163 resultados para Communication messages
Resumo:
Public, nonprofit and private organisations respond to large-scale disasters domestically and overseas. Critics of these assistance efforts, as well as those involved, often cite poor interorganisational partnering as an obstacle to successful disaster response. Observers frequently call for ‘more’ and ‘better’ partnering. We found important qualitative distinctions existed within partnering behaviours. We identified four different types of interorganisational partnering activities often referred to interchangeably: communication, cooperation, coordination and collaboration—the Four Cs. We derived definitions of the Four Cs from the partnering literature. We then tested them in a case study of the response to the 2010 Haiti earthquake. We suggest that the Four Cs are distinct activities, that organisations are typically strong or weak in one or more for various reasons, and that the four terms represent a continuum of increased interorganisational embeddedness in partnering activities.
Resumo:
Synchrophasors have become an important part of the modern power system and numerous applications have been developed covering wide-area monitoring, protection and control. Most applications demand continuous transmission of synchrophasor data across large geographical areas and require an efficient communication framework. IEEE C37.118-2 evolved as one of the most successful synchrophasor communication standards and is widely adopted. However, it lacks a predefined security mechanism and is highly vulnerable to cyber attacks. This paper analyzes different types of cyber attacks on IEEE C37.118-2 communication system and evaluates their possible impact on any developed synchrophasor application. Further, the paper also recommends an efficent security mechanism that can provide strong protection against cyber attacks. Although, IEEE C37.118-2 has been widely adopted, there is no clear understanding of the requirements and limitations. To this aim, the paper also presents detailed performance evaluation of IEEE C37.118-2 implementations which could help determine required resources and network characteristics before designing any synchrophasor application.
Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model
Resumo:
In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multiantenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the primary base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, three wireless power transfer (WPT) policies are proposed: 1) co-operative power beacons (CPB) power transfer, 2) best power beacon (BPB) power transfer, and 3) nearest power beacon (NPB) power transfer. To characterize the power transfer reliability of the proposed three policies, we derive new expressions for the exact power outage probability. Moreover, the analysis of the power outage probability is extended to the case when PBs are equipped with large antenna arrays. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), where the receiver with the strongest channel is selected; and 2) nearest receiver selection (NRS), where the nearest receiver is selected. To assess the secrecy performance, we derive new analytical expressions for the secrecy outage probability and the secrecy throughput considering the two receiver selection schemes using the proposed WPT policies. We presented Monte carlo simulation results to corroborate our analysis and show: 1) secrecy performance improves with increasing densities of PBs and D2D receivers due to larger multiuser diversity gain; 2) CPB achieves better secrecy performance than BPB and NPB but consumes more power; and 3) BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead. A pivotal conclusion- is reached that with increasing number of antennas at PBs, NPB offers a comparable secrecy performance to that of BPB but with a lower complexity.
Resumo:
The X-parameter based nonlinear modelling tools have been adopted as the foundation for the advanced methodology
of experimental characterisation and design of passive nonlinear devices. Based upon the formalism of the Xparameters,
it provides a unified framework for co-design of antenna beamforming networks, filters, phase shifters and
other passive and active devices of RF front-end, taking into account the effect of their nonlinearities. The equivalent
circuits of the canonical elements are readily incorporated in the models, thus enabling evaluation of PIM effect on the
performance of individual devices and their assemblies. An important advantage of the presented methodology is its
compatibility with the industry-standard established commercial RF circuit simulator Agilent ADS.
The major challenge in practical implementation of the proposed approach is concerned with experimental retrieval of the X-parameters for canonical passive circuit elements. To our best knowledge commercial PIM testers and practical laboratory test instruments are inherently narrowband and do not allow for simultaneous vector measurements at the PIM and harmonic frequencies. Alternatively, existing nonlinear vector analysers (NVNA) support X-parameter measurements in a broad frequency bands with a range of stimuli, but their dynamic range is insufficient for the PIM characterisation in practical circuits. Further opportunities for adaptation of the X-parameters methodology to the PIM
characterisation of passive devices using the existing test instruments are explored.
Resumo:
INTRODUCTION: A disaster is a serious disruption to the functioning of a community that exceeds its capacity to cope within its own resources. Risk communication in disasters aims to prevent and mitigate harm from disasters, prepare the population before a disaster, disseminate information during disasters and aid subsequent recovery. The aim of this systematic review is to identify, appraise and synthesise the findings of studies of the effects of risk communication interventions during four stages of the disaster cycle.
METHODS: We searched the Cochrane Central Register of Controlled Trials, Embase, MEDLINE, PsycInfo, Sociological Abstracts, Web of Science and grey literature sources for randomised trials, cluster randomised trials, controlled and uncontrolled before and after studies, interrupted time series studies and qualitative studies of any method of disaster risk communication to at-risk populations. Outcome criteria were disaster-related knowledge and behaviour, and health outcomes.
RESULTS: Searches yielded 5,224 unique articles, of which 100 were judged to be potentially relevant. Twenty-five studies met the inclusion criteria, and two additional studies were identified from other searching. The studies evaluated interventions in all four stages of the disaster cycle, included a variety of man-made, natural and infectious disease disasters, and were conducted in many disparate settings. Only one randomised trial and one cluster randomised trial were identified, with less robust designs used in the other studies. Several studies reported improvements in disaster-related knowledge and behaviour.
DISCUSSION: We identified and appraised intervention studies of disaster risk communication and present an overview of the contemporary literature. Most studies used non-randomised designs that make interpretation challenging. We do not make specific recommendations for practice but highlight the need for high-quality randomised trials and appropriately-analysed cluster randomised trials in the field of disaster risk communication where these can be conducted within an appropriate research ethics framework.
Resumo:
The notion of educating the public through generic healthy eating messages has pervaded dietary health promotion efforts over the years and continues to do so through various media, despite little evidence for any enduring impact upon eating behaviour. There is growing evidence, however, that tailored interventions such as those that could be delivered online can be effective in bringing about healthy dietary behaviour change. The present paper brings together evidence from qualitative and quantitative studies that have considered the public perspective of genomics, nutrigenomics and personalised nutrition, including those conducted as part of the EU-funded Food4Me project. Such studies have consistently indicated that although the public hold positive views about nutrigenomics and personalised nutrition, they have reservations about the service providers' ability to ensure the secure handling of health data. Technological innovation has driven the concept of personalised nutrition forward and now a further technological leap is required to ensure the privacy of online service delivery systems and to protect data gathered in the process of designing personalised nutrition therapies.
Resumo:
A key issue for the social work profession concerns the nature, quality and content of communicative encounters with children and families. This article introduces some findings from a project funded by the Economic and Social Research Council (ESRC) that took place across the United Kingdom between 2013 and 2015, which explored how social workers communicate with children in their everyday practice. The Talking and Listening to Children (TLC) project had three phases: the first was ethnographic, involving observations of social workers in their workplace and during visits; the second used video-stimulated recall with a small number of children and their social workers; and the third developed online materials to support social workers. This paper discusses findings from the first phase. It highlights a diverse picture regarding the context and content of communicative processes; it is argued that attention to contextual issues is as important as focusing on individual practitioners’ behaviours and outlines a model for so doing.
Resumo:
Existing compact routing schemes, e.g., Thorup and Zwick [SPAA 2001] and Chechik [PODC 2013], often have no means to tolerate failures, once the system has been setup and started. This paper presents, to our knowledge, the first self-healing compact routing scheme. Besides, our schemes are developed for low memory nodes, i.e., nodes need only O(log2 n) memory, and are thus, compact schemes.
We introduce two algorithms of independent interest: The first is CompactFT, a novel compact version (using only O(log n) local memory) of the self-healing algorithm Forgiving Tree of Hayes et al. [PODC 2008]. The second algorithm (CompactFTZ) combines CompactFT with Thorup-Zwick’s treebased compact routing scheme [SPAA 2001] to produce a fully compact self-healing routing scheme. In the self-healing model, the adversary deletes nodes one at a time with the affected nodes self-healing locally by adding few edges. CompactFT recovers from each attack in only O(1) time and ∆ messages, with only +3 degree increase and O(log∆) graph diameter increase, over any sequence of deletions (∆ is the initial maximum degree).
Additionally, CompactFTZ guarantees delivery of a packet sent from sender s as long as the receiver has not been deleted, with only an additional O(y log ∆) latency, where y is the number of nodes that have been deleted on the path between s and t. If t has been deleted, s gets informed and the packet removed from the network.