885 resultados para Communication in architecture


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Providing QoS in the context of Ad Hoc networks includes a very wide field of application from the perspective of every level of the architecture in the network. Saying It in another way, It is possible to speak about QoS when a network is capable of guaranteeing a trustworthy communication in both extremes, between any couple of the network nodes by means of an efficient Management and administration of the resources that allows a suitable differentiation of services in agreement with the characteristics and demands of every single application.The principal objective of this article is the analysis of the quality parameters of service that protocols of routering reagents such as AODV and DSR give in the Ad Hoc mobile Networks; all of this is supported by the simulator ns-2. Here were going to analyze the behavior of some other parameters like effective channel, loss of packages and latency in the protocols of routering. Were going to show you which protocol presents better characteristics of Quality of Service (QoS) in the MANET networks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Advances in digital speech processing are now supporting application and deployment of a variety of speech technologies for human/machine communication. In fact, new businesses are rapidly forming about these technologies. But these capabilities are of little use unless society can afford them. Happily, explosive advances in microelectronics over the past two decades have assured affordable access to this sophistication as well as to the underlying computing technology. The research challenges in speech processing remain in the traditionally identified areas of recognition, synthesis, and coding. These three areas have typically been addressed individually, often with significant isolation among the efforts. But they are all facets of the same fundamental issue--how to represent and quantify the information in the speech signal. This implies deeper understanding of the physics of speech production, the constraints that the conventions of language impose, and the mechanism for information processing in the auditory system. In ongoing research, therefore, we seek more accurate models of speech generation, better computational formulations of language, and realistic perceptual guides for speech processing--along with ways to coalesce the fundamental issues of recognition, synthesis, and coding. Successful solution will yield the long-sought dictation machine, high-quality synthesis from text, and the ultimate in low bit-rate transmission of speech. It will also open the door to language-translating telephony, where the synthetic foreign translation can be in the voice of the originating talker.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Nowadays, road safety and traffic congestion are major concerns worldwide. This is why research on vehicular communication is very vital. In static scenarios vehicles behave typically like in an office network where nodes transmit without moving and with no defined position. This paper analyses the impact of context information on existing popular rate adaptation algorithms. Our simulation was done in MATLAB by observing the impact of context information on these algorithms. Simulation was performed for both static and mobile cases.Our simulations are based on IEEE 802.11p wireless standard. For static scenarios vehicles do not move and without defined positions, while for the mobile case, vehicles are mobile with uniformly selected speed and randomized positions. Network performance are analysed using context information. Our results show that in mobility when context information is used, the system performance can be improved for all three rate adaptation algorithms. That can be explained by that with range checking, when many vehicles are out of communication range, less vehicles contend for network resources, thereby increasing the network performances. © 2013 IEEE.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

For intelligent DC distributed power systems, data communication plays a vital role in system control and device monitoring. To achieve communication in a cost effective way, power/signal dual modulation (PSDM), a method that integrates data transmission with power conversion, can be utilized. In this paper, an improved PSDM method using phase shift full bridge (PSFB) converter is proposed. This method introduces a phase control based freedom in the conventional PSFB control loop to realize communication using the same power conversion circuit. In this way, decoupled data modulation and power conversion are realized without extra wiring and coupling units, and thus the system structure is simplified. More importantly, the signal intensity can be regulated by the proposed perturbation depth, and so this method can adapt to different operating conditions. Application of the proposed method to a DC distributed power system composed of several PSFB converters is discussed. A 2kW prototype system with an embedded 5kbps communication link has been implemented, and the effectiveness of the method is verified by experimental results.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of this research was to explore a new way of experiencing a performance space using the portability and flexibility of a cargo container. Since the 17th century there has been a split between theater, as a written work, and architecture. Theater has lost its founding essence becoming more about the structure and less about the performance. Contemporary theater designs came through the development of street performances, which developed into theater types such as the Black Box and lately video and projection screening. With the exploration of kinetic uses in architecture and defragmentation of a cargo container there is a new step on the development of theater design. Using a cargo container gave me a familiar object with specific dimensions to start my exploration as well as the possibility of having the theater transported to many sites. The findings demonstrate that there are many unexplored possibilities to create a performance space outside the conventional theater that can promote new types of performances as well as the use of new technologies of video and projection.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background: Although many studies have investigated sexual communication between parents and children in Kenya, none have focused singularly on grandparent and grandchild communication when grandparents are primary caregivers. Further, few studies have asked about specific topics related to sex, instead asking generally about “sex related topics” or focusing on HIV/AIDS. This research aims to investigate communication on ten specific sex- related topics between grandparents who are primary caregivers and their grandchildren. The primary research aim was to identify facilitators and barriers to grandparent-grandchild communication associated with frequency of communication. A secondary exploratory question was whether frequency of communication and youth satisfaction with communication were associated with youth’s desire for more communication in the future. Methods: The study was conducted in urban and peri-urban central Kenya. A convenience sample of 193 grandparents and 166 twelve to fifteen year old grandchildren were identified by community health workers. A cross sectional survey assessed nine potential barriers or facilitators to communication (e.g., frequency of communication, perceived grandparent knowledge, grandparent sense of responsibility to communication on a given topic) on ten specified sex- related topics (e.g., peer pressure on sex topics, romantic relationships, condoms). Bivariate and multivariable analyses identified significant associations between communication variables and the outcomes of interest. Results: Bivariate regression showed that higher grandchild age, grandchild gender, higher perceived grandparent knowledge, higher perceived grandparent comfort, higher grandparent-reported sense of responsibility, higher grandparent-reported belief that child should be aware of a given topic before initiating in sex, and higher youth’s own comfort during communication, were significantly associated with higher levels of communication frequency. In the multivariable model, higher grandchild age, gender, higher comfort during communication, and higher perceived grandparent knowledge remained significantly associated with higher levels communication frequency. For the secondary research question, higher communication frequency and higher levels of youth satisfaction were both significantly associated with higher levels of youth desire for more communication in bivariate regression, and higher levels of youth’s satisfaction with communication remained significantly associated with higher levels of youth’s desire for more in the adjusted analysis. Conclusions: This study found that several potential barriers and facilitators of communication are associated with both frequency of and youth’s desire for more communication. The association between grandchild age, gender and perceived grandparent knowledge and frequency of communication is similar to findings from other studies that have examined sex-related communication between parent primary caregivers and children. This finding has important implications for understanding grandparent and grandchild communication, and communication on specific topics in a population from Kenya. The positive association between youth satisfaction of and desire for more communication has important education policy and intervention implications, suggesting that if youth are satisfied with the communication with their caregivers, they may want to learn more.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Backscatter communication is an emerging wireless technology that recently has gained an increase in attention from both academic and industry circles. The key innovation of the technology is the ability of ultra-low power devices to utilize nearby existing radio signals to communicate. As there is no need to generate their own energetic radio signal, the devices can benefit from a simple design, are very inexpensive and are extremely energy efficient compared with traditional wireless communication. These benefits have made backscatter communication a desirable candidate for distributed wireless sensor network applications with energy constraints.

The backscatter channel presents a unique set of challenges. Unlike a conventional one-way communication (in which the information source is also the energy source), the backscatter channel experiences strong self-interference and spread Doppler clutter that mask the information-bearing (modulated) signal scattered from the device. Both of these sources of interference arise from the scattering of the transmitted signal off of objects, both stationary and moving, in the environment. Additionally, the measurement of the location of the backscatter device is negatively affected by both the clutter and the modulation of the signal return.

This work proposes a channel coding framework for the backscatter channel consisting of a bi-static transmitter/receiver pair and a quasi-cooperative transponder. It proposes to use run-length limited coding to mitigate the background self-interference and spread-Doppler clutter with only a small decrease in communication rate. The proposed method applies to both binary phase-shift keying (BPSK) and quadrature-amplitude modulation (QAM) scheme and provides an increase in rate by up to a factor of two compared with previous methods.

Additionally, this work analyzes the use of frequency modulation and bi-phase waveform coding for the transmitted (interrogating) waveform for high precision range estimation of the transponder location. Compared to previous methods, optimal lower range sidelobes are achieved. Moreover, since both the transmitted (interrogating) waveform coding and transponder communication coding result in instantaneous phase modulation of the signal, cross-interference between localization and communication tasks exists. Phase discriminating algorithm is proposed to make it possible to separate the waveform coding from the communication coding, upon reception, and achieve localization with increased signal energy by up to 3 dB compared with previous reported results.

The joint communication-localization framework also enables a low-complexity receiver design because the same radio is used both for localization and communication.

Simulations comparing the performance of different codes corroborate the theoretical results and offer possible trade-off between information rate and clutter mitigation as well as a trade-off between choice of waveform-channel coding pairs. Experimental results from a brass-board microwave system in an indoor environment are also presented and discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The hypothesis that the same educational objective, raised as cooperative or collaborative learning in university teaching does not affect students’ perceptions of the learning model, leads this study. It analyses the reflections of two students groups of engineering that shared the same educational goals implemented through two different methodological active learning strategies: Simulation as cooperative learning strategy and Problem-based Learning as a collaborative one. The different number of participants per group (eighty-five and sixty-five, respectively) as well as the use of two active learning strategies, either collaborative or cooperative, did not show differences in the results from a qualitative perspective.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable attack specific modules for DDoS, spamming, info-stealing, remote access, boot-sector formatting etc. BlackEnergy has been involved in several high profile cyber physical attacks including the recent Ukraine power grid attack in December 2015. This paper investigates the evolution of BlackEnergy and its cyber attack capabilities. It presents a basic cyber attack model used by BlackEnergy for targeting industrial control systems. In particular, the paper analyzes cyber threats of BlackEnergy for synchrophasor based systems which are used for real-time control and monitoring functionalities in smart grid. Several BlackEnergy based attack scenarios have been investigated by exploiting the vulnerabilities in two widely used synchrophasor communication standards: (i) IEEE C37.118 and (ii) IEC 61850-90-5. Specifically, the paper addresses reconnaissance, DDoS, man-in-the-middle and replay/reflection attacks on IEEE C37.118 and IEC 61850-90-5. Further, the paper also investigates protection strategies for detection and prevention of BlackEnergy based cyber physical attacks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In contrast to marking of the location of resources or sexual partners using single-spot pheromone sources, pheromone paths attached to the substrate and assisting orientation are rarely found among flying organisms. However, they do exist in meliponine bees (Apidae, Apinae, Meliponini), commonly known as stingless bees, which represent a group of important pollinators in tropical forests. Worker bees of several Neotropical meliponine species, especially in the genus Scaptotrigona Moure 1942, deposit pheromone paths on substrates between highly profitable resources and their nest. In contrast to past results and claims, we find that these pheromone paths are not an indispensable condition for successful recruitment but rather a means to increase the success of recruiters in persuading their nestmates to forage food at a particular location. Our results are relevant to a speciation theory in scent path-laying meliponine bees, such as Scaptotrigona. In addition, the finding that pheromone path-laying bees are able to recruit to food locations even across barriers such as large bodies of water affects tropical pollination ecology and theories on the evolution of resource communication in insect societies with a flying worker caste.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This study explores the role of nurturing communication in distinguishing interpersonal and intergroup interactions between health professionals and patients, from the perspective of communication accommodation theory (CAT). Participants (47 men and 87 women) rated videotapes of actual hospital consultations on 12 goal and 16 strategy items derived from CAT. Health professionals in interpersonal interactions were perceived to pay more attention to relationship and emotional needs and to use more nurturant discourse management and emotional expression. These results point the way toward elucidating the perceived optimal balance in accommodative behavior, both group based and interpersonal, in these contexts, and they highlight the importance of nurturant communication to this process.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The alpha-conotoxins, a class of nicotinic acetylcholine receptor (nAChR) antagonists, are emerging as important probes of the role played by different nAChR subtypes in cell function and communication, In this study, the native alpha-conotoxins PnIA and PnIB were found to cause concentration-dependent inhibition of the ACh-induced current in all rat parasympathetic neurons examined, with IC50 values of 14 and 33 nM, and a maximal reduction in current amplitude of 87% and 71%, respectively. The modified alpha-conotoxin [N11S]PnIA reduced the ACh-induced current with an IC50 value of 375 nM and a maximally effective concentration caused 91% block, [A10L]PnIA was the most potent inhibitor, reducing the ACh-induced current in similar to 80% of neurons, with an IC50 value of 1.4 nM and 46% maximal block of the total current, The residual current was not inhibited further by alpha-bungarotoxin, but was further reduced by the cu-conotoxins PnIA or PnIB, and by mecamylamine. H-1 NMR studies indicate that PnIA, PnIB, and the analogues, [A10L]PnIA and [N11S]PnIA, have identical backbone structures. We propose that positions 10 and II of PnIA and PnIB influence potency and determine selectivity among alpha 7 and other nAChR subtypes, including alpha 3 beta 2 and alpha 3 beta 4, Four distinct components of the nicotinic ACh-induced current in mammalian parasympathetic neurons have been dissected with these conopeptides.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Some patients are no longer able to communicate effectively or even interact with the outside world in ways that most of us take for granted. In the most severe cases, tetraplegic or post-stroke patients are literally `locked in` their bodies, unable to exert any motor control after, for example, a spinal cord injury or a brainstem stroke, requiring alternative methods of communication and control. But we suggest that, in the near future, their brains may offer them a way out. Non-invasive electroencephalogram (EEG)-based brain-computer interfaces (BCD can be characterized by the technique used to measure brain activity and by the way that different brain signals are translated into commands that control an effector (e.g., controlling a computer cursor for word processing and accessing the internet). This review focuses on the basic concepts of EEG-based BC!, the main advances in communication, motor control restoration and the down-regulation of cortical activity, and the mirror neuron system (MNS) in the context of BCI. The latter appears to be relevant for clinical applications in the coming years, particularly for severely limited patients. Hypothetically, MNS could provide a robust way to map neural activity to behavior, representing the high-level information about goals and intentions of these patients. Non-invasive EEG-based BCIs allow brain-derived communication in patients with amyotrophic lateral sclerosis and motor control restoration in patients after spinal cord injury and stroke. Epilepsy and attention deficit and hyperactive disorder patients were able to down-regulate their cortical activity. Given the rapid progression of EEG-based BCI research over the last few years and the swift ascent of computer processing speeds and signal analysis techniques, we suggest that emerging ideas (e.g., MNS in the context of BC!) related to clinical neuro-rehabilitation of severely limited patients will generate viable clinical applications in the near future.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The preset study adopted an intergroup approach to information sharing and communication in three organisational samples during change. In Study 1, employees from a public hospital (N = 142) completed a survey measuring perceptions of organisational communication and strength of identification with the work unit and the organisation as a whole. Consistent with predictions, team members rated communication from double ingroup members (same work unit/same occupational group) more favourably than communication from partial group members (same work unit/different occupational group). Also as predicted, work unit identification was related to favourable ratings of work unit communication across occupational groups, whereas occupational identification was related to favourable ratings of work unit communication within occupational groups. In Study 2, strength of identification with three organisational groups was associated with positive ratings of communication among employees from the same public hospital (N = 189) and a military organisation (N = 2119). Based on these results, intergroup strategies for the management of information sharing and organisational communication during change are discussed.