158 resultados para Communication situation


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Public, nonprofit and private organisations respond to large-scale disasters domestically and overseas. Critics of these assistance efforts, as well as those involved, often cite poor interorganisational partnering as an obstacle to successful disaster response. Observers frequently call for ‘more’ and ‘better’ partnering. We found important qualitative distinctions existed within partnering behaviours. We identified four different types of interorganisational partnering activities often referred to interchangeably: communication, cooperation, coordination and collaboration—the Four Cs. We derived definitions of the Four Cs from the partnering literature. We then tested them in a case study of the response to the 2010 Haiti earthquake. We suggest that the Four Cs are distinct activities, that organisations are typically strong or weak in one or more for various reasons, and that the four terms represent a continuum of increased interorganisational embeddedness in partnering activities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Synchrophasors have become an important part of the modern power system and numerous applications have been developed covering wide-area monitoring, protection and control. Most applications demand continuous transmission of synchrophasor data across large geographical areas and require an efficient communication framework. IEEE C37.118-2 evolved as one of the most successful synchrophasor communication standards and is widely adopted. However, it lacks a predefined security mechanism and is highly vulnerable to cyber attacks. This paper analyzes different types of cyber attacks on IEEE C37.118-2 communication system and evaluates their possible impact on any developed synchrophasor application. Further, the paper also recommends an efficent security mechanism that can provide strong protection against cyber attacks. Although, IEEE C37.118-2 has been widely adopted, there is no clear understanding of the requirements and limitations. To this aim, the paper also presents detailed performance evaluation of IEEE C37.118-2 implementations which could help determine required resources and network characteristics before designing any synchrophasor application.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multiantenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the primary base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, three wireless power transfer (WPT) policies are proposed: 1) co-operative power beacons (CPB) power transfer, 2) best power beacon (BPB) power transfer, and 3) nearest power beacon (NPB) power transfer. To characterize the power transfer reliability of the proposed three policies, we derive new expressions for the exact power outage probability. Moreover, the analysis of the power outage probability is extended to the case when PBs are equipped with large antenna arrays. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), where the receiver with the strongest channel is selected; and 2) nearest receiver selection (NRS), where the nearest receiver is selected. To assess the secrecy performance, we derive new analytical expressions for the secrecy outage probability and the secrecy throughput considering the two receiver selection schemes using the proposed WPT policies. We presented Monte carlo simulation results to corroborate our analysis and show: 1) secrecy performance improves with increasing densities of PBs and D2D receivers due to larger multiuser diversity gain; 2) CPB achieves better secrecy performance than BPB and NPB but consumes more power; and 3) BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead. A pivotal conclusion- is reached that with increasing number of antennas at PBs, NPB offers a comparable secrecy performance to that of BPB but with a lower complexity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The X-parameter based nonlinear modelling tools have been adopted as the foundation for the advanced methodology
of experimental characterisation and design of passive nonlinear devices. Based upon the formalism of the Xparameters,
it provides a unified framework for co-design of antenna beamforming networks, filters, phase shifters and
other passive and active devices of RF front-end, taking into account the effect of their nonlinearities. The equivalent
circuits of the canonical elements are readily incorporated in the models, thus enabling evaluation of PIM effect on the
performance of individual devices and their assemblies. An important advantage of the presented methodology is its
compatibility with the industry-standard established commercial RF circuit simulator Agilent ADS.
The major challenge in practical implementation of the proposed approach is concerned with experimental retrieval of the X-parameters for canonical passive circuit elements. To our best knowledge commercial PIM testers and practical laboratory test instruments are inherently narrowband and do not allow for simultaneous vector measurements at the PIM and harmonic frequencies. Alternatively, existing nonlinear vector analysers (NVNA) support X-parameter measurements in a broad frequency bands with a range of stimuli, but their dynamic range is insufficient for the PIM characterisation in practical circuits. Further opportunities for adaptation of the X-parameters methodology to the PIM
characterisation of passive devices using the existing test instruments are explored.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent evidence indicates that dogs' sociocognitive abilities and behaviour in a test situation are shaped by both genetic factors and life experiences. We used the 'unsolvable task' paradigm to investigate the effect of breed and age/experience on the use of human-directed gazing behaviour. Following a genetic classification based on recent genome analyses, dogs were allocated to three breed groups, namely Primitive, Hunting/Herding and Molossoid. Furthermore, we tested dogs at 2 months, 4.5. months and as adults. The test consisted of three solvable trials in which dogs could obtain food by manipulating a plastic container followed by an unsolvable trial in which obtaining the food became impossible. The dogs' behaviour towards the apparatus and the people present was analysed. At 2 months no breed group differences emerged and although human-directed gazing behaviour was observed in approximately half of the pups, it occurred for brief periods, suggesting that the aptitude to use human-directed gazing as a request for obtaining help probably develops at a later date when dogs have had more experience with human communication. Breed group differences, however, did emerge strongly in adult dogs and, although less pronounced, also in 4.5-month-old subjects, with dogs in the Hunting/Herding group showing significantly more human-directed gazing behaviour than dogs in the other two breed groups. These results suggest that, although the domestication process may have shaped the dog's human-directed communicative abilities, the later selection for specific types of work might also have had a significant impact on their emergence. © 2011 The Association for the Study of Animal Behaviour.