35 resultados para Materiality of Communication
Resumo:
Link adaptation (LA) plays an important role in adapting an IEEE 802.11 network to wireless link conditions and maximizing its capacity. However, there is a lack of theoretic analysis of IEEE 802.11 LA algorithms. In this article, we propose a Markov chain model for an 802.11 LA algorithm (ONOE algorithm), aiming to identify the problems and finding the space of improvement for LA algorithms. We systematically model the impacts of frame corruption and collision on IEEE 802.11 network performance. The proposed analytic model was verified by computer simulations. With the analytic model, it can be observed that ONOE algorithm performance is highly dependent on the initial bit rate and parameter configurations. The algorithm may perform badly even under light channel congestion, and thus, ONOE algorithm parameters should be configured carefully to ensure a satisfactory system performance. Copyright © 2011 John Wiley & Sons, Ltd.
Resumo:
Distributed network utility maximization (NUM) is receiving increasing interests for cross-layer optimization problems in multihop wireless networks. Traditional distributed NUM algorithms rely heavily on feedback information between different network elements, such as traffic sources and routers. Because of the distinct features of multihop wireless networks such as time-varying channels and dynamic network topology, the feedback information is usually inaccurate, which represents as a major obstacle for distributed NUM application to wireless networks. The questions to be answered include if distributed NUM algorithm can converge with inaccurate feedback and how to design effective distributed NUM algorithm for wireless networks. In this paper, we first use the infinitesimal perturbation analysis technique to provide an unbiased gradient estimation on the aggregate rate of traffic sources at the routers based on locally available information. On the basis of that, we propose a stochastic approximation algorithm to solve the distributed NUM problem with inaccurate feedback. We then prove that the proposed algorithm can converge to the optimum solution of distributed NUM with perfect feedback under certain conditions. The proposed algorithm is applied to the joint rate and media access control problem for wireless networks. Numerical results demonstrate the convergence of the proposed algorithm. © 2013 John Wiley & Sons, Ltd.
Resumo:
Risk management and knowledge management have so far been studied almost independently. The evolution of risk management to the holistic view of Enterprise Risk Management requires the destruction of barriers between organizational silos and the exchange and application of knowledge from different risk management areas. However, knowledge management has received little or no attention in risk management. This paper examines possible relationships between knowledge management constructs related to knowledge sharing, and two risk management concepts: perceived quality of risk control and perceived value of enterprise risk management. From a literature review, relationships with eight knowledge management variables covering people, process and technology aspects were hypothesised. A survey was administered to risk management employees in financial institutions. The results showed that the perceived quality of risk control is significantly associated with four knowledge management variables: perceived quality of risk knowledge sharing, perceived quality of communication among people, web channel functionality, and risk management information system functionality. However, the relationships of the knowledge management variables to the perceived value of enterprise risk management are not significant. We conclude that better knowledge management is associated with better risk control, but that more effort needs to be made to break down organizational silos in order to support true Enterprise Risk Management.
Resumo:
Over the past two years there have been several large-scale disasters (Haitian earthquake, Australian floods, UK riots, and the Japanese earthquake) that have seen wide use of social media for disaster response, often in innovative ways. This paper provides an analysis of the ways in which social media has been used in public-to-public communication and public-to-government organisation communication. It discusses four ways in which disaster response has been changed by social media: 1. Social media appears to be displacing the traditional media as a means of communication with the public during a crisis. In particular social media influences the way traditional media communication is received and distributed. 2. We propose that user-generated content may provide a new source of information for emergency management agencies during a disaster, but there is uncertainty with regards to the reliability and usefulness of this information. 3. There are also indications that social media provides a means for the public to self-organise in ways that were not previously possible. However, the type and usefulness of self-organisation sometimes works against efforts to mitigate the outcome of the disaster. 4. Social media seems to influence information flow during a disaster. In the past most information flowed in a single direction from government organisation to public, but social media negates this model. The public can diffuse information with ease, but also expect interaction with Government Organisations rather than a simple one-way information flow. These changes have implications for the way government organisations communicate with the public during a disaster. The predominant model for explaining this form of communication, the Crisis and Emergency Risk Communication (CERC), was developed in 2005 before social media achieved widespread popularity. We will present a modified form of the CERC model that integrates social media into the disaster communication cycle, and addresses the ways in which social media has changed communication between the public and government organisations during disasters.
Resumo:
Over the past two years there have been several large-scale disasters (Haitian earthquake, Australian floods, UK riots, and the Japanese earthquake) that have seen wide use of social media for disaster response, often in innovative ways. This paper provides an analysis of the ways in which social media has been used in public-to-public communication and public-to-government organisation communication. It discusses four ways in which disaster response has been changed by social media: 1. Social media appears to be displacing the traditional media as a means of communication with the public during a crisis. In particular social media influences the way traditional media communication is received and distributed. 2. We propose that user-generated content may provide a new source of information for emergency management agencies during a disaster, but there is uncertainty with regards to the reliability and usefulness of this information. 3. There are also indications that social media provides a means for the public to self-organise in ways that were not previously possible. However, the type and usefulness of self-organisation sometimes works against efforts to mitigate the outcome of the disaster. 4. Social media seems to influence information flow during a disaster. In the past most information flowed in a single direction from government organisation to public, but social media negates this model. The public can diffuse information with ease, but also expect interaction with Government Organisations rather than a simple one-way information flow. These changes have implications for the way government organisations communicate with the public during a disaster. The predominant model for explaining this form of communication, the Crisis and Emergency Risk Communication (CERC), was developed in 2005 before social media achieved widespread popularity. We will present a modified form of the CERC model that integrates social media into the disaster communication cycle, and addresses the ways in which social media has changed communication between the public and government organisations during disasters.
Resumo:
With the features of low-power and flexible networking capabilities IEEE 802.15.4 has been widely regarded as one strong candidate of communication technologies for wireless sensor networks (WSNs). It is expected that with an increasing number of deployments of 802.15.4 based WSNs, multiple WSNs could coexist with full or partial overlap in residential or enterprise areas. As WSNs are usually deployed without coordination, the communication could meet significant degradation with the 802.15.4 channel access scheme, which has a large impact on system performance. In this thesis we are motivated to investigate the effectiveness of 802.15.4 networks supporting WSN applications with various environments, especially when hidden terminals are presented due to the uncoordinated coexistence problem. Both analytical models and system level simulators are developed to analyse the performance of the random access scheme specified by IEEE 802.15.4 medium access control (MAC) standard for several network scenarios. The first part of the thesis investigates the effectiveness of single 802.15.4 network supporting WSN applications. A Markov chain based analytic model is applied to model the MAC behaviour of IEEE 802.15.4 standard and a discrete event simulator is also developed to analyse the performance and verify the proposed analytical model. It is observed that 802.15.4 networks could sufficiently support most WSN applications with its various functionalities. After the investigation of single network, the uncoordinated coexistence problem of multiple 802.15.4 networks deployed with communication range fully or partially overlapped are investigated in the next part of the thesis. Both nonsleep and sleep modes are investigated with different channel conditions by analytic and simulation methods to obtain the comprehensive performance evaluation. It is found that the uncoordinated coexistence problem can significantly degrade the performance of 802.15.4 networks, which is unlikely to satisfy the QoS requirements for many WSN applications. The proposed analytic model is validated by simulations which could be used to obtain the optimal parameter setting before WSNs deployments to eliminate the interference risks.
Resumo:
Distributed network utility maximization (NUM) is receiving increasing interests for cross-layer optimization problems in multihop wireless networks. Traditional distributed NUM algorithms rely heavily on feedback information between different network elements, such as traffic sources and routers. Because of the distinct features of multihop wireless networks such as time-varying channels and dynamic network topology, the feedback information is usually inaccurate, which represents as a major obstacle for distributed NUM application to wireless networks. The questions to be answered include if distributed NUM algorithm can converge with inaccurate feedback and how to design effective distributed NUM algorithm for wireless networks. In this paper, we first use the infinitesimal perturbation analysis technique to provide an unbiased gradient estimation on the aggregate rate of traffic sources at the routers based on locally available information. On the basis of that, we propose a stochastic approximation algorithm to solve the distributed NUM problem with inaccurate feedback. We then prove that the proposed algorithm can converge to the optimum solution of distributed NUM with perfect feedback under certain conditions. The proposed algorithm is applied to the joint rate and media access control problem for wireless networks. Numerical results demonstrate the convergence of the proposed algorithm. © 2013 John Wiley & Sons, Ltd.
Resumo:
Due to the dynamic and mutihop nature of the Mobile Ad-hoc Network (MANET), voice communication over MANET may encounter many challenges. We set up a subjective quality evaluation model using ITU-T E-model with extension. And through simulation in NS-2, we evaluate how the following factors impact voice quality in MANET: the number of hops, the number of route breakages, the number of communication pairs and the background traffic. Using AODV as the underlying routing protocol, and with the MAC layer changed from 802.11 DCF to 802.11e EDCF, we observe that 802.11e is more suitable for implementating voice communication over MANET. © 2005 IEEE.
Resumo:
Changes in the international economic scenario in recent years have made it necessary for both industrial and service firms to reformulate their strategies, with a strong focus on the resources required for successful implementation. In this scenario, information and communication technologies (ICT) has a potentially vital role to play both as a key resource for re-engineering business processes within a framework of direct connection between suppliers and customers, and as a source of cost optimisation. There have also been innovations in the logistics and freight transport industry in relation to ICT diffusion. The implementation of such systems by third party logistics providers (3PL) allows the real-time exchange of information between supply chain partners, thereby improving planning capability and customer service. Unlike other industries, the logistics and freight transport industry is lagging somewhat behind other sectors in ICT diffusion. This situation is to be attributed to a series of both industry-specific and other factors, such as: (a) traditional resistance to change on the part of transport and logistics service providers; (b) the small size of firms that places considerable constraints upon investment in ICT; (c) the relative shortage of user-friendly applications; (d) the diffusion of internal standards on the part of the main providers in the industry whose aim is to protect company information, preventing its dissemination among customers and suppliers; (e) the insufficient degree of professional skills for using such technologies on the part of staff in such firms. The latter point is of critical importance insofar as the adoption of ICT is making it increasingly necessary both to develop new technical skills to use different hardware and new software tools, and to be able to plan processes of communication so as to allow the optimal use of ICT. The aim of this paper is to assess the impact of ICT on transport and logistics industry and to highlight how the use of such new technologies is affecting providers' training needs. The first part will provide a conceptual framework of the impact of ICT on the transport and logistics industry. In the second part the state of ICT dissemination in the Italian and Irish third party logistics industry will be outlined. In the third part, the impact of ICT on the training needs of transport and logistics service providers - based on case studies in both countries - are discussed. The implications of the foregoing for the development of appropriate training policies are considered. For the covering abstract see ITRD E126595.
Resumo:
Translators wishing to work on translating specialised texts are traditionally recommended to spend much time and effort acquiring specialist knowledge of the domain involved, and for some areas of specialised activity, this is clearly essential. For other types of translation-based, domain-specific of communication, however, it is possible to develop a systematic approach to the task which will allow for the production of target texts which are adequate for purpose, in a range of specialised domains, without necessarily having formal qualifications in those areas. For Esselink (2000) translation agencies, and individual clients, would tend to prefer a subject expert who also happens to have competence in one or more languages over a trained translator with a high degree of translation competence, including the ability to deal with specialised translation tasks. The problem, for the would-be translator, is persuading prospective clients that he or she is capable of this. This paper will offer an overview of the principles used to design training intended to teach trainee translators how to use a systematic approach to specialised translation, in order to extend the range of areas in which they can tackle translation, without compromising quality or reliability. This approach will be described within the context of the functionalist approach developed in particular by Reiss and Vermeer (1984), Nord (1991, 1997) inter alia.
Resumo:
For the development of communication systems such as Internet of Things, integrating communication with power supplies is an attractive solution to reduce supply cost. This paper presents a novel method of power/signal dual modulation (PSDM), by which signal transmission is integrated with power conversion. This method takes advantage of the intrinsic ripple initiated in switch mode power supplies as signal carriers, by which cost-effective communications can be realized. The principles of PSDM are discussed, and two basic dual modulation methods (specifically PWM/FSK and PWM/PSK) are concluded. The key points of designing a PWM/FSK system, including topology selection, carrier shape, and carrier frequency, are discussed to provide theoretical guidelines. A practical signal modulation-demodulation method is given, and a prototype system provides experimental results to verify the effectiveness of the proposed solution.
Resumo:
In recent years, we have witnessed the mushrooming of pro- democracy and protest movements not only in the Arab world, but also within Europe and the Americas. Such movements have ranged from popular upheavals, like in Tunisia and Egypt, to the organization of large- scale demonstrations against unpopular policies, as in Spain, Greece and Poland. What connects these different events are not only their democratic aspirations, but also their innovative forms of communication and organization through online means, which are sometimes considered to be outside of the State’s control. At the same time, however, it has become more and more apparent that countries are attempting to increase their understanding of, and control over, their citizens’ actions in the digital sphere. This involves striving to develop surveillance instruments, control mechanisms and processes engineered to dominate the digital public sphere, which necessitates the assistance and support of private actors such as Internet intermediaries. Examples include the growing use of Internet surveillance technology with which online data traffic is analysed, and the extensive monitoring of social networks. Despite increased media attention, academic debate on the ambivalence of these technologies, mechanisms and techniques remains relatively limited, as is discussion of the involvement of corporate actors. The purpose of this edited volume is to reflect on how Internet-related technologies, mechanisms and techniques may be used as a means to enable expression, but also to restrict speech, manipulate public debate and govern global populaces.
Resumo:
Communication in Forensic Contexts provides in-depth coverage of the complex area of communication in forensic situations. Drawing on expertise from forensic psychology, linguistics and law enforcement worldwide, the text bridges the gap between these fields in a definitive guide to best practice. •Offers best practice for understanding and improving communication in forensic contexts, including interviewing of victims, witnesses and suspects, discourse in courtrooms, and discourse via interpreters •Bridges the knowledge gaps between forensic psychology, forensic linguistics and law enforcement, with chapters written by teams bringing together expertise from each field •Published in collaboration with the International Investigative Interviewing Research Group, dedicated to furthering evidence-based practice and practice-based research amongst researchers and practitioners •International, cross-disciplinary team includes contributors from North America, Europe and Asia Pacific, and from psychology, linguistics and forensic practice
Resumo:
Communication in investigative and legal settings is a vitally important area of practice and research. This chapter outlines the significant paradigm shift in interviewing practices, highlighting various studies that have been conducted that have demarked this change. We examine the role of linguistics in this paradigm shift and the importance of training across England and Wales and the Nordic countries in maintaining the professionalization of communication in forensic contexts. The authors outline the significance of maintaining international links across disciplines and summarize the details of each chapter within the book.
Resumo:
Advertising and other forms of communications are often used by government bodies, non-government organisations, and other institutions to try to influence the population to either a) reduce some form of harmful behaviour (e.g. smoking, drunk- driving) or b) increase some more healthy behaviour (e.g. eating healthily). It is common for these messages to be predicated on the chances of some negative event occurring if the individual does not either a) stop the harmful behaviour, or b) start / increase the healthy behaviour. This design of communication is referred to by many names in the relevant literature, but for the purposes of this thesis, will be termed a ‘threat appeal’. Despite their widespread use in the public sphere, and concerted academic interest since the 1950s, the effectiveness of threat appeals in delivering their objective remains unclear in many ways. In a detailed, chronological and thematic examination of the literature, two assumptions are uncovered that have either been upheld despite little evidence to support them, or received limited attention at all, in the literature. Specifically, a) that threat appeal characteristics can be conflated with their intended responses, and b) that a threat appeal always and necessarily evokes a fear response in the subject. A detailed examination of these assumptions underpins this thesis. The intention is to take as a point of departure the equivocality of empirical results, and deliver a novel approach with the objective of reducing the confusion that is evident in existing work. More specifically, the present thesis frames cognitive and emotional responses to threat appeals as part of a decision about future behaviour. To further develop theory, a conceptual framework is presented that outlines the role of anticipated and anticipatory emotions, alongside subjective probabilities, elaboration and immediate visceral emotions, resultant from manipulation of the intrinsic message characteristics of a threat appeal (namely, message direction, message frame and graphic image). In doing so, the spectrum of relevant literature is surveyed, and used to develop a theoretical model which serves to integrate key strands of theory into a coherent model. In particular, the emotional and cognitive responses to the threat appeal manipulations are hypothesised to influence behaviour intentions and expectations pertaining to future behaviour. Using data from a randomised experiment with a sample of 681 participants, the conceptual model was tested using analysis of covariance. The results for the conceptual framework were encouraging overall, and also with regard to the individual hypotheses. In particular, empirical results showed clearly that emotional responses to the intrinsic message characteristics are not restricted to fear, and that different responses to threat appeals were clearly attributed to specific intrinsic message characteristics. In addition, the inclusion of anticipated emotions alongside cognitive appraisals in the framework generated interesting results. Specifically, immediate emotions did not influence key response variables related to future behaviour, in support of questioning the assumption of the prominent role of fear in the response process that is so prevalent in existing literature. The findings, theoretical and practical implications, limitations and directions for future research are discussed.