171 resultados para Networking and Communications

em QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The key attributes of a smarter power grid include: pervasive interconnection of smart devices; extensive data generation and collection; and rapid reaction to events across a widely dispersed physical infrastructure. Modern telecommunications technologies are being deployed across power systems to support these monitoring and control capabilities. To enable interoperability, several new communications protocols and standards have been developed over the past 10 to 20 years. These continue to be refined, even as new systems are rolled out.

This new hyper-connected communications infrastructure provides an environment rich in sub-systems and physical devices that are attractive to cyber-attackers. Indeed, as smarter grid operations become dependent on interconnectivity, the communications network itself becomes a target. Consequently, we examine cyber-attacks that specifically target communications, particularly state-of-the-art standards and protocols. We further explore approaches and technologies that aim to protect critical communications networks against intrusions, and to monitor for, and detect, intrusions that infiltrate Smart Grid systems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An analysis of community-based campaigns opposing waste incineration and advocating 'zero waste' policies in Ireland, North and South.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The aim of this Study was to examine the relationship between job characteristics and burnout, i.e., exhaustion, cynicism and lack of professional efficacy, in a sample of 115 (49- to 61-yr.-old) information and communications technology professionals. Questionnaire survey data were collected at two time points. In 1995 (Time 1), higher quantitative overload and lower job control were associated with higher exhaustion. Job control was negatively associated with lack of professional efficacy. In 2001 (Time 2), quantitative overload and information overload were positively associated with exhaustion, but with job control negatively. Use of new information Was negatively associated with cynicism. In addition, job control and use of new information were negatively associated with lack of professional efficacy. job characteristics at Time 1 were not significantly associated with burnout at Time 2 when job characteristics at Time 2 were controlled.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mobile ad hoc networking of dismounted combat personnel is expected to play an important role in the future of network-centric operations. High-speed, short-range, soldier-to-soldier wireless communications will be required to relay information on situational awareness, tactical instructions, and covert surveillance related data during special operations reconnaissance and other missions. This article presents some of the work commissioned by the U. K. Ministry of Defence to assess the feasibility of using 60 GHz millimeter-wave smart antenna technology to provide covert communications capable of meeting these stringent networking needs. Recent advances in RF front-end technology, alongside physical layer transmission schemes that could be employed in millimeter-wave soldier-mounted radio, are discussed. The introduction of covert communications between soldiers will require the development of a bespoke directive medium access layer. A number of adjustments to the IEEE 802.11 distribution coordination function that will enable directional communications are suggested. The successful implementation of future smart antenna technologies and direction of arrival-based protocols will be highly dependent on thorough knowledge of transmission channel characteristics prior to deployment. A novel approach to simulating dynamic soldier-to-soldier signal propagation using state-of-the-art animation-based technology developed for computer game design is described, and important channel metrics such as root mean square angle and delay spread for a team of four networked infantry soldiers over a range of indoor and outdoor environments is reported.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

There is a substantial literature on the relationship between gender and access to finance. However, most studies have been concerned with access to debt finance. More recently, the focus of this research has broadened to examine women and venture capital. This article extends the focus further by examining the role of women in the business angel market, which is more important than the formal venture capital market in terms of both the number of ventures supported and total capital flows. Based on a detailed analysis of business angels in the U.K., the study concludes that women investors who are active in the market differ from their male counterparts in only limited respects. Future research into women business angels, and the possible existence of gender differences, needs to be based on more fully elaborated standpoint epistemologies that focus on the experience of the woman angel investor per se, and center on the examination of the role of homophily, social capital, networking, and competition in investment behavior.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This letter reports the statistical characterization and modeling of the indoor radio channel for a mobile wireless personal area network operating at 868 MHz. Line of sight (LOS) and non-LOS conditions were considered for three environments: anechoic chamber, open office area and hallway. Overall, the Nakagami-m cdf best described fading for bodyworn operation in 60% of all measured channels in anechoic chamber and open office area environments. The Nakagami distribution was also found to provide a good description of Rician distributed channels which predominated in the hallway. Multipath played an important role in channel statistics with the mean recorded m value being reduced from 7.8 in the anechoic chamber to 1.3 in both the open office area and hallway.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Key pre-distribution schemes have been proposed as means to overcome Wireless Sensor Networks constraints such as limited communication and processing power. Two sensor nodes can establish a secure link with some probability based on the information stored in their memories though it is not always possible that two sensor nodes may set up a secure link. In this paper, we propose a new approach that elects trusted common nodes called ”Proxies” which reside on an existing secure path linking two sensor nodes. These sensor nodes are used to send the generated key which will be divided into parts (nuggets) according to the number of elected proxies. Our approach has been assessed against previously developed algorithms and the results show that our algorithm discovers proxies more quickly which are closer to both end nodes, thus producing shorter path lengths. We have also assessed the impact of our algorithm on the average time to establish a secure link when the transmitter and receiver of the sensor nodes are ”ON”. The results show the superiority of our algorithm in this regard. Overall, the proposed algorithm is well suited for Wireless Sensor Networks.