217 resultados para proposed communications
Resumo:
People have difficulty accessing means to easily publicise and discuss their ideas and concerns with their local community. The aim of this research has been to design and evaluate capacity for Internet technologies coupled with public displays to engage a diverse range of community members in the making of a shared local suburban communications network. The research problem relates to the challenges of community building, in particular discovering mechanisms that work to engage a target community and motivate participation. In an effort to understand genuine participation and barriers to use, the study was embedded in a local community and purposely longitudinal. This research contributes knowledge about the limitations of public displays to increase visibility of local communications, the need for long-term and networked visibility of community-building communications, the integral role of community facilitators, and the challenges of sustaining shared communications.
Resumo:
Several chronic infections known to be associated with malignancy have established oncogenic properties. However the existence of chronic inflammatory conditions that do not have an established infective cause and are associated with the development of tumours strongly suggests that the inflammatory process itself provides the prerequisite environment for the development of malignancy. This environment includes upregulation of mediators of the inflammatory response such as cyclo-oxygenase (COX)-2 leading to the production of inflammatory cytokines and prostaglandins which themselves may suppress cell mediated immune responses and promote angiogenesis. These factors may also impact on cell growth and survival signalling pathways resulting in induction of cell proliferation and inhibition of apoptosis. Furthermore, chronic inflammation may lead to the production of reactive oxygen species and metabolites such as malondialdehyde within the affected cells that may in turn induce DNA damage and mutations and, as a result, be carcinogenic. Here it is proposed that the conditions provided by a chronic inflammatory environment are so essential for the progression of the neoplastic process that therapeutic intervention aimed at inhibiting inflammation, reducing angiogenesis and stimulating cell mediated immune responses may have a major role in reducing the incidence of common cancers. © 2001 Cancer Research Campaign http://www.bjcancer.com.
Resumo:
Capacity of current and future high data rate wireless communications depend significantly on how well changes in the wireless channel are predicted and tracked. Generally, this can be estimated by transmitting known symbols. However, this increases overheads if the channel varies over time. Given today’s bandwidth demand and the increased necessity for mobile wireless devices, the contributions of this research are very significant. This study has developed a novel and efficient channel tracking algorithm that can recursively update the channel estimation for wireless broadband communications reducing overheads, therefore increasing the speed of wireless communication systems.
Resumo:
Government action is essential to increase the healthiness of food environments and reduce obesity, diet-related non-communicable diseases (NCDs), and their related inequalities. This paper proposes a monitoring framework to assess government policies and actions for creating healthy food environments. Recommendations from relevant authoritative organizations and expert advisory groups for reducing obesity and NCDs were examined, and pertinent components were incorporated into a comprehensive framework for monitoring government policies and actions. A Government Healthy Food Environment Policy Index (Food-EPI) was developed, which comprises a ‘policy’ component with seven domains on specific aspects of food environments, and an ‘infrastructure support’ component with seven domains to strengthen systems to prevent obesity and NCDs. These were revised through a week-long consultation process with international experts. Examples of good practice statements are proposed within each domain, and these will evolve into benchmarks established by governments at the forefront of creating and implementing food policies for good health. A rating process is proposed to assess a government's level of policy implementation towards good practice. The Food-EPI will be pre-tested and piloted in countries of varying size and income levels. The benchmarking of government policy implementation has the potential to catalyse greater action to reduce obesity and NCDs.
Resumo:
Private-sector organizations play a critical role in shaping the food environments of individuals and populations. However, there is currently very limited independent monitoring of private-sector actions related to food environments. This paper reviews previous efforts to monitor the private sector in this area, and outlines a proposed approach to monitor private-sector policies and practices related to food environments, and their influence on obesity and non-communicable disease (NCD) prevention. A step-wise approach to data collection is recommended, in which the first (‘minimal’) step is the collation of publicly available food and nutrition-related policies of selected private-sector organizations. The second (‘expanded’) step assesses the nutritional composition of each organization's products, their promotions to children, their labelling practices, and the accessibility, availability and affordability of their products. The third (‘optimal’) step includes data on other commercial activities that may influence food environments, such as political lobbying and corporate philanthropy. The proposed approach will be further developed and piloted in countries of varying size and income levels. There is potential for this approach to enable national and international benchmarking of private-sector policies and practices, and to inform efforts to hold the private sector to account for their role in obesity and NCD prevention.
Resumo:
Food and non-alcoholic beverage marketing is recognized as an important factor influencing food choices related to non-communicable diseases. The monitoring of populations' exposure to food and non-alcoholic beverage promotions, and the content of these promotions, is necessary to generate evidence to understand the extent of the problem, and to determine appropriate and effective policy responses. A review of studies measuring the nature and extent of exposure to food promotions was conducted to identify approaches to monitoring food promotions via dominant media platforms. A step-wise approach, comprising ‘minimal’, ‘expanded’ and ‘optimal’ monitoring activities, was designed. This approach can be used to assess the frequency and level of exposure of population groups (especially children) to food promotions, the persuasive power of techniques used in promotional communications (power of promotions) and the nutritional composition of promoted food products. Detailed procedures for data sampling, data collection and data analysis for a range of media types are presented, as well as quantifiable measurement indicators for assessing exposure to and power of food and non-alcoholic beverage promotions. The proposed framework supports the development of a consistent system for monitoring food and non-alcoholic beverage promotions for comparison between countries and over time.
Resumo:
The proposed reforms to the youth justice system in Queensland are premised on the assumption that offending by young people is increasing. We noted (Carrington, Dwyer, Hutchinson and Richards 2012, 8) in a recent submission about the boot camps legislation that: "Statistics suggest that this concern is not warranted. Certainly studies show that ‘rates per 100,000 juveniles in detention in Queensland have been relatively stable compared with the national trend’ (Richards 2011) and that rates of detention of child offenders have declined generally in Australia over the last three decades. Youth offending statistics are affected by the diversion options used by the police, as well as by the numbers and levels of policing, and any special strategies such as Operation Colossus in the northern part of the state. ‘Community concern’ about crime does not always reflect the true rates of crime across Queensland. Policy should be based on valid evidence, not on ‘community concern’. With stable numbers of young people being detained in Australia, the research clearly suggests that youth offending is not escalating."...
Resumo:
Server consolidation using virtualization technology has become an important technology to improve the energy efficiency of data centers. Virtual machine placement is the key in the server consolidation technology. In the past few years, many approaches to the virtual machine placement have been proposed. However, existing virtual machine placement approaches consider the energy consumption by physical machines only, but do not consider the energy consumption in communication network, in a data center. However, the energy consumption in the communication network in a data center is not trivial, and therefore should be considered in the virtual machine placement. In our preliminary research, we have proposed a genetic algorithm for a new virtual machine placement problem that considers the energy consumption in both physical machines and the communication network in a data center. Aiming at improving the performance and efficiency of the genetic algorithm, this paper presents a hybrid genetic algorithm for the energy-efficient virtual machine placement problem. Experimental results show that the hybrid genetic algorithm significantly outperforms the original genetic algorithm, and that the hybrid genetic algorithm is scalable.
Resumo:
The security and privacy of patient information is one of the biggest hindrances to the wide adoption of eHealth systems. For eHealth systems to be successful they must provide protection for patients’ privacy while ensuring healthcare professionals are able to access the information necessary to provide appropriate care. Accountable-eHealth systems are a proposed solution to these potentially competing concerns by enforcing appropriate use and after-the-fact accountability measures. We have developed a Web-based prototype to demonstrate scenarios of how both appropriate and inappropriate use of patient information would be handled in an Accountable-eHealth system.
Resumo:
Wireless networked control systems (WNCSs) have been increasingly deployed in industrial applications. As they require timely data packet transmissions, it is difficult to make efficient use of the limited channel resources, particularly in contention based wireless networks in the layered network architecture. Aiming to maintain the WNCSs under critical real-time traffic condition at which the WNCSs marginally meet the real-time requirements, a cross-layer design (CLD) approach is presented in this paper to adaptively adjust the control period to achieve improved channel utilization while still maintaining effective and timely packet transmissions. The effectiveness of the proposed approach is demonstrated through simulation studies.
Resumo:
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to prove the security of AKE protocols even when the adversary learns certain secret values. In this work, we address more granular leakage: partial leakage of long-term secrets of protocol principals, even after the session key is established. We introduce a generic key exchange security model, which can be instantiated allowing bounded or continuous leakage, even when the adversary learns certain ephemeral secrets or session keys. Our model is the strongest known partial-leakage-based security model for key exchange protocols. We propose a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the proposed model, by introducing a new concept: the leakage-resilient NAXOS trick. We identify a special property for public-key cryptosystems: pair generation indistinguishability, and show how to obtain the leakage-resilient NAXOS trick from a pair generation indistinguishable leakage-resilient public-key cryptosystem.
Resumo:
This paper presents a distributed communication based active power curtailment (APC) control scheme for grid connected photovoltaic (PV) systems to address voltage rise. A simple distribution feeder model is presented and simulated using MATLAB. The resource sharing based control scheme proposed is shown to be effective at reducing voltage rise during times of peak generation and low load. Simulations also show the even distribution of APC using simple communications. Simulations demonstrate the versatility of the proposed control method under major communication failure conditions. Further research may lead to possible applications in coordinated electric vehicle (EV) charging.
Resumo:
Spectrum sensing of multiple primary user channels is a crucial function in cognitive radio networks. In this paper we propose an optimal, sensing resource allocation algorithm for multi-channel cooperative spectrum sensing. The channel target is implemented as an objective and constraint to ensure a pre-determined number of empty channels are detected for secondary user network operations. Based on primary user traffic parameters, we calculate the minimum number of primary user channels that must be sensed to satisfy the channel target. We implement a hybrid sensing structure by grouping secondary user nodes into clusters and assign each cluster to sense a different primary user channels. We then solve the resource allocation problem to find the optimal sensing configuration and node allocation to minimise sensing duration. Simulation results show that the proposed algorithm requires the shortest sensing duration to achieve the channel target compared to existing studies that require long sensing and cannot guarantee the target.
Resumo:
We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access keys and tokens in a connected world. Although many existing solutions can be employed to protect a long secret using a short password, those solutions typically require certain assumptions on the distribution of the secret and/or the password, and are helpful against only a subset of the possible attackers. After briefly reviewing a variety of approaches, we propose a user-centric comprehensive model to capture the possible threats posed by online and offline attackers, from the outside and the inside, against the security of both the plaintext and the password. We then propose a few very simple protocols, adapted from the Ford-Kaliski server-assisted password generator and the Boldyreva unique blind signature in particular, that provide the best protection against all kinds of threats, for all distributions of secrets. We also quantify the concrete security of our approach in terms of online and offline password guesses made by outsiders and insiders, in the random-oracle model. The main contribution of this paper lies not in the technical novelty of the proposed solution, but in the identification of the problem and its model. Our results have an immediate and practical application for the real world: they show how to implement single-sign-on stateless roaming authentication for the internet, in a ad-hoc user-driven fashion that requires no change to protocols or infrastructure.
Resumo:
WG-7 is a stream cipher based on WG stream cipher and has been designed by Luo et al. (2010). This cipher is designed for low cost and lightweight applications (RFID tags and mobile phones, for instance). This paper addresses cryptographic weaknesses of WG-7 stream cipher. We show that the key stream generated by WG-7 can be distinguished from a random sequence after knowing 213.5 keystream bits and with a negligible error probability. Also, we investigate the security of WG-7 against algebraic attacks. An algebraic key recovery attack on this cipher is proposed. The attack allows to recover both the internal state and the secret key with the time complexity about 2/27.