Search results for: Johnmarshall Reeve
5 The Relationships between Autonomy-Based Insula Activity and Learning: A Functional Magnetic Resonance Imaging Study
Authors: Woogul Lee, Johnmarshall Reeve
Abstract:
Learners’ perceived autonomy predicts learners’ interest, engagement, and learning. To understand these processes, we conducted an fMRI experiment. In this experiment, participants saw the national flag and were asked to rate how much they freely wanted to learn about that particular national flag. The participants then learned the characteristics of the national flag. Results showed that (1) the degree of participants’ perceived autonomy was positively correlated with the degree of insula activity, (2) participants’ early-trial insula activity predicted corresponding late-trial dorsolateral prefrontal cortex activity, and (3) the degree of dorsolateral prefrontal cortex activity was positively correlated with the degree of participants’ learning about the characteristics of the national flag. Results suggest that learners’ perceived autonomy predicts learning through the mediation of insula activity associated with intrinsic satisfaction and 'pure self' processes.Keywords: insular cortex, autonomy, self-determination, dorsolateral prefrontal cortex
Procedia PDF Downloads 2024 Effects of Peakedness of Bimodal Waves on Overtopping of Sloping Seawalls
Authors: Stephen Orimoloye, Jose Horrillo-Caraballo, Harshinie Karunarathna, Dominic E. Reeve
Abstract:
Prediction of wave overtopping is an essential component of coastal seawall designing and management. Not only that excessive overtopping is reported for impermeable seawalls under bimodal waves, but overtopping is also showing a high sensitivity to the peakedness of the random wave propagation patterns. In the present study, we present a comprehensive analysis of the effects of peakedness of bimodal wave patterns of the overtopping of sloping seawalls. An energy-conserved bimodal spectrum with four different spectra peak periods and swell percentages was applied to estimate wave overtopping in both numerical and experimental flumes. Results of incident surface elevations and bimodal spectra were accurately captured across the flume domain using sets of well-positioned resistant-type wave gauges. Peakedness characteristics of the wave patterns were extracted to derive a relationship between the non-dimensional overtopping and the peakedness across the wave groups in the wave series. The full paper will briefly describe the development of the spectrum and present a comprehensive results analysis leading to the derivation of the relationship between dimensionless overtopping and peakedness of bimodal waves.Keywords: wave overtopping, peakedness, bimodal waves, swell percentages
Procedia PDF Downloads 1813 Exposing Latent Fingermarks on Problematic Metal Surfaces Using Time of Flight Secondary Ion Mass Spectroscopy
Authors: Tshaiya Devi Thandauthapani, Adam J. Reeve, Adam S. Long, Ian J. Turner, James S. Sharp
Abstract:
Fingermarks are a crucial form of evidence for identifying a person at a crime scene. However, visualising latent (hidden) fingermarks can be difficult, and the correct choice of techniques is essential to develop and preserve any fingermarks that might be present. Knives, firearms and other metal weapons have proven to be challenging substrates (stainless steel in particular) from which to reliably obtain fingermarks. In this study, time of flight secondary ion mass spectroscopy (ToF-SIMS) was used to image fingermarks on metal surfaces. This technique was compared to a conventional superglue based fuming technique that was accompanied by a series of contrast enhancing dyes (basic yellow 40 (BY40), crystal violet (CV) and Sudan black (SB)) on three different metal surfaces. The conventional techniques showed little to no evidence of fingermarks being present on the metal surfaces after a few days. However, ToF-SIMS images revealed fingermarks on the same and similar substrates with an exceptional level of detail demonstrating clear ridge definition as well as detail about sweat pore position and shape, that persist for over 26 days after deposition when the samples were stored under ambient conditions.Keywords: conventional techniques, latent fingermarks, metal substrates, time of flight secondary ion mass spectroscopy
Procedia PDF Downloads 1632 The Security Trade-Offs in Resource Constrained Nodes for IoT Application
Authors: Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve
Abstract:
The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%.Keywords: energy consumption, IEEE 802.15.4, IoT security, security cost evaluation
Procedia PDF Downloads 1681 Portrayal of Pak-US Relations in Perspective of Bin Laden Killing by the Leading American and British Newspapers: A Content Analysis of the Guardian, the Telegraph, Washington Post and the New York Times
Authors: Shahzad Ali
Abstract:
This article expounds the coverage of Pak-US relations in the context of Osama Bin Laden killing in four selected leading newspapers of UK and the US viz The Telegraph, The Guardian, The New York Times and The Washington Post during the specific time period of three months, i.e., April-June, 2011. The study is scrutinized on the basis of Operation Neptune Spear. The research study is theoretically linked with the propaganda model of Herman and Chomsky and the Shoemaker and Reeve‘s theory of content effect, specifically the impact of foreign policy as a driving instrument influencing the nature and treatment of the coverage of Pak-US relations. The relations between Pakistan and USA are of great importance in the context of Bin Laden. The Pak-US relations were less aggravated and hostile in pre OBL period but post OBL period worsened these relations. It is also interesting to mention that the policies of these newspapers were dependent on the foreign policy of their countries. It was explored that the news coverage was found favorable as and when the relations Pakistan and the US or UK were cordial and smooth. And it turned into negative and unfavorable when the relations were in strain and deteriorating and endorsed various studies that the Western mainstream media tried to be more nationalistic in projecting official stance while covering foreign coverage instead of adhering to universal cannon of journalism, i.e., objectivity, fairness, and neutrality, etc. Overall 219 news items of these four selected newspapers regarding Pak-US relations in the context of pre and post OBL’s killing operation were undertaken for analysis. The ratio of negative slants was found higher as compared to the positive and neutral slants. Besides, the ratio of news items with unfavorable frames was found higher in post OBL operation in comparison of pre-era of the coverage related to Pak-US relations in the leading British and American newspapers.Keywords: Osama Bin Laden, Pakistan, USA, UK, relations, Guardian, Washington Post, Telegraph, New York Times, Operation Neptune Spear
Procedia PDF Downloads 170