынка и применяемых моделей трансграничной кооперации высокотехнологичных бизнесов, применялись общенаучные методы (наблюдение, сравнение, измерение, анализ и синтез, метод логического рассуждения, критический обзор научной литературы и профессиональных публикаций). Для осуществления анализа количественных параметров состояния российского венчурного рынка использовались конкретно-научные методы (статический анализ, графический метод), для формирования предложений по инкорпорации венчурного рынка в процессы кооперации высокотехнологичных компаний использовался экспертный метод и метод сценариев. Результаты. В рамках научного исследования проведена количественная и качественная оценка развития российского венчурного рынка, определены основные проблемные аспекты, мешающие его более активному участию в организации трансграничной цифровой кооперации российских высокотехнологичных компаний. В завершении исследования были сформулированы предложения по стимулированию процессов инкорпорации агентов венчурного рынка в процессы цифровой кооперации российских высокотехнологичных компаний и оказания им финансовой и управленческой поддержки с учетом опыта лучших мировых практик. Выводы / значимость. В рамках научного исследования было установлено, что основным проблемам повышения вовлеченности венчурного рынка в процессы трансграничной цифровой кооперации российских высокотехнологичных компаний следует отнести: 1) концентрация инновационной активности и высокотехнологичных бизнесов в небольшом портфеле отраслей: ИКТ, биотехнологии, военно-промышленный комплекс; 2) слабые интеграционные связи между российскими частными VC- и PE-фондами; 3) обострение военно-политических противоречий между РФ и мировыми лидерами, приведшее к ограничению и запрету на трансферт технологий и участие в совместных инновационных проектах; 4) поощрение государственным регулятором сотрудничества с государственными объектами инновационной инфраструктуры. К наиболее эффективным предложениям по разрешению проблемных аспектов следует отнести: 1) формирование партнерских связей между венчурными фондами и корпоративными лабораториями / R&D-платформами высокотехнологичных бизнесов; 2) инициация пилотных программ кооперации венчурных фондов и объектов инновационной инфраструктуры в единое пространство; 3) популяризация практики участия венчурных фондов в создании эндаумент-фондов в ведущих университетах; 4) популяризация трансграничной кооперации через инструменты мягкой силы. Применение. Результаты научного исследования состояния и перспектив интеграции венчурного рынка в процессы трансграничной цифровой кооперации российских высокотехнологичных компаний будет полезно экспертам в сфере инновационной политики при формировании прогнозов и сценариев инновационного сотрудничества России со странами-партнёрами ЕАЭС и мировыми центрами инноваций: Китаем, США, ЕС. Ключевые слова: венчурный рынок, цифровая кооперация, открытые инновации, инновационная экосистема, венчурные фонды, эндаумент-фонды, «мягкая сила», Россотрудничество. Smart integration: using the venture capital market to organise digital cooperation of Russian high-tech companies across borders This article explores the status and prospects of using the venture capital market in organizing cross-border digital cooperation among Russian high-tech companies. Methodology. In preparing the theoretical section of the paper, the methods for maturity as-sessment of the venture capital market and models for cross-border cooperation of high-tech busi-nesses were investigated using general scientific methods (observation, comparison, measurement, analysis and synthesis, method of logical reasoning, critical review of scientific literature and profes-sional publications). Quantitative analysis of Russian venture capital market status was performed by using specific scientific methods (static analysis, graphical method), while expert and scenario meth-ods were used to generate proposals on venture capital market incorporation into processes of high-tech companies’ cooperation. Results. The research conducted a quantitative and qualitative assessment of Russian venture capital market development, identified major problematic aspects hindering its more active participa-tion in the organization of cross-border digital cooperation of Russian hi-tech companies. In conclu-sion of the research, we formulated proposals to encourage venture capital market agents to be incor-porated into the processes of digital cooperation among Russian hi-tech companies, and to provide them with financial and managerial support based on the best international practices. Conclusions / Significance. In this research, it was determined that the main problems in in-creasing venture capital market involvement in the processes of cross-border digital cooperation of Russian high-tech companies are as follows: 1) concentration of innovation activity and high-tech businesses in a small portfolio of sectors: ICT, biotechnology, military-industrial complex; 2) weak integration links between Russian private VC and PE funds; 3) aggravation of military and political contradictions between Russia and world leaders, which led to limitations and bans on technology transfer and participation in joint innovation projects; 4) state regulator's encouragement of coopera-tion with state-run innovation infrastructure facilities. The most effective proposals for solving the problematic aspects include: 1) formation of part-nerships between venture funds and corporate laboratories/R&D-platforms of high-tech businesses; 2) initiation of pilot programs of cooperation of venture funds and innovation infrastructure objects into a common space; 3) popularization of the practice of venture funds participation in creation of en-dowment funds in leading universities; 4) popularization of cross-border cooperation through soft power tools. Application. The results of the scientific study of the state and prospects of venture market inte-gration in the processes of cross-border digital cooperation of Russian high-tech companies will be useful to experts in the field of innovation policy in forming forecasts and scenarios of innovative co-operation of Russia with the EAEU partner countries and the world innovation centers: China, the USA and the EU.
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Pikun, Lesia. "The Frank Einstein Books by Jon Scieszka as a Variant of the Literary Game with Cultural Heritage". Vìsnik Marìupolʹsʹkogo deržavnogo unìversitetu Serìâ Fìlologìâ 14, n.º 25 (2021): 79–86. http://dx.doi.org/10.34079/2226-3055-2021-14-25-79-86.

Texto completo da fonte
Resumo:
The article is dedicated to the study of the literary mirror game with the cultural heritage in the Frank Einstein books by Jon Scieszka. The Frank Einstein books were first translated and published in Ukraine in 2019. This article is the first investigation of the Frank Einstein series by J. Scieszka as a literary game. Six Frank Einstein books (“Frank Einstein and the Antimatter Motor” (2014), “Frank Einstein and the Electro-Finger” (2015), ‘Frank Einstein and the BrainTurbo” (2015), “Frank Einstein and the EvoBlaster Belt” (2016), “Frank Einstein and the Bio-Action Gizmo” (2017) and “Frank Einstein and the Space-Time Zipper” (2019)) demonstrate vivid examples of the literary game in the contemporary children’s literature from the positions of the author as a game creator and the reader as a game opponent. J. Scieszka was born in 1954 in Flint, Michigan, USA. The future writer received a varied education. He attended the military academy, then studied English and pre-med at Albion College for his B.A., and in 1980 received a master's degree of Fine Arts in fiction writing at Columbia University. After graduation J. Scieszka worked as a teacher at an elementary school. Teaching schoolchildren, Jon re-discovered how smart they are. School children turned to be the best audience for the weird and funny stories he had always liked to read and write. The books by Jon Scieszka are based on recognizable archetypal plots and iconic characters, which are not presented to the reader in a conserved form, but focused on the current stage of culture and science development. The writer cheerfully and humorously manipulates well-known plots, rewrites established ideas, and interprets familiar literary themes, motives, characters, etc., presented in world-famous science fiction, well-known to the modern young reader. J. Scieszka says that he got his ideas from other books, his kids, kids he had taught, kids he had learned from, watching movies, playing with his cat, talking to his wife. He also includes allusions to his favourite writers – Cervantes, Kafka, Borges, Pynchon, Sterne, Barth, Heller (Scieszka, 2014). J. Scieszka uses a repertoire of prominent scientific and literary samples in his work, such as the character of the scientist Frankenstein by M. Shelley and the theoretical physicist Albert Einstein, the inventor and businessman Thomas Edison, a fictional character Dr. Watson in the Sherlock Holmes stories by Sir Arthur Conan Doyle, the primatologist Jane Goodall. There is a mechanism of mirror doubling in the system of characters: Frankenstein and Frank Einstein, Albert Einstein and Al. Einstein, Klink and Klank, and the complex mirror refraction of Frank Einstein and Watson as Sherlock Holmes and Dr. Watson, Frank Einstein and T. Edison as Sherlock Holmes and Professor Moriarty. The article analyses the well-known literary and scientific achievements that acquire a mirror replay in the books about Frank Einstein. The researcher concludes that the books by J. Sciezska are a source of vivid emotional experiences and motivation for serious readers’ reflection. The author of the article draws attention to the fact that the play field created by J. Scieszka is a product of accumulated cultural content, which activates the human tendency to imitate, assimilate and repeat. This game is a form of conscious assimilation and processing of the universe of intangible and material artifacts, objectified actions and relations created by mankind in the process of mastering nature.
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

"Survey on Stress Detection Using Multiple Sensors through Wearable Devices". International Journal of Advanced Trends in Computer Science and Engineering 10, n.º 2 (5 de abril de 2021): 787–90. http://dx.doi.org/10.30534/ijatcse/2021/461022021.

Texto completo da fonte
Resumo:
An Individual method of living on with a daily existence it directly influences on your overall health. Since stress is the significant infection of our human body. Like depression, heart attack and mental illness. WHO says “Globally, more than 264 million people of all ages suffer from depression.”[8]. Also the report says that most of the time people are stressed because of their work. 10.7% of People disorder with stress, anxiety and depression [8]. There are different method to discovering stress ex. Smart watches, chest belt, and extraordinary machine. Our principle objective is to figure out pressure progressively utilizing smart watches through their Sensor. There are different kinds of sensor available to find stress such as PPG, GSR, HRV, ECG and temperature. Smart watches contain a wide range of data through various sensor. This kind of gathered information are applied on various machine learning method. Like linear regression, SVM, KNN, decision tree. Technique have distinct, comparing accuracy and chooses best Machine learning model. This paper investigation have different analysis to find and compare accuracy by various sensors data. It is also check whether using one sensor or multiple sensors such as HRV, ECG or GSR and PPG to predict the better accuracy score for stress detection.
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Raji, Rafiu King, Jian Lin Han, Zixing Li e Lihua Gong. "Review of development trends in smart shoe applications". Sensor Review, 17 de abril de 2024. http://dx.doi.org/10.1108/sr-04-2023-0093.

Texto completo da fonte
Resumo:
Purpose At the moment, in terms of both research and commercial products, smart shoe technology and applications seem not to attract the same magnitude of attention compared to smart garments and other smart wearables such as wrist watches and wrist bands. The purpose of this study is to fill this knowledge gap by discussing issues regarding smart shoe sensing technologies, smart shoe sensor placements, factors that affect sensor placements and finally the areas of smart shoe applications. Design/methodology/approach Through a review of relevant literature, this study first and foremost attempts to explain what constitutes a smart shoe and subsequently discusses the current trends in smart shoe applications. Discussed in this study are relevant sensing technologies, sensor placement and areas of smart shoe applications. Findings This study outlined 13 important areas of smart shoe applications. It also uncovered that majority of smart shoe functionality are physical activity tracking, health rehabilitation and ambulation assistance for the blind. Also highlighted in this review are some of the bottlenecks of smart shoe development. Originality/value To the best of the authors’ knowledge, this is the first comprehensive review paper focused on smart shoe applications, and therefore serves as an apt reference for researchers within the field of smart footwear.
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

"Shri-Shape UWB Wearable Antenna & its Performance with Human Tissue". International Journal of Recent Technology and Engineering 8, n.º 3 (30 de setembro de 2019): 7727–30. http://dx.doi.org/10.35940/ijrte.c6293.098319.

Texto completo da fonte
Resumo:
Wearable technology is growing technology in today’s wireless world. So, there is great demand for wearable devices comprising wearable antenna. Wearable antenna has to be worn on the human body in the form of jackets, wrist watches, glasses, smart clothing, head-mounted displays, GPS shoes etc. Wearable antenna is major part in all the devices. These devices can be used for health monitoring, physical training, navigation, RFID, military, medical, human safety and security applications. Radiations from such antenna greatly effects on the human body parts. This paper represents a novel structure for UWB wearable applications. The major focus is given on effect of antenna on human body. Along with the VSWR, return loss, bandwidth, specific absorption rate (SAR) has been measured using equivalent head model. The structure is designed using Rogers 5880 as substrate material and compared with FR4, polyester, flannel, jean fabric using Ansys HFSS simulation software. All structures are designed to work in the UWB range (1 to 10GHz and above) useful for wearable applications.
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Kamarudin, Nur Khairani, Ahmad Firdaus, Azlee Zabidi, Ferda Ernawan, Syifak Izhar Hisham e Mohd Faizal Ab Razak. "Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)". Journal of Intelligent & Fuzzy Systems, 10 de novembro de 2022, 1–15. http://dx.doi.org/10.3233/jifs-222612.

Texto completo da fonte
Resumo:
Many smart mobile devices, including smartphones, smart televisions, smart watches, and smart vacuums, have been powered by Android devices. Therefore, mobile devices have become the prime target for malware attacks due to their rapid development and utilization. Many security practitioners have adopted different approaches to detect malware. However, its attacks continuously evolve and spread, and the number of attacks is still increasing. Hence, it is important to detect Android malware since it could expose a great threat to the users. However, in machine learning intelligence detection, too many insignificant features will decrease the percentage of the detection’s accuracy. Therefore, there is a need to discover the significant features in a minimal amount to assist with machine learning detection. Consequently, this study proposes the Pearson correlation coefficient (PMCC), a coefficient that measures the linear relationship between all features. Afterwards, this study adopts the heatmap method to visualize the PMCC value in the color of the heat version. For machine learning classification algorithms, we used a type of fuzzy logic called lattice reasoning. This experiment used real 3799 Android samples with 217 features and achieved the best accuracy rate of detection of more than 98% by using Unordered Fuzzy Rule Induction (FURIA).
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Smyth, Barry, Aonghus Lawlor, Jakim Berndsen e Ciara Feely. "Recommendations for marathon runners: on the application of recommender systems and machine learning to support recreational marathon runners". User Modeling and User-Adapted Interaction, 18 de agosto de 2021. http://dx.doi.org/10.1007/s11257-021-09299-3.

Texto completo da fonte
Resumo:
AbstractEvery year millions of people, from all walks of life, spend months training to run a traditional marathon. For some it is about becoming fit enough to complete the gruelling 26.2 mile (42.2 km) distance. For others, it is about improving their fitness, to achieve a new personal-best finish-time. In this paper, we argue that the complexities of training for a marathon, combined with the availability of real-time activity data, provide a unique and worthwhile opportunity for machine learning and for recommender systems techniques to support runners as they train, race, and recover. We present a number of case studies—a mix of original research plus some recent results—to highlight what can be achieved using the type of activity data that is routinely collected by the current generation of mobile fitness apps, smart watches, and wearable sensors.
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

McWhorter, Stephanie, Cynthia Simon-Arndt e Lori Carlson. "Overview of Navy Medicine’s Limited Duty Patient Population". Military Medicine, 23 de novembro de 2022. http://dx.doi.org/10.1093/milmed/usac348.

Texto completo da fonte
Resumo:
ABSTRACT Introduction U.S. Navy Medicine’s temporary limited duty (LIMDU) program is the primary vehicle for managing the medical care and subsequent career outcomes of the ill and injured active component (AC) Sailors and Marines to ensure a medically ready force. Before the LIMDU Sailor and Marine Readiness Tracker System (SMART) came online, it was very difficult to examine LIMDU program administration metrics, patients’ experiences during LIMDU, and their subsequent health and career outcomes. This study examined the LIMDU patient population’s demographic, military career, and LIMDU-specific characteristics; identified characteristics that differed significantly by military service; and evaluated potentially modifiable factors associated with patient outcomes. Materials and Methods A comprehensive SMART extract was used to identify all AC Sailors and Marines in active LIMDU status between October 1, 2016, and September 30, 2019. The SMART extract was merged with comprehensive administrative military personnel data by patient identifiers to create a longitudinal dataset and to conduct descriptive statistics, bivariate, and multivariate logistic regression analyses for this study. The sample included 26,591 AC Sailors and Marines with complete SMART and military personnel records who ended LIMDU on or before September 30, 2019. Results During the study’s 3-year period, Navy Medicine’s rate of initial LIMDU entry by AC personnel increased each year from 2,041 in FY2017 to 2,424 in FY2019 per 100,000 personnel. At the time of initial entry, most LIMDU patients were male (76%), E4–E6 paygrades (54%), and had a single diagnosis recorded in their SMART records (66%). Pain patients (23%) constituted the largest diagnostic group, followed closely by musculoskeletal patients (23%), and then mental and behavioral health patients (20%). Variables that might reflect administration practices of the program did not differ significantly by service, suggesting good internal standardization of LIMDU administration across Navy Medicine. However, bivariate and multivariate analyses identified significant differences by service for almost all personal demographic, LIMDU-specific, and post-LIMDU military career sample characteristics measured at the last LIMDU close date or later. Study results suggested that the Navy and Marine Corps referred Sailors and Marines to start LIMDU for different medical reasons; to receive care from different military treatment facilities; to close LIMDU with different final actions; and to experience different post-LIMDU career outcomes. Conclusion Navy Medicine’s SMART data is an important new resource for LIMDU program evaluation and population-level patient research, despite the data limitations and concerns identified and addressed by this study. The study results provide a baseline empirical understanding about the LIMDU patient population. Further research is necessary to interrogate the validity of these results over a longer period and to initiate other lines of inquiry. While the construction of the larger project’s LIMDU patient population longitudinal dataset required a significant initial investment, future dividends from ongoing work are anticipated. Results derived from verified SMART data will benefit Navy Medicine, operational commands, and LIMDU patients alike by informing continuing efforts to improve patient health and career outcomes, identify and implement best clinical and administrative practices, and optimize force readiness.
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

BUGULASHVILI, Medea, e Jonathan Gerdes SCOTT. "“Getting Smarter” with Joseph Nye". Journal in Humanities 11, n.º 1 (5 de julho de 2022). http://dx.doi.org/10.31578/hum.v11i1.479.

Texto completo da fonte
Resumo:
“Smart Power” is a concept developed by an American political scientist and IR scholar Joseph S. Nye Jr. Over decades international relations was dominated by the notion of hard power, concentrating mainly on military strength and economic growth. However, with the increasing number of concerning issues presented in the 21th century, hard power alone has no chance in solving problems such as climate change and global pandemics.This is where Nye introduces his notion of “Smart Power,”- which he explains as “an ability to combine soft and hard power into a successful strategy where they reinforce rather undercut each other” (2021, p.10). This paper aims to answer the question how Joseph Nye’s notion of smart power successfully explains circumstances between powers since the end of the cold war till today. His Work on “Smart Power” proves the thesis, that among the recent IR scholars and theorists, Joseph Nye is one of the best at explaining the current circumstances between powers. This paper embarks on a content analysis of peer reviewed articles, books, statements, speeches and interviews that support the findings.Keywords: Foreign Policy, Power Relations, Smart Power
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Barnsdale, Liam. "Trooping the (School) Colour". M/C Journal 26, n.º 1 (14 de março de 2023). http://dx.doi.org/10.5204/mcj.2970.

Texto completo da fonte
Resumo:
Introduction Throughout the early and mid-twentieth century, cadet training was a feature of many secondary schools and educational establishments across Australia, with countless young men between the ages of 14 and 18 years of age undergoing military training, ostensibly in preparation for service in Australia’s armed forces upon their coming of age. Unlike earlier in the century, when cadet training was mandatory for all males within the relevant age range, during the Second World War cadet detachments could only be formed and maintained by secondary schools for pupils attending those schools. Additionally, the Australian Army provided so little financial support to school cadet detachments during the conflict that schools had to rely on the parents of their pupils to purchase their sons’ not inexpensive cadet uniforms, with a result that only a limited number of schools could afford to maintain a cadet detachment, and almost every schools that could do so made enrolment in their detachments voluntary for their pupils. Counterbalancing these material obstacles, however, was the threat of the ongoing conflict and the demands for trained soldiers both overseas and within Australia, which resulted in school cadet training becoming increasingly popular between 1939 and 1945, with many schools across Australia either establishing new cadet detachments or expanding their existing cadet detachments in order to contribute to their nation’s war effort. Not only did the Second World War increase the number of cadet detachments among educational establishments, but cadet training became more diverse and varied both within and between schools. Owing to their preoccupation with maintaining both the Australian Imperial Force and a defence force against a potential invasion of Australia, the Australian Army’s supervision of and contribution to cadet training became more sporadic than it had been in peacetime. As a result, school headmasters became increasingly powerful in their discretion to direct the cadet training that went on at their schools, with the Australian Army providing little to no input to or supervision of the day-to-day training at the myriad of cadet detachments across the nation. This state of affairs allowed schools, and the educators who ran them, an unprecedented amount of freedom to enact their own idealised version of military training through their cadet detachments, resulting in a diverse range of training syllabi, organisational practices, and uniforms. Unlike in other nations such as New Zealand, Australian schools’ cadet uniforms were not issued by the Australian Army, but instead were designed and purchased by the individual cadet detachments, with the Australian Army only providing official recognition and partial funding for the designs. Under this system, Australian schools designed a diverse range of uniforms for their cadet detachments, tailoring them to suit their individual conceptions of what cadet training should contain and how a cadet detachment should appear. This resulted in cadet detachments clad in uniforms that reflected the ideals of the schools to which they were attached, with the training practices and identities of a school reflected in the design of its cadet uniform. This article will examine two prevalent influences behind the design of Australian school cadet uniforms during the Second World War – the competing prioritisation of smartness and practicality, and the range of identities and loyalties which schools attempted to inculcate in their pupils. In the process, it will be argued that these variations in cadet uniform designs reflect the diversity of practices and ideology within male secondary education in Australia during the 1940s. Uniforms for Purpose Despite the limitations imposed by wartime shortages, a school’s priorities for their cadet training could still be expressed through their design of uniforms. For many, the range of priorities can be summarised as a split between smartness and toughness. Some establishments designed their cadet uniforms on traditional ideals of rigid sartorial orderliness, tailoring them to be pleasing to the eye when paraded in public. Others disregarded smartness in favour of hard-wearing uniforms more suited to rigorous physical training under a variety of climactic conditions, emphasising comfort and durability above appearance. Schools did not openly state that their choice of uniform was motivated by a desire to have their cadets appear impressive on the parade ground. However, many voiced their praise for their cadet detachments’ appearances in public parades. One example of this can be found in the June 1940 edition of Terrace, the magazine of Christian Brothers’ College Gregory Terrace, in which the cadet training column finished by proudly declaring that “the appearance of the cadets and their military bearing called forth expressions of praise from all who saw them marching in the Corpus Christi procession at NC” (“G.T. Corps Jottings” 5). Similar evidence of a school’s prioritisation of smartness and presentability in their cadet training can also be found in numerous contemporary descriptions of cadet training by the cadets themselves. One anonymous pupil at Sydney Church of England Grammar School described the hardships that the school’s cadets faced in maintaining their uniforms – a khaki combination of woollen slouch hat, tunic with brass buttons, brown leather ‘Sam Browne’ belt and trousers with a blue stripe down each leg. In a lengthy poem describing many aspects of school life, the pupil’s ‘Song of Shore’ described how “of each cadet the heart is set on being clean and smart; A fleck of dust, a speck of rust, will break his sergeant's heart” (‘A Song of Shore’ 131). These demands for cleanliness and smartness weighed heavily on a cadet, with the author lamenting how “he cleans his boots, he cleans his belt, he cleans his bits of brass: his Brasso goes to chapel and his Kiwi into class; but still they say, ‘Put it away! To Friday drill you go!’ And button-sticks in period six are dangerous things to show” (‘A Song of Shore’ 131). Given that this context of uniform maintenance is the only description of cadet training in this poem, the emphasis placed on sartorial orderliness at schools such as Sydney Church of England Grammar School was clearly strong enough to eclipse all other aspects of training in the eyes of those subjected to it. Uniforms designed to visually impress, however, often wore out quite quickly under the harsh conditions of cadet training. One cadet at Geelong College noted how after an afternoon of instruction on the school oval in “a comfortable spot in the rain and wind … my well-tailored uniform is sopping with either sweat or rain according to the consistent weather of these parts. My chin-strap has lost all its flavour and generally I feel most inefficient” (“Chank” 31). The short life of stylistically-prioritised uniforms was often exacerbated by the difficulty of obtaining replacement items of clothing under wartime conditions. In 1941, the cadet uniforms of Hale School, Western Australia – presented in fig. 1 and consisting of slouch hat, woollen khaki tunic, Khaki drill breeches and tall leather gaiters – had been reduced in number and quality to such an extent that one boy described the process of selecting uniforms at the beginning of each year as “scramble day”, when, “after trying on various clothing you begin to wonder how many deformed people were in the corps before you” (“Lance-Corporal” 96). The cadet elaborated by lamented how “pick[ing] out the right hat is like winning the Charities, and all you can do is to hope for the best next year” (“Lance-Corporal” 96), and “on being issued with your hat badge you will say confidently, ‘Well, at least this must fit.’ But don't be optimistic; it is sure to have the clip missing” (“Lance-Corporal” 97). The shortage of serviceable uniforms became so acute that by 1943 the annual ‘Cadet Notes’ article in the school’s magazine The Cygnet announced that “it would be greatly appreciated if Old Boys who have any part of a uniform, would make it available” (“Cadets” Cygnet 20). This sentiment was echoed the following year by an anonymous cadet’s cartoon (fig. 2), highlighting the deplorable state of the school’s cadet uniforms after so many years of use, with frayed hems, baggy seams, and, most significantly, a severe shortage of sizes which fitted the average cadet (“Uniforms for ‘B’ Company” 74). This, when compared with the formal photographs of cadets published by the school in an earlier edition of the Cygnet, seen in fig. 1, gives a clear indication of the disparity between the image that schools intended to project and the and that which cadets perceived. Fig. 1: Hale School cadet uniforms as presented by the school in 1939 (“Officers and N.C.Os.” 55) Fig. 2: Hale School cadet uniforms as perceived by a cadet in 1944 (“Uniforms for ‘B’ Company” 74) For many schools, however, the ideal cadet uniform was simple, easily-maintained and durable, often drawing inspiration from contemporary, rather than traditional, military uniforms. When designing a uniform for their newly-established cadet detachment in 1939, Brisbane Boys’ College stated categorically that “the first consideration was smartness” and that “the preservation of that smartness will be the duty of every cadet” (“Cadet Corps” 41). However, while other schools chose stiff and heavy woollen cadet uniforms, the committee appointed by the College to decide on a uniform opted for a light combination of felt hat, khaki drill jacket, and shorts, “similar in design to that of the Darwin Mobile Force”, a new Australian Army formation created the previous year intended to defend Australia’s northern coastline from invasion, “which looked so smart when that force marched through the city early in the year” (“Cadet Corps” 41-42). When further explaining their choice, the College argued that “shorts, we consider, are more serviceable for the Queensland climate” (“Cadet Corps” 42). Brisbane Boys’ College was not the only establishment to be impressed by new military formations and their heralding of a new form of warfare. Newcastle Boys’ High School’s cadet uniform deviated from those of other schools’ cadet detachments by including a navy blue beret in place of the ubiquitous felt ‘slouch hat’. This choice of headwear, coupled with the School’s unusual decision to replace the normal khaki items of clothing with a field grey battledress-style jacket and slacks, was so similar to that worn by the armoured divisions both in Australia and Britain that when the Newcastle Sun published a picture of four Newcastle cadets wearing their new uniforms, they jocularly warned their readers that “these are not members of the Tank Corps” (“High School Cadet Corps” 7). Evidently, while some schools opted for a more traditionally smart design for their cadet uniforms, others chose to emulate more modern military uniform designs, even to the point where their uniforms lost all similarity to those traditionally worn by cadet detachments in Australia. It was not through the emulation of contemporary Australian Army uniforms that schools implemented practical uniform components in place of stylish ones. When several independent Roman Catholic schools in New South Wales applied to form cadet units and intended to adopt cadet uniforms in a variety of colours with brimless, forage cap headdress, Australia’s Military Board directed Captain McConnel, the Staff Officer Commanding Senior Cadets for New South Wales, “to invite schools again to reconsider the uniforms they have submitted with a view to their adoption of the Australian Hat and Khaki materials” (McConnel 1). McConnel acknowledged that “particular uniforms are not stipulated”, but claimed “khaki to be most suitable and economical for field training while the Australian Hat gives greater protection from the sun”, which was a factor of “considerable importance” as “work in the open is one of the main objects of cadet training” (McConnel 1). However, despite McConnel’s emphatic pleas to the institutions to reconsider their uniforms, only two of the eleven schools chose to alter their uniforms to suit the Military Board’s recommendations. The remainder either compromised by retaining their forage caps but adopting McConnel’s recommendation of using khaki material for their uniforms, or, as was the case with Marist Brothers’ High School, Darlinghurst, wrote in response to McConnel’s letter stating that they found “no reason for altering the design initially submitted”, and persisted with their application (Frederic 1). This case demonstrates that while dispassionate logic could motivate schools to design practical uniforms resistant to the wear and tear produced by strenuous outdoor cadet training in the Australian climate, these considerations were often outweighed by the subjective ideological motivations behind educators’ desires to adopt attractively smart cadet uniforms that were expensive and ill-suited to physical training. Evidently, educators’ personal desires to make their cadets, and as a result their schools, appear impressively smart and orderly were a powerful motivation behind not only their choice of uniform but also their support for cadet training in its entirety. These motivations could and frequently did outweigh practical considerations, to the point where the appearance of a cadet detachment, and thereby that of the cadet detachment’s school, was considered more important than the training it provided. Uniforms as Identity The division between concepts of cadet training held by the Australian Army and the highly diverse forms of training practiced by individual schools extended beyond differences of opinion over the relative merits of smartness and practicality expressed by cadet uniforms. A cadet uniform not only reflected educators’ intentions regarding the contents of their training, but also reflected the values of the group identity they wished to immerse their boys in, and the overarching group to which this identity owed its loyalty. The best example of uniforms reflecting a cadet detachment’s loyalty can be seen in the widespread adoption of uniforms that emulated Australian Army uniforms almost exactly. Although Australian cadet detachments were not issued with official Service Dress uniforms until 1945, many detachments’ uniforms emulated the Service Dress’s design and material down to the ubiquitous wide-brimmed ‘slouch hat’ or ‘Australian hat’ worn by the Australian Army in both the First and Second World Wars. Brother RJ McCartney, “the nominal C.O.” of the cadet detachment at Christian Brothers’ College Ipswich, specifically described his detachment’s uniform to the Queensland Times in 1944 as “similar to that issued to Army personnel” after declaring that “the training [cadets] receive will be most useful to them should they join one of the fighting forces later” (“95 Boys” 2). The popularity of this design cannot be attributed solely to the arguments made by the Military Board for its practicality, and the symbolic power of these uniforms raised the cadet detachments from insular, extra-curricular organisations to a unified whole, connected to the Commonwealth’s war effort through their uniforms and the martial identities they espoused. Fig. 3: A contemporary drawing of Brisbane Boys’ College cadet badge from 1939 (“Cadet Corps” 42) Not all Australian educational establishments, however, chose to emulate the Australian Army uniform in their cadet detachments’ uniforms, with many adopting uniforms that emphasised school or local identities above national identity. Most schools expressed their local identity through the implementation of school colours in their hat bands or ‘puggaree’ or designed insignia for their cadet uniforms based on school insignia. The cadet detachment at Brisbane Boys College adopted a badge that was nearly identical to the College badge, seen in fig. 3, albeit with a crown in place of the book (“Cadet Corps” 42). This alteration brought the design into alignment with common practice in military insignia, but it could also be viewed as symbolic representation of the difference between the College and the cadet detachment – whereas the College’s primary objective was to educate, the cadet detachment’s objective was to instil a sense of patriotism and duty. The most prominent examples of schools deviating in this manner can be found among Presbyterian schools, many of which chose to emphasise their Scottish ancestry instead of their Australian nationality. One such school was Scotch College in Claremont, Western Australia, where in August 1939, after “several unsuccessful attempts to secure a uniform dress for the cadets”, “the corps fitted out with uniforms which made the boys look like trained soldiers … which consisted of a Cameron kilt, with a kangaroo-skin sporran, a khaki tunic and glengarrie [sic]” (“Cadets” Scotch 16), which gave the detachment the appearance of a highland regiment of the British Army. After being issued with their new uniforms and instructed on their wearing, an event that was satirically recalled later that year by a cadet asking the headmaster what was worn beneath the kilt, the cadets were addressed by the school’s headmaster Mr Anderson, who “mention[ed] the fine example set by our predecessors, which example, he knew, we would endeavour to live up to” (“Cadets” Scotch 16). A similar uniform was worn by The Scots College, Sydney, prior to and during the Second World War. The College’s cadet uniform, shown in fig. 4, was just as rife with Scottish motifs as the uniform of Scotch College, including a kilt which one anonymous cadet described as “eleven yards of pleats, folds, buckles, buttons and straps all mixed up” (“C.S.R., IVa” 91). The Scots College’s uniform incorporated more colonial aspects than their West Australian contemporary’s uniform, however, with the glengarry and khaki tunic replaced by a Blancoed-white pith helmet and dark green standing-collared jacket with hooks and eyes that, according to the anonymous cadet, “were typically scotch”, in that “they would not give in” (“C.S.R., IVa” 91). Despite the free issue of Service Dress by the Australian Army in 1945, the College maintained its distinctly Scottish cadet uniform, albeit with the pith helmet replaced by a glengarry cap. So strong was the College’s prioritisation of its colonial ancestral identity above any contemporary Australian national identity that the Sun newspaper described them as “Black Watch juniors” when publishing a photograph of them parading “in support of the War Loan Campaign” in October 1941, seen in fig. 4 (“Black Watch Juniors” 3). Although these schools formed the minority in espousing divergent local identities above a centralised national identity, is these exceptions to the broad consensus which reflect the diverse nature of not only cadet training but secondary education within Australia in the first half of the twentieth century. Furthermore, this diversity was only revealed due to the refusal of the Australian Army to issue free uniforms to cadet detachments, with the resulting absence of a centralised identity leading to a vacuum in which schools decided upon an identity with which to imbue their pupils through the medium of cadet uniforms. Fig. 4: The Scots College cadets parading through Sydney, as presented by the Sun (“Black Watch Juniors” 3). Conclusion The Australian Army’s refusal to issue a free, standardised cadet uniform to secondary school cadet detachments prevented many educational establishments from establishing their own cadet detachment. However, this policy allowed those schools that did establish a detachment to clothe their members in a manner that they believed would align with the school’s unique conceptions of both what cadet training should consist of and how a cadet detachment should be presented to the world. As a result of this freedom, Australian secondary school cadet uniforms were influenced by a wide range of practical and ideological factors, with a diverse range of uniform designs reflecting an equally diverse range of thinking around cadet training. Some schools preferred a cadet uniform to be tough and suited to strenuous outdoor use under harsh climatic conditions, with Brisbane Boys’ College modelling their uniform after the recently-formed Darwin Mobile Force and incorporating shorts and a wide-brimmed Australian hat of the type recommended by the Australian Army for its value in shielding its wearer from the sun. Other cadet uniforms, such as those adopted by many Roman Catholic schools in Sydney, emphasised sartorial orderliness and visual splendour, incorporating unusual colours and forage caps to showcase their cadets and their school while emphasising their institutions’ individuality, against the Australian Army’s recommendations for durability and practicality. Similarly, a school’s cadet uniform could reflect its ideological objectives, revealing the identity it aimed to immerse its pupils in. The wide range of schools’ cadet uniform headdress alone, from ‘slouch hats’ to glengarry and forage caps to pith helmets, reveals the many split loyalties and ideals held by Australian schools during the Second World War between imperial, national, local, and religious identities and ethos. However, despite Australian Schools’ diverse and meticulously curated choices in cadet uniforms, cadets’ contemporary descriptions of their uniforms reveal that the intentions behind the uniforms’ designs were often entirely lost on those who wore them. Many cadets overlooked the lofty educational and ideological intentions behind their educators’ choices and instead only took note of their ridiculous, impractical, and uncomfortable aspects. This difference in perception, with educators praising and pupils decrying their cadet uniforms, reveals the performative nature of the entire uniform design process, with schools designing their cadet detachments’ uniforms not for those wearing them but for any third party who might view them. As such, schools’ overtures regarding the practicality, smartness and identity of their uniforms were not the result of the schools’ established practices, but the values with which the schools wished to be associated, with cadet uniforms acting as the medium through which these values would be communicated to the wider world. Images “Black Watch Juniors in City Parade.” The Sun 10 Oct. 1941: 3. “Officers and N.C.Os. of the Cadet Corps, 1939.” The Cygnet: Hale School Magazine 19.3 (June 1939): 55. “Uniforms for ‘B’ Company. Only Two Sizes 2 Large OR 2 Small.” The Cygnet: Hale School Magazine 14.4 (June 1944): 74. References “A Song of Shore” The Torch-Bearer: The Magazine of the Sydney Church of England Grammar School 43.2 (1 Sep. 1939): 130-131. “Cadets.” The Cygnet: Hale School Magazine 13.3 (June 1943): 19-20. “Cadets.” The Scotch College Reporter 32 (Dec. 1939): 16-17. “Cadet Corps.” The Portal: The Magazine of the Brisbane Boys’ College Dec. 1939: 41-43. “Chank”; “A Day in the Ranks.” The Pegasus: The Journal of The Geelong College 37.1 (June 1946): 30-31. “C.S.R., IVa”; “A Bonny Wee Scotsman.” The Scotsman: A Record of The Scots College, Bellevue Hill, Sydney 32.3 (May 1946): 91. “G.T. Corps Jottings.” Terrace: Quarterly Review, Published by Christian Brothers’ College Gregory Terrace, Brisbane, Queensland 3.2 (24 June 1940): 5. “High School Cadet Corps.” The Newcastle Sun 4 June 1940: 7. “Lance-Corporal”; “Scramble Day.” The Cygnet: Hale School Magazine 13 (5 June 1941): 96-97. “95 Boys Receive Training in School Cadet Corps.” The Queensland Times 21 Aug. 1944: 2. Memoranda Brother Frederic to Captain McConnel. “Cadets – Educational establishments – Approval to form senior cadet detachments – Roman Catholic schools.” 7 April 1941. Australian War Memorial, Ref. AWM61 426/2/176. Captain McConnel to Director CBC Waverley, CBC Lewisham, CBC Darlinghurst, MBC Darlinghurst, MBC Randwick, MBC Kogarah, MBC Parramatta, MBC Church Hill, DLSC Ashfield, DLSC Marrickville, HCC Ryde, SJC Hunter's Hill. “Cadets – Educational establishments – Approval to form senior cadet detachments – Roman Catholic schools.” 13 March 1941. Australian War Memorial, Ref. AWM61 426/2/176.
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Laufman, David H., Sean Newell, Stephen Reynolds e Mike Buchwald. "Cyber incidents: How best to work with law enforcement". Cyber Security: A Peer-Reviewed Journal, 1 de setembro de 2017. http://dx.doi.org/10.69554/wisn4238.

Texto completo da fonte
Resumo:
Cyber intrusions now affect businesses and organisations of all sizes and in all sectors and industries. The United States Department of Justice employs a whole-ofgovernment approach to investigate, disrupt and deter malicious cyber activity. We work with other law enforcement agencies; the intelligence community; civil, administrative and regulatory agencies; and the military to draw upon each partner’s unique expertise and resources, and to use whichever combination of tools will be most effective in responding to and countering a particular threat. Meeting the cyberthreat requires the help and cooperation of the private sector as well. When deciding whether to notify law enforcement of a cyber incident, organisations weigh the anticipated benefits of a proactive approach against legal, business, reputational and other practical concerns. This paper explains why working with law enforcement is the smart choice before, during and after a cyber intrusion or attack. We can help victims understand what happened; we can share context and information about related incidents; we can ensure a proper investigation and preservation of evidence; we can assist victims in dealing with regulators; and we are uniquely situated to work with other parts of the federal government to respond with possible criminal prosecution, economic sanctions, diplomatic pressure, intelligence operations and military action. Although primarily directed towards victim organisations, we hope this paper helps answer questions that all organisations’ leadership and counsel may have as they decide how their response may affect their business or mission, whether they are witnesses (eg internet service providers) or victims.
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Narmilan, A., e N. Puvanitha. "Mitigation Techniques for Agricultural Pollution by Precision Technologies with a Focus on the Internet of Things (IoTs): A Review". Agricultural Reviews 41, n.º 03 (25 de agosto de 2020). http://dx.doi.org/10.18805/ag.r-151.

Texto completo da fonte
Resumo:
The widespread of Information and Communication Technology (ICT) in the past decades brought numerous advantages to many individuals and most of the organizations everywhere in the world. In the 21st century, the most significant technology is the Internet of Things (IoTs) which has developed rapidly covering most of applications in the health, civil, military and agriculture sectors also. Precision Agriculture (PA), as the combination of information, communication and control technologies in agronomic practices, is emerging time by time. Also, precision agriculture is considered a smart farming system on the basis of modern technologies to regulate, examine and manage changes inside an agricultural field for cost-effectiveness, sustainability and optimal protection of environment. Meanwhile, agricultural practices are contributing to environmental pollution due to poor management which is further disturbing food security, health and climate. One of the best strategies to overcome this challenge can be introducing the deployment of precision technologies for the development of agricultural productivity while reducing the environmental degradation. Therefore, the key objective of this review was to discuss the mitigation techniques for agricultural pollution and enhance the agricultural production by smart technologies like IoTs. This paper summarizes the main categories of IoTs, Precision Agriculture, agricultural pollution and finally, mitigation practices on environmental degradation.
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

"KEEPING ABREAST OF TIME FOR FUTURE CHALLENGES". CONTEMPORARY MILITARY CHALLENGES, VOLUME 2013/ ISSUE 15/1 (30 de maio de 2013): 9–10. http://dx.doi.org/10.33179//bsv.99.svi.11.cmc.15.1.00.

Texto completo da fonte
Resumo:
This year, the transformation of the Slovenian Armed Forces continues. Last year, the guidance on reduction of defence budget continued from the previous years. This required a thorough reflection, preparation of measures and constant upgrades in the defence system functioning. In the overall effort to apply cuts to defence budgets, NATO member states searched for various solutions and each of them tackled this challenge in a slightly different way. The term transformation is thus a very topical term. We have heard and read a lot about it. However, in the last year, Smart Defence was certainly the one most related to the reduction in defence budgets. And what is the essence of Smart Defence? It is no longer about how to achieve more with less, but how to use the given resources to maximise the efficiency. This also requires changes in thinking, approaches, and mainly solutions. NATO member states considered different options to achieve best results in the current situation. The synergy of effects is supposed to be the right option for everything, whereby all of the engaged entities should contribute to the best of their abilities and in a way to best build an effective whole. In the Slovenian Armed Forces, we have considered the given circumstances, studied our possibilities and with a new year we started a journey down the path of optimal functioning and changes. This process was called transformation of the Slovenian Armed Forces. It is just that topical issues from the domestic and inter- national security environment are also discussed in our contributions. Some of the authors thus present their works and findings developed recently during the transfor- mation process. In this issue, Vinko Vegič is publishing his article »NATO crisis interventions – lessons learned and challenges of the operation in Libya”. He describes what such a vast NATO operation means and what it brings in practice, i.e. in a situation where different doctrines and theoretic debates should provide appropriate solutions. Branimir Furlan wrote the article »Professional armed forces without professional autonomy – is this possible?” where he shares a view on the developmental phases of the professionalization of the armed forces and military profession as the final goal bringing to foreground the question of competence and responsibility of the military for its own professional development. Valter Bosotina and Branko Lavtar discuss “The renovation of uniform-supply system in the Slovenian Armed Forces”. In their article, they present the solutions for the improvement of the process used so far, which is necessary for the functioning of the Slovenian Armed Forces. The process is, at the same time, affected by various circumstances and influences, which require changes. In his article “New approach to prediction and decision-making in the targeting process” Jurij Jurtela presents a subject which deals with fire support systems. He acquaints readers with the dilemmas that occur during individual military operations and require decisions about a great variety of matters. He provides suggestions on how to tackle those dilemmas and what tools to use for the best effect and superiority. Erik Kopač and Janja Vuga from the Faculty of Social Sciences write about Individual’s choice to seek employment in the Slovenian Armed Forces contract reserve. They used socio-psychological approach to study, which factors are the most decisive for this type of employment, and established that economic stimula- tion plays an important role in this, while the essence lies in the personal attitude of each individual. More details are available in the article. Canadian anthropologist Donna Winslow studied modern defence forces. She authored a number of articles and reached many interesting findings. Two of the most famous include the findings about a scandal in Somalia and about the war in Chechnya. Maja Garb, Jelena Juvan and Uroš Svete honoured her memory with their article “From the questions of military culture to the analysis of anthropologi- sts’ role in the armed forces – the work of Donna Winslow”.
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

Rizzardi, Alessandra, Sabrina Sicari e Alberto Coen-Porisini. "Analysis on functionalities and security features of Internet of Things related protocols". Wireless Networks, 4 de junho de 2022. http://dx.doi.org/10.1007/s11276-022-02999-7.

Texto completo da fonte
Resumo:
AbstractThe Internet of Things (IoT) paradigm is characterized by the adoption of different protocols and standards to enable communications among heterogeneous and, often, resource-constrained devices. The risk of violation is high due to the wireless nature of the communication protocols usually involved in the IoT environments (e.g., e-health, smart agriculture, industry 4.0, military scenarios). For such a reason, proper security countermeasures must be undertaken, in order to prevent and react to malicious attacks, which could hinder the data reliability. In particular, the following requirements should be addressed: authentication, confidentiality, integrity, and authorization. This paper aims at investigating such security features, which are often combined with native functionalities, in the most known IoT-related protocols: MQTT, CoAP, LoRaWAN, AMQP, RFID, ZigBee, and Sigfox. The advantages and weaknesses of each one will be revealed, in order to point out open issues and best practices in the design of efficient and robust IoT network infrastructure.
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

Menzel, David, e Jennifer Hesterman. "Airport security threats and strategic options for mitigation". Journal of Airport Management, 1 de março de 2018. http://dx.doi.org/10.69554/efbm2046.

Texto completo da fonte
Resumo:
This paper provides an overview of the security challenges and responses faced by airports. The number of air passengers is doubling every 15 years just as security dangers multiply across the world. Technology is enabling massive advances in security, but there are other elements that should be embraced — from exploring the power of human intuition to the lessons learnt by the military through the adoption of concentric rings of security and the very real dangers from insider threats. Cybersecurity is also an increasing and potentially catastrophic risk which, along with other emerging threats, needs to be addressed with greater creativity and imagination. Much is being done to deal with the risk — not least with industry programmes such as Fast Travel, Smart Security and now the International Air Transport Association’s (IATA) and Airports Council International’s (ACI) latest initiative, NEXTT (New Experience in Travel and Technologies) — but the message from every key organisation is that the industry must do more, particularly when it comes to political will and a readiness to share experiences and best practice.
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia