124 resultados para networking
Resumo:
There is a substantial literature on the relationship between gender and access to finance. However, most studies have been concerned with access to debt finance. More recently, the focus of this research has broadened to examine women and venture capital. This article extends the focus further by examining the role of women in the business angel market, which is more important than the formal venture capital market in terms of both the number of ventures supported and total capital flows. Based on a detailed analysis of business angels in the U.K., the study concludes that women investors who are active in the market differ from their male counterparts in only limited respects. Future research into women business angels, and the possible existence of gender differences, needs to be based on more fully elaborated standpoint epistemologies that focus on the experience of the woman angel investor per se, and center on the examination of the role of homophily, social capital, networking, and competition in investment behavior.
Resumo:
A novel tag computation circuit for a credit based Self-Clocked Fair Queuing (SCFQ) Scheduler is presented. The scheduler combines Weighted Fair Queuing (WFQ) with a credit based bandwidth reallocation scheme. The proposed architecture is able to reallocate bandwidth on the fly if particular links suffer from channel quality degradation .The hardware architecture is parallel and pipelined enabling an aggregated throughput rate of 180 million tag computations per second. The throughput performance is ideal for Broadband Wireless Access applications, allowing room for relatively complex computations in QoS aware adaptive scheduling. The high-level system break-down is described and synthesis results for Altera Stratix II FPGA technology are presented.
Resumo:
Key pre-distribution schemes have been proposed as means to overcome Wireless Sensor Networks constraints such as limited communication and processing power. Two sensor nodes can establish a secure link with some probability based on the information stored in their memories though it is not always possible that two sensor nodes may set up a secure link. In this paper, we propose a new approach that elects trusted common nodes called ”Proxies” which reside on an existing secure path linking two sensor nodes. These sensor nodes are used to send the generated key which will be divided into parts (nuggets) according to the number of elected proxies. Our approach has been assessed against previously developed algorithms and the results show that our algorithm discovers proxies more quickly which are closer to both end nodes, thus producing shorter path lengths. We have also assessed the impact of our algorithm on the average time to establish a secure link when the transmitter and receiver of the sensor nodes are ”ON”. The results show the superiority of our algorithm in this regard. Overall, the proposed algorithm is well suited for Wireless Sensor Networks.
Resumo:
Leukocyte-derived matrix metalloproteinases (MMP) are implicated in the tissue destruction characteristic of tuberculosis (TB). The contribution of lung stromal cells to MMP activity in TB is unknown. Oncostatin M (OSM) is an important stimulus to extrapulmonary stromal MMP induction, but its role in regulation of pulmonary MMP secretion or pathophysiology of TB is unknown. We investigated OSM secretion from Mycobacterium tuberculosis (Mtb)-infected human monocytes/macrophages and the networking effects of such OSM on lung fibroblast MMP secretion. Mtb increased monocyte OSM secretion dose dependently in vitro. In vivo tuberculous granulomas immunostained positively for OSM. Further, conditioned media from Mtb-infected monocytes (CoMTb) induced monocyte OSM secretion (670 ± 55 versus 166 ± 14 pg/mL in controls), implicating an autocrine loop. Mtb-induced OSM secretion was prostaglandin (PG) sensitive, and required activation of surface G-protein coupled receptors. OSM induction was ERK MAP kinase dependent, p38-requiring but JNK-independent. OSM synergized with TNF-, a key cytokine in TB granuloma formation, to stimulate pulmonary fibroblast MMP-1/-3 secretion, while suppressing secretion of tissue inhibitors of metalloproteinases-1/-2. In summary, Mtb infection of monocytes results in PG-dependent OSM secretion, which synergizes with TNF- to drive functionally unopposed fibroblast MMP-1/-3 secretion, demonstrating a previously unrecognized role for OSM in TB.
Resumo:
The future convergence of voice, video and data applications on the Internet requires that next generation technology provides bandwidth and delay guarantees. Current technology trends are moving towards scalable aggregate-based systems where applications are grouped together and guarantees are provided at the aggregate level only. This solution alone is not enough for interactive video applications with sub-second delay bounds. This paper introduces a novel packet marking scheme that controls the end-to-end delay of an individual flow as it traverses a network enabled to supply aggregate- granularity Quality of Service (QoS). IPv6 Hop-by-Hop extension header fields are used to track the packet delay encountered at each network node and autonomous decisions are made on the best queuing strategy to employ. The results of network simulations are presented and it is shown that when the proposed mechanism is employed the requested delay bound is met with a 20% reduction in resource reservation and no packet loss in the network.
Resumo:
Bodyworn antennas are found in a wide range of medical, military and personal communication applications, yet reliable communication from the surface of the human body still presents a range of engineering challenges. At UHF and microwave frequencies, bodyworn antennas can suffer from reduced efficiency due to electromagnetic absorption in tissue, radiation pattern fragmentation and variations in feed-point impedance. The significance and nature of these effects are system specific and depend on the operating frequency, propagation environment and physical constraints on the antenna itself. This paper describes how numerical electromagnetic modelling techniques such as FDTD (finite-difference time-domain) can be used in the design of bodyworn antennas. Examples are presented for 418 MHz, 916 .5 MHz and 2 . 45 GHz, in the context of both biomedical signalling and wireless personal-area networking applications such as the Bluetooth(TM)* wireless technology.
Resumo:
Mobile ad hoc networking of dismounted combat personnel is expected to play an important role in the future of network-centric operations. High-speed, short-range, soldier-to-soldier wireless communications will be required to relay information on situational awareness, tactical instructions, and covert surveillance related data during special operations reconnaissance and other missions. This article presents some of the work commissioned by the U. K. Ministry of Defence to assess the feasibility of using 60 GHz millimeter-wave smart antenna technology to provide covert communications capable of meeting these stringent networking needs. Recent advances in RF front-end technology, alongside physical layer transmission schemes that could be employed in millimeter-wave soldier-mounted radio, are discussed. The introduction of covert communications between soldiers will require the development of a bespoke directive medium access layer. A number of adjustments to the IEEE 802.11 distribution coordination function that will enable directional communications are suggested. The successful implementation of future smart antenna technologies and direction of arrival-based protocols will be highly dependent on thorough knowledge of transmission channel characteristics prior to deployment. A novel approach to simulating dynamic soldier-to-soldier signal propagation using state-of-the-art animation-based technology developed for computer game design is described, and important channel metrics such as root mean square angle and delay spread for a team of four networked infantry soldiers over a range of indoor and outdoor environments is reported.
Resumo:
Research to date has identified incubator units as an effective mechanism for supporting the growth and development of small entrepreneurial firms. Advantages are gained not only from the provision of appropriate facilities and external managerial expertise on site, but also from the opportunity to develop entrepreneurial networks facilitated by the spatial proximity of incubator firms. Therefore, the research question upon which the paper is based investigates the impact of context, in other words the degree to which the networking opportunities provided by the university incubator support the small firm in its pursuit of sustainability and growth
Resumo:
Put in place to protect the rights of the child, the Convention on the Rights of the Child is a set of non-negotiable standards. A core principle underpinning the Convention is the child's right to participate fully in social arenas and to access sources of social support without excessive interference. Juxtaposing this is the right of the child to be shielded from harm, abuse and exploitation. Over the past several decades the Internet has emerged as a fast and easily accessible medium for people to connect and communicate. While the Internet provides children with a source of support through chat rooms, online communities and social networking sites, just as equally it can expose vulnerable children to predatory and deviant individuals exacerbating the potential for harm. Upholding the Convention in cyberspace is a challenge. The Internet is not owned or regulated by any governing body and accountability is difficult to enforce. This article discusses some of the difficulties of upholding the Convention online and provides recommendations for policy-makers to protect children as they participate in cyberspace.
Resumo:
The provision of security in mobile ad hoc networks is of paramount importance due to their wireless nature. However, when conducting research into security protocols for ad hoc networks it is necessary to consider these in the context of the overall system. For example, communicational delay associated with the underlying MAC layer needs to be taken into account. Nodes in mobile ad hoc networks must strictly obey the rules of the underlying MAC when transmitting security-related messages while still maintaining a certain quality of service. In this paper a novel authentication protocol, RASCAAL, is described and its performance is analysed by investigating both the communicational-related effects of the underlying IEEE 802.11 MAC and the computational-related effects of the cryptographic algorithms employed. To the best of the authors' knowledge, RASCAAL is the first authentication protocol which proposes the concept of dynamically formed short-lived random clusters with no prior knowledge of the cluster head. The performance analysis demonstrates that the communication losses outweigh the computation losses with respect to energy and delay. MAC-related communicational effects account for 99% of the total delay and total energy consumption incurred by the RASCAAL protocol. The results also show that a saving in communicational energy of up to 12.5% can be achieved by changing the status of the wireless nodes during the course of operation. Copyright (C) 2009 G. A. Safdar and M. P. O'Neill (nee McLoone).