81 resultados para Telecommunications.
Resumo:
Just as telecommunications has played a key role in the global economy,1 high-speed broadband will have a significant role to play in the future of the digital economy. In particular high-speed broadband will have a role to play in the delivery of applications and services necessary for acquiring, and maintaining into the future Australia and Australians’ appropriate education level; community; health services, information provision and support; government services and engagement and participation by the public in the political process.
Resumo:
This article explores an important temporal aspect of the design of strategic alliances by focusing on the issue of time bounds specification. Time bounds specification refers to a choice on behalf of prospective alliance partners at the time of alliance formation to either pre-specify the duration of an alliance to a specific time window, or to keep the alliance open-ended (Reuer & Ariňo, 2007). For instance, Das (2006) mentions the example of the alliance between Telemundo Network and Mexican Argos Comunicacion (MAC). Announced in October 2000, this alliance entailed a joint production of 1200 hours of comedy, news, drama, reality and novella programs (Das, 2006). Conditioned on the projected date of completing the 1200 hours of programs, Telemundo Network and MAC pre-specified the time bounds of the alliance ex ante. Such time-bound alliances are said to be particularly prevalent in project-based industries, like movie production, construction, telecommunications and pharmaceuticals (Schwab & Miner, 2008). In many other instances, however, firms may choose to keep their alliances open-ended, not specifying a specific time bound at the time of alliance formation. The choice between designing open-ended alliances that are “built to last”, versus time bound alliances that are “meant to end” is important. Seminal works like Axelrod (1984), Heide & Miner (1992), and Parkhe (1993) demonstrated that the choice to place temporal bounds on a collaborative venture has important implications. More specifically, collaborations that have explicit, short term time bounds (i.e. what is termed a shorter “shadow of the future”) are more likely to experience opportunism (Axelrod, 1984), are more likely to focus on the immediate present (Bakker, Boros, Kenis & Oerlemans, 2012), and are less likely to develop trust (Parkhe, 1993) than alliances for which time bounds are kept indeterminate. These factors, in turn, have been shown to have important implications for the performance of alliances (e.g. Kale, Singh & Perlmutter, 2000). Thus, there seems to be a strong incentive for organizations to form open-ended strategic alliances. And yet, Reuer & Ariňo (2007), one of few empirical studies that details the prevalence of time-bound and open-ended strategic alliances, found that about half (47%) of the alliances in their sample were time bound, the other half were open-ended. What conditions, then, determine this choice?
Resumo:
This article examines the place of Australian and local content regulation in the new media policy framework proposed by the Convergence Review. It outlines the history of Australian content regulation and the existing policy framework, before going on to detail some of the debates around Australian content during the Review. The final section analyses the relevant recommendations in the Convergence Review Final Report, and highlights some issues and problems that may arise in the new framework.
Resumo:
The mining environment presents a challenging prospect for stereo vision. Our objective is to produce a stereo vision sensor suited to close-range scenes consisting mostly of rocks. This sensor should produce a dense depth map within real-time constraints. Speed and robustness are of foremost importance for this application. This paper compares a number of stereo matching algorithms in terms of robustness and suitability to fast implementation. These include traditional area-based algorithms, and algorithms based on non-parametric transforms, notably the rank and census transforms. Our experimental results show that the rank and census transforms are robust with respect to radiometric distortion and introduce less computational complexity than conventional area-based matching techniques.
Resumo:
Mobile telecommunications have become a key lifestyle and technological trend of the twenty first century. In the context of increased urbanism and pressure on cites for citizen engagement for the purpose of creating good public places the potential of these technologies raises critical questions for planning professionals. Even though technology has become integral to all functions within our urban environment, little is known about perceptions and relationship between urban planners and the ubiquitous, ever-present digital layer of urban data and information. This paper explores this issue, via three focus groups and an additional follow-up interview with planners from local and state government, education and private sector. This paper explores the issues of integrating information and communication technologies into planning practice and the affordances that these technologies offer for community consultation and placemaking.
Resumo:
The IEEE Wireless LAN standard has been a true success story by enabling convenient, efficient and low-cost access to broadband networks for both private and professional use. However, the increasing density and uncoordinated operation of wireless access points, combined with constantly growing traffic demands have started hurting the users' quality of experience. On the other hand, the emerging ubiquity of wireless access has placed it at the center of attention for network attacks, which not only raises users' concerns on security but also indirectly affects connection quality due to proactive measures against security attacks. In this work, we introduce an integrated solution to congestion avoidance and attack mitigation problems through cooperation among wireless access points. The proposed solution implements a Partially Observable Markov Decision Process (POMDP) as an intelligent distributed control system. By successfully differentiating resource hampering attacks from overload cases, the control system takes an appropriate action in each detected anomaly case without disturbing the quality of service for end users. The proposed solution is fully implemented on a small-scale testbed, on which we present our observations and demonstrate the effectiveness of the system to detect and alleviate both attack and congestion situations.
Resumo:
Smartphones get increasingly popular where more and more smartphone platforms emerge. Special attention was gained by the open source platform Android which was presented by the Open Handset Alliance (OHA) hosting members like Google, Motorola, and HTC. Android uses a Linux kernel and a stripped-down userland with a custom Java VM set on top. The resulting system joins the advantages of both environments, while third-parties are intended to develop only Java applications at the moment. In this work, we present the benefit of using native applications in Android. Android includes a fully functional Linux, and using it for heavy computational tasks when developing applications can bring in substantional performance increase. We present how to develop native applications and software components, as well as how to let Linux applications and components communicate with Java programs. Additionally, we present performance measurements of native and Java applications executing identical tasks. The results show that native C applications can be up to 30 times as fast as an identical algorithm running in Dalvik VM. Java applications can become a speed-up of up to 10 times if utilizing JNI.
Resumo:
Exercise-based cardiac rehabilitation (CR) is efficacious in reducing mortality and hospital admissions; however it remains inaccessible to large proportions of the patient population. Removal of attendance barriers for hospital or centre-based CR has seen the promotion of home-based CR. Delivery of safe and appropriately prescribed exercise in the home was first documented 25 years ago, with the utilisation of fixed land-line telecommunications to monitor ECG. The advent of miniature ECG sensors, in conjunction with smartphones, now enables CR to be delivered with greater flexibility with regard to location, time and format, while retaining the capacity for real-time patient monitoring. A range of new systems allow other signals including speed, location, pulse oximetry, and respiration to be monitored and these may have application in CR. There is compelling evidence that telemonitored-based CR is an effective alternative to traditional CR practice. The long-standing barrier of access to centre-based CR, combined with new delivery platforms, raises the question of when telemonitored-based CR could replace conventional approaches as the standard practice.
Resumo:
After its narrow re-election in June 2010, the Australian Labor government undertook a series of public inquiries into reform of Australian media, communications and copyright laws. One important driver of policy reform was the government’s commitment to building a National Broadband Network (NBN), and the implications this had for existing broadcasting and telecommunications policy, as it would constitute a major driver of convergence of media and communications access devices and content platforms. These inquiries included: the Convergence Review of media and communications legislation; the Australian Law Reform Commission (ALRC) review of the National Classification Scheme; the Independent Media Inquiry (Finkelstein Review) into Media and Media Regulation; and the ALRC review of Copyright and the Digital Economy. One unusual feature of this review process, discussed in the paper, was the degree to which academics were involved in the process, not simply as providers of expert opinion, but as review chairs seconded from their universities. This paper considers the role played by activist groups in all of these inquiries and their relationship to the various participants in the inquiries, as well as the implications of academics being engaged in such inquiries, not simply as activist-scholars, but as those primarily responsible for delivering policy review outcomes. The latter brings to the forefront issues arising in from direct engagement with governments and state agencies themselves, which challenges traditional understandings of the academic community as “critical outsiders” towards such policy processes.
Resumo:
Sound Musicianship is a book for music educators and musicians about musicianship—about musical skills, abilities, habits, sensibilities and understandings. Musicianship is explored as a form of craftsmanship. Like most crafts, music requires a balance of theoretical knowledge and practical skills that contribute to a highly tuned ability to appreciate and express music. In particular, the book explores general trends that influence musicianship in the twenty-first century, such as an increased reliance on digital media, greater awareness of the neurological basis for musical behaviour, a renewed interest in connections between bodily movements and musical expression, and increased cultural plurality resulting from more frequent travel, increased levels of migration and ubiquitous telecommunications. The book has a deliberate focus on the developmental aspects of musicianship, which will benefit those hoping to advance their own music learning or that of others. It includes a diverse range of views and perspectives on musicianship and is organised into five sections. The first four sections explore the implications of music understood as sound, experience, motion and culture, respectively. In these sections, leading researchers and thinkers outline important issues and debates that are relevant to developing the crafts of music making and they share insights into recent trends and understandings. The final section of the book looks at educational considerations and provides a series of case studies that document innovative approaches to developing musicianship. Readers will encounter some new, interesting and thought-provoking ideas within these pages. As we move further into the twenty-first century—with all the opportunities and challenges for music making it brings—the requirement to review our concepts of musicianship training will intensify, and the definition of a “sound basis” for a contemporary musicianship will evolve. This book is intended to help stimulate and inform that evolutionary process.
Resumo:
The current global economic instability and the vulnerability of small island nations are providing the impetus for greater integration between the countries of the South Pacific region. This exercise is critical for their survival in today’s turbulent economic environment. Past efforts of regional integration in the South Pacific have not been very successful. Reasons attributed to this outcome include issues related to damage of sovereignty, and lack of a shared integration infrastructure. Today, the IT resources with collaborative capacities provide the opportunity to develop a shared IT infrastructure to facilitate integration in the South Pacific. In an attempt to develop a model of regional integration with an IT-backed infrastructure, we identify and report on the antecedents of the current stage of regional integration, and the stakeholders’ perceived benefits of an IT resources backed regional integration in the South Pacific. Employing a case study based approach, the study finds that while most stakeholders were positive about the potential of IT-backed regional integration, significant challenges exist that hinder the realisation of this model. The study finds that facilitating IT-backed regional integration requires enabling IT infrastructure, equitable IT development in the region, greater awareness on the potential of the modern IT resources, market liberalisation of the information and telecommunications sector and greater political support for IT initiatives.
Resumo:
This paper critically evaluates the series of inquires that the Australian Labor government undertook during 2011-2013 into reform of Australian media, communications and copyright laws. One important driver of policy reform was the government’s commitment to building a National Broadband Network (NBN), and the implications this had for existing broadcasting and telecommunications policy, as it would constitute a major driver of convergence of media and communications access devices and content platforms. These inquiries included: the Convergence Review of media and communications legislation; the Australian Law Reform Commission (ALRC) review of the National Classification Scheme; and the Independent Media Inquiry (Finkelstein Review) into Media and Media Regulation. One unusual feature of this review process was the degree to which academics were involved in the process, not simply as providers of expert opinion, but as review chairs seconded from their universities. This paper considers the role played by activist groups in all of these inquiries and their relationship to the various participants in the inquiries, as well as the implications of academics being engaged in such inquiries, not simply as activist-scholars, but as those primarily responsible for delivering policy review outcomes. The paper draws upon the concept of "policy windows" in order to better understand the context in which the inquiries took place, and their relative lack of legislative impact.
Resumo:
In this age of electronic money transactions, the opportunities for electronic crime expanded at the same rate as ever expanding rise of on-line services. With world becoming a global village, crime over the internet transcends no boundaries, borders or jurisdictions. This paper critically examines the available literature on spam, and the control measures available to control spam. This study is followed by the literature overview related to mobility of devices and how the application of mobile technologies as communication medium has impacted the handling of spam. The conclusion of this literature review with proposed direction of study is summarized.
Resumo:
The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and authentication of a security endpoint have raised numerous privacy and security concerns. HSMs have the ability to tie a system or an object, along with its users to the physical world. However, this enables tracking of the user and/or an object associated with the HSM. Current systems do not adequately address the privacy needs and as such are susceptible to various attacks. In this work, we analyse various security and privacy concerns that arise when deploying such hardware security modules and propose a system that allow users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Along with the standard notion of protecting privacy of an user, the proposed system offers colligation between seemingly independent pseudonyms. This new property when combined with HSMs that store the master secret key is extremely beneficial to a user, as it offers a convenient way to generate a large number of pseudonyms using relatively small storage requirements.
Resumo:
Database watermarking has received significant research attention in the current decade. Although, almost all watermarking models have been either irreversible (the original relation cannot be restored from the watermarked relation) and/or non-blind (requiring original relation to detect the watermark in watermarked relation). This model has several disadvantages over reversible and blind watermarking (requiring only watermarked relation and secret key from which the watermark is detected and original relation is restored) including inability to identify rightful owner in case of successful secondary watermarking, inability to revert the relation to original data set (required in high precision industries) and requirement to store unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store original database at a secure secondary storage.