922 resultados para Radio coverage
Resumo:
We investigated the association between exposure to radio-frequency electromagnetic fields (RF-EMFs) from broadcast transmitters and childhood cancer. First, we conducted a time-to-event analysis including children under age 16 years living in Switzerland on December 5, 2000. Follow-up lasted until December 31, 2008. Second, all children living in Switzerland for some time between 1985 and 2008 were included in an incidence density cohort. RF-EMF exposure from broadcast transmitters was modeled. Based on 997 cancer cases, adjusted hazard ratios in the time-to-event analysis for the highest exposure category (>0.2 V/m) as compared with the reference category (<0.05 V/m) were 1.03 (95% confidence interval (CI): 0.74, 1.43) for all cancers, 0.55 (95% CI: 0.26, 1.19) for childhood leukemia, and 1.68 (95% CI: 0.98, 2.91) for childhood central nervous system (CNS) tumors. Results of the incidence density analysis, based on 4,246 cancer cases, were similar for all types of cancer and leukemia but did not indicate a CNS tumor risk (incidence rate ratio = 1.03, 95% CI: 0.73, 1.46). This large census-based cohort study did not suggest an association between predicted RF-EMF exposure from broadcasting and childhood leukemia. Results for CNS tumors were less consistent, but the most comprehensive analysis did not suggest an association.
Resumo:
Desde su nacimiento, la radio ha estado en constante peligro de desaparición. La prescripción y legitimidad asociadas a las ondas pueden resguardar a un servicio público en constante crisis. Las listas de reproducción o playlists son la base de la programación radiofónica musical y la posibilidad de acceder a las obras musicales tal y como “se oyen” es una opción que la radio en Internet ofrece. Este trabajo analiza cómo abordan los programas temáticos musicales de las emisoras de radio de antena convencional y bitcasters de titularidad pública en España la creación y publicación de listas de reproducción en Internet.
Resumo:
Two portable Radio Frequency IDentification (RFID) systems (made by Texas Instruments and HiTAG) were developed and tested for bridge scour monitoring by the Department of Civil and Environmental Engineering at the University of Iowa (UI). Both systems consist of three similar components: 1) a passive cylindrical transponder of 2.2 cm in length (derived from transmitter/responder); 2) a low frequency reader (~134.2 kHz frequency); and 3) an antenna (of rectangular or hexagonal loop). The Texas Instruments system can only read one smart particle per time, while the HiTAG system was successfully modified here at UI by adding the anti-collision feature. The HiTAG system was equipped with four antennas and could simultaneously detect 1,000s of smart particles located in a close proximity. A computer code was written in C++ at the UI for the HiTAG system to allow simultaneous, multiple readouts of smart particles under different flow conditions. The code is written for the Windows XP operational system which has a user-friendly windows interface that provides detailed information regarding the smart particle that includes: identification number, location (orientation in x,y,z), and the instance the particle was detected.. These systems were examined within the context of this innovative research in order to identify the best suited RFID system for performing autonomous bridge scour monitoring. A comprehensive laboratory study that included 142 experimental runs and limited field testing was performed to test the code and determine the performance of each system in terms of transponder orientation, transponder housing material, maximum antenna-transponder detection distance, minimum inter-particle distance and antenna sweep angle. The two RFID systems capabilities to predict scour depth were also examined using pier models. The findings can be summarized as follows: 1) The first system (Texas Instruments) read one smart particle per time, and its effective read range was about 3ft (~1m). The second system (HiTAG) had similar detection ranges but permitted the addition of an anti-collision system to facilitate the simultaneous identification of multiple smart particles (transponders placed into marbles). Therefore, it was sought that the HiTAG system, with the anti-collision feature (or a system with similar features), would be preferable when compared to a single-read-out system for bridge scour monitoring, as the former could provide repetitive readings at multiple locations, which could help in predicting the scour-hole bathymetry along with maximum scour depth. 2) The HiTAG system provided reliable measures of the scour depth (z-direction) and the locations of the smart particles on the x-y plane within a distance of about 3ft (~1m) from the 4 antennas. A Multiplexer HTM4-I allowed the simultaneous use of four antennas for the HiTAG system. The four Hexagonal Loop antennas permitted the complete identification of the smart particles in an x, y, z orthogonal system as function of time. The HiTAG system can be also used to measure the rate of sediment movement (in kg/s or tones/hr). 3) The maximum detection distance of the antenna did not change significantly for the buried particles compared to the particles tested in the air. Thus, the low frequency RFID systems (~134.2 kHz) are appropriate for monitoring bridge scour because their waves can penetrate water and sand bodies without significant loss of their signal strength. 4) The pier model experiments in a flume with first RFID system showed that the system was able to successfully predict the maximum scour depth when the system was used with a single particle in the vicinity of pier model where scour-hole was expected. The pier model experiments with the second RFID system, performed in a sandbox, showed that system was able to successfully predict the maximum scour depth when two scour balls were used in the vicinity of the pier model where scour-hole was developed. 5) The preliminary field experiments with the second RFID system, at the Raccoon River, IA near the Railroad Bridge (located upstream of 360th street Bridge, near Booneville), showed that the RFID technology is transferable to the field. A practical method would be developed for facilitating the placement of the smart particles within the river bed. This method needs to be straightforward for the Department of Transportation (DOT) and county road working crews so it can be easily implemented at different locations. 6) Since the inception of this project, further research showed that there is significant progress in RFID technology. This includes the availability of waterproof RFID systems with passive or active transponders of detection ranges up to 60 ft (~20 m) within the water–sediment column. These systems do have anti-collision and can facilitate up to 8 powerful antennas which can significantly increase the detection range. Such systems need to be further considered and modified for performing automatic bridge scour monitoring. The knowledge gained from the two systems, including the software, needs to be adapted to the new systems.
Resumo:
Recent studies have started to use media data to measure party positions and issue salience. The aim of this article is to compare and cross-validate this alternative approach with the more commonly used party manifestos, expert judgments and mass surveys. To this purpose, we present two methods to generate indicators of party positions and issue salience from media coverage: the core sentence approach and political claims analysis. Our cross-validation shows that with regard to party positions, indicators derived from the media converge with traditionally used measurements from party manifestos, mass surveys and expert judgments, but that salience indicators measure different underlying constructs. We conclude with a discussion of specific research questions for which media data offer potential advantages over more established methods.
Resumo:
In 2009, Cygnus X-3 (Cyg X-3) became the first microquasar to be detected in the GeV γ-ray regime, via the satellites Fermi and AGILE. The addition of this new band to the observational toolbox holds promise for building a more detailed understanding of the relativistic jets of this and other systems. We present a rich data set of radio, hard and soft X-ray, and γ-ray observations of Cyg X-3 made during a flaring episode in 2010 May. We detect a ~3 day softening and recovery of the X-ray emission, followed almost immediately by a ~1 Jy radio flare at 15 GHz, followed by a 4.3σ γ-ray flare (E > 100 MeV) ~1.5 days later. The radio sampling is sparse, but we use archival data to argue that it is unlikely the γ-ray flare was followed by any significant unobserved radio flares. In this case, the sequencing of the observed events is difficult to explain in a model in which the γ-ray emission is due to inverse Compton scattering of the companion star's radiation field. Our observations suggest that other mechanisms may also be responsible for γ-ray emission from Cyg X-3.
Resumo:
The archives of the Prefecture of the Peruvian Ministry of Foreign Affairs provide a perspective from which to reconstruct the broad range of legal circumstances in which Spanish residents in various regions of the country find themselves immersed (assets of relatives who have died without wills or family in Peru, political conflicts, legal problems -whether criminal or civil as a result of business activities- or the requested intervention ofconsular authorities when decisions considered detrimental to their compatriots are made by prefects and sub-prefects). The legal framework protecting Spanish nationals in Peru is analysed to understand the mechanisms of immigration in the country and the mechanisms that led them to keep their Spanish nationality, even after establishing wide-reaching family and business interests
Resumo:
OBJECTIVE: To assess the association between socio-demographic factors and the quality of preventive care and chronic care of cardiovascular (CV) risk factors in a country with universal health care coverage. METHODS: Our retrospective cohort assessed a random sample of 966 patients aged 50-80years followed over 2years (2005-2006) in 4 Swiss university primary care settings (Basel/Geneva/Lausanne/Zürich). We used RAND's Quality Assessment Tools indicators and examined recommended preventive care among different socio-demographic subgroups. RESULTS: Overall patients received 69.6% of recommended preventive care. Preventive care indicators were more likely to be met among men (72.8% vs. 65.4%; p<0.001), younger patients (from 71.0% at 50-59years to 66.7% at 70-80years, p for trend=0.03) and Swiss patients (71.1% vs. 62.7% in forced migrants; p=0.001). This latter difference remained in multivariate analysis adjusted for gender, age, civil status and occupation (OR 0.68; 95% CI 0.54-0.86). Forced migrants had lower scores for physical examination and breast and colon cancer screening (all p≤0.02). No major differences were seen for chronic care of CV risk factors. CONCLUSION: Despite universal healthcare coverage, forced migrants receive less preventive care than Swiss patients in university primary care settings. Greater attention should be paid to forced migrants for preventive care.
Resumo:
Entrevista a Radio Nikosia
Resumo:
This research paper provides the basis of a future doctoral thesison the construction of foreign news. We aim to highlight similarities and differences in the online news coverage of the nationalist movments in Scotland and Catalonia in the Canadian Anglophone and Francophone press. Through a qualitative and quantitative content analysis of The Montreal Gazette, The National Post, The Globe and Mail, Le Devoir and La Presse, we attempt to show the frames used in the coverage of the political developments in both “stateless regions” from January 2011 to September 2014, when a referendum on the constitutional status of Scotland has beenagreed on. In parallel to the analysis of daily online newspapers, we will use semi-structured interviews of journalists from each news organization to obtain more in-depth knowledge of the factors influencing the construction of news. Lastly, we want to find out to the extent to which the coverage on the nationalist movements in Scotland and Catalonia serve to revive the debate on the independence question of Québec
Resumo:
A guide for seniors on medicare and prescription drug plans
Resumo:
Cognitive radio is a wireless technology aimed at improvingthe efficiency use of the radio-electric spectrum, thus facilitating a reductionin the load on the free frequency bands. Cognitive radio networkscan scan the spectrum and adapt their parameters to operate in the unoccupiedbands. To avoid interfering with licensed users operating on a givenchannel, the networks need to be highly sensitive, which is achieved byusing cooperative sensing methods. Current cooperative sensing methodsare not robust enough against occasional or continuous attacks. This articleoutlines a Group Fusion method that takes into account the behavior ofusers over the short and long term. On fusing the data, the method is basedon giving more weight to user groups that are more unanimous in their decisions.Simulations have been performed in a dynamic environment withinterferences. Results prove that when attackers are present (both reiterativeor sporadic), the proposed Group Fusion method has superior sensingcapability than other methods.
Resumo:
Cognitive radio networks (CRN) sense spectrum occupancy and manage themselves to operate in unused bands without disturbing licensed users. The detection capability of a radio system can be enhanced if the sensing process is performed jointly by a group of nodes so that the effects of wireless fading and shadowing can be minimized. However, taking a collaborative approach poses new security threats to the system as nodes can report false sensing data to force a wrong decision. Providing security to the sensing process is also complex, as it usually involves introducing limitations to the CRN applications. The most common limitation is the need for a static trusted node that is able to authenticate and merge the reports of all CRN nodes. This paper overcomes this limitation by presenting a protocol that is suitable for fully distributed scenarios, where there is no static trusted node.
Resumo:
Spectrum is an essential resource for the provision of mobile services. In order to control and delimit its use, governmental agencies set up regulatory policies. Unfortunately, such policies have led to a deficiency of spectrum as only few frequency bands are left unlicensed, and these are used for the majority of new emerging wireless applications. One promising way to alleviate the spectrum shortage problem is adopting a spectrum sharing paradigm in which frequency bands are used opportunistically. Cognitive radio is the key technology to enable this shift of paradigm.Cognitive radio networks are self-organized systems in which devices cooperate to use those spectrum ranges that are not occupied by licensed users. They carry out spectrum sensing in order to detect vacant channels that can be used for communication. Even though spectrum sensing is an active area of research, an important issue remains unsolved: the secure authentication of sensing reports. Not providing security enables the input of false data in the system thus empowering false results. This paper presents a distributed protocol based on wireless physical layer security, symmetric cryptography and one-way functions that allows determining a final sensing decision from multiple sources in a quick and secure way, as well as it preserves users¿ privacy.
Resumo:
Spectrum scarcity demands thinking new ways tomanage the distribution of radio frequency bands so that its use is more effective. The emerging technology that can enable this paradigm shift is the cognitive radio. Different models fororganizing and managing cognitive radios have emerged, all with specific strategic purposes. In this article we review the allocation spectrum patterns of cognitive radio networks andanalyse which are the common basis of each model.We expose the vulnerabilities and open challenges that still threaten the adoptionand exploitation of cognitive radios for open civil networks.