833 resultados para power line communication
Resumo:
O consumidor contemporâneo, inserido em um novo ambiente de comunicação, potencializa suas expressões, capaz de avaliar uma marca ou produto e transmitir sua opinião pelas redes sociais, ou seja, o consumidor expressa suas opiniões e desejos dialogando com seus pares de forma espontânea nas redes sociais on-line. É neste ambiente de participação e interação (ciberespaço) que está nosso objeto de estudo, o boca a boca on-line – a voz do consumidor contemporâneo, também conhecido como uma manifestação informativa pessoal ou uma conversa, a opinion sharing. Proporcionado pelos consumidores nas redes sociais on-line, o boca a boca se fortalece em função das possibilidades de interação, característica da sociedade em rede. Nesse cenário, oobjetivo desta pesquisa é caracterizar o boca a boca on-line como um novo fluxo comunicacional entre consumidores, hoje potencializado pelas novas tecnologias da comunicação, capazes de alterar a percepção da marca e demonstrar o uso, pelas marcas, das redes sociais on-line ainda como um ambiente de comunicação unidirecional. Mediante três casos selecionados por conveniência (dois casos nacionais e um internacional), o corpus de análise de nossa pesquisa se limitou aos 5.084 comentários disponibilizados após publicação de matérias jornalísticas no Portal G1 e nas fanpages (Facebook), ambos relativos aos casos selecionados. Com a Análise de Conteúdo dos posts, identificamos e categorizamos a fala do consumidor contemporâneo, sendo assim possível comprovar que as organizações/marcas se valem da cultura do massivo, não dialogando com seus consumidores, pois utilizam as redes sociais on-line ainda de forma unidirecional, além de não darem a devida atenção ao atual fluxo onde se evidencia a opinião compartilhada dos consumidores da sociedade em rede.
Resumo:
Various paging.
Resumo:
Mode of access: Internet.
Resumo:
This study examined employees' perceptions of trust, power and mentoring in manager-employee relationships in a variety of sectors, including health care, education, hospitality and retail. The main theoretical frameworks used were communication accommodation theory and social identity theory, in examining the manager-employee relationships from an in-group/out-group perspective. Computer-aided content analyses revealed a number of emergent communication and relationship themes that impact upon the level of 'in-groupness' and therefore trust in supervisor-supervisee relationships. While it may be illusory to believe that any organization can enjoy complete trust among its workforce, it is clear that certain communication characteristics can result in greater trust in manager-employee relationships, even within the context of organizational constraints. It is argued that the results of the study could be used to inform human resource management academics of key aspects of managerial communication that should be further researched, and also provide insights into the main communication skills that managers should focus upon to improve trust in the workplace.
Resumo:
In this paper the performance of a multiple input multiple output (MIMO) wireless communication system operating in an indoor environment, featuring both line of sight (LOS) and non-line of sight (NLOS) signal propagation, is assessed. In the model the scattering objects are assumed to be uniformly distributed in an area surrounding the transmitting and receiving array antennas. Mutual coupling effects in the arrays are treated in an exact manner. However interactions with scattering objects are taken into account via a single bounce approach. Computer simulations are carried out for the system capacity for varying inter-element spacing in the receiving array for assumed values of LOS/NLOS power fraction and signal to noise ratio (SNR).
Resumo:
Collision induced power jitter is examined in dispersion-managed wavelength division-multiplexed transmission systems. The power jitter causes ’ a serious problem for a singly-periodic dispersion managed line having almost zero average dispersion, which can be reduced by applying doubly-periodic dispersion management.
Resumo:
Whilst some authors have portrayed the Internet as a powerful tool for business and political institutions, others have highlighted the potential of this technology for those vying to constrain or counter-balance the power of organizations, through e-collectivism and on-line action. What appears to be emerging is a contested space that has the potential to simultaneously enhance the power of organizations, whilst also acting as an enabling technology for the empowerment of grass-root networks. In this struggle, organizations are fighting for the retention of “old economy” positions, as well as the development of “new economy” power-bases. In realizing these positions, organizations and institutions are strategizing and manoeuvering in order to shape on-line networks and communications. For example, the on-line activities of individuals can be contained through various technological means, such as surveillance, and the structuring of the virtual world through the use of portals and “walled gardens”. However, loose groupings of individuals are also strategizing to ensure there is a liberation of their communication paths and practices, and to maintain the potential for mobilization within and across traditional boundaries. In this article, the unique nature and potential of the Internet are evaluated, and the struggle over this contested virtual space is explored.
Resumo:
A method is proposed to offer privacy in computer communications, using symmetric product block ciphers. The security protocol involved a cipher negotiation stage, in which two communicating parties select privately a cipher from a public cipher space. The cipher negotiation process includes an on-line cipher evaluation stage, in which the cryptographic strength of the proposed cipher is estimated. The cryptographic strength of the ciphers is measured by confusion and diffusion. A method is proposed to describe quantitatively these two properties. For the calculation of confusion and diffusion a number of parameters are defined, such as the confusion and diffusion matrices and the marginal diffusion. These parameters involve computationally intensive calculations that are performed off-line, before any communication takes place. Once they are calculated, they are used to obtain estimation equations, which are used for on-line, fast evaluation of the confusion and diffusion of the negotiated cipher. A technique proposed in this thesis describes how to calculate the parameters and how to use the results for fast estimation of confusion and diffusion for any cipher instance within the defined cipher space.