151 resultados para Folk communication
Resumo:
Public, nonprofit and private organisations respond to large-scale disasters domestically and overseas. Critics of these assistance efforts, as well as those involved, often cite poor interorganisational partnering as an obstacle to successful disaster response. Observers frequently call for ‘more’ and ‘better’ partnering. We found important qualitative distinctions existed within partnering behaviours. We identified four different types of interorganisational partnering activities often referred to interchangeably: communication, cooperation, coordination and collaboration—the Four Cs. We derived definitions of the Four Cs from the partnering literature. We then tested them in a case study of the response to the 2010 Haiti earthquake. We suggest that the Four Cs are distinct activities, that organisations are typically strong or weak in one or more for various reasons, and that the four terms represent a continuum of increased interorganisational embeddedness in partnering activities.
Resumo:
Synchrophasors have become an important part of the modern power system and numerous applications have been developed covering wide-area monitoring, protection and control. Most applications demand continuous transmission of synchrophasor data across large geographical areas and require an efficient communication framework. IEEE C37.118-2 evolved as one of the most successful synchrophasor communication standards and is widely adopted. However, it lacks a predefined security mechanism and is highly vulnerable to cyber attacks. This paper analyzes different types of cyber attacks on IEEE C37.118-2 communication system and evaluates their possible impact on any developed synchrophasor application. Further, the paper also recommends an efficent security mechanism that can provide strong protection against cyber attacks. Although, IEEE C37.118-2 has been widely adopted, there is no clear understanding of the requirements and limitations. To this aim, the paper also presents detailed performance evaluation of IEEE C37.118-2 implementations which could help determine required resources and network characteristics before designing any synchrophasor application.
Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model
Resumo:
In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multiantenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the primary base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, three wireless power transfer (WPT) policies are proposed: 1) co-operative power beacons (CPB) power transfer, 2) best power beacon (BPB) power transfer, and 3) nearest power beacon (NPB) power transfer. To characterize the power transfer reliability of the proposed three policies, we derive new expressions for the exact power outage probability. Moreover, the analysis of the power outage probability is extended to the case when PBs are equipped with large antenna arrays. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), where the receiver with the strongest channel is selected; and 2) nearest receiver selection (NRS), where the nearest receiver is selected. To assess the secrecy performance, we derive new analytical expressions for the secrecy outage probability and the secrecy throughput considering the two receiver selection schemes using the proposed WPT policies. We presented Monte carlo simulation results to corroborate our analysis and show: 1) secrecy performance improves with increasing densities of PBs and D2D receivers due to larger multiuser diversity gain; 2) CPB achieves better secrecy performance than BPB and NPB but consumes more power; and 3) BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead. A pivotal conclusion- is reached that with increasing number of antennas at PBs, NPB offers a comparable secrecy performance to that of BPB but with a lower complexity.
Resumo:
The X-parameter based nonlinear modelling tools have been adopted as the foundation for the advanced methodology
of experimental characterisation and design of passive nonlinear devices. Based upon the formalism of the Xparameters,
it provides a unified framework for co-design of antenna beamforming networks, filters, phase shifters and
other passive and active devices of RF front-end, taking into account the effect of their nonlinearities. The equivalent
circuits of the canonical elements are readily incorporated in the models, thus enabling evaluation of PIM effect on the
performance of individual devices and their assemblies. An important advantage of the presented methodology is its
compatibility with the industry-standard established commercial RF circuit simulator Agilent ADS.
The major challenge in practical implementation of the proposed approach is concerned with experimental retrieval of the X-parameters for canonical passive circuit elements. To our best knowledge commercial PIM testers and practical laboratory test instruments are inherently narrowband and do not allow for simultaneous vector measurements at the PIM and harmonic frequencies. Alternatively, existing nonlinear vector analysers (NVNA) support X-parameter measurements in a broad frequency bands with a range of stimuli, but their dynamic range is insufficient for the PIM characterisation in practical circuits. Further opportunities for adaptation of the X-parameters methodology to the PIM
characterisation of passive devices using the existing test instruments are explored.
Resumo:
Public health risk communication during emergencies should be rapid and accurate in order to allow the audience to take steps to prevent adverse outcomes. Delays to official communications may cause unnecessary anxiety due to uncertainty or inaccurate information circulating within the at-risk group. Modern electronic communications present opportunities for rapid, targeted public health risk communication. We present a case report of a cluster of invasive meningococcal disease in a primary school in which we used the school's mass short message service (SMS) text message system to inform parents and guardians of pupils about the incident, to tell them that chemoprophylaxis would be offered to all pupils and staff, and to advise them when to attend the school to obtain further information and antibiotics. Following notification to public health on a Saturday, an incident team met on Sunday, sent the SMS messages that afternoon, and administered chemoprophyaxis to 93% of 404 pupils on Monday. The use of mass SMS messages enabled rapid communication from an official source and greatly aided the public health response to the cluster.
Resumo:
INTRODUCTION: A disaster is a serious disruption to the functioning of a community that exceeds its capacity to cope within its own resources. Risk communication in disasters aims to prevent and mitigate harm from disasters, prepare the population before a disaster, disseminate information during disasters and aid subsequent recovery. The aim of this systematic review is to identify, appraise and synthesise the findings of studies of the effects of risk communication interventions during four stages of the disaster cycle.
METHODS: We searched the Cochrane Central Register of Controlled Trials, Embase, MEDLINE, PsycInfo, Sociological Abstracts, Web of Science and grey literature sources for randomised trials, cluster randomised trials, controlled and uncontrolled before and after studies, interrupted time series studies and qualitative studies of any method of disaster risk communication to at-risk populations. Outcome criteria were disaster-related knowledge and behaviour, and health outcomes.
RESULTS: Searches yielded 5,224 unique articles, of which 100 were judged to be potentially relevant. Twenty-five studies met the inclusion criteria, and two additional studies were identified from other searching. The studies evaluated interventions in all four stages of the disaster cycle, included a variety of man-made, natural and infectious disease disasters, and were conducted in many disparate settings. Only one randomised trial and one cluster randomised trial were identified, with less robust designs used in the other studies. Several studies reported improvements in disaster-related knowledge and behaviour.
DISCUSSION: We identified and appraised intervention studies of disaster risk communication and present an overview of the contemporary literature. Most studies used non-randomised designs that make interpretation challenging. We do not make specific recommendations for practice but highlight the need for high-quality randomised trials and appropriately-analysed cluster randomised trials in the field of disaster risk communication where these can be conducted within an appropriate research ethics framework.
Resumo:
A key issue for the social work profession concerns the nature, quality and content of communicative encounters with children and families. This article introduces some findings from a project funded by the Economic and Social Research Council (ESRC) that took place across the United Kingdom between 2013 and 2015, which explored how social workers communicate with children in their everyday practice. The Talking and Listening to Children (TLC) project had three phases: the first was ethnographic, involving observations of social workers in their workplace and during visits; the second used video-stimulated recall with a small number of children and their social workers; and the third developed online materials to support social workers. This paper discusses findings from the first phase. It highlights a diverse picture regarding the context and content of communicative processes; it is argued that attention to contextual issues is as important as focusing on individual practitioners’ behaviours and outlines a model for so doing.