179 resultados para Microwave communication systems
Resumo:
Significant increase in installation of rooftop Photovoltaic (PV) in the Low-Voltage (LV) residential distribution network has resulted in over voltage problems. Moreover, increasing peak demand creates voltage dip problems and make voltage profile even worse. Utilizing the reactive power capability of PV inverter (RCPVI) can improve the voltage profile to some extent. Resistive caharcteristic (higher R/X ratio) limits the effectiveness of reactive power to provide voltage support in distribution network. Battery Energy Storage (BES), whereas, can store the excess PV generation during high solar insolation time and supply the stored energy back to the grid during peak demand. A coordinated algorithm is developed in this paper to use the reactive capability of PV inverter and BES with droop control. Proposed algorithm is capable to cater the severe voltage violation problem using RCPVI and BES. A signal flow is also mentioned in this research work to ensure smooth communication between all the equipments. Finally the developed algorithm is validated in a test distribution network.
Resumo:
This thesis presents a novel idea for an adaptive prioritized cross-layer design (APCLD) control algorithm to achieve comprehensive channel congestion control for vehicular safety communication based on DSRC technology. An appropriate evaluation metric and two control parameters have been established. Simulation studies have evaluated the DSRC network performance in different traffic scenario and under different channel conditions. The APCLD algorithm is derived from the results of the simulation analysis.
Resumo:
This paper investigates how community based media organisations are co-creative storytelling institutions, and how they learn to disseminate knowledge in a social learning system. Organisations involved in story co-creation are learning to create in fluid environments.They are project based, with a constant turnover of volunteers or staff. These organisations have to meet the needs of their funding bodies and their communities to remain sustainable. Learning is seen as dialogical, and this is also reflected in the nature of storytelling itself. These organisations must learn to meet the needs of their communities, who in turn learn from the organisation’s expertise in a facilitated setting. This learning is participatory and collaborative, and is often a mix of virtual and offline interaction. Such community-based organisations sit in the realm of a hybrid-learning environment; they are neither a formal educational institution like a college, nor do their volunteers produce outcomes in a professional capacity. Yet, they must maintain a certain level of quality outcomes from their contributors to be of continued value in their communities. Drawing from a larger research study, one particular example is that of the CitizenJ project. CitizenJ is hosted by a state cultural centre, and partnered with publishing partners in the community broadcasting sector. This paper explores how this project is a Community of Practice, and how it promotes ethical and best practice, meets contributors’ needs, emphasises the importance of facilitation in achieving quality outcomes, and the creation of projects for wider community and public interest.
Resumo:
This article argues that the concept of national media systems, and the comparative study of media systems, institutions, and practices, retains relevance in an era of media globalization and technological convergence. It considers various critiques of ‘media systems’ theories, such as those which view the concept of ‘system’ as a legacy of an outdated positivism and those which argue that the media globalization is weakening the relevance of nation-states in structuring the field of media cultures and practices. It argues for the continuing centrality of nation-states to media processes, and the ongoing significance of the national space in an age of media globalization, with reference to case studies of Internet policies in China, Brazil, and Australia. These studies indicate that nation-states remain critical actors in media governance and that domestic actors largely shape the central dynamics of media policies, even where media technologies and platforms enable global flows of media content.
Resumo:
Safety culture is a term with numerous definitions in the literature. Many authors advocate a prescriptive approach to safety culture in which if an organisation has certain levels of externally prescribed systems and structures in place it has a “good safety culture”. Conversely, other researchers suggest an anthropological approach of exploring deep meanings and understandings present within an organisation’s workforce. In a recent published review, the authors presented an alternative view to safety culture, in which the anthropological aspects of safety culture interact with the structures and systems in place within an organisation to result in behavioural patterns. This can be viewed as a human factors approach to safety culture in which, through understanding the specific interactions between the culture of a workforce and external organisational elements, organisational structures and systems can be optimised in order to shape worker behaviour and improve safety. This paper presents findings from a recent investigation of safety culture in the Australian heavy vehicle (transport) industry. Selected results are discussed to explore how understanding culture can provide direction to the optimisation of organisational structures and systems to match worker culture and thus improve safety. Specifically the value placed on personal experience and stories, as well as on both time and money are discussed, and interventions that are suited to these aspects of the culture are discussed. These findings demonstrate the importance of shifting beyond mere prescriptive and interpretive approaches to safety culture and instead to focus on the interaction between cultural and contextual elements to optimise organisational structures and systems.
Resumo:
Background Miscommunication in the healthcare sector can be life-threatening. The rising number of migrant patients and foreign-trained staff means that communication errors between a healthcare practitioner and patient when one or both are speaking a second language are increasingly likely. However, there is limited research that addresses this issue systematically. This protocol outlines a hospital-based study examining interactions between healthcare practitioners and their patients who either share or do not share a first language. Of particular interest are the nature and efficacy of communication in language-discordant conversations, and the degree to which risk is communicated. Our aim is to understand language barriers and miscommunication that may occur in healthcare settings between patients and healthcare practitioners, especially where at least one of the speakers is using a second (weaker) language. Methods/Design Eighty individual interactions between patients and practitioners who speak either English or Chinese (Mandarin or Cantonese) as their first language will be video recorded in a range of in- and out-patient departments at three hospitals in the Metro South area of Brisbane, Australia. All participants will complete a language background questionnaire. Patients will also complete a short survey rating the effectiveness of the interaction. Recordings will be transcribed and submitted to both quantitative and qualitative analyses to determine elements of the language used that might be particularly problematic and the extent to which language concordance and discordance impacts on the quality of the patient-practitioner consultation. Discussion Understanding the role that language plays in creating barriers to healthcare is critical for healthcare systems that are experiencing an increasing range of culturally and linguistically diverse populations both amongst patients and practitioners. The data resulting from this study will inform policy and practical solutions for communication training, provide an agenda for future research, and extend theory in health communication.
Resumo:
While enhanced cybersecurity options, mainly based around cryptographic functions, are needed overall speed and performance of a healthcare network may take priority in many circumstances. As such the overall security and performance metrics of those cryptographic functions in their embedded context needs to be understood. Understanding those metrics has been the main aim of this research activity. This research reports on an implementation of one network security technology, Internet Protocol Security (IPSec), to assess security performance. This research simulates sensitive healthcare information being transferred over networks, and then measures data delivery times with selected security parameters for various communication scenarios on Linux-based and Windows-based systems. Based on our test results, this research has revealed a number of network security metrics that need to be considered when designing and managing network security for healthcare-specific or non-healthcare-specific systems from security, performance and manageability perspectives. This research proposes practical recommendations based on the test results for the effective selection of network security controls to achieve an appropriate balance between network security and performance
Resumo:
Network topology and routing are two important factors in determining the communication costs of big data applications at large scale. As for a given Cluster, Cloud, or Grid system, the network topology is fixed and static or dynamic routing protocols are preinstalled to direct the network traffic. Users cannot change them once the system is deployed. Hence, it is hard for application developers to identify the optimal network topology and routing algorithm for their applications with distinct communication patterns. In this study, we design a CCG virtual system (CCGVS), which first uses container-based virtualization to allow users to create a farm of lightweight virtual machines on a single host. Then, it uses software-defined networking (SDN) technique to control the network traffic among these virtual machines. Users can change the network topology and control the network traffic programmingly, thereby enabling application developers to evaluate their applications on the same system with different network topologies and routing algorithms. The preliminary experimental results through both synthetic big data programs and NPB benchmarks have shown that CCGVS can represent application performance variations caused by network topology and routing algorithm.
Resumo:
Interest in the area of collaborative Unmanned Aerial Vehicles (UAVs) in a Multi-Agent System is growing to compliment the strengths and weaknesses of the human-machine relationship. To achieve effective management of multiple heterogeneous UAVs, the status model of the agents must be communicated to each other. This paper presents the effects on operator Cognitive Workload (CW), Situation Awareness (SA), trust and performance by increasing the autonomy capability transparency through text-based communication of the UAVs to the human agents. The results revealed a reduction in CW, increase in SA, increase in the Competence, Predictability and Reliability dimensions of trust, and the operator performance.
Resumo:
Cooperative Intelligent Transportation Systems (C-ITS) allow in-vehicle systems, and ultimately the driver, to enhance their awareness of their surroundings by enabling communication between vehicles and road infrastructure. C-ITS are widely considered as the next major step in driving assistance systems, aiming at increasing safety, comfort and mobility for drivers. However, any communicating systems are subjected to security threats. A key component for providing secure communications at a large scale is a Public Key Infrastructure (PKI). Due to the safety-critical nature of Vehicle-to-Vehicle (V2V) communications, a C-ITS PKI has functional, performance and scalability requirements that differ from traditional non-automotive environments. This paper identifies and defines the key functional and security requirements for C-ITS PKI systems and analyses proposed C-ITS PKI standards against these requirements. In particular, the proposed US and European C-ITS PKI systems are identified as being too complex and not scalable. The paper also highlights various privacy, security and scalability concerns that should be considered for a secure C-ITS PKI solution in the Australian transport landscape.
Resumo:
This project was a step forward in improving the voltage profile of traditional low voltage distribution networks with high photovoltaic generation or high peak demand. As a practical and economical solution, the developed methods use a Dynamic Voltage Restorer or DVR, which is a series voltage compensator, for continuous and communication-less power quality enhancement. The placement of DVR in the network is optimised in order to minimise its power rating and cost. In addition, new approaches were developed for grid synchronisation and control of DVR which are integrated with the voltage quality improvement algorithm for stable operation.
Resumo:
Developing countries in Asia and the Pacific are rapidly reaching middle income economic status. Their competitive advantage is shifting from labor-intensive industries and natural resource-based economies to knowledge-based economies that innovate and create new products and services. Early adoption of information and communication technology (ICT) can allow countries to leapfrog over the traditional development pathway into production of knowledge-based products and services. Since higher education institutions (HEIs) are considered a primary engine of economic growth, adoption of ICT is imperative for securing competitive advantage. ICT is thought to be one of the fastest growing industries and is frequently heralded as a transforming influence on higher education systems globally and, consequently, is enhancing the competitive advantage of countries. It is increasingly becoming evident that an institution-wide ICT strategy covering all evolving functions of competitive HEIs is necessary. Such a system may be designed as an integrated platform but implemented in phases.
Resumo:
Introduction Electronic medication administration record (eMAR) systems are promoted as a potential intervention to enhance medication safety in residential aged care facilities (RACFs). The purpose of this study was to conduct an in-practice evaluation of an eMAR being piloted in one Australian RACF before its roll out, and to provide recommendations for system improvements. Methods A multidisciplinary team conducted direct observations of workflow (n=34 hours) in the RACF site and the community pharmacy. Semi-structured interviews (n=5) with RACF staff and the community pharmacist were conducted to investigate their views of the eMAR system. Data were analysed using a grounded theory approach to identify challenges associated with the design of the eMAR system. Results The current eMAR system does not offer an end-to-end solution for medication management. Many steps, including prescribing by doctors and communication with the community pharmacist, are still performed manually using paper charts and fax machines. Five major challenges associated with the design of eMAR system were identified: limited interactivity; inadequate flexibility; problems related to information layout and semantics; the lack of relevant decision support; and system maintenance issues.We suggest recommendations to improve the design of the eMAR system and to optimize existing workflows. Discussion Immediate value can be achieved by improving the system interactivity, reducing inconsistencies in data entry design and offering dedicated organisational support to minimise connectivity issues. Longer-term benefits can be achieved by adding decision support features and establishing system interoperability requirements with stakeholder groups (e.g. community pharmacies) prior to system roll out. In-practice evaluations of technologies like eMAR system have great value in identifying design weaknesses which inhibit optimal system use.